Member since
09-29-2015
362
Posts
242
Kudos Received
63
Solutions
My Accepted Solutions
Title | Views | Posted |
---|---|---|
1312 | 03-14-2019 01:00 PM | |
1586 | 01-23-2019 04:19 PM | |
7187 | 01-15-2019 01:59 PM | |
4530 | 01-15-2019 01:57 PM | |
10582 | 12-06-2018 02:01 PM |
04-19-2016
06:48 PM
Is there anything relevant in the ambari-server-log. I need more information than "unexpected error condition" to provide help on this.
... View more
04-19-2016
12:15 PM
3 Kudos
@ARUNKUMAR RAMASAMY If you turn on debugging, the error message will contain the reason for failure. I am not sure why we need to turn on debugging to get more information - you would think that this info would be normally available. To turn on debugging, edit /etc/ambari-server/conf/log4j.properties and set the following line (line #28) from: log4j.rootLogger=INFO,file to log4j.rootLogger=DEBUG,file Then restart ambari, try again and see what the error message is. Since the log will be rather verbose, you will want to search (or grep) for "KdcServerConnectionVerification".
... View more
04-18-2016
05:35 PM
@sunil kanthety Unfortunately, I am not familiar with Accumulo issues. Does the issue correct itself when Kerberos is re-enabled?
... View more
04-18-2016
03:29 PM
@sunil kanthety You seem to be in an interesting state. What version of Ambari are you running? For the issue you posted where the error is "Security is enabled, but JCE policy zip is not specified". Check your ambari.properties file for a property named "jce.name". The file listed there should exist in /var/lib/ambari-server/resources. If the property or the file does not exist we need to investigate why. For starters, what version of Java are you using and did you have ambari-server setup install it or did you install Java manually? When enabling Kerberos via the UI. Does a button allowing you to skip the failed stage appear? If so, you should be able to click that and continue with the disable process. Once you complete disabling Kerberos, you should make sure that the Kerberos service is removed by issuing the following REST API call: DELETE /api/v1/clusters/CLUSTERNAME/services/KERBEROS For example, using curl on a cluster named C1 where the administrator username and password have not be changed from the default values: curl -H "X-Requested-By:ambari" -u admin:admin -X DELETE "http://<AMBARI-SERVER>:8080/api/v1/clusters/C1/services/KERBEROS After this, you should be able to retry enabling Kerberos again.
... View more
04-08-2016
04:37 PM
@Alan Watt The KDC verification process does not use the LDAP interface. It uses the KDC interface. So the port should be 88 not 636. This means that that in the KDC host field you entered in the LDAP details rather than the KDC admin details, thus the failure. Try setting the KDC host and KAdmin hosts to <servername>:88 and try again.
... View more
03-23-2016
03:39 PM
1 Kudo
Looking at the following error message, you specified the KDC host as "hostname" not the FQDN of the relevant host. An unexpected exception occurred while attempting to communicate with the KDC server at hostname:88 over TCP Rerun the Enable Kerberos Wizard and make sure you set the correct hostname for the KDC and admin hosts.
... View more
03-21-2016
03:24 PM
2 Kudos
If Ambari is to manage the cluster's Kerberos identities in the Active Directory, than it must connect to the Active Director using LDAPS. This is to allow Ambari to set the account passwords. If LDAP is used, enabling Kerberos will fail since Ambari needs to set the relevant account passwords and the Active Directory will reject the calls to create accounts from Ambari. If you cannot use LDAPS, then you will need to select the manual option when enabling Kerberos where you will need to manually create the accounts in the active directory. You will then need to export keytab files and distribute them to the appropriate hosts. A CSV file is provided via the wizard to identify the identities and keytab files needed.
... View more
03-13-2016
01:47 PM
2 Kudos
When using Ambari, I believe that in order to properly execute zkCli.sh, you need to first source the zookeeper-env.sh file. source /etc/zookeeper/conf/zookeeper-env.sh;
/usr/hdp/current/zookeeper-client/bin/zkCli.sh .... Modifying zookeeper_jaas.conf to use a service identity is not particularly appropriate for a user-executed task. User executed tasks should be authenticated use the executing user's identity. However I am not an expert with ZooKeeper.
... View more
03-08-2016
02:15 PM
2 Kudos
The JSON in the payload is incorrect: {"RequestInfo":{"context":"Stop DATANODE"},"Body":"HostRoles":{"state":"INSTALLED"}} Should be: {"RequestInfo":{"context":"Stop DATANODE"},"Body":{"HostRoles":{"state":"INSTALLED"}}} Note the added set of { and } around the HostRoles data.
... View more