Member since
09-29-2015
362
Posts
242
Kudos Received
63
Solutions
My Accepted Solutions
| Title | Views | Posted |
|---|---|---|
| 1821 | 03-14-2019 01:00 PM | |
| 2109 | 01-23-2019 04:19 PM | |
| 8612 | 01-15-2019 01:59 PM | |
| 6316 | 01-15-2019 01:57 PM | |
| 15286 | 12-06-2018 02:01 PM |
09-19-2016
01:11 PM
@Avijeet Dash For versions before Ambari 2.4.0, @Vipin Rathor's answer is correct. For Ambari 2.4.0 (and later), Ambari will do this for you when Kerberos is enabled.
... View more
09-15-2016
01:32 PM
1 Kudo
@Sanjib Behera After enabling Kerberos via Ambari, some of the UI's are configured to require Kerberos authentication where others are not. I am not sure why not all of them are changed, but that is the way it is for now. The Hadoop UIs (HDFS, Yarn, etc...), for example, do not have Kerberos enabled by default - though there are directions on how to do it manually. That said, once Kerberos authentication is required by a (web-based) UI, you cannot simply point your web browser at them. There are a few additional steps needed to enabled your the web browser to send Kerberos tokens. Each browser has a different set of instructions on how to do this. See https://ping.force.com/Support/PingFederate/Integrations/How-to-configure-supported-browsers-for-Kerberos-NTLM for some instruction on this. However in general you need to do the following: Configure your local machine to communicate with the relevant KDC On your local machine, kinit (or similar facility) as some Kerberos identity Open your web browser (you may need to close and re-open your web browser for it to acknowledge the Kerberos ticket cache) Update the settings in your web browser to enable Kerberos authentication (see the link posted above) Browse to the protected URL
... View more
09-14-2016
02:13 PM
1 Kudo
@Sanjib Behera The ACL file for the MIT KDC package on Ubuntu is typically at /etc/krb5kdc/kadm5.acl and should contain the following line to ensure the admin user has the ability to manage accounts in the KDC : */admin@XXX.COM * If this is set properly, then I would think that you should have no issues. Attached is my kdc install script for Ubuntu. Maybe it will help? install-kdc-ubuntush.txt If you make any changes to kadm5.acl file, be sure to restart both the krb5-admin-server and the krb5-kdc services. service krb5-kdc restart
service krb5-admin-server restart
... View more
09-13-2016
05:47 PM
1 Kudo
It appears you have a configuration issue in your krb5.conf and kdc.conf files. I assume you are setting up an MIT KDC which is outside the scope of Ambari or HDP. Have you tried following the MIT KDC install docs like the one at https://web.mit.edu/kerberos/krb5-devel/doc/admin/install_kdc.html? To help to get going, here is a KDC installation script that I use for installing on CentOS. It creates a realm named EXAMPLE.COM with an admin user - principal: admin/admin@EXAMPLE.COM; password: hadoop install-kdcsh.txt
... View more
08-26-2016
06:58 PM
3. (LDAP uri) The use of secure ldap (ldaps) is required her
Thanks for pointing this out. In a future version of Ambari, LDAPS will be a hard requirement by both the UI and the backend logic. For now (Ambari 2.4.0 and below) this is a documented requirement.
... View more
08-11-2016
12:25 PM
@Kuldeep Kulkarni, In the auth-to-local rule set examples, DEFAULT should be the last rule. Also, this is a bit more than setting up the trust relationship between two MIT KDCs. It also includes some details about allowing two clusters to access each other's data. To do this, I believe that there are a few more steps. See https://community.hortonworks.com/articles/18686/kerberos-cross-realm-trust-for-distcp.html
... View more
07-29-2016
05:38 PM
@Satish Bomma I think the installation for this is not too complex. The MIT KDC install easy with potentially little to do - depending on your security needs. Once the KDC is installed, and admin user needs to be created and you are done. Here is a script for Centos that installs a KDC - install-kdcsh.txt Then the trust relationship need to be created. This is about 3 command line calls on the Active Directory host and 1 on the MIT KDC host. Finally Ambari need to know about the Active Directory as well as the local KDC. This is done by adding a _realm_ block to the krb5.conf template and adding the Active Directory's realm to a text box labeled "Additional Realms" while enabling Kerberos.
... View more
07-29-2016
05:03 PM
4 Kudos
I would recommend setting up an MIT KDC for the cluster's service identities. If there are users in an Active Directory that need access to the services on the cluster, then a trust relationship between the cluster's KDC and the Active Directory can be setup to give those users access. This configuration lends itself to spreading the Kerberos-related workload across different KDCs - the service-related Kerberos workload remains local to the cluster while the user-related Kerberos workload is sent to the Active Directory. This reduces the load on the Active Directory; and depending on the network configuration, this can contain much of the network traffic to be local to the cluster.
... View more
07-26-2016
02:02 PM
Then it appears that things are looking pretty good. Is the alert still appearing? It may have been a hiccup where multiple threads were attempting to refresh that cache at the same time. I think in older versions of Ambari this was a problem every-so-often. What version of Ambari are you using?
... View more
07-26-2016
01:59 PM
Another source for master/slave configuration is https://web.mit.edu/kerberos/krb5-1.12/doc/admin/install_kdc.html
... View more