Member since
09-29-2015
362
Posts
242
Kudos Received
63
Solutions
My Accepted Solutions
Title | Views | Posted |
---|---|---|
1311 | 03-14-2019 01:00 PM | |
1585 | 01-23-2019 04:19 PM | |
7186 | 01-15-2019 01:59 PM | |
4525 | 01-15-2019 01:57 PM | |
10581 | 12-06-2018 02:01 PM |
04-24-2019
08:42 AM
I manage to retrieve the group named "ad_sshaccess_users" from the LDAP directory to the Ambari. But there is "0 member" inside this group. But in the Active Directory I created 2 users under this group mapped in the FreeIPA. Do you know if Ambari can retrieve AD users through a FreeIPA server which is doing the LDAP part? I'm not sure about that.
... View more
03-14-2019
01:00 PM
1 Kudo
@Oleg Tarassov, You are not looking at the correct source code version for Ambari 2.6.2.2. I believe that you want to look at https://github.com/apache/ambari/blob/release-2.6.2/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/IPAKerberosOperationHandler.java#L949. According to this, the encryption types are not considered when exporting keytab files from IPA. This has been fixed in Ambari 2.7.0 and above. See https://issues.apache.org/jira/browse/AMBARI-22293.
... View more
08-07-2019
01:41 PM
Hello! ran into the same problem, but in my case the kadmin/<FQDN kadmin server>@<REALM> existed and if i run kinit -S kadmin/@<REALM> admin/admin@<REALM> then he will authorize # klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: admin/admin@<REALM>
Valid starting Expires Service principal
08/07/2019 11:30:25 08/07/2019 14:30:25 kadmin/cluster@<REALM>
... View more
12-26-2018
05:53 PM
Thanks Akhil, that helps.
... View more
12-21-2018
02:30 PM
All, Thanks for your response. I found the root cause of the issue. Ambari was using its master's key in KDC admin credentials that is why it was giving "Missing KDC administrator credentials. Please enter admin principal and password". So I have removed that crendential file (PFA for this) and issue has been solved. For others, you may need to keep ambari master key and KDC admin creds same, because that file is required at the time of ambari-server restart (if you have configured jceks). PFA, kerberos-admin-creds-issue-solved.png
... View more
12-10-2018
07:29 PM
Thank you @Robert Levas @dvillarreal Yes, I am using a newer version of ambari and also tried FreeIPA since openLDAP didn't seem to work art all with kerberos. I followed the exact steps as on https://community.hortonworks.com/articles/59645/ambari-24-kerberos-with-freeipa.html - everything seems to be working fine but fails when kerberizing the cluster. I get the following error: Also, important to note that while I get the following error: DNS query for data2.testhdp.com. A failed: The DNS operation timed out after 30.0005660057 seconds DNS resolution for hostname data2.testhdp.com failed: The DNS operation timed out after 30.0005660057 seconds Failed to update DNS records. Missing A/AAAA record(s) for host data2.testhdp.com: 172.31.6.79. Missing reverse record(s) for address(es): 172.31.6.79.
I installed server as: ipa-server-install --domain=testhdp.com \ --realm=TESTHDP.COM \ --hostname=ldap2.testhdp.com \ --setup-dns \ --forwarder=8.8.8.8 \ --reverse-zone=3.2.1.in-addr.arpa. and the clients on each node as ipa-client-install --domain=testhdp.com \
--server=ldap2.testhdp.com \
--realm=TESTHDP.COM \
--principal=hadoopadmin@TESTHDP.COM\
--enable-dns-updates Also, that post doing the following step: echo "nameserver ldap2.testhdp.com" > /etc/resolv.conf my yum is broken and I need to revert to make it work. Do you guys have any idea about it? I thought that there is no need of DNS as I have resolution of *.testhdp.com in my hostfile on all nodes.
... View more
12-05-2018
03:25 PM
@fifi abd I didn't read through the entire error, but the last line indicates that there is an issue with XML in /home/v962173adm/nifi-1.8.0-bin/nifi-1.8.0/./conf/authorizers.xml. Take a look at row 159 and see if there is anything obvious. Maybe some copy/paste issue where an invalid or unicode character is there? Sometimes a forward or back quote gets in or that long dash character (Em Dash). If you attach that file, I can take a look and see if there is something obvious there.
... View more
12-06-2018
09:47 PM
Because of this below property in core-site.xml, it works for you hadoop.security.auth_to_local The mapping rules. For example: RULE:[2:$1@$0]([jt]t@.*EXAMPLE.COM)s/.*/mapred/ RULE:[2:$1@$0]([nd]n@.*EXAMPLE.COM)s/.*/hdfs/ RULE:[2:$1@$0](hm@.*EXAMPLE.COM)s/.*/hbase/ RULE:[2:$1@$0](rs@.*EXAMPLE.COM)s/.*/hbase/ DEFAULT The mapping from Kerberos principal names to local OS user names. See Creating Mappings Between Principals and UNIX Usernames for more information.
... View more
11-07-2018
08:16 PM
@Narendra Neerukonda Awesome... I am glad that I could help. Be sure to accept my answer to close out this issue.
... View more