Member since
08-04-2015
10
Posts
3
Kudos Received
0
Solutions
03-09-2017
06:50 AM
1 Kudo
No joy...I still get this when I do list_labels: ERROR: DISABLED: Visibility labels feature is not available Still searching for a (definitive) configuration through Cloudera Manager that will actually turn on visibility labels in HBASE.
... View more
02-23-2017
08:41 AM
hello, I am trying to get my CDH 5.9 installation of Hbase working with visibility labels enabled through Cloudera Manager. In the "HBase Service Advanced Configuration Snippet (Safety Valve) for hbase-site.xml" I have set: hfile.format.version to 3 hbase.coprocessor.region.classes to org.apache.hadoop.hbase.security.visibility.VisibilityController hbase.coprocessor.master.classes to org.apache.hadoop.hbase.security.visibility.VisibilityController After restart, I log in to the Hbase shell and try to "add_labels ['TESTLABEL'] and I am getting the error: ERROR: DISABLED: Visibility labels feature is not available Probably something simple that I am missing, but any ideas would be appreciated.
... View more
Labels:
- Labels:
-
Apache HBase
-
Cloudera Manager
-
Security
10-02-2015
07:09 AM
1 Kudo
To solve this I did a kinit <account>@FOREST.COM which goes to the remote (AD) domain and then klist -e to see what encryption types were being sent back. In my case we were getting aes256 and arcfour. The cross realm entries were only encrypted for arcfour, so I recreated the cross realm entries with all the encryption types being sent by the remote domain in my local KDC. So it looked like this: addprinc -e "arcfour-hmac:normal aes256-cts-hmac-sha1-96:normal" krbtgt/DATA.FOREST.COM@DATA.FOREST.COM addprinc -e "arcfour-hmac:normal aes256-cts-hmac-sha1-96:normal" krbtgt/DATA.FOREST.COM@FOREST.COM after a restart of the local KDC things are working well. The most helpful piece was turning on debugging: HADOOP_OPTS="-Dsun.security.krb5.debug=true" Without the debugging I had no idea it was even trying to connect to the remote domain.
... View more
10-02-2015
06:33 AM
Thanks this is very helpful. It seems that the problem was the encryption of the cross realm entries in the MIT KDC. Using kvno is a very quick way of testing.
... View more
09-28-2015
03:37 PM
I have Kerberos authentication working with a stand alone KDC. However, our next step is to allow users from another realm/domain to access the cluster. Obviously I followed the guide for cross realm configuration, but I am having little success. Does anyone know of another way to test the cross realm configuration without going through the cluster? Or at least how to turn on some more robust logging? The authentication always stays on the local kdc and never tries to go out to the AD. I was under the impression that once the configurations with the cross realm principals were in place, kerberos would look first locally for an acount and then remotely. However I am guessing that I am completely off base. Here are my crossrealm entries in my KDC: krbtgt/DATA.FOREST.COM@DATA.FOREST.COM krbtgt/DATA.FOREST.COM@FOREST.COM krbtgt/FOREST.COM@DATA.FOREST.COM Here is my krb5.conf: [logging] default = FILE:/var/log/krb5libs.log kdc = FILE:/var/log/krb5kdc.log admin_server = FILE:/var/log/kadmind.log [libdefaults] default_realm = DATA.FOREST.COM dns_lookup_realm = false dns_lookup_kdc = false ticket_lifetime = 24h renew_lifetime = 7d forwardable = true [realms] DATA.FOREST.COM = { kdc = ip-10-0-0-241.us-west-2.compute.internal admin_server = ip-10-0-0-241.us-west-2.compute.internal default_domain = data.forest.com } FOREST.COM = { kdc = ip-10-0-0-251.us-west-2.compute.internal admin_server = ip-10-0-0-251.us-west-2.compute.internal default_domain = forest.com } [domain_realm] .data.forest.com = DATA.FOREST.COM data.forest.com = DATA.FOREST.COM .forest.com = FOREST.COM forest.com = FOREST.COM Any assistance would be appreciated.
... View more
Labels:
- Labels:
-
Kerberos