Member since
12-11-2015
217
Posts
30
Kudos Received
31
Solutions
My Accepted Solutions
Title | Views | Posted |
---|---|---|
237 | 01-02-2025 06:28 AM | |
751 | 08-14-2024 06:24 AM | |
1963 | 10-02-2023 06:26 AM | |
1635 | 07-28-2023 06:28 AM | |
10587 | 06-02-2023 06:06 AM |
02-12-2019
01:32 AM
<td> <samp>principal (string)</samp></td> <td><samp>impala/master2-impala-20.yodlee.com@YODLEEINSIGHTS.COM</samp></td> Impalad will expect the client to use this SPN while client tries to connect to it. This is why it failed when you put host fqdn as haproxy When you enable haproxy in CM > Impala > Configuration > Impalad Load Balancer name then CM will prepare a merged keytab consisting of SPN of the loadbalancer and also changes this principal field in impalad configuration to haproxy spn, After which you will be able to connect to impalad.
... View more
02-11-2019
09:36 PM
What value are you noticing for principal in the impalad-webui varz page? https://<impalad-hostname>:25000/varz Did you add the ELB or Haproxy details in the CM > Impala > Configuration > Impala Daemons Load Balancer ?
... View more
02-07-2019
07:09 PM
Impala relies on hivemetastore for persisting table metadata. HMS inturn uses db to persist metadata. So if the db's filesystem is out of space, request from hms to persist metadata will be denied and yes if the space on the db is not freed up then request from hms will be failed and eventually impala also fails the query
... View more
05-16-2018
11:59 PM
Is the issue reported in this thread happened in UAT or in PROD? From UAT configs, the default timeouts are around 5 minutes and overridden timeouts are around 1 hr. Is the error that you posted happens for long running jdbc application maintaining a single connection ? Can you check if you increase the timeouts[lets say 2hr] further, the issue still happens?
... View more
05-16-2018
11:33 PM
Can you paste the haproxy.cfg here. Just want to have a look at the connection timeout configured The error you see happens if the connection between client and impalad gets broken. having a lower connection timeout on haproxy can potentially cause this
... View more
05-16-2018
11:22 PM
Is there any loadbalancer inbetween the client and impalad? if yes, try to increase the conntimeout on the LB
... View more
03-05-2017
03:20 AM
Command to test reverse resolution is described in this link http://linuxcommando.blogspot.in/2008/07/how-to-do-reverse-dns-lookup.html
... View more
03-05-2017
03:15 AM
1 Kudo
First of all. I am sorry for getting back late on this question.
One of the key factor of kerberos authentication is its reliability on DNS reverse resolution.
Quote from MIT KDC - https://web.mit.edu/kerberos/krb5-1.4/krb5-1.4.4/doc/krb5-admin/Getting-DNS-Information-Correct.html
----
[1]
Getting DNS Information Correct
Several aspects of Kerberos rely on name service. In order for Kerberos to provide its high level of security, it is less forgiving of name service problems than some other parts of your network. It is important that your Domain Name System (DNS) entries and your hosts have the correct information.
----
Lets say the virtual ip as haproxy.com
And loadbalancers are running on below nodes
haproxy1.com - 10.0.0.1
haproxy2.com - 10.0.0.2
haproxy3.com - 10.0.0.3
impalad running on nodes
impalad1 - 10.0.0.4
impalad2 - 10.0.0.5
impalad3 - 10.0.0.6
====
# Forward resolution configs for DNS
haproxy1.com IN A 10.0.0.1
haproxy.com IN CNAME haproxy1.com
====
Now haproxy.com resolves to ip 10.0.0.1
reverse resolution of ip 10.0.0.1 will result in answer haproxy1.com. This breaks the expectation of kerberos [1] authentication, so service ticket request will fail when you run impala-shell -i haproxy.com
[2]
So our aim is to achieve DNS resolution like this.
haproxy.com -> 10.0.0.1
10.0.0.1 -> haproxy.com
We can now alter the reverse resolution of DNS to achieve this
Reverse zone configuration:
====
inverse-query-haproxy1.com IN PTR haproxy1.com
10.0.0.1 IN CNAME inverse-query-haproxy1.com
====
With these above set of configs we can achieve forward and reverse resolution as expected in [2]
Caution Note:
If you run CM agents on one of the proxy machines, i.e. its a part of the cluster, its identity will have to change permanently to the VIP name, because reverse DNS will now never show the original hostname, which could cause other services to have issues unless listening_hostname is configured to use the VIP name. Ideally the haproxy machine should not be added as part of the cluster in CM hosts control, to avoid this from happening - it should be a standalone box.
... View more
02-19-2017
03:13 AM
@bushnoh This is normal. Once you setup loadbalancer infront of impalad, the impalad will expose itself through the service principal name(SPN) of the loadbalancer to the external client. If you check the varz page of individual impalad, you can notice following parameters https://<impalad-hostname>:25000/varz principal ==> LB SPN be_principal ==> IMPALAD SPN This shows that impalad expects LB's SPN for clients communication whereas for internal communication[within impalad's] it uses its own SPN. be_principal --> Backend principal for internal communication. hence it is required to contact the impalad with LB's SPN.
... View more
01-19-2017
09:19 AM
You're welcome!
... View more
- « Previous
- Next »