Member since
03-21-2016
46
Posts
5
Kudos Received
7
Solutions
My Accepted Solutions
| Title | Views | Posted |
|---|---|---|
| 1679 | 01-08-2021 07:37 AM | |
| 7298 | 12-04-2020 07:12 AM | |
| 1931 | 10-22-2020 07:16 AM | |
| 1917 | 10-20-2020 06:56 AM | |
| 2418 | 09-09-2020 06:59 AM |
01-08-2021
07:46 AM
CM uses BitTorrent to distrubte parcels so it's already very efficient. My recommendation would be to let CM do the work and not bother with trying to save yourself a few minutes.
... View more
01-08-2021
07:37 AM
KT should be installed in it's own cluster. From a security standpoint, you don't want other services on the box.
... View more
12-09-2020
06:19 AM
This is the executive summary from the the CVE link.... A security feature bypass vulnerability exists in the way Key Distribution Center (KDC) determines if a service ticket can be used for delegation via Kerberos Constrained Delegation (KCD). To exploit the vulnerability, a compromised service that is configured to use KCD could tamper with a service ticket that is not valid for delegation to force the KDC to accept it. The update addresses this vulnerability by changing how the KDC validates service tickets used with KCD.
... View more
12-04-2020
07:12 AM
We have found out that MSFT has also released a fix for the Kerberos authentication issue. To fix the Windows AD, you can engage with the AD team to apply one of the following patches that MSFT has provided to fix the Kerberos authentication issue. Please link on the appropriate link based on the flavor of the Windows Server. Windows Server 2012: https://www.catalog.update.microsoft.com/Search.aspx?q=KB4594438 Windows Server 2012 R2: https://www.catalog.update.microsoft.com/Search.aspx?q=KB4594439Windows Server 2016: https://www.catalog.update.microsoft.com/Search.aspx?q=KB4594441 Windows Server 2019: https://www.catalog.update.microsoft.com/Search.aspx?q=KB4594442 Windows Server 1903: https://www.catalog.update.microsoft.com/Search.aspx?q=KB4594443 Windows Server 1909: https://www.catalog.update.microsoft.com/Search.aspx?q=KB4594443 Windows Server 2004: https://www.catalog.update.microsoft.com/Search.aspx?q=KB4594440 Windows Server 20H2: https://www.catalog.update.microsoft.com/Search.aspx?q=KB4594440 Once the patch is applied, the application will be able to renew the tickets without theneed to apply any patch for Hue. [1] https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-17049
... View more
12-02-2020
11:50 AM
Community support is the only free support option. You could reach out to Cloudera to get the cluster under support or roll back the change on the AD side. BTW, CDH 5 is reaching end of support (EOS) on Dec 31 so you'd need to upgrade to CDH 6 or CDP. Both of these will require a license for the most recent versions.
... View more
12-02-2020
09:37 AM
This is likely caused by a change in your AD servers. The CVE is CVE-2020-17049 You'll need to file a case with Support and get a patch.
... View more
10-22-2020
07:16 AM
1 Kudo
Here's a relevant community answer... https://community.cloudera.com/t5/Support-Questions/How-to-use-merge-in-sqoop-import/td-p/161847 Mike
... View more
10-20-2020
07:21 AM
1 Kudo
This looks like your sqoop job isn't authenticated w/ Kerberos. Here's a doc that may help... https://sqoop.apache.org/docs/1.99.7/security/AuthenticationAndAuthorization.html
... View more
10-20-2020
06:56 AM
1 Kudo
Here's the doc... https://docs.cloudera.com/cdp-private-cloud/latest/upgrade/topics/cdpdc-upgrade-paths.html I'd recommend getting Cloudera PS engaged to assist though. There are also a few on-demand CDP classes available... https://www.cloudera.com/about/training.html#?fq=training%3Atypes%2Fondemand Mike
... View more