Member since
01-10-2017
11
Posts
0
Kudos Received
0
Solutions
12-01-2020
12:21 AM
@GangWar , yes, basically with all UI exposed to end user, like Hue, CM UI and etc. as long as the UI needs to get AD authentication and authorized in Cloudera. Since I have little control over AD, is there a way I can configure on Cloudera to restrict the number of login retries?
... View more
11-26-2020
07:39 PM
Dear Experts, I got an assignment that to set up the maximum number of login retries in CDP 7.1.3. My environment is: - Kerberos enabled; - OS RHEL 7.8; - CDP 7.1.3 - Integrated with MS AD I yet to find any clue in Cloudera online document, appreciate if you can share more details! Thanks Anton
... View more
11-04-2020
09:24 PM
@Mike in Austin , Thanks for your reply! But with CDP 7.1.3, there is no more Navigator. Based on Cloudera document, Navigator is replaced by the combination of Atlas & Ranger. I didn't find any specifics on publishing to SYSLOG in CDP 7.1.3 Ranger document. Looking forward to hearing from you! Thanks
... View more
11-04-2020
09:21 PM
Dear All, Does CDP 7.1.3 on prem support ADFS? one of my customers has ADFS to federate their multiple ADs. They are expecting Cloudera Web Portal like Cloudera Manager, Ranger to support ADFS. Any official documents available? Thanks
... View more
10-24-2020
12:10 AM
Hi Mike, Thank you very much for your reply! Can you share more details or point me to the right documents? Thanks
... View more
10-22-2020
09:25 PM
Hi All, As of CDH 6.3 there was Navigator which could publish audit events to syslog. For now without Navigator in CDP 7.1.x, how can I do the audit events publishing to syslog? Looking Forward To Hearing From You! Thanks
... View more
05-10-2018
07:30 AM
Hi All, I have installed CDSW 1.3 successfully on: - EDH 5.11.1 - CM 5.13 - CDSW 1.3 - 2 CDSW nodes, one master, one worker Now they are experiencing the following problems: - Can't start CDSW session ( Phython, R, Scala ), error message "Whoops, there was an unexpected error."; - Can't get Kerberos authentication, error message "could not authenticate using provided Kerberos principal and password"; I've tried the following to troubleshoot: - command "kubectl config view", output: -> apiVersion: v1 -> clusters:[] -> contexts:[] -> current-context:"" -> kind: Config -> preferences:{} -> users: [] - Modified parameters “default_tgs_enctypes = aes256-cts aes128-cts rc4-hmac”, “default_tkt_enctypes = rc4-hmac aes256-cts aes128-cts” and “permitted_enctypes = aes256-cts aes128-cts rc4-hmac” to kbr5.conf according to this KB Article, then removed & regenerated authentication; -> modified kbr5.conf on all CDSW nodes; -> restarted CDSW service from CM; -> after modifying kbr5.conf, kinit failed with error message “kinit: configuration file does not specify default realm when parsing name”; -> the service took very long time over 10 minutes and the web still not ready; -> changed the kbr5.conf back to its original format, removed aes256 & aes128; -> kinit works after kbr5.conf changed; -> use klist -e and got a valid principal; -> CDSW service started normally; After CDSW service started, I tried “cdsw validate”, there was no error detected. I tried to start a session ‘python’, ‘scala’ or ‘R’, got the following error message “Whoops, there was an unexpected error." Tried to configure Kerberos using the same principal and password which works using kinit through command line, got an error “Could not authenticate using provided Kerberos principal and password”. Thanks
... View more
Labels: