Member since
01-19-2017
3681
Posts
633
Kudos Received
372
Solutions
My Accepted Solutions
| Title | Views | Posted |
|---|---|---|
| 1605 | 06-04-2025 11:36 PM | |
| 2071 | 03-23-2025 05:23 AM | |
| 983 | 03-17-2025 10:18 AM | |
| 3733 | 03-05-2025 01:34 PM | |
| 2569 | 03-03-2025 01:09 PM |
05-25-2019
08:40 AM
@Shashank Naresh I guess your problem is with the network configuration. Adapter 1 should be NAT, Adapter 2 should either Wireless or LAN in my example screenshot its Realtek PCIe GBE Family controller the LAN NIC for my laptop yours could be different. See attached screenshot After saving the configuration restart the Virtual box Please revert Naresh.PNG
... View more
05-23-2019
03:45 PM
@Sonali Dive https://community.hortonworks.com/questions/460/what-does-active-directory-secure-ldap-ldaps-conne.html#
... View more
05-22-2019
08:41 PM
@Sami Ahmad When you have set up your ambari.repo correctly on Linux you need to do the following # yum repolist
# yum install -y ambari-server
# yum install -y mysql-connector-java
# ambari-server setup --jdbc-db=mysql --jdbc-driver=/usr/share/java/mysql-connector-java That should pick the correct version of MySQL driver for your ambari if you indeed to run on MySQL or MariaDB # yum install -y mariadb-server To get the mysql-connect version here are the steps # zipgrep 'Bundle-Version' mysql-connector-java.jar output META-INF/MANIFEST.MF:Bundle-Version: 5.1.25 HTH
... View more
05-22-2019
12:33 PM
@Akash S If you have kerberized your cluster using AD, your local user cannot generate a valid Kerberos key unless he/she is present in the AD. The reason for using AD is to delegate and centralize user creation/authentication/management to Active Directory. You should maybe configure a System Security Services Daemon (SSSD) client to use Active Directory (AD) as an Identity Provider for SSSD But the best solution is to create your HIVEUSER in AD which will generate the correct keytabs/permission for your user to access hive. HTH
... View more
05-22-2019
08:51 AM
@Mazen Elshayeb Unbelievable ping me on linkedin ,could help with remote
... View more
05-16-2019
09:12 AM
@Mazen Elshayeb Can you capture and share your screenshot? Firstly can you ensure your kdc and kadmin are started? Did you run this step? If not please do that while logged in as root, the output should look like below # kadmin.local -q "addprinc admin/admin" Desired output Authenticating as principal root/admin@HADOOP.COM with password.
WARNING: no policy specified for admin/admin@HADOOP.COM; defaulting to no policy
Enter password for principal "admin/admin@HADOOP.COM": {password_used_during_creation}
Re-enter password for principal "admin/admin@HADOOP.COM": {password_used_during_creation}
Principal "admin/admin@HADOOP.COM" created. Restart kdc (Centos please adapt accordingly) # /etc/rc.d/init.d/krb5kdc start Desired output Starting Kerberos 5 KDC: [ OK ] Restart kadmin # /etc/rc.d/init.d/kadmin start Desired output Starting Kerberos 5 Admin Server: [ OK ] Now continue with Ambari kerberization wizard using the admin/admin@HADOOP.COM with password earlier set That should work
... View more
05-16-2019
06:20 AM
@Mazen Elshayeb That's good news the principal admin should be admin/admin@HADOOP.COM and the password is the magic password you used when creating the Kerberos database. You must have gotten a warning saying keep the password safely 🙂 Please proceed and revert!
... View more
05-15-2019
12:41 PM
@Ashok kumar Thangarathinam You can add new properties by clicking on the + to add new (Key/Value) client properties HTH
... View more