Member since
01-19-2017
3679
Posts
632
Kudos Received
372
Solutions
My Accepted Solutions
| Title | Views | Posted |
|---|---|---|
| 1001 | 06-04-2025 11:36 PM | |
| 1568 | 03-23-2025 05:23 AM | |
| 785 | 03-17-2025 10:18 AM | |
| 2833 | 03-05-2025 01:34 PM | |
| 1864 | 03-03-2025 01:09 PM |
11-07-2019
04:57 AM
@svasi Sorry also these 2 logs the files attached look okay, /var/log/krb5/krb5kdc.log /var/log/krb5/kadmind.log Did you create the re-create the principal? Share the output of # kadmin.local listprincs
... View more
11-07-2019
04:02 AM
@svasi Can you share the files mentioned in my previous post? Redact site specific sensitive information and I will have a look at it.
... View more
11-06-2019
10:38 PM
1 Kudo
@Harpreet_Singh Yes they look fine as they a direct reference to the Hortonworks documentation. Derby databases ain't great for anything apart for development. But its a good pratice to have ONLY one type of database for easy management. And the earlier you start to practice that the better. If your issue is resolved then close the thread by accepting the best answer Happy hadooping
... View more
11-06-2019
10:30 PM
@neha_t_jain Great I have seen a similar question of a member asking HDP compatibility with Java 12 it's unfortunate the open sourceness of Java is gone and some companies will have to pay to use it. HDP being a packaged software need rigorous unitary tests for all the components which as you know are many so the certification of a new version of Java will take a while which in one way is good because it gives software testers time to uncover memory leaks etc. Having said that if my response answered you then take some time to mark it as a solution so other members can easily resolve similar queries and avoid creating new threads
... View more
11-06-2019
12:42 PM
@svasi I saw a couple of potential issues and I would like you to make a few changes. Recreate an admin for Kerberos Using the below syntax # kadmin.local -q "addprinc admin/admin" ----------start of output--------- Authenticating as principal root/admin@EDHDEV.COM with a password. WARNING: no policy specified for admin/admin@EDHDEV.COM; defaulting to no policy Enter the password for principal "admin/admin@EDHDEV.COM": welcome1 Re-enter password for principal "admin/admin@EDHDEV.COM": welcome1 Principal "admin/admin@EDHDEV.COM" created. ----------end of output--------- Validate the principal works # kadmin -p admin/admin@EDHDEV.COM It will ask for the password once successfully authenticated then type q to quit Can you leave the default encryption types? and you should select Manage krb5.conf through Cloudera Manager Don't change the kadm5.acl file it's okay the way it is !! I saw something missing in your krb5.conf between [realms] and [logging] the domain_realm add that to all the hosts if it's a multinode [realms] EDHDEV.COM = { kdc = master-1.dev.edl.gcp.domain.it admin_server = master-1.dev.edl.gcp.domain.it } [domain_realm] .edhdev.com = EDHDEV.COM edhdev.com = EDHDEV.COM [logging] kdc = FILE:/var/log/krb5/krb5kdc.log admin_server = FILE:/var/log/krb5/kadmind.log default = SYSLOG:NOTICE:DAEMON Go to the CM and launch the kerberization using this below the principal admin/admin@EDHDEV.COM Please make the above changes restart the kdc and retry kerberization it should go smoothly Happy hadooping
... View more
11-06-2019
11:37 AM
@neha_t_jain Do you still need more clarification or did the response give you a good idea on how to proceed? I think if you plan to test drive HDP that's the only solution not to compromise your network security. Please let me know.
... View more
11-06-2019
11:30 AM
@m4x1m1li4n To validate the zookeeper ports can you run the snippets and share the output, it seems CDH uses the port 4181 for its zookeeper I am from the HDP world! Using port 2181 echo "stat" | nc server.example.org 2181 | grep Mode $ telnet slave3.sysdatadigital.it 2181 Using port 4181 echo "stat" | nc slave3.sysdatadigital.it 4181 | grep Mode $ telnet slave3.sysdatadigital.it 4181 Disable the firewall in the VPC which is a subnet doesn't disable the firewall on the host please validate that all the hosts have the firewall disable Assuming you are on Centos/RHEL 7 and share the output readapt if your OS is different # systemctl status firewalld From your CM can you share the zookeeper screenshot
... View more
11-06-2019
10:08 AM
@Cico Yes that is a permission issue there is sticky bit issue -chmod 1777 was run recursively to resolve that please run the below command as HDFS user $ hdfs dfs -chmod -R 777 /user/history Please revert
... View more