Member since
09-29-2015
362
Posts
242
Kudos Received
63
Solutions
My Accepted Solutions
Title | Views | Posted |
---|---|---|
813 | 03-14-2019 01:00 PM | |
1073 | 01-23-2019 04:19 PM | |
5247 | 01-15-2019 01:59 PM | |
2616 | 01-15-2019 01:57 PM | |
6238 | 12-06-2018 02:01 PM |
07-08-2021
03:38 AM
1. Login to ambari database hosted server. 2. Take the backup of database. Replace XXXXXX with correct pasword nohup mysqldump -u root -pXXXXXX --databases ambari >/ambari.sql & 3. Login to mysql with root or ambari account and remove hive keytabs. delete from kerberos_principal_host where principal_name like '%hive%'; delete from kerberos_principal where principal_name like '%hive%'; 4. Restart Ambari server. 5. Regenerate the keytabs with valid account 6. Start the Node manager. Note: its not only for Hive.. we can remove based on error. as caches in ambari database prevents to regenerate again
... View more
05-08-2021
12:51 AM
thank you so much. I encountered same problem,but it solved after read your solution. I also changed the default config in Ambari to only 2 encryption types and hashed out the default ticket encryptions as well, then error went away.
... View more
04-06-2021
08:29 AM
@mRabramS Can you share how you reconfigure the KDC ? @VidyaSargur I’m really sorry , I opened a new thread but there’s no response BR,
... View more
04-05-2021
10:51 PM
Hi, You must deploy the jce policy on every cluster nodes if you are using built-in openjdk. Please follow the steps. [root@hostname]# locate local_policy.jar [root@hostname]# wget --no-check-certificate --no-cookies --header "Cookie: oraclelicense=accept-securebackup-cookie" "http://download.oracle.com/otn-pub/java/jce/8/jce_policy-8.zip" [root@hostname]# unzip -o -j -q jce_policy-8.zip -d /usr/jdk64/jdk1.8.0_112/jre/lib/security/ [root@hostname]# ambari-server rstart Now test the connection. Hopes it will resolves the issue.
... View more
01-31-2020
05:54 AM
There are properties that are set under both - service level configurations and under Admin -- Kerberos configurations, such as yarn. admin. acl What if the two properties point to different values, which properties does the service pick when required?
... View more
01-13-2020
03:37 PM
Sorry for the bump. I tried this in the HDP Sandbox and discovered that installing krb5-workstation-1.15.1-37.el7_7.2.x86_64.rpm solved the problem
... View more
11-04-2019
02:26 AM
How did you find that some process is destroying the ticket? I am also facing same issue.
... View more
04-24-2019
08:42 AM
I manage to retrieve the group named "ad_sshaccess_users" from the LDAP directory to the Ambari. But there is "0 member" inside this group. But in the Active Directory I created 2 users under this group mapped in the FreeIPA. Do you know if Ambari can retrieve AD users through a FreeIPA server which is doing the LDAP part? I'm not sure about that.
... View more
03-14-2019
01:00 PM
1 Kudo
@Oleg Tarassov, You are not looking at the correct source code version for Ambari 2.6.2.2. I believe that you want to look at https://github.com/apache/ambari/blob/release-2.6.2/ambari-server/src/main/java/org/apache/ambari/server/serveraction/kerberos/IPAKerberosOperationHandler.java#L949. According to this, the encryption types are not considered when exporting keytab files from IPA. This has been fixed in Ambari 2.7.0 and above. See https://issues.apache.org/jira/browse/AMBARI-22293.
... View more
08-07-2019
01:41 PM
Hello! ran into the same problem, but in my case the kadmin/<FQDN kadmin server>@<REALM> existed and if i run kinit -S kadmin/@<REALM> admin/admin@<REALM> then he will authorize # klist
Ticket cache: FILE:/tmp/krb5cc_0
Default principal: admin/admin@<REALM>
Valid starting Expires Service principal
08/07/2019 11:30:25 08/07/2019 14:30:25 kadmin/cluster@<REALM>
... View more