Member since
10-21-2015
4
Posts
2
Kudos Received
1
Solution
My Accepted Solutions
Title | Views | Posted |
---|---|---|
3556 | 01-19-2016 06:13 PM |
01-19-2016
06:13 PM
Thanks all,I just reinstalled the ODBC driver from 2.2.4 add-ons and it worked..
... View more
01-19-2016
06:12 PM
1 Kudo
Thanks Kevin,I just reinstalled the ODBC driver from 2.2.4 add-ons and it worked..
... View more
01-18-2016
08:08 PM
1 Kudo
While trying to connect facing the below exception Unable to connect to the ODBC Data Source. Check that the necessary drivers are installed and that the connection properties are valid. [Hortonworks][HiveODBC] (34) Error from server: SSL_connect: certificate verify failed. Unable to connect to the server "devehdp004.unix.gsm1900.org". Check that the server is running and that you have access privileges to the requested database.
... View more
Labels:
- Labels:
-
Apache Hive
-
Apache Knox
11-03-2015
04:36 PM
Have anyone succeeded in configuring/accessing kerberos enabled oozie webui using AD Realm. Right now our cluster is configured with a local realm that services use and a cross realm that is connected to AD.All the users will be using their enterprise account to get a ticket for using against any hadoop services. While trying to do the same form our local machine for accessing oozie and strom webui we are facing below exception GSSException: Failure unspecified at GSS-API level (Mechanism level: Specified version of key is not available (44)) When verifying the ticket using klist the output is as follows hw11980:dev msundaram$ klist Credentials cache: API:3911E669-2B88-401B-8291-0352420190A7 Principal: msundar1@GSM1900.ORG Issued Expires Principal Nov 2 18:00:58 2015 Nov 3 04:00:58 2015 krbtgt/GSM1900.ORG@GSM1900.ORG Nov 2 18:01:13 2015 Nov 3 04:00:58 2015 HTTP/devehdp004.unix.gsm1900.org@GSM1900.ORG When trying with local realm,We are able to access the UI without any issues.And the klist looks like this hw11980:dev msundaram$ kinit -k -t hdpsrvc.keytab hdpsrvc hw11980:dev msundaram$ klist Credentials cache: API:C30071FF-156B-4608-940F-3C10D800F519 Principal: hdpsrvc@HDP_EIT_DEV.com Issued Expires Principal Nov 2 18:06:49 2015 Nov 3 18:06:49 2015 krbtgt/HDP_EIT_DEV.com@HDP_EIT_DEV.com Nov 2 18:06:57 2015 Nov 3 18:06:49 2015 HTTP/devehdp004.unix.gsm1900.org@HDP_EIT_DEV.com hw11980:dev msundaram$ We are not sure how to handle the SPENGO Ticket[ HTTP/devehdp004.unix.gsm1900.org@GSM1900.ORG] that is created for AD. Anyone has succeeded configuring this earlier? We need help on configuring this. Right now we have configured HUE with Oozie but it goes down frequently as already too many users are using it for HIVE/HDFS. The same is working in our QAT environment and our klist looks like this
hw11980:dev msundaram$ klist
Credentials cache: API:22D5D25B-E5F2-4372-AFB2-34B0944DA683
Principal: msundar1@GSMTEST.ORG
Issued Expires Principal
Nov 2 18:22:52 2015 Nov 3 04:22:52 2015 krbtgt/GSMTEST.ORG@GSMTEST.ORG
hw11980:dev msundaram$ klist
Credentials cache: API:22D5D25B-E5F2-4372-AFB2-34B0944DA683
Principal: msundar1@GSMTEST.ORG
Issued Expires Principal
Nov 2 18:22:52 2015 Nov 3 04:22:52 2015 krbtgt/GSMTEST.ORG@GSMTEST.ORG
Nov 2 18:58:33 2015 Nov 3 04:22:52 2015 krbtgt/HDP_EIT_QAT.COM@GSMTEST.ORG Nov 2 18:58:33 2015 Nov 3 04:22:52 2015 HTTP/qatehdp003.unix.gsm1900.org@HDP_EIT_QAT.COM So it invokes the krbtgt/HDP_EIT_QAT.COM@GSMTEST.ORG cross realm service principal properly
... View more
Labels:
- Labels:
-
Apache Oozie
-
Apache Storm