Vijay Srinivasaraghavan created AMBARI-13312:
------------------------------------------------

             Summary: Enbale Kerberos is not working
                 Key: AMBARI-13312
                 URL: https://issues.apache.org/jira/browse/AMBARI-13312
             Project: Ambari
          Issue Type: Bug
          Components: ambari-server
    Affects Versions: trunk
         Environment: SLES 11 SP3
            Reporter: Vijay Srinivasaraghavan


I have installed MIT KDC server on host1. Hadoop cluster and Ambari Server 
running in host 2 (in two separate containers). I have created a hadoop cluster 
with ZK, YARN/MR2 and HDFS services. When I try to enable security by using 
existing KDC, I see below 2 issues.

1) Ambari server krb5.conf is not getting updated with the values supplied in UI

2) Service keytab (kerberos.service_check.100515.keytab) seems to be having 
some issues.

{code}
lglop193:/ # klist
klist: No credentials cache found (ticket cache FILE:/tmp/krb5cc_0)
Kerberos 4 ticket cache: /tmp/tkt0
klist: You have no tickets cached

lglop193:/ # cd /etc/security/keytabs/
lglop193:/etc/security/keytabs # ls
kerberos.service_check.100515.keytab

lglop193:/etc/security/keytabs # /usr/bin/kinit -c 
/var/lib/ambari-agent/tmp/kerberos_service_check_cc_8b60256b73fc5454fc5737d0a1ce9887
 -kt /etc/security/keytabs/kerberos.service_check.100515.keytab 
[email protected]
kinit(v5): Key table entry not found while getting initial credentials

lglop193:/etc/security/keytabs # kinit C-100515 -k -t 
kerberos.service_check.100515.keytab
kinit(v5): Key table entry not found while getting initial credentials
{code}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to