Details
-
Improvement
-
Status: Resolved
-
Minor
-
Resolution: Implemented
-
2.5.2
-
None
-
Multiple Kerberos Domain Controllers across multiple data centers for single realm.
Description
We were seeing Kerberos Service checks failures in Ambari. Specifically it would fail during the first run of the day, succeed on the second, then fail on the next but succeed if run again and so forth.
Reviewing the operation log, it showed kinit failure from random node(s)
kinit: Client XXXX not found in Kerberos database while getting initial credentials
Since AMBARI-9852
The service check must perform the following steps:
1.Create a unique principal in the relevant KDC (server)
2.Test that the principal can be used to authenticate via kinit (agent)
3.Destroy the principal (server)
Which is a very good check of services.
So what is happening...
In our environment we have multiple Kerberos Domain Controllers across multiple data centers all providing the same realm.
The creation of a unique principal occurs at a single KDC and is propagated to the others.
The agents were testing the principal at different KDC, i.e. before it had a change to propagate. This is why the second service check would succeed.
Attachments
Issue Links
- links to