Configure acceptable Kerberos principal patterns
If the source and destination realms are not configured to trust each
other or do not have the same principal pattern, then you must set
the dfs.namenode.kerberos.principal.pattern
property to *
and allow distcp
irrespective of the principal patterns of the source and
destination clusters.
dfs.namenode.kerberos.principal.pattern
property either in hdfs-site.xml
, or using Cloudera Manager. This
procedure explains the configuration using Cloudera Manager. You must perform the
procedure on both the clusters.