Details
-
Improvement
-
Status: Resolved
-
Major
-
Resolution: Fixed
-
None
-
None
-
None
Description
Gianmarco De Francisci Morales asked on the user list:
I am getting the exception in the subject when running my giraph program
on a cluster with Kerberos authentication.
This leads to the idea of having Kerberos authentication supported within GIRAPH. Hopefully it would use our fast GIRAPH-37 IPC, but could also interoperate with Hadoop security.
Attachments
Attachments
Issue Links
- blocks
-
GIRAPH-200 remove hadoop RPC and keep just netty
- Resolved
-
GIRAPH-282 Make netty the default RPC transport
- Resolved
- is depended upon by
-
GIRAPH-852 Add SASL unit tests
- Open
- is related to
-
GIRAPH-363 Fix hadoop_0.23 profile broken by GIRAPH-211
- Resolved
-
GIRAPH-583 Problem with authentication on Hadoop 0.23
- Resolved
-
GIRAPH-265 Enable Zookeeper security support within Giraph
- Open
-
GIRAPH-200 remove hadoop RPC and keep just netty
- Resolved
-
GIRAPH-262 Netty optimization to handle requests locally whenever possible
- Resolved
- relates to
-
GIRAPH-212 Security is busted since GIRAPH-168
- Resolved
-
GIRAPH-37 Implement Netty-backed IPC
- Resolved
-
AVRO-405 Netty-based Java RPC server
- Closed
-
AVRO-641 add SASL to socket transport
- Closed
-
HADOOP-4487 Security features for Hadoop
- Closed
-
HADOOP-6419 Change RPC layer to support SASL based mutual authentication
- Closed
-
ZOOKEEPER-823 update ZooKeeper java client to optionally use Netty for connections
- Closed
-
GIRAPH-362 Address master task id for communication for master (known issue from GIRAPH-211)
- Open
-
GIRAPH-262 Netty optimization to handle requests locally whenever possible
- Resolved
-
GIRAPH-289 Add thread and channel pooling to NettyClient and NettyServer
- Resolved
-
HADOOP-8078 Add capability to turn on security in unit tests.
- Resolved