Uploaded image for project: 'Hadoop HDFS'
  1. Hadoop HDFS
  2. HDFS-4680

Audit logging of delegation tokens for MR tracing



    • Bug
    • Status: Closed
    • Major
    • Resolution: Fixed
    • 2.0.3-alpha
    • 2.1.1-beta
    • namenode, security
    • None


      HDFS audit logging tracks HDFS operations made by different users, e.g. creation and deletion of files. This is useful for after-the-fact root cause analysis and security. However, logging merely the username is insufficient for many usecases. For instance, it is common for a single user to run multiple MapReduce jobs (I believe this is the case with Hive). In this scenario, given a particular audit log entry, it is difficult to trace it back to the MR job or task that generated that entry.

      I see a number of potential options for implementing this.

      1. Make an optional "client name" field part of the NN RPC format. We already pass a clientName as a parameter in many RPC calls, so this would essentially make it standardized. MR tasks could then set this field to the job and task ID.
      2. This could be generalized to a set of optional key-value tags in the NN RPC format, which would then be audit logged. This has standalone benefits outside of just verifying MR task ids.
      3. Neither of the above two options actually securely verify that MR clients are who they claim they are. Doing this securely requires the JobTracker to sign MR task attempts, and then having the NN verify this signature. However, this is substantially more work, and could be built on after idea #2.

      Thoughts welcomed.


        1. hdfs-4680-5.patch
          17 kB
          Andrew Wang
        2. hdfs-4680-4.patch
          14 kB
          Andrew Wang
        3. hdfs-4680-3.patch
          11 kB
          Andrew Wang
        4. hdfs-4680-2.patch
          12 kB
          Andrew Wang
        5. hdfs-4680-1.patch
          5 kB
          Andrew Wang

        Issue Links



              andrew.wang Andrew Wang
              andrew.wang Andrew Wang
              0 Vote for this issue
              18 Start watching this issue