Uploaded image for project: 'Slider'
  1. Slider
  2. SLIDER-446

delegation token renewer identity may require definition of 'slider' user and principal

    XMLWordPrintableJSON

Details

    • Bug
    • Status: Resolved
    • Major
    • Resolution: Invalid
    • Slider 0.50
    • Slider 0.60
    • appmaster, security
    • None
    • Slider October #2

    Description

      Currently the HDFS delegation token renewal framework needs to establish a user/subject using kerberos (not tokens) in order to perform the token renewal or replacement operations. Given that it was HDFS, the current implementation leverages the namenode principal as the renewing identity. However, this approach does not work if the node on which the AM is running doesn't actually have access to the namenode keytab. So, as I see it, there are a number of alternatives:

      1) Looks for a datanode keytab if the namenode keytab is not available and use the DN service principal - probably not the best choice since, once again, there's no guarantee that a DN is running on the NM host.
      2) Use the NM principal/keytab - this may be appropriate. Are there any permission issues in leveraging a yarn principal with HDFS?
      3) Create a slider-specific service principal and keytab - this would seem to be appropriate given the precedent set in Hadoop (most secure applications appear to manage their own set of principals).
      4) Others?

      Given that this subject may engender multiple opinions, I could use option 2 as an interim (and possibly final) solution?

      Attachments

        Activity

          People

            jmaron Jonathan Maron
            jmaron Jonathan Maron
            Votes:
            0 Vote for this issue
            Watchers:
            4 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: