Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Opentsdb/Kerberos with HDP 3.1 #1751

Open
VeljkoC opened this issue Aug 22, 2019 · 0 comments
Open

Opentsdb/Kerberos with HDP 3.1 #1751

VeljkoC opened this issue Aug 22, 2019 · 0 comments

Comments

@VeljkoC
Copy link

VeljkoC commented Aug 22, 2019

Hi,

I have read how to configure opentsdb with kerberos #1010

Create a service keytab
Create a JAAS file, it should look like this

Client {
com.sun.security.auth.module.Krb5LoginModule required
principal="opentsdb/OPENTSDB_HOST@KRB5_REALM"
useTicketCache=true
useKeyTab=false;
};

You must set useTicketCache, Opentsdb is not able to get a ticket for you
3. Create a crontab to renew your krb5 ticket, it should look like this :

0 */9 * * * /usr/bin/kinit opentsdb/OPENTSDB_HOST@KRB5_REALM -kt /your/keytab/path

You must edit the opentsdb init script

4.1 replace user by a dedicated user, useful for crontab
4.2 add the following java option

JVMARGS="${JVMARGS} -Djava.security.auth.login.config=/your/jaas/file/path"

But it is unclear to me these 4 questions:

  1. Do we need to setup also Hbase to use Kerberos? As we are familiar Kerberos is enabled on HDFS. I am not sure regarding the Hbase.
  2. opentsdb/OPENTSDB_HOST@KRB5_REALM for which user this principle should be created?
  3. 4.2 add the following java option
    

JVMARGS="${JVMARGS} -Djava.security.auth.login.config=/your/jaas/file/path"
where we should add this line?
4. useKeyTab=false;
why is this parameter set to false when we are referencing keytab file?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant