Skip to content

Conversation

@colinmjj
Copy link

@colinmjj colinmjj commented Apr 2, 2015

Add following configuration:
spark.security.group.acls.enable: true|false to enable/disable group acl check
spark.security.groupMappingProvider: to config the implement for getting groups for user,
the default value: org.apache.spark.util.ShellBasedUnixGroupsMapping

The group acls can be configured with: "spark.ui.view.acls", "spark.modify.acls", "spark.admin.acls", for example:
spark.ui.view.acls : user1,user2|group1,group2
The user list and group list will be splitted by '|'.

@AmplabJenkins
Copy link

Can one of the admins verify this patch?

@rxin
Copy link
Contributor

rxin commented Dec 31, 2015

I'm going to close this pull request. If this is still relevant and you are interested in pushing it forward, please open a new pull request. Thanks!

@asfgit asfgit closed this in 7b4452b Dec 31, 2015
@alpivonka
Copy link

I would like to bring up an opportunity for re-use.
with in the mapred-site.xml (for our implementation) we are using the following to allow access to mapreduce logs ...etc..
Why reinvent the wheel, most often the users/groups for both MR and Spark would be the some or all of the same user/groups.
My suggestion is to create a common list/set of properties between MR and Spark for acls. Instead of maintaining two separate lists
mapreduce.cluster.acls.enabled = true
mapreduce.job.acl-view-job=mapred,hue,* group-name
mapreduce.job.acl-modify-job=mapred,hue,* group-name

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants