You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@ambari.apache.org by "Jaimin D Jetly (JIRA)" <ji...@apache.org> on 2015/12/12 00:18:46 UTC

[jira] [Commented] (AMBARI-8610) Kerberos add hosts/services CSV required for automating keytab distribution

    [ https://issues.apache.org/jira/browse/AMBARI-8610?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15053768#comment-15053768 ] 

Jaimin D Jetly commented on AMBARI-8610:
----------------------------------------

This work involves making REST API changes for returning CSV of principals for host components that have not been installed yet. Once it is done UI can leverage the API to show "Download CSV" button on Review page.

It doesn't seem that we have been able to make much progress over here and this work no longer seems feasible to go in 2.2.0 release.
I am moving this out of 2.2.0.

cc [~harisekhon] [~rlevas]

> Kerberos add hosts/services CSV required for automating keytab distribution
> ---------------------------------------------------------------------------
>
>                 Key: AMBARI-8610
>                 URL: https://issues.apache.org/jira/browse/AMBARI-8610
>             Project: Ambari
>          Issue Type: Improvement
>    Affects Versions: 1.6.1
>         Environment: HDP 2.1
>            Reporter: Hari Sekhon
>            Assignee: Robert Levas
>             Fix For: 2.2.0
>
>
> Ambari generates a CSV list of principals for generating keytabs only when initially kerberizing a cluster.
> However, when adding nodes to the cluster Ambari provides no such CSV or list of principals - leaving the user to figure out the list of required principals and keytabs themselves.
> A CSV of new principals and keytabs should be created whenever deploying new hosts or new services to an existing kerberized cluster to allow for similar automation of extending an existing cluster.
> I use the original CSV as input to a perl program I've written to automate kerberos principal creation, keytab exports and distribution to nodes based for a FreeIPA realm (standalone MIT KDC as per stock kerberos_setup.sh is used more for small VM / PoC setups without LDAP integrated users and groups).
> If anyone else wants to automate FreeIPA Kerberos keytabs for their clusters they can use this program on my github:
> {code}
> git clone https://github.com/harisekhon/toolbox
> cd toolbox
> make
> ./ambari_freeipa_kerberos_setup.pl --help
> {code}
> Regards,
> Hari Sekhon
> http://www.linkedin.com/in/harisekhon



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)