You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@spark.apache.org by "Patrick Wendell (JIRA)" <ji...@apache.org> on 2015/01/08 22:23:36 UTC

[jira] [Created] (SPARK-5158) Allow for keytab-based HDFS security in Standalone mode

Patrick Wendell created SPARK-5158:
--------------------------------------

             Summary: Allow for keytab-based HDFS security in Standalone mode
                 Key: SPARK-5158
                 URL: https://issues.apache.org/jira/browse/SPARK-5158
             Project: Spark
          Issue Type: New Feature
          Components: Spark Core
            Reporter: Patrick Wendell
            Assignee: Matthew Cheah
            Priority: Critical


There have been a handful of patches for allowing access to Kerberized HDFS clusters in standalone mode. The main reason we haven't accepted these patches have been that they rely on insecure distribution of token files from the driver to the other components.

As a simpler solution, I wonder if we should just provide a way to have the Spark driver and executors independently log in and acquire credentials using a keytab. This would work for users who are build dedicated, single-tenant, Spark clusters (i.e. they are willing to have a keytab on every machine running Spark for their application). It wouldn't address all possible deployment scenarios, but if it's simple I think it's worth considering.

This would also work for Spark streaming jobs, which often run on dedicated hardware since they are long-running services.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscribe@spark.apache.org
For additional commands, e-mail: issues-help@spark.apache.org