You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@flink.apache.org by "Tzu-Li (Gordon) Tai (JIRA)" <ji...@apache.org> on 2017/05/25 04:12:04 UTC
[jira] [Updated] (FLINK-6713) Document how to allow multiple Kafka
consumers / producers to authenticate using different credentials
[ https://issues.apache.org/jira/browse/FLINK-6713?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Tzu-Li (Gordon) Tai updated FLINK-6713:
---------------------------------------
Description:
The doc improvements should include:
1. Clearly state that the built-in JAAS security module in Flink is a JVM process-wide static JAAS file installation (all static JAAS files are, not Flink specific), and therefore only allows all Kafka consumers and producers in a single JVM (and therefore the whole job, since we do not allow assigning operators to specific slots) to authenticate as one single user.
2. If Kerberos authentication is used: self-ship multiple keytab files, and use Kafka's dynamic JAAS configuration through client properties to point to separate keytabs for each consumer / producer. Note that ticket cache would never work for multiple authentications.
3. If plain simple login is used: Kafka's dynamic JAAS configuration should be used (and is the only way to do so).
was:
The doc improvements should include:
1. Clearly state that the built-in JAAS security module in Flink is a JVM process-wide static JAAS file installation (all static JAAS files are, not Flink specific), and therefore only allows all Kafka consumers and producers in a single JVM (and therefore the whole job, since we do not allow assigning operators to specific slots) to authenticate as one single user.
2. If Kerberos authentication is used, 2 approaches: 1) with Flink's built-in Kerberos support, multiple user principals need to be merged as a single keytab, or 2) self-ship multiple keytab files, and use Kafka's dynamic JAAS configuration through client properties to point to separate keytabs for each consumer / producer. Note that ticket cache would never work for multiple authentications.
3. If plain simple login is used: Kafka's dynamic JAAS configuration should be used (and is the only way to do so).
> Document how to allow multiple Kafka consumers / producers to authenticate using different credentials
> ------------------------------------------------------------------------------------------------------
>
> Key: FLINK-6713
> URL: https://issues.apache.org/jira/browse/FLINK-6713
> Project: Flink
> Issue Type: Improvement
> Components: Documentation, Kafka Connector
> Reporter: Tzu-Li (Gordon) Tai
> Assignee: Tzu-Li (Gordon) Tai
>
> The doc improvements should include:
> 1. Clearly state that the built-in JAAS security module in Flink is a JVM process-wide static JAAS file installation (all static JAAS files are, not Flink specific), and therefore only allows all Kafka consumers and producers in a single JVM (and therefore the whole job, since we do not allow assigning operators to specific slots) to authenticate as one single user.
> 2. If Kerberos authentication is used: self-ship multiple keytab files, and use Kafka's dynamic JAAS configuration through client properties to point to separate keytabs for each consumer / producer. Note that ticket cache would never work for multiple authentications.
> 3. If plain simple login is used: Kafka's dynamic JAAS configuration should be used (and is the only way to do so).
--
This message was sent by Atlassian JIRA
(v6.3.15#6346)