You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@oozie.apache.org by "Robert Kanter (JIRA)" <ji...@apache.org> on 2013/01/17 18:52:12 UTC
[jira] [Updated] (OOZIE-1172) Add documentation on how to get Java
actions to authenticate properly on Kerberos-enabled clusters
[ https://issues.apache.org/jira/browse/OOZIE-1172?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Robert Kanter updated OOZIE-1172:
---------------------------------
Description:
If a user tries to use a Java action (so they've written their own Java main method) on a Kerberos-enabled cluster it will fail because they need to propagate the delegation token like this (taken from the MapReduce action):
{code}
// propagate delegation related props from launcher job to MR job
if (System.getenv("HADOOP_TOKEN_FILE_LOCATION") != null) {
jobConf.set("mapreduce.job.credentials.binary", System.getenv("HADOOP_TOKEN_FILE_LOCATION"));
}
{code}
We should document this somewhere.
was:
If a user tries to use a Java action, so they've written their own Java main method, on a Kerberos-enabled cluster it will fail because they need to propagate the delegation token like this (taken from the MapReduce action):
{code}
// propagate delegation related props from launcher job to MR job
if (System.getenv("HADOOP_TOKEN_FILE_LOCATION") != null) {
jobConf.set("mapreduce.job.credentials.binary", System.getenv("HADOOP_TOKEN_FILE_LOCATION"));
}
{code}
We should document this somewhere.
> Add documentation on how to get Java actions to authenticate properly on Kerberos-enabled clusters
> --------------------------------------------------------------------------------------------------
>
> Key: OOZIE-1172
> URL: https://issues.apache.org/jira/browse/OOZIE-1172
> Project: Oozie
> Issue Type: Improvement
> Components: docs
> Affects Versions: trunk
> Reporter: Robert Kanter
> Assignee: Robert Kanter
> Priority: Minor
> Fix For: trunk
>
>
> If a user tries to use a Java action (so they've written their own Java main method) on a Kerberos-enabled cluster it will fail because they need to propagate the delegation token like this (taken from the MapReduce action):
> {code}
> // propagate delegation related props from launcher job to MR job
> if (System.getenv("HADOOP_TOKEN_FILE_LOCATION") != null) {
> jobConf.set("mapreduce.job.credentials.binary", System.getenv("HADOOP_TOKEN_FILE_LOCATION"));
> }
> {code}
> We should document this somewhere.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira