You are viewing a plain text version of this content. The canonical link for it is here.
Posted to yarn-dev@hadoop.apache.org by "Bibin A Chundatt (JIRA)" <ji...@apache.org> on 2016/12/30 16:30:58 UTC

[jira] [Created] (YARN-6046) Documentation correction in YarnApplicationSecurity

Bibin A Chundatt created YARN-6046:
--------------------------------------

             Summary: Documentation correction in YarnApplicationSecurity
                 Key: YARN-6046
                 URL: https://issues.apache.org/jira/browse/YARN-6046
             Project: Hadoop YARN
          Issue Type: Bug
            Reporter: Bibin A Chundatt
            Priority: Trivial


Few documentation correction required in hadoop-yarn/hadoop-yarn-site/YarnApplicationSecurity.html

{code}
1. Suring AM startup, log in to Kerberos.
{code}

{code}
Don’t. Rely on the lifespan of the 
{code}

{code}
renewed automatically; the AM pushes out 
{code}

{code}
In an insecure cluster, the application will run as the identity of the account of the node manager, typically something such as yarn or mapred. By default, the application will access HDFS as that user, with a different home directory, and with a different user identified in audit logs and on file system owner attributes.
{code}
Need to reframe sentence.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

---------------------------------------------------------------------
To unsubscribe, e-mail: yarn-dev-unsubscribe@hadoop.apache.org
For additional commands, e-mail: yarn-dev-help@hadoop.apache.org