You are viewing a plain text version of this content. The canonical link for it is here.
Posted to yarn-dev@hadoop.apache.org by "Bibin A Chundatt (JIRA)" <ji...@apache.org> on 2016/12/30 16:30:58 UTC
[jira] [Created] (YARN-6046) Documentation correction in
YarnApplicationSecurity
Bibin A Chundatt created YARN-6046:
--------------------------------------
Summary: Documentation correction in YarnApplicationSecurity
Key: YARN-6046
URL: https://issues.apache.org/jira/browse/YARN-6046
Project: Hadoop YARN
Issue Type: Bug
Reporter: Bibin A Chundatt
Priority: Trivial
Few documentation correction required in hadoop-yarn/hadoop-yarn-site/YarnApplicationSecurity.html
{code}
1. Suring AM startup, log in to Kerberos.
{code}
{code}
Don’t. Rely on the lifespan of the
{code}
{code}
renewed automatically; the AM pushes out
{code}
{code}
In an insecure cluster, the application will run as the identity of the account of the node manager, typically something such as yarn or mapred. By default, the application will access HDFS as that user, with a different home directory, and with a different user identified in audit logs and on file system owner attributes.
{code}
Need to reframe sentence.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)
---------------------------------------------------------------------
To unsubscribe, e-mail: yarn-dev-unsubscribe@hadoop.apache.org
For additional commands, e-mail: yarn-dev-help@hadoop.apache.org