[ 
https://issues.apache.org/jira/browse/AMBARI-3592?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13805466#comment-13805466
 ] 

Aleksandr Kovalenko commented on AMBARI-3592:
---------------------------------------------

committed to trunk

> Reassign Master(secure cluster): Display principal and keytab path creation 
> as a required manual step.
> ------------------------------------------------------------------------------------------------------
>
>                 Key: AMBARI-3592
>                 URL: https://issues.apache.org/jira/browse/AMBARI-3592
>             Project: Ambari
>          Issue Type: Task
>          Components: client
>    Affects Versions: 1.4.2
>            Reporter: Aleksandr Kovalenko
>            Assignee: Aleksandr Kovalenko
>             Fix For: 1.4.2
>
>         Attachments: AMBARI-3592.patch
>
>
> If the cluster is detected to be a kerberos secure cluster, we should add an 
> informative message about creating appropriate keytab. There is already a 
> step in the wizard that displays manual steps for HDFS components 
> reassignment. We can add this message over there. For ResourceManager 
> reassignment, we will require a manual step page to display this information.
> Cluster security status can be retrieved from hadoop.security.authentication 
> property in core-site.xml and if value found is kerberos, add appropriate 
> message. Example: 
> *For NameNode reassignment:*
>  Note: 
> # Keytab file <dfs.namenode.keytab.file value> containing principal 
> <dfs.namenode.kerberos.principal value with _HOST substituted with real 
> target host hostname> should exist on <target host hostname>. 
> # Keytab file <dfs.web.authentication.kerberos.keytab value> containing 
> principal <dfs.web.authentication.kerberos.principal value with _HOST in the 
> value substituted with real target host hostname > should exist on <target 
> host hostname>



--
This message was sent by Atlassian JIRA
(v6.1#6144)

Reply via email to