lifangyu opened a new pull request, #6923:
URL: https://github.com/apache/gravitino/pull/6923

   <!--
   [Improvement] hudi catalog support Kerberos authentication #6854
   -->
   
   ### What changes were proposed in this pull request?
   
   When the Hudi catalog back-end is hms, the hms Kerberos authentication 
function is supported
   
   ### Why are the changes needed?
   
   1. For data security, it is necessary to support hms Kerberos authentication;
   2. Provides a HMS Kerberos authentication methods: HudiHMSBackendOps. 
InitKerberosAuth (...). Access entry
   
   
   ### Does this PR introduce _any_ user-facing change?
   1. Introduced user-facing changes:
   The hudi catalog has added property parameters:
   authentication.type: The type of authentication for hudi catalog backend.    
This configuration only applicable for for hms backend,  and only supports 
`Kerberos`, `simple` currently.
   authentication.kerberos. principal: The principal of the Kerberos 
authentication
   Authentication.kerbers.keytab-uri: The URI of The keytab for the Kerberos 
authentication.
   Property name with this prefix passed down to the underlying backend client 
for use.   Such as  ` gravitino. Bypass. Hive. Metastore. Kerberos. The 
principal = XXXX ` ` gravitino. Bypass. Hadoop. Security. The authentication = 
kerberos `, ` gr avitino.bypass.hive.metastore.sasl.  enabled=ture` And so on.
   
   ### How was this patch tested?
   
   Using the web ui, you can configure hudi catalog backend hms and config 
Kerberos-related parameters to manage hudi metadata. As shown below:
   <img width="1379" alt="image" 
src="https://github.com/user-attachments/assets/6f89d707-0e82-4091-9076-00761508d158";
 />
   
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to