[ 
https://issues.apache.org/jira/browse/HADOOP-12426?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Steve Loughran updated HADOOP-12426:
------------------------------------
    Attachment: HADOOP-12426-001.patch

Patch -001

this is derived from the slider kdiag, adding a toolrunner entry point, some 
more checks, and some basic tests.

Even with a {{UGI.reset()}} called between test methods, the JVM state is a 
mess: if you try to log in as an unknown principal, you are still assumed to be 
that principal. Accordingly: one test is commented out. 

Test-wise, this is the limit of what you can do in unit tests.

I've not added this as an end-user command, not yet...it needs playing with.

Usage

{code}
kdiag [--keytab <keytab> --principal <principal>] [--out <outfile>] 
[--keylength <length>] [--secure]
{code}

the -secure flag fails fast on an insecure cluster

> Add Entry point for Kerberos health check
> -----------------------------------------
>
>                 Key: HADOOP-12426
>                 URL: https://issues.apache.org/jira/browse/HADOOP-12426
>             Project: Hadoop Common
>          Issue Type: New Feature
>          Components: security
>    Affects Versions: 3.0.0
>            Reporter: Steve Loughran
>            Priority: Minor
>         Attachments: HADOOP-12426-001.patch
>
>
> If we a little command line entry point for testing kerberos settings, 
> including some automated diagnostics checks, we could simplify fielding the 
> client-side support calls.
> Specifically
> * check JRE for having java crypto extensions at full key length.
> * network checks: do you know your own name?
> * Is the user kinited in?
> * if a tgt is specified, does it exist?
> * are hadoop security options consistent?



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to