Venkat Ranganathan created FALCON-1916:
------------------------------------------

             Summary: Allow RM principal to be specified in Cluster entity 
                 Key: FALCON-1916
                 URL: https://issues.apache.org/jira/browse/FALCON-1916
             Project: Falcon
          Issue Type: Bug
          Components: common
         Environment: secure cluster
            Reporter: Venkat Ranganathan
            Assignee: Venkat Ranganathan


When we define cluster entities where clusters are in different kerberos realms 
with cross-realm trust setup (or the auth to local rules for RM varies in 
different clusters),  we need to explicitly define the RM principal (like NN 
principal) so that the cluster entity can be validated and used.

For example, if Falcon server is  in a cluster using REALM A and the RM being 
accessed is in REALM B, the Falcon server will try to use the principal for the 
RM as rm/_HOST@A instead of rm/_HOST@B which is the valid realm, which can 
result in exceptions like below
{quote}
2016-04-01 11:01:16,870 WARN - .... POST//entities/submit/cluster ~ Exception 
encountered while connecting to the server : (Client:680)
java.lang.IllegalArgumentException: Server has invalid Kerberos principal: 
rm/host@realm
at 
org.apache.hadoop.security.SaslRpcClient.getServerPrincipal(SaslRpcClient.java:334)
{quote}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to