[ 
https://issues.apache.org/jira/browse/FALCON-1916?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Balu Vellanki updated FALCON-1916:
----------------------------------
    Issue Type: Improvement  (was: Bug)

> Allow RM principal to be specified in Cluster entity 
> -----------------------------------------------------
>
>                 Key: FALCON-1916
>                 URL: https://issues.apache.org/jira/browse/FALCON-1916
>             Project: Falcon
>          Issue Type: Improvement
>          Components: common
>         Environment: secure cluster
>            Reporter: Venkat Ranganathan
>            Assignee: Venkat Ranganathan
>             Fix For: trunk, 0.10
>
>   Original Estimate: 1m
>  Remaining Estimate: 1m
>
> When we define cluster entities where clusters are in different kerberos 
> realms with cross-realm trust setup (or the auth to local rules for RM varies 
> in different clusters),  we need to explicitly define the RM principal (like 
> NN principal) so that the cluster entity can be validated and used.
> For example, if Falcon server is  in a cluster using REALM A and the RM being 
> accessed is in REALM B, the Falcon server will try to use the principal for 
> the RM as rm/_HOST@A instead of rm/_HOST@B which is the valid realm, which 
> can result in exceptions like below
> {quote}
> 2016-04-01 11:01:16,870 WARN - .... POST//entities/submit/cluster ~ Exception 
> encountered while connecting to the server : (Client:680)
> java.lang.IllegalArgumentException: Server has invalid Kerberos principal: 
> rm/host@realm
> at 
> org.apache.hadoop.security.SaslRpcClient.getServerPrincipal(SaslRpcClient.java:334)
> {quote}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to