[ https://issues.apache.org/jira/browse/FALCON-1916?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Balu Vellanki updated FALCON-1916: ---------------------------------- Issue Type: Improvement (was: Bug) > Allow RM principal to be specified in Cluster entity > ----------------------------------------------------- > > Key: FALCON-1916 > URL: https://issues.apache.org/jira/browse/FALCON-1916 > Project: Falcon > Issue Type: Improvement > Components: common > Environment: secure cluster > Reporter: Venkat Ranganathan > Assignee: Venkat Ranganathan > Fix For: trunk, 0.10 > > Original Estimate: 1m > Remaining Estimate: 1m > > When we define cluster entities where clusters are in different kerberos > realms with cross-realm trust setup (or the auth to local rules for RM varies > in different clusters), we need to explicitly define the RM principal (like > NN principal) so that the cluster entity can be validated and used. > For example, if Falcon server is in a cluster using REALM A and the RM being > accessed is in REALM B, the Falcon server will try to use the principal for > the RM as rm/_HOST@A instead of rm/_HOST@B which is the valid realm, which > can result in exceptions like below > {quote} > 2016-04-01 11:01:16,870 WARN - .... POST//entities/submit/cluster ~ Exception > encountered while connecting to the server : (Client:680) > java.lang.IllegalArgumentException: Server has invalid Kerberos principal: > rm/host@realm > at > org.apache.hadoop.security.SaslRpcClient.getServerPrincipal(SaslRpcClient.java:334) > {quote} -- This message was sent by Atlassian JIRA (v6.3.4#6332)