Alexandre Linte created HDFS-11393: -------------------------------------- Summary: Hadoop KMS contacted by jobs which don’t use KMS encryption Key: HDFS-11393 URL: https://issues.apache.org/jira/browse/HDFS-11393 Project: Hadoop HDFS Issue Type: Wish Environment: Hadoop 2.7.3, Spark 1.6.3 on Yarn, Oozie 4.2.3 Cluster secured with Kerberos Reporter: Alexandre Linte Priority: Minor
Hello, After few days of usage of Hadoop KMS in our pre-production platform, it was noticed that after restarting resourcemanagers, all Yarn jobs generated on the platform interrogated the KMS server, even if the didn't process encrypted information. {noformat} 2016-11-23 10:58:47,708 DEBUG AuthenticationFilter - Request [http://uabigkms01:16000/kms/v1/?op=GETDELEGATIONTOKEN&renewer=rm%2Fuabigrm01%40SANDBOX.HADOOP] triggering authentication 2016-11-23 10:58:47,735 DEBUG AuthenticationFilter - Request [http://uabigkms01:16000/kms/v1/?op=GETDELEGATIONTOKEN&renewer=rm%2Fuabigrm01%40SANDBOX.HADOOP] user xxxx authenticated {noformat} Indeed after research we see that KMS supports delegation token to authenticate to the Java KeyProvider by processes without Kerberos credentials. Is there a way to bypass Delegation Token on KMS and just contact KMS when jobs or user into HDFS use encrypted data ? -- This message was sent by Atlassian JIRA (v6.3.15#6346) --------------------------------------------------------------------- To unsubscribe, e-mail: hdfs-dev-unsubscr...@hadoop.apache.org For additional commands, e-mail: hdfs-dev-h...@hadoop.apache.org