Alexandre Linte created HDFS-11393:
--------------------------------------

             Summary: Hadoop KMS contacted by jobs which don’t use  KMS 
encryption
                 Key: HDFS-11393
                 URL: https://issues.apache.org/jira/browse/HDFS-11393
             Project: Hadoop HDFS
          Issue Type: Wish
         Environment: Hadoop 2.7.3, Spark 1.6.3 on Yarn, Oozie 4.2.3
Cluster secured with Kerberos
            Reporter: Alexandre Linte
            Priority: Minor


Hello,

After few days of usage of Hadoop KMS in our pre-production platform, it was 
noticed that after restarting resourcemanagers, all Yarn jobs generated on the 
platform interrogated the KMS server, even if the didn't process encrypted 
information. 
{noformat}
2016-11-23 10:58:47,708 DEBUG AuthenticationFilter - Request 
[http://uabigkms01:16000/kms/v1/?op=GETDELEGATIONTOKEN&renewer=rm%2Fuabigrm01%40SANDBOX.HADOOP]
 triggering authentication

2016-11-23 10:58:47,735 DEBUG AuthenticationFilter - Request 
[http://uabigkms01:16000/kms/v1/?op=GETDELEGATIONTOKEN&renewer=rm%2Fuabigrm01%40SANDBOX.HADOOP]
 user xxxx authenticated
{noformat}
Indeed after research we see that KMS supports delegation token to authenticate 
to the Java KeyProvider by processes without Kerberos credentials.
Is there a way to bypass Delegation Token on KMS and just contact KMS when jobs 
or user into HDFS use encrypted data ?




--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

---------------------------------------------------------------------
To unsubscribe, e-mail: hdfs-issues-unsubscr...@hadoop.apache.org
For additional commands, e-mail: hdfs-issues-h...@hadoop.apache.org

Reply via email to