[ 
https://issues.apache.org/jira/browse/HDFS-12372?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16147594#comment-16147594
 ] 

Kihwal Lee commented on HDFS-12372:
-----------------------------------

You should not run datanode as a hdfs superuser.  Many examples show "dn" as a 
datanode user, which is not a privileged user.  Some people also use 
"hadoop.security.auth_to_local" to map the dn user to the hdfs superuser. This 
is also not a good practice.  One compromised datanode allows a superuser 
access to the hdfs cluster.



> Document the impact of HDFS-11069 (Tighten the authorization of datanode RPC)
> -----------------------------------------------------------------------------
>
>                 Key: HDFS-12372
>                 URL: https://issues.apache.org/jira/browse/HDFS-12372
>             Project: Hadoop HDFS
>          Issue Type: Improvement
>    Affects Versions: 2.8.0, 2.9.0, 2.7.4, 3.0.0-alpha2
>            Reporter: Wei-Chiu Chuang
>            Assignee: Wei-Chiu Chuang
>
> The idea of HDFS-11069 is good. But it seems to cause confusion for 
> administrators when they issue commands like hdfs diskbalancer, or hdfs 
> dfsadmin, because this change of behavior is not documented properly.
> I suggest we document a recommended way to kinit (e.g. kinit as 
> hdfs/ho...@host1.example.com, rather than h...@example.com), as well as 
> documenting a notice for running privileged DataNode commands in a Kerberized 
> clusters



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

---------------------------------------------------------------------
To unsubscribe, e-mail: hdfs-issues-unsubscr...@hadoop.apache.org
For additional commands, e-mail: hdfs-issues-h...@hadoop.apache.org

Reply via email to