[ 
https://issues.apache.org/jira/browse/FLINK-11088?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16721857#comment-16721857
 ] 

Rong Rong edited comment on FLINK-11088 at 12/14/18 11:03 PM:
--------------------------------------------------------------

I further dig into the details on the document on Hadoop side and seems like 
there are 3 recommended way of distributing credentials to secure long running 
service on YARN. See here: 
https://hadoop.apache.org/docs/current/hadoop-yarn/hadoop-yarn-site/YarnApplicationSecurity.html#Securing_Long-lived_YARN_Services.

I am not sure whether this applies to other cluster resource management system, 
but I think it is worthwhile to take a look. For one: the current way of 
letting all JM and TMs renews keytab with KDC seems to be a problem. If we can 
have AM or JM renewing with keytab credential and distribute them via 
delegation token to all TMs it will release lots of loads on KDC server.

I will start drafting a simple discussion doc if the community thinks this is 
worth to dig deeper. Any thoughts [~suez1224], [~till.rohrmann], [~aljoscha] ?


was (Author: walterddr):
I further dig into the details on the document on Hadoop side and seems like 
there are 3 recommended way of distributing credentials to secure long running 
service on YARN. See here: 
https://hadoop.apache.org/docs/current/hadoop-yarn/hadoop-yarn-site/YarnApplicationSecurity.html#Securing_Long-lived_YARN_Services.

I am not sure whether this applies to other cluster resource management system, 
but I think it is worthwhile to take a look. For one: the current way of 
letting all JM and TMs renews keytab with KDC seems to be a problem. If we can 
have AM or JM renewing with keytab credential and distribute them via 
delegation token to all TMs it will release lots of loads on KDC server.

I will start drafting a simple discussion doc if the community thinks this is 
worth to dig deeper. Any thoughts [~till.rohrmann] [~aljoscha] ?

> Improve Kerberos Authentication using Keytab in YARN proxy user mode
> --------------------------------------------------------------------
>
>                 Key: FLINK-11088
>                 URL: https://issues.apache.org/jira/browse/FLINK-11088
>             Project: Flink
>          Issue Type: Improvement
>          Components: Security, YARN
>            Reporter: Rong Rong
>            Assignee: Rong Rong
>            Priority: Major
>
> Currently flink-yarn assumes keytab is shipped as application master 
> environment local resource on client side and will be distributed to all the 
> TMs. This does not work for YARN proxy user mode [1] since proxy user or 
> super user might not have access to actual users' keytab, but can request 
> delegation tokens on users' behalf. 
> Based on the type of security options for long-living YARN service[2], we 
> propose to have the keytab file path discovery configurable depending on the 
> launch mode of the YARN client. 
> Reference: 
> [1] 
> https://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/Superusers.html
> [2] 
> https://hadoop.apache.org/docs/current/hadoop-yarn/hadoop-yarn-site/YarnApplicationSecurity.html#Securing_Long-lived_YARN_Services



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to