[ 
https://issues.apache.org/jira/browse/SPARK-24270?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16474486#comment-16474486
 ] 

Ankita commented on SPARK-24270:
--------------------------------

Yeah I am asking them as well. I wonder if anyone here has run into this issue 
or has thoughts ideas! 

> How to submit spark jobs with kinit sessions without keytab onto a Kerberized 
> cluster managed by Cloudera 
> ----------------------------------------------------------------------------------------------------------
>
>                 Key: SPARK-24270
>                 URL: https://issues.apache.org/jira/browse/SPARK-24270
>             Project: Spark
>          Issue Type: Question
>          Components: Documentation
>    Affects Versions: 2.2.1
>            Reporter: Ankita
>            Priority: Major
>
> Hi,
> We have a cluster that is secured over Kerberos on Cloudera. However, Spark 
> is not managed by cloudera. We have our own distribution package with 
> packages and deploys Spark 2.21 onto the cluster.  The reason being, the 
> version of Cloudera is 5.4 which does not support the Spark 2+
> I see that we are able to submit jobs on the cluster with a valid keytab file 
> and principal account, but unable to just do kinit and use the ticket 
> generated in the session to authenticate the job. 
> Is there a way to not use the keytab/prinicipal to be passed explicitly and 
> just use the kinit session of the user submitting the job? 
> Why is it essential to have a specific keytab file and pass it as args to 
> spark submit / spark shell? 
> Please provide some context around how Spark authenticates using this data 
> and why cant it use Kinit in this case? 



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to