Github user vanzin commented on the issue:

    https://github.com/apache/spark/pull/17530
  
    > That shouldn't preclude standalone clusters from communicating with 
secured resources.
    
    Of course it should. You're inserting a service into your cluster that 
allows people to steal each others' credentials, basically making security in 
all the other services pointless. Explain to me how does that make sense?
    
    If all you want is to allow Spark to access secure HDFS, create a user for 
the "Spark Standalone" service and login on every Worker node as that user. All 
Spark applications will use that user, and then administrators have control of 
how much damage that user can do to other services.
    
    But as is, you're basically breaking security of the whole datacenter by 
introducing an insecure service.


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at [email protected] or file a JIRA ticket
with INFRA.
---

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to