Github user rvesse commented on a diff in the pull request:

    https://github.com/apache/spark/pull/21669#discussion_r215692843
  
    --- Diff: docs/security.md ---
    @@ -722,6 +722,62 @@ with encryption, at least.
     The Kerberos login will be periodically renewed using the provided 
credentials, and new delegation
     tokens for supported will be created.
     
    +## Secure Interaction with Kubernetes
    +
    +When talking to Hadoop-based services behind Kerberos, it was noted that 
Spark needs to obtain delegation tokens
    +so that non-local processes can authenticate. These delegation tokens in 
Kubernetes are stored in Secrets that are 
    +shared by the Driver and its Executors. As such, there are three ways of 
submitting a kerberos job: 
    +
    --- End diff --
    
    Might be worth making it explicit here that for any of the following 
examples to work `HADOOP_CONF_DIR` must be defined in the submission 
environment otherwise the K8S backend skips all the HDFS steps including 
Kerberos setup
    
    Also shouldn't the Running on Kubernetes docs also be updated to mention 
this feature, even if only to link users across to this doc?


---

---------------------------------------------------------------------
To unsubscribe, e-mail: reviews-unsubscr...@spark.apache.org
For additional commands, e-mail: reviews-h...@spark.apache.org

Reply via email to