GitHub user vanzin opened a pull request: https://github.com/apache/spark/pull/22911
[SPARK-25815][k8s] Support kerberos in client mode, keytab-based token renewal. This change hooks up the k8s backed to the updated HadoopDelegationTokenManager, so that delegation tokens are also available in client mode. It also closes the remaining gap in kerberos support which is to support the current keytab-based token renewal supported by YARN (and partially by Mesos). That is done by stashing the keytab in a secret on the driver pod, and then providing it to the HadoopDelegationTokenManager when the driver starts. Tested in cluster mode with and without a keytab, and also in client mode. You can merge this pull request into a Git repository by running: $ git pull https://github.com/vanzin/spark SPARK-25815 Alternatively you can review and apply these changes as the patch at: https://github.com/apache/spark/pull/22911.patch To close this pull request, make a commit to your master/trunk branch with (at least) the following in the commit message: This closes #22911 ---- commit 7f86e231922648a9da07ae73026a3a430d2c83f5 Author: Marcelo Vanzin <vanzin@...> Date: 2018-10-19T20:33:47Z [SPARK-25815][k8s] Support kerbers in client mode, keytab-based token renewal. This change hooks up the k8s backed to the updated HadoopDelegationTokenManager, so that delegation tokens are also available in client mode. It also closes the remaining gap in kerberos support which is to support the current keytab-based token renewal supported by YARN (and partially by Mesos). That is done by stashing the keytab in a secret on the driver pod, and then providing it to the HadoopDelegationTokenManager when the driver starts. Tested in cluster mode with and without a keytab, and also in client mode. ---- --- --------------------------------------------------------------------- To unsubscribe, e-mail: reviews-unsubscr...@spark.apache.org For additional commands, e-mail: reviews-h...@spark.apache.org