Dear Ravi,

thanks for answer. I went through the discussion in the ticket you mention and did some experimentation. My understanding is the following - as long as I dont explicitly allow for this using

 hadoop.proxyuser.username.groups
 hadoop.proxyuser.username.hosts

user processes spawned by yarn on worknodes will always run with the uid of that user. Is that right?

 Thanks,
  Tomasz




W dniu 29.06.2015 o 21:43, Ravi Prakash pisze:
Hi Tomasz!

It is tricky to set up, but there are no implications to security if you
configure it correctly. Please read the discussion on [YARN-2424] LCE
should support non-cgroups, non-secure mode - ASF JIRA
<https://issues.apache.org/jira/browse/YARN-2424>

HTH
Ravi
        
        
        
        
[YARN-2424] LCE should support non-cgroups, non-secure mode - ASF JIRA
<https://issues.apache.org/jira/browse/YARN-2424>
After YARN-1253, LCE no longer works for non-secure, non-cgroup scenarios.
View on issues.apache.org <https://issues.apache.org/jira/browse/YARN-2424>
        
Preview by Yahoo






On Thursday, June 25, 2015 2:30 AM, Tomasz Fruboes
<[email protected]> wrote:


Dear Experts,

   I'm running a small YARN cluster configured to use simple security,
LinuxContainerExecutor and


yarn.nodemanager.linux-container-executor.nonsecure-mode.limit-users=false

   in order to get correct uid when executing jobs. This is needed to
access files from network exported filesystem.

   I was wondering - does this posses any security risk (since
nonsecure-mode.limit is set to true by default in the simple security
mode)? I.e. is there a known way for a user to get uid of different user
with such configuration?

   Cheers,
     Tomasz




Reply via email to