You could set the Spark config properties for principal to use with Kerberos - it's not end-to-end, but could be a good step:
http://spark.apache.org/docs/latest/security.html#yarn-mode On Wed, Jul 20, 2016 at 4:02 PM -0700, "Jeff Zhang" <zjf...@gmail.com<mailto:zjf...@gmail.com>> wrote: I think the work is still in progress. But it will be done very soon. On Thu, Jul 21, 2016 at 5:21 AM, Chen Song <chen.song...@gmail.com<mailto:chen.song...@gmail.com>> wrote: Thanks Jeff. I don't see any configurations for keytab and principal in Zeppelin when talking to Livy. I don't see a reason for Zeppelin to do that. Or is it something this patch gonna enforce? Can I just pull the patch and give a try? Chen On Wed, Jul 20, 2016 at 2:05 AM Jeff Zhang <zjf...@gmail.com<mailto:zjf...@gmail.com>> wrote: Livy in secured cluster is still in progress. See https://github.com/cloudera/livy/pull/145 But this is only in livy side. In zeppelin side, I believe you also need to specify keytab and principal to access livy rest api. I don't know whether you need to refresh ticket in zeppelin side, it depends on zeppelin side implementation. On Wed, Jul 20, 2016 at 4:55 AM, Chen Song <chen.song...@gmail.com<mailto:chen.song...@gmail.com>> wrote: I have a question on running Zeppelin Spark interpreter in a Kerberized environment. Spark comes with a runtime conf that allows you to specific the keytab and principal. My questions are: 1. When using Livy, does it rely on the same mechanism when starting Spark 2. Whether to use Livy or not, there doesn't seem a way to refresh login from the specified the principle and keytab. After a while, I need to run kinit manually to re-login using the principal with the keytab, if the interpreter needs to be restarted. Is there a better way to address this? Chen -- Best Regards Jeff Zhang -- Best Regards Jeff Zhang