<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Dockerized YARN services with Kerberos in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Dockerized-YARN-services-with-Kerberos/m-p/228056#M84816</link>
    <description>&lt;P&gt;&lt;A href="https://issues.apache.org/jira/browse/YARN-7787"&gt;YARN-7787&lt;/A&gt; is open to discuss the issue, but there is no clear solution.&lt;/P&gt;</description>
    <pubDate>Mon, 12 Nov 2018 23:53:07 GMT</pubDate>
    <dc:creator>billie</dc:creator>
    <dc:date>2018-11-12T23:53:07Z</dc:date>
    <item>
      <title>Dockerized YARN services with Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Dockerized-YARN-services-with-Kerberos/m-p/228050#M84810</link>
      <description>&lt;P&gt;I have been able to run Dockerized YARN services on a kerberized HDP 3.0.1 cluster using the following service configuration. However, this requires a service principal to be created for every node in the cluster in the format user1/hostname@EXAMPLE.COM. Additionally, the keytab for each of these principals must be distributed to their respective hosts.&lt;/P&gt;&lt;P&gt;Is there a way around this? &lt;/P&gt;&lt;PRE&gt;{
  "name": "hello-world",
  "version": "1.0.0",
  "description": "hello world example",
  "components" :
    [
      {
        "name": "hello",
        "number_of_containers": 5,
        "artifact": {
          "id": "library/redis",
          "type": "DOCKER"
        },
        "launch_command": "",
        "resource": {
          "cpus": 1,
          "memory": "256"
        },
        "configuration": {
          "env": {
            "YARN_CONTAINER_RUNTIME_DOCKER_RUN_OVERRIDE_DISABLE": "true"
          }
        }
      }
    ],

    "kerberos_principal": {
      "principal_name": "user1/_HOST@EXAMPLE.COM",
      "keytab": "file:///etc/security/keytabs/user1.keytab"
    }
} &lt;/PRE&gt;&lt;P&gt;If I leave out the "kerberos_principal" section completely, I receive this error at service submission:&lt;/P&gt;&lt;PRE&gt;{"diagnostics":"Kerberos principal or keytab is missing."}&lt;/PRE&gt;&lt;P&gt;If I use a principal without the "_HOST" portion, I receive this error at service submission:&lt;/P&gt;&lt;PRE&gt;{"diagnostics":"Kerberos principal (user1@EXAMPLE.COM) does  not contain a hostname."}&lt;/PRE&gt;&lt;P&gt;If the keytab does not exist on the worker node, I receive this error in the application log:&lt;/P&gt;&lt;PRE&gt;org.apache.hadoop.service.ServiceStateException: java.io.IOException: 
SASL is configured for registry, but neither keytab/principal nor 
java.security.auth.login.config system property are specified&lt;/PRE&gt;</description>
      <pubDate>Sat, 10 Nov 2018 08:35:42 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Dockerized-YARN-services-with-Kerberos/m-p/228050#M84810</guid>
      <dc:creator>shjelmfelt</dc:creator>
      <dc:date>2018-11-10T08:35:42Z</dc:date>
    </item>
    <item>
      <title>Re: Dockerized YARN services with Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Dockerized-YARN-services-with-Kerberos/m-p/228051#M84811</link>
      <description>&lt;P&gt;You can upload the keytab from any one host to hdfs and then set "keytab" value to that path, something like "hdfs:///user/user1/user1.keytab". Note, the principal_name in that case cannot contain _HOST anymore and has to be expanded to the hostname from where you chose to upload the keytab, so something like "user1/host1.example.com@EXAMPLE.COM".&lt;/P&gt;</description>
      <pubDate>Sat, 10 Nov 2018 08:51:16 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Dockerized-YARN-services-with-Kerberos/m-p/228051#M84811</guid>
      <dc:creator>gsaha</dc:creator>
      <dc:date>2018-11-10T08:51:16Z</dc:date>
    </item>
    <item>
      <title>Re: Dockerized YARN services with Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Dockerized-YARN-services-with-Kerberos/m-p/228052#M84812</link>
      <description>&lt;P&gt;That worked. I just uploaded one of the keytabs into hdfs:/user/user1/user1_host1.keytab and updated the "kerberos_principal" section as follows. Is there a plan to remove the hostname requirement?&lt;/P&gt;&lt;P&gt;Thanks, &lt;A rel="user" href="https://community.cloudera.com/users/340/gsaha.html" nodeid="340"&gt;@Gour Saha!&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/340/gsaha.html" nodeid="340"&gt;&lt;/A&gt; &lt;/P&gt;&lt;PRE&gt;"kerberos_principal": {&lt;BR /&gt;  "principal_name": "user1/host1.example.com@EXAMPLE.COM",&lt;BR /&gt;  "keytab": "hdfs:/user/user1/user1_host1.keytab"&lt;BR /&gt;}&lt;/PRE&gt;</description>
      <pubDate>Sat, 10 Nov 2018 09:08:41 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Dockerized-YARN-services-with-Kerberos/m-p/228052#M84812</guid>
      <dc:creator>shjelmfelt</dc:creator>
      <dc:date>2018-11-10T09:08:41Z</dc:date>
    </item>
    <item>
      <title>Re: Dockerized YARN services with Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Dockerized-YARN-services-with-Kerberos/m-p/228053#M84813</link>
      <description>&lt;P&gt;Do you mean will we support principal of the format "user@EXAMPLE.COM"?&lt;/P&gt;</description>
      <pubDate>Sat, 10 Nov 2018 09:14:02 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Dockerized-YARN-services-with-Kerberos/m-p/228053#M84813</guid>
      <dc:creator>gsaha</dc:creator>
      <dc:date>2018-11-10T09:14:02Z</dc:date>
    </item>
    <item>
      <title>Re: Dockerized YARN services with Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Dockerized-YARN-services-with-Kerberos/m-p/228054#M84814</link>
      <description>&lt;P&gt;Yes, that is what I meant.&lt;/P&gt;</description>
      <pubDate>Sat, 10 Nov 2018 09:18:39 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Dockerized-YARN-services-with-Kerberos/m-p/228054#M84814</guid>
      <dc:creator>shjelmfelt</dc:creator>
      <dc:date>2018-11-10T09:18:39Z</dc:date>
    </item>
    <item>
      <title>Re: Dockerized YARN services with Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Dockerized-YARN-services-with-Kerberos/m-p/228055#M84815</link>
      <description>&lt;P&gt;That's because this keytab is used by YARN Service master which needs a service principal and not a user principal. Its all towards thwarting replay attacks.&lt;/P&gt;</description>
      <pubDate>Sat, 10 Nov 2018 11:16:17 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Dockerized-YARN-services-with-Kerberos/m-p/228055#M84815</guid>
      <dc:creator>gsaha</dc:creator>
      <dc:date>2018-11-10T11:16:17Z</dc:date>
    </item>
    <item>
      <title>Re: Dockerized YARN services with Kerberos</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Dockerized-YARN-services-with-Kerberos/m-p/228056#M84816</link>
      <description>&lt;P&gt;&lt;A href="https://issues.apache.org/jira/browse/YARN-7787"&gt;YARN-7787&lt;/A&gt; is open to discuss the issue, but there is no clear solution.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Nov 2018 23:53:07 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Dockerized-YARN-services-with-Kerberos/m-p/228056#M84816</guid>
      <dc:creator>billie</dc:creator>
      <dc:date>2018-11-12T23:53:07Z</dc:date>
    </item>
  </channel>
</rss>

