Created on 06-11-2016 04:02 PM - edited 09-16-2022 03:24 AM
Hi there! how are you? 😃
We have a HDP 2.2 cluster (without Kerberos) already on Production, and we are planning to build another HPD 2.4 cluster (with Kerberos) on the side of the first one.
So, cutting to the chase, my doubt is: Are we going to have some troubles on the attempting to connect to a kerberos enabled cluster?
Are there limitations on the communication between clusters? I mean, will a cluster be able to connect to the cluster for read/write operations, without getting kerberos errors.
As far as I know, this is not a supported configuration but I am looking for someone that has experience configuring this solution.
Thanks in advance.
Thiago.
Created 06-11-2016 05:04 PM
If you are using DistCp and WebHDFS to copy data between a secure cluster and an nonsecure cluster by doing the following:
<property> <name>ipc.client.fallback-to-simple-auth-allowed</name> <value>true</value> </property>
distcp webhdfs://nonsecure-cluster webhdfs://secure-cluster distcp webhdfs://secure-cluster webhdfs://nonsecure-cluster
Created 06-11-2016 05:04 PM
If you are using DistCp and WebHDFS to copy data between a secure cluster and an nonsecure cluster by doing the following:
<property> <name>ipc.client.fallback-to-simple-auth-allowed</name> <value>true</value> </property>
distcp webhdfs://nonsecure-cluster webhdfs://secure-cluster distcp webhdfs://secure-cluster webhdfs://nonsecure-cluster
Created 06-11-2016 08:46 PM
Hello @Thiago. It is possible to achieve communication across secured and unsecured clusters. A common use case for this is using DistCp for transfer of data between clusters.
As mentioned in other answers, the configuration property ipc.client.fallback-to-simple-auth-allowed=true tells a secured client that it may enter a fallback unsecured mode when the unsecured server side fails to satisfy authentication. However, I recommend not setting this in core-site.xml, and instead setting it on the command line invocation specifically for the DistCp command that needs to communicate with the unsecured cluster. Setting it in core-site.xml means that all RPC connections for any application are eligible for fallback to simple authentication. This potentially expands the attack surface for man-in-the-middle attacks.
Here is an example of overriding the setting on the command line while running DistCp:
hadoop distcp -D ipc.client.fallback-to-simple-auth-allowed=true hdfs://nn1:8020/foo/bar hdfs://nn2:8020/bar/foo
The command must be run while logged into the secured cluster, not the unsecured cluster.
This is adapted from one of my prior answers: