Created on 04-21-2016 12:05 PM - edited 09-16-2022 03:15 AM
I am able to access gs without having kerberos ticket. I am guessing that it's normal but it would be nice to have a way to enforce kerberos auth for gs while accessing the GS from Hadoop.
bash-4.1$ id uid=1023418093(hive) gid=1614812195(hadoop) ----------------------------------------------------------- bash-4.1$ kdestroy kdestroy: No credentials cache found while destroying cache ----------------------------------------------------------- bash-4.1$ klist klist: No credentials cache found (ticket cache FILE:/tmp/krb5cc_1023418093) ----------------------------------------------------------- bash-4.1$ hadoop fs -ls gs://dev/ 16/04/20 14:31:48 INFO gcs.GoogleHadoopFileSystemBase: GHFS version: 1.4.5-hadoop2 Found 1 items drwxrwxr-x - hive hive 0 2016-04-11 00:26 gs://dev/apps ----------------------------------------------------------- bash-4.1$ hadoop fs -ls / 16/04/20 14:30:56 WARN ipc.Client: Exception encountered while connecting to the server : javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)] at com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212) at org.apache.hadoop.security.SaslRpcClient.saslConnect(SaslRpcClient.java:413) at org.apache.hadoop.ipc.Client$Connection.setupSaslConnection(Client.java:558) at org.apache.hadoop.ipc.Client$Connection.access$1800(Client.java:373)
Created 04-21-2016 12:22 PM
The Google Cloud Storage Connector for Hadoop is configured at the cluster level without any knowledge of Kerberos.
So the output you showed is what I would expect.
But some thoughts:
Created 04-21-2016 12:22 PM
The Google Cloud Storage Connector for Hadoop is configured at the cluster level without any knowledge of Kerberos.
So the output you showed is what I would expect.
But some thoughts:
Created 04-21-2016 01:37 PM
I concur with Sean. As long as any user, who have access to the cluster and the google personal key, they can explore GHFS bucket. I would say, google has to enhance the connector, by allowing intervention of kerberos prior to validation of the personal key.