Created 03-07-2016 09:08 AM
Created 03-07-2016 09:09 AM
See this https://drill.apache.org/docs/configuring-user-authentication/
FYI: Drill is not part of HDP stack.
Created 03-07-2016 09:10 AM
drill.exec {
security.user.auth {
enabled: true,
packages += "org.apache.drill.exec.rpc.user.security",
impl: "pam",
pam_profiles: [ "sudo", "login" ]
}
}
Created on 03-07-2016 09:19 AM - edited 08-19-2019 04:07 AM
i provided (sudo, login)credentials, but it is saying invalid
Created 03-07-2016 10:27 AM
@prswamy t sudo login is not the username and password. Please read on PAM
When using PAM for authentication, each user that has permission to run Drill queries must exist in the list of users that resides on each Drill node in the cluster. The username (including uid) and password for each user must be identical across all of the Drill nodes.
If you use PAM with /etc/passwd for authentication, verify that the users with permission to start the Drill process are part of the shadow user group on all nodes in the cluster. This enables Drill to read the /etc/shadow file for authentication.
Created 12-10-2016 08:36 PM
Hi ,
i am getting invalid username/password error in apache drill PAM configuration. i think my configurations are fine , below are the config files ----------------------------------------------------------------------------------------------------------------------
1:drill-override.conf
drill.exec: { cluster-id: "drillbits1", zk.connect: "sandbox.hortonworks.com:2181"
impersonation: {
enabled: true
}
security.user.auth:
{ enabled: true,
packages += "org.apache.drill.exec.rpc.user.security",
impl: "pam",
pam_profiles: [ "root", "michael" ]
}
---------------------
2: drill-env.sh
export DRILLBIT_JAVA_OPTS="-Djava.library.path=/opt/pam/" still i get invalid credentials error when i log in through the Apache Drill GUI
Created 12-12-2016 10:18 AM
Hello,
Kindly remove pam_profiles in below given lines and restart the drill. It will work.
drill.exec { security.user.auth { enabled: true, packages += "org.apache.drill.exec.rpc.user.security", impl: "pam", pam_profiles: [ "sudo", "login" ] } }
Thanks
Michael N.