-
-
Notifications
You must be signed in to change notification settings - Fork 4
Adding troubleshooting for kerberos #702
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
| @@ -0,0 +1,18 @@ | |||
| = Troubleshooting | |||
|
|
|||
| == Hbase access with kerberos authentication | |||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| == Hbase access with kerberos authentication | |
| == HBase access with Kerberos authentication |
|
|
||
| == Hbase access with kerberos authentication | ||
|
|
||
| Currently, xref:zookeeper:index.adoc[Zookeeper] is not secured with authentication. This means, if an application tries to connect to Hbase, it would ask the zookeeper quorum to figure the correct nodes to talk to. In a Java world, you would define a `Client` which would carry the kerberos requirements. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pls separate sentences with newlines (in docs)
| Currently, xref:zookeeper:index.adoc[Zookeeper] is not secured with authentication. This means, if an application tries to connect to Hbase, it would ask the zookeeper quorum to figure the correct nodes to talk to. In a Java world, you would define a `Client` which would carry the kerberos requirements. | |
| Currently, xref:zookeeper:index.adoc[Zookeeper] stacklets can only be secured using mutual TLS. | |
| This means, if an application tries to connect to HBase, it would contact Zookeeper to figure the correct HBase nodes to talk to. | |
| In a Java world, you would define a `Client` which would carry the Kerberos requirements. |
|
|
||
| Currently, xref:zookeeper:index.adoc[Zookeeper] is not secured with authentication. This means, if an application tries to connect to Hbase, it would ask the zookeeper quorum to figure the correct nodes to talk to. In a Java world, you would define a `Client` which would carry the kerberos requirements. | ||
|
|
||
| However, those requirements might be passed through and thus your client ( e.g. xref:spark-k8s:usage-guide:operations:applications.adoc[SparkApplications] ) would try to authenticate with kerberos at the corresponding Zookeeper endpoint. This will result in a kerberos ( authentication ) error. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| However, those requirements might be passed through and thus your client ( e.g. xref:spark-k8s:usage-guide:operations:applications.adoc[SparkApplications] ) would try to authenticate with kerberos at the corresponding Zookeeper endpoint. This will result in a kerberos ( authentication ) error. | |
| However, those requirements might be passed through and thus your client (e.g. xref:spark-k8s:usage-guide:operations:applications.adoc[SparkApplications]) would try to authenticate with Kerberos at the corresponding Zookeeper endpoint. | |
| This will result in a Kerberos ( authentication ) error. |
|
|
||
| However, those requirements might be passed through and thus your client ( e.g. xref:spark-k8s:usage-guide:operations:applications.adoc[SparkApplications] ) would try to authenticate with kerberos at the corresponding Zookeeper endpoint. This will result in a kerberos ( authentication ) error. | ||
|
|
||
| To prevent this, you can set a jvm argument like ( again e.g. SparkApplications ) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| To prevent this, you can set a jvm argument like ( again e.g. SparkApplications ) | |
| To prevent this, you can set a JVM argument like this (again e.g. SparkApplications) in all Pods which would like to talk to HBase: |
| jvmArgumentOverrides: | ||
| add: | ||
| - "-Dzookeeper.sasl.client=false" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
AFAIK we normally use 2 spaces
| jvmArgumentOverrides: | |
| add: | |
| - "-Dzookeeper.sasl.client=false" | |
| jvmArgumentOverrides: | |
| add: | |
| - "-Dzookeeper.sasl.client=false" |
|
|
||
| in all pods which would like to talk to Hbase. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| in all pods which would like to talk to Hbase. |
|
|
||
| However, those requirements might be passed through and thus your client ( e.g. xref:spark-k8s:usage-guide:operations:applications.adoc[SparkApplications] ) would try to authenticate with kerberos at the corresponding Zookeeper endpoint. This will result in a kerberos ( authentication ) error. | ||
|
|
||
| To prevent this, you can set a jvm argument like ( again e.g. SparkApplications ) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you please link to https://docs.stackable.tech/home/stable/concepts/overrides/#jvm-argument-overrides?
Please make sure the docs still build afterwards (you need to build the documentation repo locally for that)
Description
Adds brief docs on troubleshooting kerberos auth in hbase.
Definition of Done Checklist
Author
Reviewer
Acceptance
type/deprecationlabel & add to the deprecation scheduletype/experimentallabel & add to the experimental features tracker