This article describes how to configure GPDB to communicate with a secure Hadoop environment
Resources
Required parameters
core-site.xml
<property> <name>hadoop.security.authorization</name> <value>true</value> </property>
hdfs-site.xml
<property> <name>dfs.namenode.kerberos.http.principal</name> <value>HTTP/[email protected]</value> </property> <property> <name>com.emc.greenplum.gpdb.hdfsconnector.security.user.keytab.file</name> <value>/home/gpadmin/gpadmin.hdfs.keytab</value> </property> <property> <name>com.emc.greenplum.gpdb.hdfsconnector.security.user.name</name> <value>gpadmin/[email protected]</value> </property>
yarn-site.xml
<property> <name>yarn.resourcemanager.address</name> <value>hdm1.phd.local:8032</value> </property> <property> <name>yarn.resourcemanager.principal</name> <value>yarn/[email protected]</value> </property>
GPDB Global Parameters
Example Hortonworks, PHD 3.0
set gp_hadoop_target_version='hdp2'; set gp_hadoop_home='/usr/lib';
Example PHD 2.x
set gp_hadoop_target_version='gphd-2.0'; set gp_hadoop_home='/usr/lib/gphd';
[root@pccadmin ~]# cat /etc/krb5.conf | egrep supported_enctypes supported_enctypes = aes128-cts-hmac-sha1-96:normal des3-cbc-sha1:normal des-cbc-md5:normal des-cbc-crc:normal rc4-hmac:normal
kadmin.local: addprinc -randkey gpadmin/[email protected] WARNING: no policy specified for gpadmin/[email protected]; defaulting to no policy Principal "gpadmin/[email protected]" created. kadmin.local: ktadd -norandkey -k /tmp/gpadmin.hdfs.keytab gpadmin/[email protected] HTTP/[email protected] Entry for principal gpadmin/[email protected] with kvno 1, encryption type aes128-cts-hmac-sha1-96 added to keytab WRFILE:/tmp/gpadmin.hdfs.keytab. Entry for principal gpadmin/[email protected] with kvno 1, encryption type des3-cbc-sha1 added to keytab WRFILE:/tmp/gpadmin.hdfs.keytab. Entry for principal gpadmin/[email protected] with kvno 1, encryption type arcfour-hmac added to keytab WRFILE:/tmp/gpadmin.hdfs.keytab. Entry for principal HTTP/[email protected] with kvno 1, encryption type aes128-cts-hmac-sha1-96 added to keytab WRFILE:/tmp/gpadmin.hdfs.keytab. Entry for principal HTTP/[email protected] with kvno 1, encryption type des3-cbc-sha1 added to keytab WRFILE:/tmp/gpadmin.hdfs.keytab. Entry for principal HTTP/[email protected] with kvno 1, encryption type arcfour-hmac added to keytab WRFILE:/tmp/gpadmin.hdfs.keytab. [root@pccadmin ~]# klist -ket /tmp/gpadmin.hdfs.keytab Keytab name: FILE:/tmp/gpadmin.hdfs.keytab KVNO Timestamp Principal ---- ----------------- -------------------------------------------------------- 1 03/09/15 09:03:44 gpadmin/[email protected] (aes128-cts-hmac-sha1-96) 1 03/09/15 09:03:44 gpadmin/[email protected] (des3-cbc-sha1) 1 03/09/15 09:03:44 gpadmin/[email protected] (arcfour-hmac) 1 03/09/15 09:03:44 HTTP/[email protected] (aes128-cts-hmac-sha1-96) 1 03/09/15 09:03:44 HTTP/[email protected] (des3-cbc-sha1) 1 03/09/15 09:03:44 HTTP/[email protected] (arcfour-hmac)