INSTALL

This document describes how Kerberos security is set up on Hadoop clusters with Centrify DirectControl Agent.


Hortonworks

Hortonworks clusters are managed by Apache Ambari. The following instructions assume Apache Ambari 1.x or 2.x is available.

Hortonworks recommends the cluster node with NameNode role be the master node.

Enabling Kerberos security with Active Directory on Hortonworks clusters without Centrify can be painful, as illustrated in [1].

Instructions

To automate creation of Hadoop service principals when enabling Kerberos security:

To automate cleanup of Hadoop service principals after disabled Kerberos security:

References

  1. Enabling Kerberos on HDP and Integrating with Active Directory

Cloudera

Cloudera clusters can be managed by Cloudera Manager. The following instructions assume Cloudera Manager is available.

Cloudera Manager manages all per-host service principals and their Kerberos keytab files. For instance, per-host service principals are generated automatically when Kerberos is enabled. The only service principal needs to be generated manually is the hdfs principal which shared to all cluster nodes.

Cloudera Manager has a wizard to help enable Kerberos security [1]. Customers can also configure Kerberos security manually on Cloudera Manager without wizard [2]. Note that there is no wizard provided to disable Kerberos security. From Cloudera community site [3], customers will need to work their way back manually on Cloudera Manager.

For clusters not managed by Cloudera Manager, the automation script should be able to help create and distribute Kerberos keytab files for all per-host service principals. But this requires the CSV file to specify the Kerberos keytab files required. Moreover, each Hadoop service will need to be manually configured to enable Kerberos security.

Instructions

To automate creation of Hadoop service principal hdfs when enabling Kerberos security:

To automate cleanup of Hadoop service principal hdfs after disabled Kerberos security:

References

  1. Enabling Kerberos Authentication Using the Wizard
  2. Enabling Kerberos Authentication Without the Wizard
  3. Disabling Kerberos

MapR

MapR clusters are managed by MapR Control System (MCS). However, MCS web UI does not provide a way to enable Kerberos security. Therefore each Hadoop service will need to be manually configured.

Moreover, MapR has its own security architecture for users and core services (e.g. CLDB, MapR file system, YARN). Thus Kerberos security is available for some Hadoop services only (e.g. HBase). Please refer to section Security Protocols Listed by Component in [1] for Hadoop services which can enable Kerberos security.

Instructions

To automate creation of Hadoop service principals when enabling Kerberos security:

To automate cleanup of Hadoop service principals after disabled Kerberos security:

References

  1. Security Architecture
  2. Shutting Down a Cluster
  3. Configuring Kerberos User Authentication
  4. Configuring HBase to use Kerberos
  5. Enabling and Disabling Security Features on Your Cluster