-
Notifications
You must be signed in to change notification settings - Fork 508
METRON-2265: Update Kerberos settings #1519
METRON-2265: Update Kerberos settings #1519
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Lots of really good stuff here @merrimanr . I want to try and run this up myself. I have a few feedback items.
...on-platform/metron-management/src/main/java/org/apache/metron/management/KafkaFunctions.java
Show resolved
Hide resolved
metron-interface/metron-rest/src/main/java/org/apache/metron/rest/config/KafkaConfig.java
Outdated
Show resolved
Hide resolved
I do a full dev install and followed Used the following environment:
Please note the KAFKA_OPTS variable suggested in the guide is wrong, it is a copy from the HDP page which is most likely to be a typo. The check of the count in elasticsearch at the "Push Data" stage is misleading, as the guide does not delete the previous collection before enabling kerberos. Repeating the "add sample-bro.txt" stage does not increase the document count. Was utilising
This showed nothing consuming from the bro topic.
Further investigations reveals that storm workers are unable to communicate with ZK?
Tried back tracking through HDP/Storm/Kerberos docs to verify correct setup, but ran out of time. |
@tigerquoll it's not clear to me which instructions you are following or where you are running into issues. Do you mind providing a step-by-step description of what you've done and where things didn't work? |
+1 I was able to kerberize successfully. I am finding that running kerberized in the development environment with HDP 3.1 is a bit unstable due to limited resources in the VM. This has always been a problem and requires a bit of massaging. Here are some brief notes on things I did to get this to work in our resource constrained dev environment.
@tigerquoll Might any of this help explain what might have happened in your environment? |
Ok, I had to deviate from the provided "metron-deployment/Kerberos-manual-setup.md" file in the following ways (Can somebody update the markup file in the PR or will there need to be a new PR for the markup changes?) Initial environment:source /etc/default/metron Verify KDCStep 2: Enable kerberosStep 3: Kafka Authorization:The Metron user does not have permissions to edit ACLs, The Kafka Service account does have permissions, so we can temporarily use that keytab to add ACLS. Add to start of Step 3: Storm AuthoriszationAn additional step should be done before the others Step 7 requires root access Start metronStep 1: Push Dataremove Add |
Good stuff @tigerquoll . I'm glad we have your fresh eyes on this. I would prefer if you submit your changes above as a separate PR, if you don't mind. I think this PR is a net-positive and gets Kerberos working on the upgrade branch. Your additions would go beyond what we have here and address many of the finer details of making Kerberos work in the development environment. |
@tigerquoll Would you mind creating a Jira ticket task in the feature branch epic along the lines of "Enhance Kerberos instructions?" I'm not sure some of these steps should be verbatim, e.g. the env vars. @nickwallen and @merrimanr seem to be making it through so it might make sense for us to verify these additional steps separately. |
This has been merged into the feature branch. |
Contributor Comments
This PR includes code and documentation changes for enabling Kerberos in HDP 3.1. The primary changes needed were minor Maven changes and making the Metron JAAS setting available to Kafka through
KAFKA_OPTS
.Changes Included
CLIENT_JAAS_ARG
property to/etc/default/metron
. This is needed separately fromMETRON_JVMFLAGS
security.protocol
setting toSASL_PLAINTEXT
/usr/hdp/current/storm-supervisor/external/storm-autocreds/*
.org.apache.commons.math.util.MathUtils
with a standard Java implementation. This dependency was being pulled in transitively.metron-data-management
that resulted fromcom.google.thirdparty
not being shaded.Testing
I attempted to test the various components (Storm, Kafka, HBase, Hadoop, etc) to verify they still work after Kerberos is enabled. The instructions in
Kerberos-manual-setup.md
should now be correct. Also there should not be any additional steps needed to enabled the sensor stubs other than a simple restart. I tested the following after spinning up full dev:flatfile_loader.sh
script works as expectedI believe this should cover almost all of the components. There were not any specific Solr changes required (was done in the Solr upgrade PR) but we might want to test this too.
Pull Request Checklist
Thank you for submitting a contribution to Apache Metron.
Please refer to our Development Guidelines for the complete guide to follow for contributions.
Please refer also to our Build Verification Guidelines for complete smoke testing guides.
In order to streamline the review of the contribution we ask you follow these guidelines and ask you to double check the following:
For all changes:
For code changes:
Have you included steps to reproduce the behavior or problem that is being changed or addressed?
Have you included steps or a guide to how the change may be verified and tested manually?
Have you ensured that the full suite of tests and checks have been executed in the root metron folder via:
Have you written or updated unit tests and or integration tests to verify your changes?
If adding new dependencies to the code, are these dependencies licensed in a way that is compatible for inclusion under ASF 2.0?
Have you verified the basic functionality of the build by building and running locally with Vagrant full-dev environment or the equivalent?
For documentation related changes:
Have you ensured that format looks appropriate for the output in which it is rendered by building and verifying the site-book? If not then run the following commands and the verify changes via
site-book/target/site/index.html
:Have you ensured that any documentation diagrams have been updated, along with their source files, using draw.io? See Metron Development Guidelines for instructions.
Note:
Please ensure that once the PR is submitted, you check travis-ci for build issues and submit an update to your PR as soon as possible.
It is also recommended that travis-ci is set up for your personal repository such that your branches are built there before submitting a pull request.