Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Kerberos actions taken on non-Kerberized cluster #43

Open
dimaspivak opened this issue Jul 4, 2018 · 1 comment
Open

Kerberos actions taken on non-Kerberized cluster #43

dimaspivak opened this issue Jul 4, 2018 · 1 comment

Comments

@dimaspivak
Copy link
Member

As seen below, it looks like we're doing a few Kerberos-enabling steps without first checking to see whether the cluster even has Kerberos enabled.

topology_cdh/start.py

Lines 1276 to 1282 in d89d510

# Following is needed for Kerberos and Kafka to work correctly.
logger.info('Copying streamsets keytab to a fixed location which is shared on all clustered nodes ...')
commands = [('cp "$(find /var/run/cloudera-scm-agent/process/*streamsets-DATACOLLECTOR -maxdepth 0 -mindepth 0 | '
'sort -rs | head -1)/streamsets.keytab" {}/streamsets.keytab').format(KERBEROS_CONFIG_CONTAINER_DIR),
'chown sdc:sdc {}/streamsets.keytab'.format(KERBEROS_CONFIG_CONTAINER_DIR),
'chown sdc:sdc {}'.format(JAAS_CONFIG_FILE_PATH)]
cluster.primary_node.execute(' && '.join(commands))

@dimaspivak
Copy link
Member Author

FYI @kirtiv1

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant