yarn上配置kerberos(十二)

一、创建认证规则
二、创建Keytab文件
三、部署Kerberos Keytab文件
四、修改YARN配置文件,包括
1)yarn-site.xml
2)mapred-site.xml
3)container-executor.cfg
五、启动服务
六、测试



实施步骤
1、创建认证规则
[root@cdh1 training]# kadmin.local -q "addprinc -randkey yarn/cdh1@ZGP.COM"
Authenticating as principal hdfs/admin@ZGP.COM with password.
WARNING: no policy specified for yarn/cdh1@ZGP.COM; defaulting to no policy
Principal "yarn/cdh1@ZGP.COM" created.
[root@cdh1 training]# kadmin.local -q "addprinc -randkey yarn/cdh2@ZGP.COM"
[root@cdh1 training]# kadmin.local -q "addprinc -randkey yarn/cdh3@ZGP.COM"
[root@cdh1 training]# kadmin.local -q "addprinc -randkey mapred/cdh1@ZGP.COM"
[root@cdh1 training]# kadmin.local -q "addprinc -randkey mapred/cdh2@ZGP.COM"
[root@cdh1 training]# kadmin.local -q "addprinc -randkey mapred/cdh3@ZGP.COM"

[root@cdh1 training]#

查看创建的认证

[root@cdh1 training]# kadmin.local -q "listprincs"
Authenticating as principal hdfs/admin@ZGP.COM with password.
HTTP/cdh1@ZGP.COM
HTTP/cdh2@ZGP.COM
HTTP/cdh3@ZGP.COM
K/M@ZGP.COM
hdfs/cdh1@ZGP.COM
hdfs/cdh2@ZGP.COM
hdfs/cdh3@ZGP.COM
kadmin/admin@ZGP.COM
kadmin/cdh1@ZGP.COM
kadmin/changepw@ZGP.COM
krbtgt/ZGP.COM@ZGP.COM
mapred/cdh1@ZGP.COM
mapred/cdh2@ZGP.COM
mapred/cdh3@ZGP.COM
root/admin@ZGP.COM
yarn/cdh1@ZGP.COM
yarn/cdh2@ZGP.COM
yarn/cdh3@ZGP.COM
[root@cdh1 training]#



2、创建keytab文件
[root@cdh1 training]# cd /var/kerberos/krb5kdc/
[root@cdh1 training]# kadmin.local -q "xst -k yarn.keytab yarn/cdh1@ZGP.COM"

Authenticating as principal hdfs/admin@ZGP.COM with password.
Entry for principal yarn/cdh1@ZGP.COM with kvno 2, encryption type des3-cbc-sha1 added to keytab WRFILE:yarn.keytab.
Entry for principal yarn/cdh1@ZGP.COM with kvno 2, encryption type arcfour-hmac added to keytab WRFILE:yarn.keytab.
Entry for principal yarn/cdh1@ZGP.COM with kvno 2, encryption type des-hmac-sha1 added to keytab WRFILE:yarn.keytab.
Entry for principal yarn/cdh1@ZGP.COM with kvno 2, encryption type des-cbc-md5 added to keytab WRFILE:yarn.keytab.
[root@cdh1 training]# kadmin.local -q "xst -k yarn.keytab yarn/cdh2@ZGP.COM"
[root@cdh1 training]# kadmin.local -q "xst -k yarn.keytab yarn/cdh3@ZGP.COM"

[root@cdh1 training]#
[root@cdh1 krb5kdc]# kadmin.local -q "xst -k mapred.keytab mapred/cdh1@ZGP.COM"
Authenticating as principal hdfs/admin@ZGP.COM with password.
Entry for principal mapred/cdh1@ZGP.COM with kvno 2, encryption type des3-cbc-sha1 added to keytab WRFILE:mapred.keytab.
Entry for principal mapred/cdh1@ZGP.COM with kvno 2, encryption type arcfour-hmac added to keytab WRFILE:mapred.keytab.
Entry for principal mapred/cdh1@ZGP.COM with kvno 2, encryption type des-hmac-sha1 added to keytab WRFILE:mapred.keytab.
Entry for principal mapred/cdh1@ZGP.COM with kvno 2, encryption type des-cbc-md5 added to keytab WRFILE:mapred.keytab.
[root@cdh1 krb5kdc]# kadmin.local -q "xst -k mapred.keytab mapred/cdh2@ZGP.COM"
[root@cdh1 krb5kdc]# kadmin.local -q "xst -k mapred.keytab mapred/cdh3@ZGP.COM"

[root@cdh1 krb5kdc]#

查看加密方式和时间戳
[root@cdh1 training]# klist -ket yarn.keytab
Keytab name: WRFILE:yarn.keytab
KVNO Timestamp         Principal
---- ----------------- --------------------------------------------------------
   2 04/04/17 22:09:43 yarn/cdh1@ZGP.COM (des3-cbc-sha1) 
   2 04/04/17 22:09:43 yarn/cdh1@ZGP.COM (arcfour-hmac) 
   2 04/04/17 22:09:43 yarn/cdh1@ZGP.COM (des-hmac-sha1) 
   2 04/04/17 22:09:43 yarn/cdh1@ZGP.COM (des-cbc-md5) 
   2 04/04/17 22:09:53 yarn/cdh2@ZGP.COM (des3-cbc-sha1) 
   2 04/04/17 22:09:53 yarn/cdh2@ZGP.COM (arcfour-hmac) 
   2 04/04/17 22:09:53 yarn/cdh2@ZGP.COM (des-hmac-sha1) 
   2 04/04/17 22:09:53 yarn/cdh2@ZGP.COM (des-cbc-md5) 
   2 04/04/17 22:10:13 yarn/cdh3@ZGP.COM (des3-cbc-sha1) 
   2 04/04/17 22:10:13 yarn/cdh3@ZGP.COM (arcfour-hmac) 
   2 04/04/17 22:10:13 yarn/cdh3@ZGP.COM (des-hmac-sha1) 
   2 04/04/17 22:10:13 yarn/cdh3@ZGP.COM (des-cbc-md5) 
[root@cdh1 training]#
[root@cdh1 krb5kdc]# klist -ket mapred.keytab
Keytab name: WRFILE:mapred.keytab
KVNO Timestamp         Principal
---- ----------------- --------------------------------------------------------
   2 04/04/17 22:16:58 mapred/cdh1@ZGP.COM (des3-cbc-sha1) 
   2 04/04/17 22:16:58 mapred/cdh1@ZGP.COM (arcfour-hmac) 
   2 04/04/17 22:16:58 mapred/cdh1@ZGP.COM (des-hmac-sha1) 
   2 04/04/17 22:16:58 mapred/cdh1@ZGP.COM (des-cbc-md5) 
   2 04/04/17 22:17:04 mapred/cdh2@ZGP.COM (des3-cbc-sha1) 
   2 04/04/17 22:17:04 mapred/cdh2@ZGP.COM (arcfour-hmac) 
   2 04/04/17 22:17:04 mapred/cdh2@ZGP.COM (des-hmac-sha1) 
   2 04/04/17 22:17:04 mapred/cdh2@ZGP.COM (des-cbc-md5) 
   2 04/04/17 22:17:10 mapred/cdh3@ZGP.COM (des3-cbc-sha1) 
   2 04/04/17 22:17:10 mapred/cdh3@ZGP.COM (arcfour-hmac) 
   2 04/04/17 22:17:10 mapred/cdh3@ZGP.COM (des-hmac-sha1) 
   2 04/04/17 22:17:10 mapred/cdh3@ZGP.COM (des-cbc-md5) 
[root@cdh1 krb5kdc]#

3、部署Kerberos Keytab文件
[root@cdh1 krb5kdc]# cp yarn.keytab /etc/hadoop/conf
[root@cdh1 krb5kdc]# cp mapred.keytab /etc/hadoop/conf
[root@cdh1 krb5kdc]# cd /etc/hadoop/conf
[root@cdh1 conf]# chown yarn:hadoop yarn.keytab 
[root@cdh1 conf]# chown mapred:hadoop mapred.keytab 
[root@cdh1 conf]# chmod 400 yarn.keytab mapred.keytab 
[root@cdh1 conf]# scp mapred.keytab yarn.keytab cdh2:/etc/hadoop/conf   
[root@cdh1 conf]# scp mapred.keytab yarn.keytab cdh3:/etc/hadoop/conf

[root@cdh1 conf]#


确认是否更改完成
[root@cdh1 conf]# slaves.sh ls -l /etc/hadoop/conf/*.keytab
cdh2: -r-------- 1 hdfs hadoop 1298 Apr  1 04:17 /etc/hadoop/conf/hdfs.keytab
cdh2: -r-------- 1 root root    674 Apr  4 22:28 /etc/hadoop/conf/mapred.keytab
cdh2: -r-------- 1 root root    650 Apr  4 22:28 /etc/hadoop/conf/yarn.keytab
cdh3: -r-------- 1 hdfs hadoop 1298 Apr  1 04:17 /etc/hadoop/conf/hdfs.keytab
cdh3: -r-------- 1 root root    674 Apr  4 22:28 /etc/hadoop/conf/mapred.keytab
cdh3: -r-------- 1 root root    650 Apr  4 22:28 /etc/hadoop/conf/yarn.keytab
[root@cdh1 conf]#
[root@cdh1 conf]# ssh cdh2 "chown yarn:hadoop /etc/hadoop/conf/yarn.keytab;chown mapred:hadoop /etc/hadoop/conf/mapred.keytab"
[root@cdh1 conf]# ssh cdh3 "chown yarn:hadoop /etc/hadoop/conf/yarn.keytab;chown mapred:hadoop /etc/hadoop/conf/mapred.keytab"



4、修改YARN配置文件
1) yarn-site.xml
[root@cdh1 conf]# vi yarn-site.xml
  <!--YARN kerberos security-->
 <property>
  <name>yarn.resourcemanager.keytab</name>
  <value>/etc/hadoop/conf/yarn.keytab</value>
 </property>
  <property>
  <name>yarn.resourcemanager.principal</name>
  <value>yarn/_HOST@ZGP.COM</value>
 </property>
  <property>
  <name>yarn.nodemanager.keytab</name>
  <value>/etc/hadoop/conf/yarn.keytab</value>
 </property>
<property>
  <name>yarn.nodemanager.principal</name>
  <value>yarn/_HOST@ZGP.COM</value>
 </property>
  <property>
    <name>yarn.nodemanager.container-executor.class</name>
    <value>org.apache.hadoop.yarn.server.nodemanager.LinuxContainerExecutor</value>
  </property>
    <property>
    <name>yarn.nodemanager.linux-container-executor.group</name>
    <value>yarn</value>
  </property>

2) mapred-site.xml

<!--mapred kerberos security-->
  <property>
    <name>mapreduce.jobhistory.keytab</name>
    <value>/etc/hadoop/conf/mapred.keytab</value>
  </property>
  <property>
    <name>mapreduce.jobhistory.principal</name>
    <value>mapred/_HOST@ZGP.COM</value>
  </property>


3) container-executor.cfg
[root@cdh1 conf]# vi container-executor.cfg
yarn.nodemanager.linux-container-executor.group=yarn
#configured value of yarn.nodemanager.linux-container-executor.group


banned.users=bin
#comma separated list of users who can not run applications


min.user.id=0
#Prevent other super-users


allowed.system.users=root,yarn,hdfs,mapred,nobody
##comma separated list of system users who CAN run applications


修改属组与权限
[root@cdh1 conf]# chown root:yarn container-executor.cfg 
[root@cdh1 conf]# chmod 400 container-executor.cfg 

[root@cdh1 conf]#

配置文件分发
[root@cdh1 conf]# scp yarn-site.xml mapred-site.xml container-executor.cfg cdh2:/etc/hadoop/conf
[root@cdh1 conf]# scp yarn-site.xml mapred-site.xml container-executor.cfg cdh3:/etc/hadoop/conf
[root@cdh1 conf]# slaves.sh chown root:yarn /etc/hadoop/conf/container-executor.cfg
[root@cdh1 conf]# slaves.sh chmod 400 /etc/hadoop/conf/container-executor.cfg



5、启动服务


启动resourcemanager和nodemanager
[root@cdh1 ~]# cat yarn_start.sh
ssh cdh1 "kinit -k -t /etc/hadoop/conf/yarn.keytab yarn/cdh1@ZGP.COM;/etc/init.d/hadoop-yarn-resourcemanager start"
ssh cdh2 "kinit -k -t /etc/hadoop/conf/yarn.keytab yarn/cdh1@ZGP.COM;/etc/init.d/hadoop-yarn-nodemanager start"
ssh cdh3 "kinit -k -t /etc/hadoop/conf/yarn.keytab yarn/cdh1@ZGP.COM;/etc/init.d/hadoop-yarn-nodemanager start"
[root@cdh1 ~]# ./yarn_start.sh

6、测试

[root@cdh1 ~]# hadoop jar /usr/lib/hadoop-mapreduce/hadoop-mapreduce-examples.jar wordcount /tmp/wordcount/in /tmp/wordcount/out


yarn上配置kerberos完成

  • 0
    点赞
  • 3
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
在 Hive 中启用 Kerberos 认证需要在 Hadoop 和 Hive 中进行相应的配置。以下是一些大致的步骤: 1. 在 Hadoop 的 core-site.xml 中添加以下属性: ``` <property> <name>hadoop.security.authentication</name> <value>kerberos</value> </property> ``` 2. 在 Hadoop 的 hdfs-site.xml 中添加以下属性: ``` <property> <name>dfs.namenode.kerberos.principal</name> <value>hdfs/_HOST@EXAMPLE.COM</value> </property> <property> <name>dfs.datanode.kerberos.principal</name> <value>hdfs/_HOST@EXAMPLE.COM</value> </property> ``` 3. 在 Hadoopyarn-site.xml 中添加以下属性: ``` <property> <name>yarn.resourcemanager.principal</name> <value>yarn/_HOST@EXAMPLE.COM</value> </property> <property> <name>yarn.nodemanager.principal</name> <value>yarn/_HOST@EXAMPLE.COM</value> </property> ``` 4. 在 Hive 的 hive-site.xml 中添加以下属性: ``` <property> <name>hive.metastore.sasl.enabled</name> <value>true</value> </property> <property> <name>hive.metastore.kerberos.keytab.file</name> <value>/path/to/hive.keytab</value> </property> <property> <name>hive.metastore.kerberos.principal</name> <value>hive/_HOST@EXAMPLE.COM</value> </property> ``` 其中,`hive.metastore.kerberos.keytab.file` 指定的是 Hive 的 keytab 文件路径,`hive.metastore.kerberos.principal` 指定的是 Hive 的 principal 名称。 5. 在启动 Hive 的时候,需要使用以下命令来启动 Kerberos 认证: ``` kinit -kt /path/to/hive.keytab hive/_HOST@EXAMPLE.COM ``` 这个命令将会使用指定的 keytab 文件和 principal 来获取 Kerberos 的 ticket。在 ticket 过期之前,你可以使用这个 ticket 来访问 Hive。 以上是 Hive 配置 Kerberos 认证的大致步骤,具体的配置可能因环境不同而有所不同。如果你遇到了问题,可以参考官方文档或者咨询相关的技术支持。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值