-
Hi. We're trying to integrate Ranger KMS and Ozone. Both have Kerberos enabled but Ozone seems not to require a delegation token while creating a new bucket.
Are we missing some properties/configurations? In attachment the creation command with HADOOP_ROOT_LOGGER set to 'DEBUG,console'. |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 4 replies
-
simple commands do not require delegation tokens. They just need Kerberos credentials. This is consistent with Hadoop. DT is required for MR, Spark jobs because their executors do not have Kerberos credentials. These frameworks issues FileSystem.addDelegationTokens() BTW, Ozone silently drops acquiring delegation tokens if ozone.security.enabled = false. This is a known issue: https://issues.apache.org/jira/browse/HDDS-10350 |
Beta Was this translation helpful? Give feedback.
-
The message "kinit: KDC can't fulfill requested option while renewing credentials" suggests it's a Kerberos problem. Another thing to check is KMS authorization rules. You log in as user 'om' and you need to make sure creating a bucket at xxx-s3g/encrypted is allowed for om. |
Beta Was this translation helpful? Give feedback.
-
Sorry, I used wrong terms, I meant that there is no Kerberos ticket for KMS issued by om. |
Beta Was this translation helpful? Give feedback.
Ranger KMS is installed inside an AWS EKS, while the Ozone cluster is on virtual machines.
The authentication problem was caused by either the AWS NLB, or the Nginx ingress. We simply opened a TCP connection and everything is working fine.
Thanks for your help!