Return-Path: X-Original-To: apmail-hadoop-mapreduce-user-archive@minotaur.apache.org Delivered-To: apmail-hadoop-mapreduce-user-archive@minotaur.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 153D19919 for ; Thu, 11 Dec 2014 09:15:21 +0000 (UTC) Received: (qmail 863 invoked by uid 500); 11 Dec 2014 09:15:14 -0000 Delivered-To: apmail-hadoop-mapreduce-user-archive@hadoop.apache.org Received: (qmail 753 invoked by uid 500); 11 Dec 2014 09:15:14 -0000 Mailing-List: contact user-help@hadoop.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: user@hadoop.apache.org Delivered-To: mailing list user@hadoop.apache.org Received: (qmail 581 invoked by uid 99); 11 Dec 2014 09:15:13 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 11 Dec 2014 09:15:13 +0000 X-ASF-Spam-Status: No, hits=-2.3 required=5.0 tests=RCVD_IN_DNSWL_MED,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (athena.apache.org: local policy) Received: from [188.184.36.16] (HELO CERNMX14.cern.ch) (188.184.36.16) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 11 Dec 2014 09:15:09 +0000 Received: from rtb-big-mac.ipv6.cern.ch (2001:1458:201:b460::100:32) by cernmxlb4.cern.ch (2001:1458:201:65::100:18) with Microsoft SMTP Server (TLS) id 14.3.158.1; Thu, 11 Dec 2014 10:14:04 +0100 Content-Type: text/plain; charset="iso-8859-1" MIME-Version: 1.0 (Mac OS X Mail 7.3 \(1878.6\)) Subject: Re: adding node(s) to Hadoop cluster From: Rainer Toebbicke In-Reply-To: Date: Thu, 11 Dec 2014 10:13:30 +0100 Content-Transfer-Encoding: quoted-printable Message-ID: <0542CBB8-E970-429E-9401-0765E76DF53F@pclella.cern.ch> References: <5A6D749C-C448-46B7-806E-FC376B318688@pclella.cern.ch> To: X-Mailer: Apple Mail (2.1878.6) X-Virus-Checked: Checked by ClamAV on apache.org Le 10 d=E9c. 2014 =E0 20:08, Vinod Kumar Vavilapalli = a =E9crit : > You don't need patterns for host-names, did you see the support for = _HOST in the principle names? You can specify the datanode principle to = be say datanodeUser@_HOST@realm, and Hadoop libraries interpret and = replace _HOST on each machine with the real host-name. Thanks, I may be mistaken, but I suspect you missed the point: for me, auth_to_local's role is to protect the server(s). For example, = somebody on an untrusted "client" can disguise as hdfs/nodename@REALM = and hence take over hdfs through a careless principal->id translation. A = well-configured auth_to_local will deflect that rogue "hdfs" to "nobody" = or something, so a malicious client cannot do a "hdfs dfs -chown ..." = for example. The _HOST construct makes using the same config files throughout the = cluster easier indeed, but as far as I see it mainly applies to the = "client". On the server, I see no way other than auth_to_local with a list/pattern = of trusted node names (on namenode and every datanode in the hdfs case) = to prevent the scenario above. Would there be? Thanks, Rainer=