-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Document running Spark jobs on a Kerberised cluster #356
Comments
A spark-job that uses the secret operator to generate keytabs for named users can be found here: https://github.com/stackabletech/hdfs-topology-provider/pull/5/files#diff-49100e41e40194b8d1f7aba8218bec678d9a9817efd5346b4609a92269721264 (this should indicate what needs to be implemented in the spark-k8s-operator) |
Duplicate of stackabletech/issues#530, closing this as well. This is included in the end-to-end-security demo |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
As a Spark developer I would like to be able to run Spark jobs on a cluster where one or more services have Kerberos enabled. There are additional setup required to get a Spark job to run with Kerberos, including providing keytab, Kerberos configuration, service configuration and Spark context config.
We should document how to run an example Spark job that connects to a kerberos-enabled HDFS and Hive service.
The text was updated successfully, but these errors were encountered: