Enable Kerberos authentication in Apache Druid
As Administrator, you can set up authentication of users who submit queries through Apache Druid (incubating) to the rest of the Hadoop cluster. If Kerberos is enabled on your cluster, to query Druid data sources that are imported from Hive, you must set up LLAP (low-latency, analytical processing).
- You enabled SPENGO-based Kerberos security on the cluster using the Ambari Server and Services.
- You planned for temporary down-time that is associated with this task.
The entire HDP cluster must shut down after you configure the Kerberos settings and initialize the Kerberos wizard.
- You set up and enabled LLAP if you want to use Hive and Druid, and Hive Server Interactive is running.
Property | Default Value Setting | Description |
---|---|---|
druid.hadoop.security.spnego.excludedPaths |
['status'] To set more than one path, enter values in the following format:['/status','/condition'] |
Specify here HTTP paths that do not need to be secured with authentication. A possible use case for providing paths here are to test scripts outside of a production environment. |
druid.hadoop.security.spnego.keytab | keytab_dir/spnego.service.keytab | The SPNEGO service keytab that is used for authentication. |
druid.hadoop.security.spnego. principal | HTTP/_HOST@realm | The SPNEGO service principal that is used for authentication. |
druid.security.extensions.loadlist | [druid-kerberos] | Indicates the Druid security extension to load for Kerberos. |
Initializing the Kerberos Wizard might require a significant amount of time to complete, depending on the cluster size. Refer to the GUI messaging on the screen for progress status.