Configuring Authentication with Kerberos
Also available as:
loading table of contents...

Running Workers as Users

In Storm secure mode, workers can run as the user (owner of the topology) who deployed the topology. This topic describes how to enable this.

  1. Make sure all users who are going to deploy topologies have a UNIX account on all of the Storm nodes. Workers will run under the UNIX account for topologies deployed by the user.

    For user testuser1 and principal testuser1/, make sure there is a corresponding testuser1 UNIX account.

  2. Add the following configuration under "Custom storm-site" in the Ambari Storm configuration screen: : true.
  3. Restart Storm components.