Configuring Kerberos
Depending on the data flow that is used, you may need to enable Kerberos authentication to interact with some service(s).
To enable Kerberos, you must provide an appropriate krb5.conf file. This file tells the Cloudera DataFlow function where the Key Distribution Center (KDC) is located and which Kerberos Realm to use.
To specify this, make the krb5.conf file available to Cloudera DataFlow Function. You can do it by using a GCS bucket. See the corresponding section to learn more about this.
Additionally, you must tell Cloudera DataFlow Function where it
can find this krb5.conf file. To do this, add an environment variable
to your Lambda function. The environment variable must have the name KRB5_FILE and the value
must be the fully qualified file name of the krb5.conf file. For
example, it might use /tmp/resources/krb5.conf
.
In order to use Keytabs in your data flow, it is also important to provide the
necessary keytab files to the Cloudera DataFlow Function. You can
accomplish it by using a GCS bucket. While the krb5.conf file is a
system configuration, the keytab is not. The keytab is configured in the data flow on a
per-component basis. For example, one Processor may use keytab
nifi-keytab-1
while some Controller Service makes use of keytab
hive-keytab-4
. The location of these files may change from deployment to
deployment. For example, for an on-premises deployment, keytabs may be stored in
/etc/security/keytabs
while in Cloudera DataFlow
Function, they may be made available in /tmp/resources.
So it is better to use Parameter Contexts to parameterize the location of the keytab files. This is a good practice for any file-based resource that needs to be made available to a deployment. In this case, because there is a parameter referencing the location, you need to provide Cloudera DataFlow Function with a value for that parameter. For more information, see Parameters.