Enabling Kerberos Authentication for Hadoop Using the Command Line
Here are the general steps to configuring secure Hadoop, each of which is described in more detail in the following sections:
- Install CDH 5.
- Verify User Accounts and Groups in CDH 5 Due to Security.
- If you are Using AES-256 Encryption, install the JCE Policy File.
- Create and Deploy the Kerberos Principals and Keytab Files.
- Shut Down the Cluster.
- Enable Hadoop security.
- Configure secure HDFS.
- Optional: Configuring Security for HDFS High Availability.
- Optional: Configuring secure WebHDFS.
- Optional: Configuring secure NFS
- Set Variables for Secure DataNodes.
- Start up the NameNode.
- Start up a DataNode.
- Set the Sticky Bit on HDFS Directories.
- Start up the Secondary NameNode (if used).
- Configure Either MRv1 Security or YARN Security.