Replication between clusters using Kerberos authentication

After you enable Kerberos authentication on the source and destination clusters, you must perform some additional steps to enable replication on the clusters. The additional steps include opening the required ports on the clusters, checking the realm names to avoid conflicts when running replication jobs, and configuring the source and target clusters.

Replication Manager supports the following replication scenarios when Kerberos authentication is used in a cluster:

  • Secure source to a secure destination.
  • Insecure source to an insecure destination.
  • Insecure source to a secure destination when the following requirements are met:
    • When a destination cluster has multiple source clusters, all the source clusters must either be secure or insecure. Replication Manager does not support a mix of secure and insecure source clusters.
    • The configuration steps in Configuring user to replicate from unsecure to secure clusters must be complete.

To enable Kerberos authentication, see Enabling Kerberos authentication for CDP. To enable replication between clusters using Kerberos authentication, see Configuring kerberized clusters for replication.