Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

workflow for password changes of auto created service principals for hive and hdfs #401

Open
maxgruber19 opened this issue Apr 11, 2024 · 0 comments

Comments

@maxgruber19
Copy link

when creating a kerberized hive or hdfs cluster the service principals hive/hive.namespace.xy for hive and nn/hdfs.namespace.xy, dn/hdfs.namespace.xy, jn/hdfs.namespace.xy for hdfs will be created automatically and get an initial password at creation time. rolling those passwords would be great to satisfy security guidelines that require yearly or monthly password changes of the service principals.

the complexity might hide in keeping the clusters safe and available while rolling the password because there might be clients talking to hdfs permanently. these clients should not recognise any change of passwords

this should work especially for external ldap systems centrally provisioned by a certain team.

best case for a user would be that the password is automatically rolled without any human action similar to rolling certificates. beyond that comfort a fully automated routine would enable user to decrease the password lifetime to a minimum.

@soenkeliebau as mentioned today

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants