I don't have active knowledge of the Win compat but I know guys who use
that and I would do something like:
* Standalone AD server
* Create keytab for each user
* Mount it
* Start workload with "security.kerberos.login.keytab"
AFAIK there are similar tools on Win like MIT kerberos has if kinit is
Thanks Greg, this is a really helpful reply.
>Any kind of Kerberos usage is starting with a "create a KDC server in your
>environment". That sever must be set.
When I say that I am kind of referring to Windows users with inbuild KDC and
AD. That would require kinit for the AS. I was wondering h
hi Chirag,
Flink now supports 2 ways to have TGT which is a Kerberos ticket and has
nothing to do with the "until 7 days renewable" HDFS TGS ticket (with
default config).
* Keytab: if one mounts a keytab for at least the JobManager pod then it
can create TGT infinitely (or until the user's passwo
Hi,
I am trying to use the FileSource to collect files from HDFS. The HDFS cluster
is secured and has Kerberos enabled.
My Flink cluster runs on Kubernetes (not using the Flink operator) with 2 Job
Managers in HA and 3 Task Managers. I wanted to understand the correct way to
configure the keytab