【Kerberos】开启了kerberos的ambari中组件shell访问

文章目录

在环境中, 本身是作为的一个而存在 。当用户通过的机制启用认证的时候, 会为各个创建对应的以及文件 。在 Linux ( 6)上, 默认的会使用 .10.3 的版本,而在 ( 7)上,则默认使用 .13.2 。因此,需要启用认证的集群,需要注意版本的兼容性问题 。、Stack、 以及 KDC 的关系大致如下图所示:
我们再看一下开启了的一些配置信息
从配置中我们知道信息存储在/etc//目录下:
[root@10.211.55.60 keytabs]# ll /etc/security/keytabstotal 116-r-------- 1 rootroot368 Mar2 19:04 ambari.server.keytab-r-------- 1 amshadoop 383 Mar2 19:04 ams.collector.keytab-r-------- 1 amshadoop 383 Mar2 19:04 ams-hbase.master.keytab-r-------- 1 amshadoop 383 Mar2 19:04 ams-hbase.regionserver.keytab-r-------- 1 amshadoop 373 Mar2 19:04 ams-monitor.keytab-r-------- 1 amshadoop 368 Mar2 19:04 ams-zk.service.keytab-r-------- 1 hdfshadoop 353 Mar2 19:04 dn.service.keytab-r--r----- 1 hbasehadoop 328 Mar2 19:04 hbase.headless.keytab-r-------- 1 hbasehadoop 368 Mar2 19:04 hbase.service.keytab-r-------- 1 hdfshadoop 323 Mar2 19:04 hdfs.headless.keytab-r--r----- 1 yarnhadoop 363 Mar2 19:04 hive.llap.task.keytab-r--r----- 1 hivehadoop 363 Mar2 19:04 hive.service.keytab-r-------- 1 mapredhadoop 358 Mar2 19:04 jhs.service.keytab-r-----r-- 1 rootroot383 Aug 142019 kafka.service.keytab-rw-r----- 1 ambari-qa hadoop 338 Mar2 19:04 kerberos.service_check.022920.keytab-rw-r----- 1 ambari-qa hadoop 338 Mar2 19:04 kerberos.service_check.030220.keytab-r-------- 1 yarnhadoop 353 Mar2 19:04 nm.service.keytab-r-------- 1 hdfshadoop 353 Mar2 19:04 nn.service.keytab-r-------- 1 rangerroot398 Mar2 19:04 rangeradmin.service.keytab-r-------- 1 rangerroot403 Mar2 19:04 rangerlookup.service.keytab-r-------- 1 rangerroot413 Mar2 19:04 rangerusersync.service.keytab-r-------- 1 yarnhadoop 353 Mar2 19:04 rm.service.keytab-r--r----- 1 ambari-qa hadoop 348 Mar2 19:04 smokeuser.headless.keytab-r--r----- 1 roothadoop 363 Mar2 19:04 spnego.service.keytab-r-------- 1 yarn-atshadoop 343 Mar2 19:04 yarn-ats.hbase-client.headless.keytab-r-------- 1 yarn-atshadoop 413 Mar2 19:04 yarn-ats.hbase-master.service.keytab-r-------- 1 yarn-atshadoop 413 Mar2 19:04 yarn-ats.hbase-regionserver.service.keytab-r-------- 1 yarnhadoop 363 Mar2 19:04 yarn.service.keytab-r-------- 1 zookeeper hadoop 388 Mar2 19:04 zk.service.keytab
以及为我们生成的一些,我们可以看一下:
kadmin.local:listprincsHTTP/host-10-211-55-60@HONEY.COMK/M@HONEY.COMadmin/admin@HONEY.COMambari-qa-testcluster@HONEY.COMambari-server-testcluster@HONEY.COMamshbase/host-10-211-55-60@HONEY.COMamsmon/host-10-211-55-60@HONEY.COMamszk/host-10-211-55-60@HONEY.COMdn/host-10-211-55-60@HONEY.COMhbase-testcluster@HONEY.COMhbase/host-10-211-55-60@HONEY.COMhdfs-testcluster@HONEY.COMhive/host-10-211-55-60@HONEY.COMjhs/host-10-211-55-60@HONEY.COMkadmin/10.1.236.60@HONEY.COMkadmin/admin@HONEY.COMkadmin/changepw@HONEY.COMkadmin/host-10-211-55-60@HONEY.COMkiprop/host-10-211-55-60@HONEY.COMkrbtgt/HONEY.COM@HONEY.COMtestcluster-022920@JIAZZ.COMtestcluster-030220@JIAZZ.COMnm/host-10-211-55-60@HONEY.COMnn/host-10-211-55-60@HONEY.COMrangeradmin/host-10-211-55-60@HONEY.COMrangerlookup/host-10-211-55-60@HONEY.COMrangerusersync/host-10-211-55-60@HONEY.COMrm/host-10-211-55-60@HONEY.COMyarn-ats-hbase/host-10-211-55-60@HONEY.COMyarn-ats-testcluster@HONEY.COMyarn/host-10-211-55-60@HONEY.COMzookeeper/host-10-211-55-60@HONEY.COM
访问hbase shell 示例
我们像往常一样访问hbase shell,我们可以进入shell,但是我们却没有权限做任何操作ERROR: No valid( level:to find anytgt)
[root@host-10-211-55-60 keytabs]# hbase shellhbase(main):001:0> listTABLEERROR: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)For usage try 'help "list"'Took 8.7254 secondshbase(main):002:0> create 'hb_test','base_info'ERROR: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)For usage try 'help "create"'Took 8.1969 seconds