Disabling Kerberos Security

HAWQ supports Kerberos at both the HDFS and/or user authentication levels. You will perform different disable procedures for each.

Disable Kerberized HDFS for HAWQ/PXF

You will perform different procedures to disable HAWQ/PXF access to a previously-kerberized HDFS depending upon whether you manage your cluster from the command line or use Ambari to manage your cluster.

Procedure for Ambari-Managed Clusters

If you manage your cluster using Ambari, you will disable Kerberos authentication for your cluster as described in the How To Disable Kerberos Hortonworks documentation. Ambari will guide you through the de-kerberization process, including removing/updating any authentication-related configuration in your cluster.

Procedure for Command-Line-Managed Clusters

If you manage your cluster from the command line, follow these instructions to disable HDFS Kerberos security for HAWQ and PXF.

  1. Disable Kerberos on the Hadoop cluster on which you use HAWQ.
  2. Disable security for HAWQ:

    1. Login to the HAWQ database master server as the gpadmin user and set up your HAWQ environment:

      1. $ ssh gpadmin@<master>
      2. gpadmin@master$ . /usr/local/hawq/greenplum_path.sh
    2. Start HAWQ if necessary:

      1. gpadmin@master$ hawq start cluster
    3. Update HAWQ configuration to disable security:

      1. gpadmin@master$ hawq config -c enable_secure_filesystem -v off
    4. Change the permission of the HAWQ HDFS data directory:

      1. gpadmin@master$ sudo -u hdfs hdfs dfs -chown -R gpadmin:gpadmin /<hawq_data_hdfs_path>
    5. On the HAWQ master node and on all segment server nodes, edit the /usr/local/hawq/etc/hdfs-client.xml file to disable kerberos security. Comment or remove the following properties in each file:

      1. <!--
      2. <property>
      3. <name>hadoop.security.authentication</name>
      4. <value>kerberos</value>
      5. </property>
      6. <property>
      7. <name>dfs.namenode.kerberos.principal</name>
      8. <value>nn/_HOST@LOCAL.DOMAIN</value>
      9. </property>
      10. -->
    6. Restart HAWQ:

      1. gpadmin@master$ hawq restart cluster -a -M fast
  3. Disable security for PXF. Perform these steps on each PXF node:

    1. Edit the /etc/pxf/conf/pxf-site.xml to comment out or remove the following properties:

      1. <!--
      2. <property>
      3. <name>pxf.service.kerberos.keytab</name>
      4. <value>/etc/security/keytab/pxf.service.keytab</value>
      5. <description>path to keytab file owned by pxf service
      6. with permissions 0400</description>
      7. </property>
      8. <property>
      9. <name>pxf.service.kerberos.principal</name>
      10. <value>pxf/_HOST@HDB.LOCAL</value>
      11. <description>Kerberos principal pxf service should use.
      12. _HOST is replaced automatically with hostnames
      13. FQDN</description>
      14. </property>
      15. -->
    2. Restart the PXF service.

      1. root@pxf-node$ service pxf-service restart

Disable Kerberos User Authentication for HAWQ

Perform the following procedure to disable Kerberos user authentication for HAWQ.

  1. Comment out or remove the pg_hba.conf entry that mandates Kerberos authentication for HAWQ. The pg_hba.conf file resides in the directory specified by the hawq_master_directory server configuration parameter value. For example, comment out:

    1. #host all all 0.0.0.0/0 gss include_realm=0 krb_realm=REALM.DOMAIN
  2. Update the pg_hba.conf file to configure non-Kerberos access restrictions for all your HAWQ users.

  3. Reload HAWQ configuration:

    1. gpadmin@master$ hawq stop master --reload
  4. Notify your HAWQ users that kinit ticket requests are no longer required to authenticate to HAWQ.