Install Kerberos client utilities
To communicate with secure Hadoop clusters that use Kerberos authentication, known as Kerberized clusters, Splunk Hadoop Connect uses the Kerberos client utilities. To connect to a Kerberized cluster, install these utilities on the same system in which Splunk Hadoop Connect runs.
Watch the video "Splunk Hadoop Connect: Kerberos Configuration" on the main Splunk website for an overview of how to configure the app for Kerberized clusters.
You do not need to install Kerberos client utilities for clusters which do not use Kerberos authentication.
Download and install Kerberos utilities
Before you install and configure MIT Kerberos utilities on the server on which Splunk Hadoop Connect runs, make sure you have administrative shell access to the server.
Follow the MIT Kerberos documentation to download and install the Kerberos utilities on the system in which Splunk Hadoop Connect runs.
Configure Kerberos client utilities
1. From the shell, verify you can run the commands
2. Make sure
/etc/krb5.conf is configured to point to the correct Kerberos Key Distribution Center (KDC). Your Kerberos administrator can help you set this up.
3. Make sure you know the correct credentials of a Kerberos principal.
4. Run the following commands to create a Kerberos ticket:
$ kinit <kerberos-principal> <password>
$ klist <valid_ticket_output>
5. Use the
ktutil command to generate a keytab file for every Kerberos principal you want to use.
6. Use the keytab file to obtain a Ticket Granting Ticket (TGT) for every principal you want to use. To do so, run the command:
$ kinit -k -t <path_to_keytab_file> <principal>
Note: Your keytab file is valid if
kinit neither generates an error nor prompts you for a password. If either of these happens, then recreate the keytab file and try to obtain a TGT.
Install Hadoop CLI
Configure Splunk Hadoop Connect
This documentation applies to the following versions of Splunk® Hadoop Connect: 1.1, 1.2, 1.2.1, 1.2.2, 1.2.3, 1.2.4, 1.2.5