Configure Kerberos
If Kerberos is enabled on your Hadoop cluster, you must configure LiveData Migrator's Kerberos settings to enable the service to authenticate with your Hadoop cluster.
For data migrations, you will need a valid keytab containing a suitable principal for the HDFS superuser on the HDFS edge node.
If you want to migrate Hive metadata from your Hadoop cluster, the edge node must also have a keytab containing a suitable principal for the Hive service.
Configure Kerberos for data migrations
- Configure Kerberos (Azure Portal)
- Configure Kerberos (CLI)
- In the Azure Portal, navigate to the LiveData Migrator resource page.
- Access the Overview page.
- Select Select Livedata Migrator Kerberos Settings.
- Select Enabled.
- Enter the following information:
- Principal: Enter a principal that will map to the HDFS superuser using auth_to_local rules.
- Keytab Path: Enter the path to the Kerberos keytab containing the Kerberos Principal. This must be accessible to the local system user running the LiveData Migrator service (default is
hdfs
).
- Select Submit to confirm your changes.
- Select Refresh and verify the Install State under the Properties tab is now InstalledAndOperational.
Run the following command to set up your Kerberos configuration for data migration:
az livedata migrator set-kerberos -g <resource_group> --migrator-name <migrator_name> --principal hdfs@REALM --keytab /etc/security/keytabs/hdfs.keytab
See the Azure CLI LiveData Extension - Configure Kerberos page for help with these parameters.
Configure Kerberos for metadata migrations
You must configure Kerberos for general LiveData Migrator use before configuring Kerberos for metadata.
- Configure Kerberos for metadata (Azure Portal)
- Configure Kerberos for metadata (CLI)
- In the Azure Portal, navigate to the LiveData Migrator resource page.
- Access the Overview page.
- Select Select Hive Migrator Kerberos Settings.
- Select Enabled.
- Enter the following information:
- Principal: Enter a principal that will map to the Hive user using auth_to_local rules.
- Keytab Path: Enter the path to the Kerberos keytab containing the Kerberos principal. This must be accessible to the local system user running the Hive service (default is
hive
).
- Select Submit to confirm your changes.
- Select Refresh and verify the Meta Install State under the Properties tab is now InstalledAndOperational.
Run the following command to set up your Kerberos configuration for metadata migration:
az livedata migrator set-meta-kerberos -g <resource_group> --migrator-name <migrator_name> --principal hive/myhostname@REALM.COM --keytab /etc/security/keytabs/hive.keytab
See the Azure CLI LiveData Extension - Configure Kerberos for Metadata page for help with these parameters.
Next steps
Once you've configured Kerberos, you're ready to create a target for your data migrations and/or create a metadata target for metadata migrations.