Hello Drill community,

In multi-tenant YARN clusters, running multiple Drill-on-YARN clusters
seems as attractive feature as it enables leveraging on YARN mechanisms of
resource management and isolation. However, there seems to be simple access
restriction issue. Assume :

- Cluster A launched by user X
- Cluster B launched by user Y

Both users X and Y will be able to connect and run queries against clusters
A and B (in fact, that applies to any positively authenticated user, not
only X and Y). Whereas we obviously would like to ensure exclusive usage of
clusters by their owners - who are owners of respective YARN resources. In
case users X and Y are non-privileged DFS users and impersonation is not
enabled, then user A has access to data on behalf of user B and vice versa
which is additional potential security issue.

I was looking for possibilities to control connect authorization, but
couldn't find anything related yet. Do I miss something maybe? Are there
any other considerations, perhaps this point was already discussed before?

It could be possible to tweak PAM setup to trigger authentication failure
for "undesired" users but that looks like an overkill in terms of
complexity.

>From user perspective, basic ACL configuration with users and groups
authorized to connect to Drillbit would already be sufficient IMO. Or
configuration switch to ensure that only owner user is authorized to
connect.

Best Regards,
Alex

Reply via email to