[ https://issues.apache.org/jira/browse/MAPREDUCE-2858?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Robert Joseph Evans updated MAPREDUCE-2858: ------------------------------------------- Assignee: Robert Joseph Evans (was: Luke Lu) Target Version/s: 0.23.0, 0.24.0 Affects Version/s: 0.24.0 Release Note: A new server has been added to yarn. It is a web proxy that sits in front of the AM web UI. The server is controlled by the yarn.web-proxy.address config. If that config is set, and it points to an address that is different then the RM web interface then a separate proxy server needs to be launched. This can be done by running yarn-daemon.sh start proxyserver If a separate proxy server is needed other configs also may need to be set, if security is enabled. yarn.web-proxy.principal yarn.web-proxy.keytab yarn.web-proxy.admin_acl The proxy server is stateless and should be able to support a VIP or other load balancing sitting in front of multiple instances of this server. Status: Patch Available (was: Open) > MRv2 WebApp Security > -------------------- > > Key: MAPREDUCE-2858 > URL: https://issues.apache.org/jira/browse/MAPREDUCE-2858 > Project: Hadoop Map/Reduce > Issue Type: Sub-task > Components: applicationmaster, mrv2, security > Affects Versions: 0.23.0, 0.24.0 > Reporter: Luke Lu > Assignee: Robert Joseph Evans > Priority: Blocker > Fix For: 0.23.0 > > Attachments: MR-2858-branch-0.23.txt, MR-2858.txt > > > In MRv2, while the system servers (ResourceManager (RM), NodeManager (NM) and > NameNode (NN)) run as "trusted" > system users, the application masters (AM) run as users who submit the > application. While this offers great flexibility > to run multiple version of mapreduce frameworks (including their UI) on the > same Hadoop cluster, it has significant > implication for the security of webapps (Please do not discuss company > specific vulnerabilities here). > Requirements: > # Secure authentication for AM (for app/job level ACLs). > # Webapp security should be optional via site configuration. > # Support existing pluggable single sign on mechanisms. > # Should not require per app/user configuration for deployment. > # Should not require special site-wide DNS configuration for deployment. > This the top jira for webapp security. A design doc/notes of threat-modeling > and counter measures will be posted on the wiki. -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa For more information on JIRA, see: http://www.atlassian.com/software/jira