[ 
https://issues.apache.org/jira/browse/YARN-9039?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16702059#comment-16702059
 ] 

Suma Shivaprasad edited comment on YARN-9039 at 11/28/18 3:57 PM:
------------------------------------------------------------------

Thanks [~bibinchundatt] for your suggestions. Unfortunately the Cloud Storage 
ACLs are a bit more complicated than that.

User specific folder access control could work if only a single user needs 
access to the folder. But gets cumbersome when implementing application 
specific acls on the  logs objects stored under that folder i.e granting access 
to other users to read the logs 

- There are limits on the size of bucket/IAM policies - 
https://aws.amazon.com/blogs/security/iam-policies-and-bucket-policies-and-acls-oh-my-controlling-access-to-s3-resources/.

- Having a bucket per user also has limitations due to the 100 buckets per 
account limits in S3.

In the long term, there are couple of options to address this
- Logs CLI talks to Log Webservice instead of talking to storage directly and 
only yarn user has access to write/read from the log aggregation storage 
bucket. Can track this effort in a separate jira to fix the issue of YARN CLI 
imposing ACLs
 - All FileSystem calls go through a FS proxy which can authorize storage ACLs 
via an Authorization framework like Apache Ranger

In the current jira, we could address the issue of ATSv2 LogWebservice not 
checking ACLs while serving logs through REST/UI and I could upload a patch for 
the same

Makes sense?

Did not get what is the fix needed for LogAggregationHtmlBlock#checkAcls ? It 
doesnt seem to be calling LogAggregationFileController.readAggregatedLogs





was (Author: suma.shivaprasad):
Thanks [~bibinchundatt] for your suggestions. Unfortunately the Cloud Storage 
ACLs are a bit more complicated than that.

User specific folder access control could work if only a single user needs 
access to the folder. But gets cumbersome when implementing application 
specific acls on the  logs objects stored under that folder i.e granting access 
to other users to read the logs 

- There are limits on the size of bucket/IAM policies - 
https://aws.amazon.com/blogs/security/iam-policies-and-bucket-policies-and-acls-oh-my-controlling-access-to-s3-resources/.

- Having a bucket per user also has limitations due to the 100 buckets per 
account limits in S3.

In the long term, there are couple of options to address this
- Logs CLI talks to Log Webservice instead of talking to storage directly and 
only yarn user has access to write/read from the log aggregation storage 
bucket. Can track this effort in a separate jira to fix the issue of YARN CLI 
imposing ACLs
 - All FileSystem calls go through a FS proxy which can authorize storage ACLs 
via an Authorization framework like Apache Ranger

In the current jira, we could address the issue of ATSv2 LogWebservice not 
checking ACLs while serving logs through REST/UI and I could upload a patch for 
the same

Makes sense?






> App ACLs are not validated when serving logs from LogWebService
> ---------------------------------------------------------------
>
>                 Key: YARN-9039
>                 URL: https://issues.apache.org/jira/browse/YARN-9039
>             Project: Hadoop YARN
>          Issue Type: Bug
>          Components: log-aggregation
>            Reporter: Suma Shivaprasad
>            Assignee: Suma Shivaprasad
>            Priority: Critical
>         Attachments: YARN-9039.1.patch, YARN-9039.2.patch
>
>
> App Acls are not being validated while serving logs through REST and UI2 via 
> Log Webservice



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

---------------------------------------------------------------------
To unsubscribe, e-mail: yarn-issues-unsubscr...@hadoop.apache.org
For additional commands, e-mail: yarn-issues-h...@hadoop.apache.org

Reply via email to