[ 
https://issues.apache.org/jira/browse/YARN-11922?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Bence Kosztolnik updated YARN-11922:
------------------------------------
    Description: 
*Problem Statement:*

I have a scenario where I need to migrate a YARN cluster to a FIPS 
140-3–compatible environment.

For this, the AMRMTokenSecretManager must use secrets that are at least 112 
bits long. By default, the secret length is 64 bits. When I modify the key size 
and restart the cluster with recovery enabled, the state store reloads the old 
secret, which has a default lifetime of 24 hours. As a result, even though the 
cluster is configured to operate in FIPS 140-3–compatible mode, it continues to 
use a non-compliant secret.

 

*Solution:*

When the ResourceManager recovers, it should validate the secret size stored in 
the state store. If the stored secret size differs from the configured value, 
the secret should be forcibly regenerated and updated.

 

*Tested:*

Through manual testing, I verified that HIVE applications can run successfully 
both before and after the configuration change.

  was:
*Problem Statement:*

I have a scenario where I need to migrate a YARN cluster to a FIPS 
140-3–compatible environment.

For this, the AMRMTokenSecretManager must use secrets that are at least 112 
bits long. By default, the secret length is 64 bits. When I modify the key size 
and restart the cluster with recovery enabled, the state store reloads the old 
secret, which has a default lifetime of 24 hours. As a result, even though the 
cluster is configured to operate in FIPS 140-3–compatible mode, it continues to 
use a non-compliant secret.

 

*Solution:*

When the ResourceManager recovers, it should validate the secret size stored in 
the state store. If the stored secret size differs from the configured value, 
the secret should be forcibly regenerated and updated.

 

{*}Tested:{*}{*}{*}

Through manual testing, I verified that HIVE applications can run successfully 
both before and after the configuration change.


> ResourceManager not update SecretManager keysize immediately if recovery is on
> ------------------------------------------------------------------------------
>
>                 Key: YARN-11922
>                 URL: https://issues.apache.org/jira/browse/YARN-11922
>             Project: Hadoop YARN
>          Issue Type: Improvement
>          Components: yarn
>    Affects Versions: 3.5.0
>            Reporter: Bence Kosztolnik
>            Assignee: Bence Kosztolnik
>            Priority: Minor
>
> *Problem Statement:*
> I have a scenario where I need to migrate a YARN cluster to a FIPS 
> 140-3–compatible environment.
> For this, the AMRMTokenSecretManager must use secrets that are at least 112 
> bits long. By default, the secret length is 64 bits. When I modify the key 
> size and restart the cluster with recovery enabled, the state store reloads 
> the old secret, which has a default lifetime of 24 hours. As a result, even 
> though the cluster is configured to operate in FIPS 140-3–compatible mode, it 
> continues to use a non-compliant secret.
>  
> *Solution:*
> When the ResourceManager recovers, it should validate the secret size stored 
> in the state store. If the stored secret size differs from the configured 
> value, the secret should be forcibly regenerated and updated.
>  
> *Tested:*
> Through manual testing, I verified that HIVE applications can run 
> successfully both before and after the configuration change.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to