-
Notifications
You must be signed in to change notification settings - Fork 28.9k
[SPARK-50758][K8S]Mounts the krb5 config map on the executor pod #49467
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
pan3793
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
turboFei
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, thanks
|
Today, I revisited this PR and after testing, I found that in client mode, both the hadoop conf and krb5.conf cannot be mounted to the executor pod correctly. Is this the expected behavior? |
Hi @maomaodev in my use case, the spark jobs are submitted via kyuubi gateway with cluster mode. So I did not aware this kind of issue. |
Can it pass the kerberos authentication in client mode? |
@turboFei Yes, in client mode, since the Hadoop conf is not mounted correctly, it is also acceptable not to mount krb5.conf, although this not be the expected behavior). |
|
We're closing this PR because it hasn't been updated in a while. This isn't a judgement on the merit of the PR in any way. It's just a way of keeping the PR queue manageable. |
What changes were proposed in this pull request?
In this pr, for spark on k8s, the krb5.conf config map will be mounted in executor side as well.
Before, the krb5.conf config map is only mounted in driver side. But according to the parameter description, the krb5.conf file should be mounted on both the driver and the executor.
Why are the changes needed?
After SPARK-43504, the hadoop config map will be mounted on the executor pod.
Now the executor pod fails to start because the hadoop conf file contains Kerberos authentication configuration, but the executor does not mount krb5.conf correctly.
See the #41181 discuss.
Does this PR introduce any user-facing change?
Yes, users do not need to take workarounds to make executors load the krb5.conf.
Such as:
How was this patch tested?
Was this patch authored or co-authored using generative AI tooling?
no