Skip to content

Commit

Permalink
docs: Add Kerberos discovery
Browse files Browse the repository at this point in the history
  • Loading branch information
sbernauer committed Jan 17, 2024
1 parent f23562f commit d6986d2
Showing 1 changed file with 8 additions and 1 deletion.
9 changes: 8 additions & 1 deletion docs/modules/hbase/pages/reference/discovery.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -36,4 +36,11 @@ The resulting discovery ConfigMap is located at `{namespace}/{cluster-name}`.
The ConfigMap data values are formatted as Hadoop XML files which allows simple mounting of that ConfigMap into pods that require access to HBase.

`hbase-site.xml`::
Contains the `hbase.zookeeper.quorum` property.
Contains the needed information to connect to Zookeeper and use that to establish a connection to HBase.

=== Kerberos
In case Kerberos is enabled according to the xref:usage-guide/security.adoc[security documentation], the discovery ConfigMap also includes the information that clients must authenticate themselves using Kerberos.

If you want to use the discovery ConfigMap outside Stackable services, you need to substitute `${env.KERBEROS_REALM}` with your actual realm (e.g. by using `sed -i -e 's/${{env.KERBEROS_REALM}}/'"$KERBEROS_REALM/g" hbase-site.xml`).

One example would be the property `hbase.master.kerberos.principal` being set to `hbase/hbase.default.svc.cluster.local@${env.KERBEROS_REALM}`.

0 comments on commit d6986d2

Please sign in to comment.