secure_mapping.js 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685
  1. /**
  2. * Licensed to the Apache Software Foundation (ASF) under one
  3. * or more contributor license agreements. See the NOTICE file
  4. * distributed with this work for additional information
  5. * regarding copyright ownership. The ASF licenses this file
  6. * to you under the Apache License, Version 2.0 (the
  7. * "License"); you may not use this file except in compliance
  8. * with the License. You may obtain a copy of the License at
  9. *
  10. * http://www.apache.org/licenses/LICENSE-2.0
  11. *
  12. * Unless required by applicable law or agreed to in writing, software
  13. * distributed under the License is distributed on an "AS IS" BASIS,
  14. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  15. * See the License for the specific language governing permissions and
  16. * limitations under the License.
  17. */
  18. module.exports = [
  19. {
  20. "name": "hadoop.security.authentication",
  21. "templateName": [],
  22. "foreignKey": null,
  23. "value": "kerberos",
  24. "nonSecureValue": "simple",
  25. "filename": "core-site.xml",
  26. "serviceName": "HDFS"
  27. },
  28. {
  29. "name": "hadoop.security.authorization",
  30. "templateName": [],
  31. "foreignKey": null,
  32. "value": "true",
  33. "nonSecureValue": "false",
  34. "filename": "core-site.xml",
  35. "serviceName": "HDFS"
  36. },
  37. {
  38. "name": "hadoop.security.auth_to_local",
  39. "templateName": ["resourcemanager_primary_name", "kerberos_domain", "yarn_user", "nodemanager_primary_name", "namenode_primary_name", "hdfs_user", "datanode_primary_name", "hbase_master_primary_name", "hbase_user","hbase_regionserver_primary_name","oozie_primary_name","oozie_user","jobhistory_primary_name","mapred_user","journalnode_principal_name","falcon_primary_name","falcon_user"],
  40. "foreignKey": null,
  41. "value": "RULE:[2:$1@$0](<templateName[0]>@.*<templateName[1]>)s/.*/<templateName[2]>/\nRULE:[2:$1@$0](<templateName[3]>@.*<templateName[1]>)s/.*/<templateName[2]>/\nRULE:[2:$1@$0](<templateName[4]>@.*<templateName[1]>)s/.*/<templateName[5]>/\nRULE:[2:$1@$0](<templateName[6]>@.*<templateName[1]>)s/.*/<templateName[5]>/\nRULE:[2:$1@$0](<templateName[7]>@.*<templateName[1]>)s/.*/<templateName[8]>/\nRULE:[2:$1@$0](<templateName[9]>@.*<templateName[1]>)s/.*/<templateName[8]>/\nRULE:[2:$1@$0](<templateName[10]>@.*<templateName[1]>)s/.*/<templateName[11]>/\nRULE:[2:$1@$0](<templateName[12]>@.*<templateName[1]>)s/.*/<templateName[13]>/\nRULE:[2:$1@$0](<templateName[14]>@.*<templateName[1]>)s/.*/<templateName[5]>/\nRULE:[2:$1@$0](<templateName[15]>@.*<templateName[1]>)s/.*/<templateName[16]>/\nDEFAULT",
  42. "filename": "core-site.xml",
  43. "serviceName": "HDFS",
  44. "dependedServiceName": [{name: "HBASE", replace: "\nRULE:[2:$1@$0](<templateName[7]>@.*<templateName[1]>)s/.*/<templateName[8]>/\nRULE:[2:$1@$0](<templateName[9]>@.*<templateName[1]>)s/.*/<templateName[8]>/"},{name: "OOZIE",replace: "\nRULE:[2:$1@$0](<templateName[10]>@.*<templateName[1]>)s/.*/<templateName[11]>/"},{name: "MAPREDUCE2",replace: "\nRULE:[2:$1@$0](<templateName[12]>@.*<templateName[1]>)s/.*/<templateName[13]>/"}]
  45. },
  46. {
  47. "name": "dfs.namenode.kerberos.principal",
  48. "templateName": ["namenode_principal_name", "kerberos_domain"],
  49. "foreignKey": null,
  50. "value": "<templateName[0]>@<templateName[1]>",
  51. "filename": "hdfs-site.xml",
  52. "serviceName": "HDFS"
  53. },
  54. {
  55. "name": "dfs.namenode.keytab.file",
  56. "templateName": ["namenode_keytab"],
  57. "foreignKey": null,
  58. "value": "<templateName[0]>",
  59. "filename": "hdfs-site.xml",
  60. "serviceName": "HDFS"
  61. },
  62. {
  63. "name": "dfs.secondary.namenode.kerberos.principal",
  64. "templateName": ["snamenode_principal_name", "kerberos_domain"],
  65. "foreignKey": null,
  66. "value": "<templateName[0]>@<templateName[1]>",
  67. "filename": "hdfs-site.xml"
  68. },
  69. {
  70. "name": "dfs.secondary.namenode.keytab.file",
  71. "templateName": ["snamenode_keytab"],
  72. "foreignKey": null,
  73. "value": "<templateName[0]>",
  74. "filename": "hdfs-site.xml",
  75. "serviceName": "HDFS"
  76. },
  77. {
  78. "name": "dfs.web.authentication.kerberos.principal",
  79. "templateName": ["hadoop_http_principal_name", "kerberos_domain"],
  80. "foreignKey": null,
  81. "value": "<templateName[0]>@<templateName[1]>",
  82. "filename": "hdfs-site.xml",
  83. "serviceName": "HDFS"
  84. },
  85. {
  86. "name": "dfs.web.authentication.kerberos.keytab",
  87. "templateName": ["hadoop_http_keytab"],
  88. "foreignKey": null,
  89. "value": "<templateName[0]>",
  90. "filename": "hdfs-site.xml",
  91. "serviceName": "HDFS"
  92. },
  93. {
  94. "name": "dfs.datanode.kerberos.principal",
  95. "templateName": ["datanode_principal_name", "kerberos_domain"],
  96. "foreignKey": null,
  97. "value": "<templateName[0]>@<templateName[1]>",
  98. "filename": "hdfs-site.xml",
  99. "serviceName": "HDFS"
  100. },
  101. {
  102. "name": "dfs.datanode.keytab.file",
  103. "templateName": ["datanode_keytab"],
  104. "foreignKey": null,
  105. "value": "<templateName[0]>",
  106. "filename": "hdfs-site.xml",
  107. "serviceName": "HDFS"
  108. },
  109. {
  110. "name": "dfs.namenode.kerberos.internal.spnego.principal",
  111. "templateName": [],
  112. "foreignKey": null,
  113. "value": "${dfs.web.authentication.kerberos.principal}",
  114. "filename": "hdfs-site.xml",
  115. "serviceName": "HDFS"
  116. },
  117. {
  118. "name": "dfs.secondary.namenode.kerberos.internal.spnego.principal",
  119. "templateName": [],
  120. "foreignKey": null,
  121. "value": "${dfs.web.authentication.kerberos.principal}",
  122. "filename": "hdfs-site.xml",
  123. "serviceName": "HDFS"
  124. },
  125. {
  126. "name": "dfs.journalnode.kerberos.principal",
  127. "templateName": ["journalnode_principal_name", "kerberos_domain"],
  128. "foreignKey": null,
  129. "value": "<templateName[0]>@<templateName[1]>",
  130. "filename": "hdfs-site.xml",
  131. "serviceName": "HDFS"
  132. },
  133. {
  134. "name": "dfs.journalnode.kerberos.internal.spnego.principal",
  135. "templateName": ["hadoop_http_principal_name", "kerberos_domain"],
  136. "foreignKey": null,
  137. "value": "<templateName[0]>@<templateName[1]>",
  138. "filename": "hdfs-site.xml",
  139. "serviceName": "HDFS"
  140. },
  141. {
  142. "name": "dfs.journalnode.keytab.file",
  143. "templateName": ["journalnode_keytab"],
  144. "foreignKey": null,
  145. "value": "<templateName[0]>",
  146. "filename": "hdfs-site.xml",
  147. "serviceName": "HDFS"
  148. },
  149. {
  150. "name": "dfs.datanode.address",
  151. "templateName": ["dfs_datanode_address"],
  152. "foreignKey": null,
  153. "value": "0.0.0.0:<templateName[0]>",
  154. "nonSecureValue": "0.0.0.0:50010",
  155. "filename": "hdfs-site.xml",
  156. "serviceName": "HDFS"
  157. },
  158. {
  159. "name": "dfs.datanode.http.address",
  160. "templateName": ["dfs_datanode_http_address"],
  161. "foreignKey": null,
  162. "value": "0.0.0.0:<templateName[0]>",
  163. "nonSecureValue": "0.0.0.0:50075",
  164. "filename": "hdfs-site.xml",
  165. "serviceName": "HDFS"
  166. },
  167. {
  168. "name": "mapreduce.jobhistory.principal",
  169. "templateName": ["jobhistory_principal_name", "kerberos_domain"],
  170. "foreignKey": null,
  171. "value": "<templateName[0]>@<templateName[1]>",
  172. "filename": "mapred-site.xml",
  173. "serviceName": "MAPREDUCE2"
  174. },
  175. {
  176. "name": "mapreduce.jobhistory.keytab",
  177. "templateName": ["jobhistory_keytab"],
  178. "foreignKey": null,
  179. "value": "<templateName[0]>",
  180. "filename": "mapred-site.xml",
  181. "serviceName": "MAPREDUCE2"
  182. },
  183. {
  184. "name": "mapreduce.jobhistory.webapp.spnego-principal",
  185. "templateName": ["jobhistory_http_principal_name", "kerberos_domain"],
  186. "foreignKey": null,
  187. "value": "<templateName[0]>@<templateName[1]>",
  188. "filename": "mapred-site.xml",
  189. "serviceName": "MAPREDUCE2"
  190. },
  191. {
  192. "name": "mapreduce.jobhistory.webapp.spnego-keytab-file",
  193. "templateName": ["jobhistory_http_keytab"],
  194. "foreignKey": null,
  195. "value": "<templateName[0]>",
  196. "filename": "mapred-site.xml",
  197. "serviceName": "MAPREDUCE2"
  198. },
  199. {
  200. "name": "yarn.timeline-service.enabled",
  201. "templateName": [],
  202. "foreignKey": null,
  203. "value": "false",
  204. "nonSecureValue": "false",
  205. "filename": "yarn-site.xml",
  206. "serviceName": "YARN"
  207. },
  208. {
  209. "name": "yarn.acl.enable",
  210. "templateName": [],
  211. "foreignKey": null,
  212. "value": "true",
  213. "nonSecureValue": "false",
  214. "filename": "yarn-site.xml",
  215. "serviceName": "YARN"
  216. },
  217. {
  218. "name": "yarn.resourcemanager.principal",
  219. "templateName": ["resourcemanager_principal_name", "kerberos_domain"],
  220. "foreignKey": null,
  221. "value": "<templateName[0]>@<templateName[1]>",
  222. "filename": "yarn-site.xml",
  223. "serviceName": "YARN"
  224. },
  225. {
  226. "name": "yarn.resourcemanager.keytab",
  227. "templateName": ["resourcemanager_keytab"],
  228. "foreignKey": null,
  229. "value": "<templateName[0]>",
  230. "filename": "yarn-site.xml",
  231. "serviceName": "YARN"
  232. },
  233. {
  234. "name": "yarn.nodemanager.principal",
  235. "templateName": ["nodemanager_principal_name", "kerberos_domain"],
  236. "foreignKey": null,
  237. "value": "<templateName[0]>@<templateName[1]>",
  238. "filename": "yarn-site.xml",
  239. "serviceName": "YARN"
  240. },
  241. {
  242. "name": "yarn.nodemanager.keytab",
  243. "templateName": ["nodemanager_keytab"],
  244. "foreignKey": null,
  245. "value": "<templateName[0]>",
  246. "filename": "yarn-site.xml",
  247. "serviceName": "YARN"
  248. },
  249. {
  250. "name": "yarn.resourcemanager.webapp.spnego-principal",
  251. "templateName": ["resourcemanager_http_principal_name", "kerberos_domain"],
  252. "foreignKey": null,
  253. "value": "<templateName[0]>@<templateName[1]>",
  254. "filename": "yarn-site.xml",
  255. "serviceName": "YARN"
  256. },
  257. {
  258. "name": "yarn.resourcemanager.webapp.spnego-keytab-file",
  259. "templateName": ["resourcemanager_http_keytab"],
  260. "foreignKey": null,
  261. "value": "<templateName[0]>",
  262. "filename": "yarn-site.xml",
  263. "serviceName": "YARN"
  264. },
  265. {
  266. "name": "yarn.nodemanager.webapp.spnego-principal",
  267. "templateName": ["nodemanager_http_principal_name", "kerberos_domain"],
  268. "foreignKey": null,
  269. "value": "<templateName[0]>@<templateName[1]>",
  270. "filename": "yarn-site.xml",
  271. "serviceName": "YARN"
  272. },
  273. {
  274. "name": "yarn.nodemanager.webapp.spnego-keytab-file",
  275. "templateName": ["nodemanager_http_keytab"],
  276. "foreignKey": null,
  277. "value": "<templateName[0]>",
  278. "filename": "yarn-site.xml",
  279. "serviceName": "YARN"
  280. },
  281. {
  282. "name": "yarn.nodemanager.container-executor.class",
  283. "templateName": ["yarn_nodemanager_container-executor_class"],
  284. "foreignKey": null,
  285. "value": "<templateName[0]>",
  286. "nonSecureValue": "org.apache.hadoop.yarn.server.nodemanager.DefaultContainerExecutor",
  287. "filename": "yarn-site.xml",
  288. "serviceName": "YARN"
  289. },
  290. {
  291. "name": "hbase.master.kerberos.principal",
  292. "templateName": ["hbase_master_principal_name", "kerberos_domain"],
  293. "foreignKey": null,
  294. "value": "<templateName[0]>@<templateName[1]>",
  295. "filename": "hbase-site.xml",
  296. "serviceName": "HBASE"
  297. },
  298. {
  299. "name": "hbase.master.keytab.file",
  300. "templateName": ["hbase_master_keytab"],
  301. "foreignKey": null,
  302. "value": "<templateName[0]>",
  303. "filename": "hbase-site.xml",
  304. "serviceName": "HBASE"
  305. },
  306. {
  307. "name": "hbase.regionserver.kerberos.principal",
  308. "templateName": ["hbase_regionserver_principal_name", "kerberos_domain"],
  309. "foreignKey": null,
  310. "value": "<templateName[0]>@<templateName[1]>",
  311. "filename": "hbase-site.xml",
  312. "serviceName": "HBASE"
  313. },
  314. {
  315. "name": "hbase.regionserver.keytab.file",
  316. "templateName": ["hbase_regionserver_keytab"],
  317. "foreignKey": null,
  318. "value": "<templateName[0]>",
  319. "filename": "hbase-site.xml",
  320. "serviceName": "HBASE"
  321. },
  322. {
  323. "name": "hive.metastore.sasl.enabled",
  324. "templateName": [],
  325. "foreignKey": null,
  326. "value": "true",
  327. "nonSecureValue": "false",
  328. "filename": "hive-site.xml",
  329. "serviceName": "HIVE"
  330. },
  331. {
  332. "name": "hive.security.authorization.enabled",
  333. "templateName": [],
  334. "foreignKey": null,
  335. "value": "true",
  336. "nonSecureValue": "false",
  337. "filename": "hive-site.xml",
  338. "serviceName": "HIVE"
  339. },
  340. {
  341. "name": "hive.security.authorization.manager",
  342. "templateName": [],
  343. "foreignKey": null,
  344. "value": "org.apache.hadoop.hive.ql.security.authorization.StorageBasedAuthorizationProvider",
  345. "nonSecureValue": "NONE",
  346. "filename": "hive-site.xml",
  347. "serviceName": "HIVE"
  348. },
  349. {
  350. "name": "hive.security.metastore.authorization.manager",
  351. "templateName": [],
  352. "foreignKey": null,
  353. "value": "org.apache.hadoop.hive.ql.security.authorization.StorageBasedAuthorizationProvider",
  354. "nonSecureValue": "NONE",
  355. "filename": "hive-site.xml",
  356. "serviceName": "HIVE"
  357. },
  358. {
  359. "name": "hive.security.authenticator.manager",
  360. "templateName": [],
  361. "foreignKey": null,
  362. "value": "org.apache.hadoop.hive.ql.security.ProxyUserAuthenticator",
  363. "nonSecureValue": "NONE",
  364. "filename": "hive-site.xml",
  365. "serviceName": "HIVE"
  366. },
  367. {
  368. "name": "hive.server2.authentication",
  369. "templateName": [],
  370. "foreignKey": null,
  371. "value": "KERBEROS",
  372. "nonSecureValue": "NONE",
  373. "filename": "hive-site.xml",
  374. "serviceName": "HIVE"
  375. },
  376. {
  377. "name": "hive.metastore.kerberos.principal",
  378. "templateName": ["hive_metastore_principal_name", "kerberos_domain"],
  379. "foreignKey": null,
  380. "value": "<templateName[0]>@<templateName[1]>",
  381. "filename": "hive-site.xml",
  382. "serviceName": "HIVE"
  383. },
  384. {
  385. "name": "hive.metastore.kerberos.keytab.file",
  386. "templateName": ["hive_metastore_keytab"],
  387. "foreignKey": null,
  388. "value": "<templateName[0]>",
  389. "filename": "hive-site.xml",
  390. "serviceName": "HIVE"
  391. },
  392. {
  393. "name": "hive.server2.authentication.kerberos.principal",
  394. "templateName": ["hive_metastore_principal_name", "kerberos_domain"],
  395. "foreignKey": null,
  396. "value": "<templateName[0]>@<templateName[1]>",
  397. "filename": "hive-site.xml",
  398. "serviceName": "HIVE"
  399. },
  400. {
  401. "name": "hive.server2.authentication.kerberos.keytab",
  402. "templateName": ["hive_metastore_keytab"],
  403. "foreignKey": null,
  404. "value": "<templateName[0]>",
  405. "filename": "hive-site.xml",
  406. "serviceName": "HIVE"
  407. },
  408. {
  409. "name": "oozie.service.AuthorizationService.authorization.enabled",
  410. "templateName": [],
  411. "foreignKey": null,
  412. "value": "true",
  413. "filename": "oozie-site.xml",
  414. "serviceName": "OOZIE"
  415. },
  416. {
  417. "name": "oozie.service.HadoopAccessorService.kerberos.enabled",
  418. "templateName": [],
  419. "foreignKey": null,
  420. "value": "true",
  421. "nonSecureValue": "false",
  422. "filename": "oozie-site.xml",
  423. "serviceName": "OOZIE"
  424. },
  425. {
  426. "name": "local.realm",
  427. "templateName": ["kerberos_domain"],
  428. "foreignKey": null,
  429. "value": "<templateName[0]>",
  430. "filename": "oozie-site.xml",
  431. "serviceName": "OOZIE"
  432. },
  433. {
  434. "name": "oozie.service.HadoopAccessorService.keytab.file",
  435. "templateName": ["oozie_keytab"],
  436. "foreignKey": null,
  437. "value": "<templateName[0]>",
  438. "filename": "oozie-site.xml",
  439. "serviceName": "OOZIE"
  440. },
  441. {
  442. "name": "oozie.service.HadoopAccessorService.kerberos.principal",
  443. "templateName": ["oozie_principal_name", "kerberos_domain"],
  444. "foreignKey": null,
  445. "value": "<templateName[0]>@<templateName[1]>",
  446. "filename": "oozie-site.xml",
  447. "serviceName": "OOZIE"
  448. },
  449. {
  450. "name": "oozie.authentication.type",
  451. "templateName": [],
  452. "foreignKey": null,
  453. "value": "kerberos",
  454. "nonSecureValue": "simple",
  455. "filename": "oozie-site.xml",
  456. "serviceName": "OOZIE"
  457. },
  458. {
  459. "name": "oozie.authentication.kerberos.principal",
  460. "templateName": ["oozie_http_principal_name", "kerberos_domain"],
  461. "foreignKey": null,
  462. "value": "<templateName[0]>@<templateName[1]>",
  463. "filename": "oozie-site.xml",
  464. "serviceName": "OOZIE"
  465. },
  466. {
  467. "name": "oozie.authentication.kerberos.keytab",
  468. "templateName": ["oozie_http_keytab"],
  469. "foreignKey": null,
  470. "value": "<templateName[0]>",
  471. "filename": "oozie-site.xml",
  472. "serviceName": "OOZIE"
  473. },
  474. {
  475. "name": "oozie.authentication.kerberos.name.rules",
  476. "templateName": ["resourcemanager_primary_name", "kerberos_domain", "yarn_user", "nodemanager_primary_name", "namenode_primary_name", "hdfs_user", "datanode_primary_name", "hbase_master_primary_name", "hbase_user","hbase_regionserver_primary_name"],
  477. "foreignKey": null,
  478. "value": "RULE:[2:$1@$0](<templateName[0]>@.*<templateName[1]>)s/.*/<templateName[2]>/\nRULE:[2:$1@$0](<templateName[3]>@.*<templateName[1]>)s/.*/<templateName[2]>/\nRULE:[2:$1@$0](<templateName[4]>@.*<templateName[1]>)s/.*/<templateName[5]>/\nRULE:[2:$1@$0](<templateName[6]>@.*<templateName[1]>)s/.*/<templateName[5]>/\nRULE:[2:$1@$0](<templateName[7]>@.*<templateName[1]>)s/.*/<templateName[8]>/\nRULE:[2:$1@$0](<templateName[9]>@.*<templateName[1]>)s/.*/<templateName[8]>/\nDEFAULT",
  479. "filename": "oozie-site.xml",
  480. "serviceName": "OOZIE",
  481. "dependedServiceName": [{name: "HBASE", replace: "\nRULE:[2:$1@$0](<templateName[7]>@.*<templateName[1]>)s/.*/<templateName[8]>/\nRULE:[2:$1@$0](<templateName[9]>@.*<templateName[1]>)s/.*/<templateName[8]>/"}]
  482. },
  483. {
  484. "name": "templeton.kerberos.principal",
  485. "templateName": ["webHCat_http_principal_name", "kerberos_domain"],
  486. "foreignKey": null,
  487. "value": "<templateName[0]>@<templateName[1]>",
  488. "filename": "webhcat-site.xml",
  489. "serviceName": "WEBHCAT"
  490. },
  491. {
  492. "name": "templeton.kerberos.keytab",
  493. "templateName": ["webhcat_http_keytab"],
  494. "foreignKey": null,
  495. "value": "<templateName[0]>",
  496. "filename": "webhcat-site.xml",
  497. "serviceName": "WEBHCAT"
  498. },
  499. {
  500. "name": "templeton.kerberos.secret",
  501. "templateName": [""],
  502. "foreignKey": null,
  503. "value": "secret",
  504. "filename": "webhcat-site.xml",
  505. "serviceName": "WEBHCAT"
  506. },
  507. {
  508. "name": "templeton.hive.properties",
  509. "templateName": ["hivemetastore_host","hive_metastore_principal_name","kerberos_domain"],
  510. "foreignKey": null,
  511. "value": "hive.metastore.local=false,hive.metastore.uris=thrift://<templateName[0]>:9083,hive." +
  512. "metastore.sasl.enabled=true,hive.metastore.execute.setugi=true,hive.metastore.warehouse.dir=/apps/hive/warehouse,hive.exec.mode.local.auto=false,hive.metastore.kerberos.principal=<templateName[1]>@<templateName[2]>",
  513. "filename": "webhcat-site.xml",
  514. "serviceName": "WEBHCAT"
  515. },
  516. {
  517. "name": "hbase.coprocessor.master.classes",
  518. "templateName": [],
  519. "foreignKey": null,
  520. "value": "org.apache.hadoop.hbase.security.access.AccessController",
  521. "filename": "hbase-site.xml",
  522. "serviceName": "HBASE"
  523. },
  524. {
  525. "name": "hbase.coprocessor.region.classes",
  526. "templateName": [],
  527. "foreignKey": null,
  528. "value": "org.apache.hadoop.hbase.security.token.TokenProvider,org.apache.hadoop.hbase.security.access.SecureBulkLoadEndpoint,org.apache.hadoop.hbase.security.access.AccessController",
  529. "filename": "hbase-site.xml",
  530. "serviceName": "HBASE"
  531. },
  532. {
  533. "name": "hbase.security.authentication",
  534. "templateName": [],
  535. "foreignKey": null,
  536. "value": "kerberos",
  537. "nonSecureValue": "simple",
  538. "filename": "hbase-site.xml",
  539. "serviceName": "HBASE"
  540. },
  541. {
  542. "name": "hbase.security.authorization",
  543. "templateName": [],
  544. "foreignKey": null,
  545. "value": "true",
  546. "nonSecureValue": "false",
  547. "filename": "hbase-site.xml",
  548. "serviceName": "HBASE"
  549. },
  550. {
  551. "name": "hbase.coprocessor.region.classes",
  552. "templateName": [],
  553. "foreignKey": null,
  554. "value": "org.apache.hadoop.hbase.security.token.TokenProvider,org.apache.hadoop.hbase.security.access.SecureBulkLoadEndpoint,org.apache.hadoop.hbase.security.access.AccessController",
  555. "filename": "hbase-site.xml"
  556. },
  557. {
  558. "name": "hbase.bulkload.staging.dir",
  559. "templateName": [],
  560. "foreignKey": null,
  561. "value": "/apps/hbase/staging",
  562. "filename": "hbase-site.xml",
  563. "serviceName": "HBASE"
  564. },
  565. {
  566. "name": "zookeeper.znode.parent",
  567. "templateName": [],
  568. "foreignKey": null,
  569. "value": "/hbase-secure",
  570. "nonSecureValue": "/hbase-unsecure",
  571. "filename": "hbase-site.xml",
  572. "serviceName": "HBASE"
  573. },
  574. /***************************************FALCON***********************************************/
  575. {
  576. "name": "*.falcon.authentication.type",
  577. "templateName": [],
  578. "foreignKey": null,
  579. "value": "kerberos",
  580. "nonSecureValue": "simple",
  581. "filename": "falcon-startup.properties.xml",
  582. "serviceName": "FALCON"
  583. },
  584. {
  585. "name": "*.falcon.http.authentication.type",
  586. "templateName": [],
  587. "foreignKey": null,
  588. "value": "kerberos",
  589. "nonSecureValue": "simple",
  590. "filename": "falcon-startup.properties.xml",
  591. "serviceName": "FALCON"
  592. },
  593. {
  594. "name": "*.falcon.service.authentication.kerberos.principal",
  595. "templateName": ["falcon_principal_name", "kerberos_domain"],
  596. "foreignKey": null,
  597. "value": "<templateName[0]>@<templateName[1]>",
  598. "filename": "falcon-startup.properties.xml",
  599. "serviceName": "FALCON"
  600. },
  601. {
  602. "name": "*.falcon.service.authentication.kerberos.keytab",
  603. "templateName": ["falcon_keytab"],
  604. "foreignKey": null,
  605. "value": "<templateName[0]>",
  606. "filename": "falcon-startup.properties.xml",
  607. "serviceName": "FALCON"
  608. },
  609. {
  610. "name": "*.falcon.http.authentication.kerberos.principal",
  611. "templateName": ["falcon_http_principal_name", "kerberos_domain"],
  612. "foreignKey": null,
  613. "value": "<templateName[0]>@<templateName[1]>",
  614. "filename": "falcon-startup.properties.xml",
  615. "serviceName": "FALCON"
  616. },
  617. {
  618. "name": "*.falcon.http.authentication.kerberos.keytab",
  619. "templateName": ["falcon_http_keytab"],
  620. "foreignKey": null,
  621. "value": "<templateName[0]>",
  622. "filename": "falcon-startup.properties.xml",
  623. "serviceName": "FALCON"
  624. },
  625. {
  626. "name": "*.dfs.namenode.kerberos.principal",
  627. "templateName": ["namenode_principal_name_falcon", "kerberos_domain"],
  628. "foreignKey": null,
  629. "value": "<templateName[0]>@<templateName[1]>",
  630. "filename": "falcon-startup.properties.xml",
  631. "serviceName": "FALCON"
  632. },
  633. /******************************************************************************************/
  634. {
  635. "name": "hadoop.proxyuser.<foreignKey[0]>.groups",
  636. "templateName": ["proxyuser_group"],
  637. "foreignKey": ["hive_metastore_primary_name"],
  638. "value": "<templateName[0]>",
  639. "filename": "core-site.xml",
  640. "serviceName": "HIVE"
  641. },
  642. {
  643. "name": "hadoop.proxyuser.<foreignKey[0]>.hosts",
  644. "templateName": ["hivemetastore_host"],
  645. "foreignKey": ["hive_metastore_primary_name"],
  646. "value": "<templateName[0]>",
  647. "filename": "core-site.xml",
  648. "serviceName": "HIVE"
  649. },
  650. {
  651. "name": "hadoop.proxyuser.<foreignKey[0]>.groups",
  652. "templateName": ["proxyuser_group"],
  653. "foreignKey": ["oozie_primary_name"],
  654. "value": "<templateName[0]>",
  655. "filename": "core-site.xml",
  656. "serviceName": "OOZIE"
  657. },
  658. {
  659. "name": "hadoop.proxyuser.<foreignKey[0]>.hosts",
  660. "templateName": ["oozieserver_host"],
  661. "foreignKey": ["oozie_primary_name"],
  662. "value": "<templateName[0]>",
  663. "filename": "core-site.xml",
  664. "serviceName": "OOZIE"
  665. },
  666. {
  667. "name": "hadoop.proxyuser.<foreignKey[0]>.groups",
  668. "templateName": ["proxyuser_group"],
  669. "foreignKey": ["webHCat_http_primary_name"],
  670. "value": "<templateName[0]>",
  671. "filename": "core-site.xml",
  672. "serviceName": "WEBHCAT"
  673. },
  674. {
  675. "name": "hadoop.proxyuser.<foreignKey[0]>.hosts",
  676. "templateName": ["webhcat_server"],
  677. "foreignKey": ["webHCat_http_primary_name"],
  678. "value": "<templateName[0]>",
  679. "filename": "core-site.xml",
  680. "serviceName": "WEBHCAT"
  681. }
  682. ];