Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

The 'alluxio.hadoop.security.kerberos.keytab.login.autorenewal' configuration is wrong in the HDFS docs #18486

Closed
QianyongY opened this issue Jan 10, 2024 · 1 comment · Fixed by #18487
Assignees
Labels
type-docs Documentation Defects

Comments

@QianyongY
Copy link
Contributor

Page
https://docs.alluxio.io/os/user/stable/en/ufs/HDFS.html

Summary

when starting Alluxio services. Another option is to set `alluxio.hadoop.security.kerberos.keytab.login.autorenewal=true`

There is a bug here, because the code is using 'alluxio.hadoop.kerberos.keytab.login.autorenewal', so the user configuration 'alluxio.hadoop.security.kerberos.keytab.login.autorenewal' does not work.

    public static final String HADOOP_KERBEROS_KEYTAB_LOGIN_AUTORENEWAL =
        "alluxio.hadoop.kerberos.keytab.login.autorenewal";

https://github.com/Alluxio/alluxio/blob/main/dora/core/common/src/main/java/alluxio/conf/PropertyKey.java#L8687-L8688

Therefore, the documentation should be modified to 'alluxio.hadoop.kerberos.keytab.login.autorenewal=true'.

@QianyongY
Copy link
Contributor Author

assign @QianyongY

alluxio-bot pushed a commit that referenced this issue Jan 11, 2024
…b.login.autorenewal' in HDFS docs



### What changes are proposed in this pull request?

Update the correct kerberos configuration 'alluxio.hadoop.kerberos.keytab.login.autorenewal' in HDFS docs to avoid user confusion.

### Why are the changes needed?

Fix #18486 



			pr-link: #18487
			change-id: cid-b8f08e2f67e5f10aa1426de7629b8e268e339433
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
type-docs Documentation Defects
Projects
None yet
1 participant