Skip to content

Commit

Permalink
[DOCFIX] Update kerberos configuration 'alluxio.hadoop.kerberos.keyta…
Browse files Browse the repository at this point in the history
…b.login.autorenewal' in HDFS docs



### What changes are proposed in this pull request?

Update the correct kerberos configuration 'alluxio.hadoop.kerberos.keytab.login.autorenewal' in HDFS docs to avoid user confusion.

### Why are the changes needed?

Fix #18486 



			pr-link: #18487
			change-id: cid-b8f08e2f67e5f10aa1426de7629b8e268e339433
  • Loading branch information
QianyongY authored Jan 11, 2024
1 parent b9de24c commit 7d8f317
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion docs/en/ufs/HDFS.md
Original file line number Diff line number Diff line change
Expand Up @@ -142,7 +142,7 @@ Use the principal `hdfs` and the keytab that you configured earlier in `alluxio-
A known limitation is that the Kerberos TGT may expire after
the max renewal lifetime. You can work around this by renewing the TGT periodically. Otherwise you
may see `No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)`
when starting Alluxio services. Another option is to set `alluxio.hadoop.security.kerberos.keytab.login.autorenewal=true`
when starting Alluxio services. Another option is to set `alluxio.hadoop.kerberos.keytab.login.autorenewal=true`
so the TGT is automatically refreshed.

The user can also use `alluxio.hadoop.security.krb5.conf` to specify the krb5.conf file location
Expand Down

0 comments on commit 7d8f317

Please sign in to comment.