blob: 1e4e249148fc3b530d6bc66d43ff22da76642a0a [file] [log] [blame]
<table class="configuration table table-bordered">
<thead>
<tr>
<th class="text-left" style="width: 20%">Key</th>
<th class="text-left" style="width: 15%">Default</th>
<th class="text-left" style="width: 10%">Type</th>
<th class="text-left" style="width: 55%">Description</th>
</tr>
</thead>
<tbody>
<tr>
<td><h5>security.kerberos.access.hadoopFileSystems</h5></td>
<td style="word-wrap: break-word;">(none)</td>
<td>List&lt;String&gt;</td>
<td>A semicolon-separated list of Kerberos-secured Hadoop filesystems Flink is going to access. For example, security.kerberos.access.hadoopFileSystems=hdfs://namenode2:9002;hdfs://namenode3:9003. The JobManager needs to have access to these filesystems to retrieve the security tokens.</td>
</tr>
<tr>
<td><h5>security.kerberos.login.contexts</h5></td>
<td style="word-wrap: break-word;">(none)</td>
<td>String</td>
<td>A comma-separated list of login contexts to provide the Kerberos credentials to (for example, `Client,KafkaClient` to use the credentials for ZooKeeper authentication and for Kafka authentication)</td>
</tr>
<tr>
<td><h5>security.kerberos.login.keytab</h5></td>
<td style="word-wrap: break-word;">(none)</td>
<td>String</td>
<td>Absolute path to a Kerberos keytab file that contains the user credentials.</td>
</tr>
<tr>
<td><h5>security.kerberos.login.principal</h5></td>
<td style="word-wrap: break-word;">(none)</td>
<td>String</td>
<td>Kerberos principal name associated with the keytab.</td>
</tr>
<tr>
<td><h5>security.kerberos.login.use-ticket-cache</h5></td>
<td style="word-wrap: break-word;">true</td>
<td>Boolean</td>
<td>Indicates whether to read from your Kerberos ticket cache.</td>
</tr>
<tr>
<td><h5>security.kerberos.relogin.period</h5></td>
<td style="word-wrap: break-word;">1 min</td>
<td>Duration</td>
<td>The time period when keytab login happens automatically in order to always have a valid TGT.</td>
</tr>
</tbody>
</table>