Configuring Spark application security settings for users
You can define Spark security settings that enable authentication, authorization, and impersonation for the instance group. By default, the security settings are unselected.
Before you begin
Restriction: If security settings are enforced at the cluster level, you cannot
change these settings for the instance group. Talk to your cluster
administrator for more information.
Based on your requirements, ensure that you meet the requirements to create an instance group. See Prerequisites for an instance group.
About this task
When you create the instance group, you can configure the Spark master to authenticate and then authorize the user who is submitting Spark applications. This limits and controls who can submit Spark applications to the Spark master.
You can also enable impersonation to have Spark applications, notebook services, or both, run as
the submission user. Impersonation means that the system runs executables under a designated OS
account.
Notes:
- Enabling impersonation without authentication and authorization allows Spark applications to run as any user.
- If you are submitting Spark applications on a host inside the cluster in client mode, you must ensure that the user who is logged in to the client host and either the submission user (impersonation is enabled) or the consumer execution user (impersonation is disabled) for the Spark executors are the same user or you receive a permission issue.
- If you select Enable impersonation to have Spark applications run as the submission user when creating the instance group, the user of either the spark.ego.uname or spark.ego.credential parameters must be the LDAP or OS execution user, rather than a built-in user, such as Admin.
- If you are configuring notebooks for your instance group and you select Enable impersonation to have Spark applications run as the submission user when creating the instance group, the user that logs in to the notebook must be the LDAP or OS execution user, rather than a built-in user, such as Admin or Guest. Spark applications will run as the submission user. Additionally, the built-in Jupyter notebook supports notebook user impersonation; to indicate that notebook services and Spark workload should run as the notebook owner OS user, select the Supports user impersonation option when adding the notebook.
Procedure
What to do next
- Finish configuring the basic settings for the instance group. See Defining basic settings for an instance group.