This is an automated email from the ASF dual-hosted git repository.

kassiez pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/doris-website.git


The following commit(s) were added to refs/heads/master by this push:
     new b9f6d8a89b3 [Doc][Enhancement]kerberos config on kubernetes (#2150)
b9f6d8a89b3 is described below

commit b9f6d8a89b301bd2b467a6f95b86bcba5343fe76
Author: smiletan <intelligen...@163.com>
AuthorDate: Tue Apr 22 17:35:53 2025 +0800

    [Doc][Enhancement]kerberos config on kubernetes (#2150)
    
    ## Versions
    
    - [x] dev
    - [x] 3.0
    - [x] 2.1
    - [ ] 2.0
    
    ## Languages
    
    - [x] Chinese
    - [x] English
    
    ## Docs Checklist
    
    - [ ] Checked by AI
    - [ ] Test Cases Built
---
 .../install-config-cluster.md                      | 24 +++++++++++++++++++
 .../install-config-cluster.md                      | 24 +++++++++++++++++++
 .../deploy-on-kubernetes/install-config-cluster.md | 23 ++++++++++++++++++
 .../install-config-cluster.md                      | 26 +++++++++++++++++++-
 .../deploy-on-kubernetes/install-config-cluster.md | 28 ++++++++++++++++++++--
 .../install-config-cluster.md                      | 24 +++++++++++++++++++
 6 files changed, 146 insertions(+), 3 deletions(-)

diff --git 
a/docs/install/deploy-on-kubernetes/integrated-storage-compute/install-config-cluster.md
 
b/docs/install/deploy-on-kubernetes/integrated-storage-compute/install-config-cluster.md
index dac68d7bc41..4b3fd411ac0 100644
--- 
a/docs/install/deploy-on-kubernetes/integrated-storage-compute/install-config-cluster.md
+++ 
b/docs/install/deploy-on-kubernetes/integrated-storage-compute/install-config-cluster.md
@@ -751,3 +751,27 @@ Support configmap monitoring and restart for FE and BE, 
Use FE usage as example.
     ```
 2. Update FE service configurations.  
    When modifying values under the `fe.conf` key in the fe-configmap ConfigMap 
(containing FE service configurations), Doris Operator will automatically 
perform a rolling restart of FE services to apply changes.
+
+## Using Kerberos Authentication
+The Doris Operator has supported Kerberos authentication for Doris (versions 
2.1.9, 3.0.4, and later) in Kubernetes since version 25.2.0. To enable Kerberos 
authentication in Doris, both the [krb5.conf 
file](https://web.mit.edu/kerberos/krb5-1.12/doc/admin/conf_files/krb5_conf.html)
 and [keytab 
files](https://web.mit.edu/Kerberos/krb5-1.16/doc/basic/keytab_def.html) are 
required.
+The Doris Operator mounts the krb5.conf file using a ConfigMap resource and 
mounts the keytab files using a Secret resource. The workflow for enabling 
Kerberos authentication is as follows:
+
+1. Create a ConfigMap containing the krb5.conf file:
+    ```shell
+    kubectl create -n ${namespace} configmap ${name} --from-file=krb5.conf
+    ```
+   Replace ${namespace} with the namespace where the DorisCluster is deployed, 
and ${name} with the desired name for the ConfigMap.
+2. Create a Secret containing the keytab files:
+    ```shell
+    kubectl create -n ${namespace} secret generic ${name} 
--from-file=${xxx.keytab}
+    ```
+   Replace ${namespace} with the namespace where the DorisCluster is deployed, 
and ${name} with the desired name for the Secret. If multiple keytab files need 
to be mounted, refer to the [kubectl create Secret 
documentation](https://kubernetes.io/docs/reference/kubectl/generated/kubectl_create/kubectl_create_secret/)
 to include them in a single Secret.
+3. Configure the DorisCluster resource to specify the ConfigMap containing 
krb5.conf and the Secret containing keytab files:
+    ```yaml
+    spec:
+      kerberosInfo:
+        krb5ConfigMap: ${krb5ConfigMapName}
+        keytabSecretName: ${keytabSecretName}
+        keytabPath: ${keytabPath}
+    ```
+   ${krb5ConfigMapName}: Name of the ConfigMap containing the krb5.conf file. 
${keytabSecretName}: Name of the Secret containing the keytab files. 
${keytabPath}: The directory path in the container where the Secret mounts the 
keytab files. This path should match the directory specified by 
hadoop.kerberos.keytab when creating a catalog. For catalog configuration 
details, refer to the [Hive Catalog 
configuration](../../../lakehouse/catalogs/hive-catalog.md#configuring-catalog) 
documentation.
diff --git 
a/i18n/zh-CN/docusaurus-plugin-content-docs/current/install/deploy-on-kubernetes/integrated-storage-compute/install-config-cluster.md
 
b/i18n/zh-CN/docusaurus-plugin-content-docs/current/install/deploy-on-kubernetes/integrated-storage-compute/install-config-cluster.md
index 572e244ad81..3d6b557f728 100644
--- 
a/i18n/zh-CN/docusaurus-plugin-content-docs/current/install/deploy-on-kubernetes/integrated-storage-compute/install-config-cluster.md
+++ 
b/i18n/zh-CN/docusaurus-plugin-content-docs/current/install/deploy-on-kubernetes/integrated-storage-compute/install-config-cluster.md
@@ -902,3 +902,27 @@ spec:
     ```
 2. 更新 `fe-configmap` 里面指定的 FE 服务启动配置。  
 当更新 `fe-configmap` 中 key 为 `fe.conf` 对应的值( FE 服务的启动配置)后,Doris Operator 自动滚动重启 
FE 服务使配置生效。
+
+## 使用 Kerberos 认证
+Doris Operator 从 25.2.0 版本开始支持 Doris (2.1.9 和 3.0.4 及以后版本) 在 Kubernetes 使用 
Kerberos 认证。 Doris 使用 Kerberos 认证需要使用 
[krb5.conf](https://web.mit.edu/kerberos/krb5-1.12/doc/admin/conf_files/krb5_conf.html)
 和 [keytab 
文件](https://web.mit.edu/Kerberos/krb5-1.16/doc/basic/keytab_def.html) 。
+Doris Operator 使用 `ConfigMap` 资源挂载 krb5.conf 文件,使用 `Secret` 资源挂载 keytab 文件。使用 
Kerberos 认证流程如下:
+1. 构建包含 krb5.conf 文件的 ConfigMap:
+    ```shell
+    kubectl create -n ${namespace} create configmap ${name} 
--from-file=krb5.conf
+    ```
+   ${namespace} 为 `DorisCluster` 部署的命名空间,${name} 为 ConfigMap 想要指定的名字。
+2. 构建包含 keytab 的 Secret:
+    ```shell
+    kubectl create -n ${namespace} secret generic ${name} --from-file= 
${xxx.keytab}
+    ```
+   ${namespace} 为 `DorisCluster` 部署的命名空间,${name} 为 Secret 想要指定的名字,如果需要挂载多个 
`keytab` 文件,请参考 [kubectl 创建 Secret 
文档](https://kubernetes.io/docs/reference/kubectl/generated/kubectl_create/kubectl_create_secret/)将多个
 `keytab` 文件放到一个 Secret 中。
+3. 配置 DorisCluster 资源,指定包含 `krb5.conf` 的 ConfigMap, 以及包含 `keytab` 文件的 Secret。
+    ```yaml
+    spec:
+      kerberosInfo:
+        krb5ConfigMap: ${krb5ConfigMapName}
+        keytabSecretName: ${keytabSecretName}
+        keytabPath: ${keytabPath}
+    ```
+   ${krb5ConfigMapName} 为包含要使用的 `krb5.conf` 文件的 ConfigMap 
名称。${keytabSecretName} 为包含 keytab 文件的 Secret 名称。${keytabPath} 为 Secret 
希望挂载到容器中的路径,这个路径是创建 catalog 时,通过 `hadoop.kerberos.keytab` 指定 keytab 的文件所在目录。创建
+   catalog 请参考配置 [Hive 
Catalog](../../../lakehouse/catalogs/hive-catalog.md#配置-catalog) 文档。
diff --git 
a/i18n/zh-CN/docusaurus-plugin-content-docs/version-2.1/install/deploy-on-kubernetes/install-config-cluster.md
 
b/i18n/zh-CN/docusaurus-plugin-content-docs/version-2.1/install/deploy-on-kubernetes/install-config-cluster.md
index 553494c7171..ecf9c76fd74 100644
--- 
a/i18n/zh-CN/docusaurus-plugin-content-docs/version-2.1/install/deploy-on-kubernetes/install-config-cluster.md
+++ 
b/i18n/zh-CN/docusaurus-plugin-content-docs/version-2.1/install/deploy-on-kubernetes/install-config-cluster.md
@@ -903,3 +903,26 @@ spec:
 2. 更新 `fe-configmap` 里面指定的 FE 服务启动配置。  
   当更新 `fe-configmap` 中 key 为 `fe.conf` 对应的值( FE 服务的启动配置)后,Doris Operator 
自动滚动重启 FE 服务使配置生效。
 
+## 使用 Kerberos 认证
+Doris Operator 从 25.2.0 版本开始支持 Doris (2.1.9 和 3.0.4 及以后版本) 在 Kubernetes 使用 
Kerberos 认证。 Doris 使用 Kerberos 认证需要使用 
[krb5.conf](https://web.mit.edu/kerberos/krb5-1.12/doc/admin/conf_files/krb5_conf.html)
 和 [keytab 
文件](https://web.mit.edu/Kerberos/krb5-1.16/doc/basic/keytab_def.html) 。
+Doris Operator 使用 `ConfigMap` 资源挂载 krb5.conf 文件,使用 `Secret` 资源挂载 keytab 文件。使用 
Kerberos 认证流程如下:
+1. 构建包含 krb5.conf 文件的 ConfigMap:
+    ```shell
+    kubectl create -n ${namespace} create configmap ${name} 
--from-file=krb5.conf
+    ```
+    ${namespace} 为 `DorisCluster` 部署的命名空间,${name} 为 ConfigMap 想要指定的名字。
+2. 构建包含 keytab 的 Secret:
+    ```shell
+    kubectl create -n ${namespace} secret generic ${name} --from-file= 
${xxx.keytab}
+    ```
+    ${namespace} 为 `DorisCluster` 部署的命名空间,${name} 为 Secret 想要指定的名字,如果需要挂载多个 
`keytab` 文件,请参考 [kubectl 创建 Secret 
文档](https://kubernetes.io/docs/reference/kubectl/generated/kubectl_create/kubectl_create_secret/)将多个
 `keytab` 文件放到一个 Secret 中。
+3. 配置 DorisCluster 资源,指定包含 `krb5.conf` 的 ConfigMap, 以及包含 `keytab` 文件的 Secret。
+    ```yaml
+    spec:
+      kerberosInfo:
+        krb5ConfigMap: ${krb5ConfigMapName}
+        keytabSecretName: ${keytabSecretName}
+        keytabPath: ${keytabPath}
+    ```
+    ${krb5ConfigMapName} 为包含要使用的 `krb5.conf` 文件的 ConfigMap 
名称。${keytabSecretName} 为包含 keytab 文件的 Secret 名称。${keytabPath} 为 Secret 
希望挂载到容器中的路径,这个路径是创建 catalog 时,通过 `hadoop.kerberos.keytab` 指定 keytab 的文件所在目录。创建
+      atalog 请参考配置 [Hive 
Catalog](../../lakehouse/datalake-analytics/hive.md#catalog-配置) 文档。
diff --git 
a/i18n/zh-CN/docusaurus-plugin-content-docs/version-3.0/install/deploy-on-kubernetes/integrated-storage-compute/install-config-cluster.md
 
b/i18n/zh-CN/docusaurus-plugin-content-docs/version-3.0/install/deploy-on-kubernetes/integrated-storage-compute/install-config-cluster.md
index 08f7385f7d4..ed840d21f83 100644
--- 
a/i18n/zh-CN/docusaurus-plugin-content-docs/version-3.0/install/deploy-on-kubernetes/integrated-storage-compute/install-config-cluster.md
+++ 
b/i18n/zh-CN/docusaurus-plugin-content-docs/version-3.0/install/deploy-on-kubernetes/integrated-storage-compute/install-config-cluster.md
@@ -924,4 +924,28 @@ spec:
 ```
 2. 更新 `fe-configmap` 里面指定的 FE 服务启动配置。
 
-当更新 `fe-configmap` 中 key 为 `fe.conf` 对应的值 (为 FE 服务的启动配置) 后,Doris Operator 
自动滚动重启 FE 服务使配置生效。
\ No newline at end of file
+当更新 `fe-configmap` 中 key 为 `fe.conf` 对应的值 (为 FE 服务的启动配置) 后,Doris Operator 
自动滚动重启 FE 服务使配置生效。
+
+## 使用 Kerberos 认证
+Doris Operator 从 25.2.0 版本开始支持 Doris (2.1.9 和 3.0.4 及以后版本) 在 Kubernetes 使用 
Kerberos 认证。 Doris 使用 Kerberos 认证需要使用 
[krb5.conf](https://web.mit.edu/kerberos/krb5-1.12/doc/admin/conf_files/krb5_conf.html)
 和 [keytab 
文件](https://web.mit.edu/Kerberos/krb5-1.16/doc/basic/keytab_def.html) 。
+Doris Operator 使用 `ConfigMap` 资源挂载 krb5.conf 文件,使用 `Secret` 资源挂载 keytab 文件。使用 
Kerberos 认证流程如下:
+1. 构建包含 krb5.conf 文件的 ConfigMap:
+    ```shell
+    kubectl create -n ${namespace} create configmap ${name} 
--from-file=krb5.conf
+    ```
+   ${namespace} 为 `DorisCluster` 部署的命名空间,${name} 为 ConfigMap 想要指定的名字。
+2. 构建包含 keytab 的 Secret:
+    ```shell
+    kubectl create -n ${namespace} secret generic ${name} --from-file= 
${xxx.keytab}
+    ```
+   ${namespace} 为 `DorisCluster` 部署的命名空间,${name} 为 Secret 想要指定的名字,如果需要挂载多个 
`keytab` 文件,请参考 [kubectl 创建 Secret 
文档](https://kubernetes.io/docs/reference/kubectl/generated/kubectl_create/kubectl_create_secret/)将多个
 `keytab` 文件放到一个 Secret 中。
+3. 配置 DorisCluster 资源,指定包含 `krb5.conf` 的 ConfigMap, 以及包含 `keytab` 文件的 Secret。
+    ```yaml
+    spec:
+      kerberosInfo:
+        krb5ConfigMap: ${krb5ConfigMapName}
+        keytabSecretName: ${keytabSecretName}
+        keytabPath: ${keytabPath}
+    ```
+   ${krb5ConfigMapName} 为包含要使用的 `krb5.conf` 文件的 ConfigMap 
名称。${keytabSecretName} 为包含 keytab 文件的 Secret 名称。${keytabPath} 为 Secret 
希望挂载到容器中的路径,这个路径是创建 catalog 时,通过 `hadoop.kerberos.keytab` 指定 keytab 的文件所在目录。创建
+   catalog 请参考配置 [Hive 
Catalog](../../../lakehouse/datalake-analytics/hive.md#catalog-配置) 文档。
diff --git 
a/versioned_docs/version-2.1/install/deploy-on-kubernetes/install-config-cluster.md
 
b/versioned_docs/version-2.1/install/deploy-on-kubernetes/install-config-cluster.md
index c7171af715d..e2d634913c2 100644
--- 
a/versioned_docs/version-2.1/install/deploy-on-kubernetes/install-config-cluster.md
+++ 
b/versioned_docs/version-2.1/install/deploy-on-kubernetes/install-config-cluster.md
@@ -517,7 +517,7 @@ mysql -h 
ac4828493dgrftb884g67wg4tb68gyut-1137856348.us-east-1.elb.amazonaws.com
 ```
 
 ## Configuring the username and password for the management cluster
-Managing Doris nodes requires connecting to the live FE nodes via the MySQL 
protocol using a username and password for administrative operations. Doris 
implements [a permission management mechanism similar to RBAC]( 
../../admin-manual/auth/authentication-and-authorization), where the user must 
have the 
[Node_priv](../../admin-manual/auth/authentication-and-authorization#Types of 
Permissions) permission to perform node management. By default, the Doris 
Operator deploys the cluster with th [...]
+Managing Doris nodes requires connecting to the live FE nodes via the MySQL 
protocol using a username and password for administrative operations. Doris 
implements [a permission management mechanism similar to RBAC]( 
../../admin-manual/auth/authentication-and-authorization), where the user must 
have the 
[Node_priv](../../admin-manual/auth/authentication-and-authorization.md#types-of-permissions)
 permission to perform node management. By default, the Doris Operator deploys 
the cluster with [...]
 
 The process of configuring the username and password can be divided into three 
scenarios:  
 - initializing the root user password during cluster deployment;
@@ -664,7 +664,7 @@ After deployment, please set the root password. Doris 
Operator will switch to us
 :::
 
 ### Setting the root user password after cluster deployment
-After deploying the Doris cluster and setting the root user's password, it's 
essential to create a management user with the necessary 
[Node_priv](../../admin-manual/auth/authentication-and-authorization#Types of 
Permissions) permission to allow Doris Operator to automatically manage the 
cluster nodes. Using the root user for this purpose is not recommended. 
Instead, please refer to [the User Creation and Permission Assignment 
Section](../../sql-manual/sql-statements/account-management/CR [...]
+After deploying the Doris cluster and setting the root user's password, it's 
essential to create a management user with the necessary 
[Node_priv](../../admin-manual/auth/authentication-and-authorization.md#types-of-permissions)
 permission to allow Doris Operator to automatically manage the cluster nodes. 
Using the root user for this purpose is not recommended. Instead, please refer 
to [the User Creation and Permission Assignment 
Section](../../sql-manual/sql-statements/account-management [...]
 
 #### Step 1: Create a user with Node_priv permission
 First, connect to the Doris database using the MySQL protocol, then create a 
new user with the required permissions:
@@ -749,3 +749,27 @@ Support configmap monitoring and restart for FE and BE, 
Use FE usage as example.
     ```
 2. Update FE service configurations.  
    When modifying values under the `fe.conf` key in the fe-configmap ConfigMap 
(containing FE service configurations), Doris Operator will automatically 
perform a rolling restart of FE services to apply changes.
+
+## Using Kerberos Authentication
+The Doris Operator has supported Kerberos authentication for Doris (versions 
2.1.9, 3.0.4, and later) in Kubernetes since version 25.2.0. To enable Kerberos 
authentication in Doris, both the [krb5.conf 
file](https://web.mit.edu/kerberos/krb5-1.12/doc/admin/conf_files/krb5_conf.html)
 and [keytab 
files](https://web.mit.edu/Kerberos/krb5-1.16/doc/basic/keytab_def.html) are 
required.
+The Doris Operator mounts the krb5.conf file using a ConfigMap resource and 
mounts the keytab files using a Secret resource. The workflow for enabling 
Kerberos authentication is as follows:
+
+1. Create a ConfigMap containing the krb5.conf file:
+    ```shell
+    kubectl create -n ${namespace} configmap ${name} --from-file=krb5.conf
+    ```
+    Replace ${namespace} with the namespace where the DorisCluster is 
deployed, and ${name} with the desired name for the ConfigMap.
+2. Create a Secret containing the keytab files:
+    ```shell
+    kubectl create -n ${namespace} secret generic ${name} 
--from-file=${xxx.keytab}
+    ```
+    Replace ${namespace} with the namespace where the DorisCluster is 
deployed, and ${name} with the desired name for the Secret. If multiple keytab 
files need to be mounted, refer to the [kubectl create Secret 
documentation](https://kubernetes.io/docs/reference/kubectl/generated/kubectl_create/kubectl_create_secret/)
 to include them in a single Secret.
+3. Configure the DorisCluster resource to specify the ConfigMap containing 
krb5.conf and the Secret containing keytab files:
+    ```yaml
+    spec:
+      kerberosInfo:
+        krb5ConfigMap: ${krb5ConfigMapName}
+        keytabSecretName: ${keytabSecretName}
+        keytabPath: ${keytabPath}
+    ```
+    ${krb5ConfigMapName}: Name of the ConfigMap containing the krb5.conf file. 
${keytabSecretName}: Name of the Secret containing the keytab files. 
${keytabPath}: The directory path in the container where the Secret mounts the 
keytab files. This path should match the directory specified by 
hadoop.kerberos.keytab when creating a catalog. For catalog configuration 
details, refer to the [Hive Catalog 
configuration](../../lakehouse/datalake-analytics/hive.md#catalog-configuration)
 documentation.
diff --git 
a/versioned_docs/version-3.0/install/deploy-on-kubernetes/integrated-storage-compute/install-config-cluster.md
 
b/versioned_docs/version-3.0/install/deploy-on-kubernetes/integrated-storage-compute/install-config-cluster.md
index 867b433ca27..d77d566c564 100644
--- 
a/versioned_docs/version-3.0/install/deploy-on-kubernetes/integrated-storage-compute/install-config-cluster.md
+++ 
b/versioned_docs/version-3.0/install/deploy-on-kubernetes/integrated-storage-compute/install-config-cluster.md
@@ -751,3 +751,27 @@ Support configmap monitoring and restart for FE and BE, 
Use FE usage as example.
     ```
 2. Update FE service configurations.  
    When modifying values under the `fe.conf` key in the fe-configmap ConfigMap 
(containing FE service configurations), Doris Operator will automatically 
perform a rolling restart of FE services to apply changes.
+
+## Using Kerberos Authentication
+The Doris Operator has supported Kerberos authentication for Doris (versions 
2.1.9, 3.0.4, and later) in Kubernetes since version 25.2.0. To enable Kerberos 
authentication in Doris, both the [krb5.conf 
file](https://web.mit.edu/kerberos/krb5-1.12/doc/admin/conf_files/krb5_conf.html)
 and [keytab 
files](https://web.mit.edu/Kerberos/krb5-1.16/doc/basic/keytab_def.html) are 
required.
+The Doris Operator mounts the krb5.conf file using a ConfigMap resource and 
mounts the keytab files using a Secret resource. The workflow for enabling 
Kerberos authentication is as follows:
+
+1. Create a ConfigMap containing the krb5.conf file:
+    ```shell
+    kubectl create -n ${namespace} configmap ${name} --from-file=krb5.conf
+    ```
+   Replace ${namespace} with the namespace where the DorisCluster is deployed, 
and ${name} with the desired name for the ConfigMap.
+2. Create a Secret containing the keytab files:
+    ```shell
+    kubectl create -n ${namespace} secret generic ${name} 
--from-file=${xxx.keytab}
+    ```
+   Replace ${namespace} with the namespace where the DorisCluster is deployed, 
and ${name} with the desired name for the Secret. If multiple keytab files need 
to be mounted, refer to the [kubectl create Secret 
documentation](https://kubernetes.io/docs/reference/kubectl/generated/kubectl_create/kubectl_create_secret/)
 to include them in a single Secret.
+3. Configure the DorisCluster resource to specify the ConfigMap containing 
krb5.conf and the Secret containing keytab files:
+    ```yaml
+    spec:
+      kerberosInfo:
+        krb5ConfigMap: ${krb5ConfigMapName}
+        keytabSecretName: ${keytabSecretName}
+        keytabPath: ${keytabPath}
+    ```
+   ${krb5ConfigMapName}: Name of the ConfigMap containing the krb5.conf file. 
${keytabSecretName}: Name of the Secret containing the keytab files. 
${keytabPath}: The directory path in the container where the Secret mounts the 
keytab files. This path should match the directory specified by 
hadoop.kerberos.keytab when creating a catalog. For catalog configuration 
details, refer to the [Hive Catalog 
configuration](../../../lakehouse/datalake-analytics/hive.md#catalog-configuration)
 documentation.


---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscr...@doris.apache.org
For additional commands, e-mail: commits-h...@doris.apache.org

Reply via email to