• MapReduce Service

mrs
  1. Help Center
  2. MapReduce Service
  3. User Guide
  4. MRS Manager Operation Guide
  5. Accessing MRS Manager Supporting Kerberos Authentication

Accessing MRS Manager Supporting Kerberos Authentication

Scenario

After users create MRS clusters that support Kerberos authentication, they can manage running clusters on MRS Manager.

This section describes how to prepare a work environment on the public cloud platform for accessing MRS Manager.

Impact on the System

Site trust must be added to the browser when you access MRS Manager for the first time. Otherwise, MRS Manager cannot be accessed.

Prerequisites

You have obtained the password of user admin. The password of user admin is specified by the user during MRS cluster creation.

Procedure

  1. On the MRS management console, click Clusters.
  2. In the Active Clusters list, click the specified cluster name.

    Record AZVPC, and Floating IP Address of the cluster, and Default Security Group of the Master node.

  3. On the ECS management console, create a new ECS.

    • Ensure that AZVPC, and Security Group of the ECS are the same as those of the cluster to be accessed.
    • Select a Windows public image. For example, select the Enterprise_Windows_STD_2012R2_20170316-0(80GB) enterprise image.
    • For details about other parameter configurations, see Elastic Cloud Server User Guide > Getting Started > Creating an ECS.
    NOTE:

    If the security group of the ECS is different from Default Security Group of the Master node, you can modify the configuration using either of the following methods:

    • Change the security group of the ECS to the default security group of the Master node. For details, see Changing the Security Group in Elastic Cloud Server User Guide > Management > Modifying ECS Specifications.
    • Add two security group rules to the security groups of the Master node and Core node to ensure that the ECS can access the cluster and set the protocol to TCP. Set Port Range of the two rules to 28443 and 20009, respectively. For details, see Virtual Private Cloud User Guide > Security > Security Group > Adding a Security Group Rule.

  4. On the VPC management console, apply for an EIP and bind it to the ECS.

    See the Virtual Private Cloud User Guide > Network Components > EIP > Assigning an EIP and Binding It to an ECS).

  5. Log in to the ECS.

    The account, password, EIP, and security group configuration rules of the Windows system are required for logging in to the ECS. For details about how to log in to the ECS, see Elastic Cloud Server User Guide > Getting Started > Logging In to an ECS > Logging In to a Windows ECS Using a Password (MSTSC).

  6. On the Windows remote desktop, use your browser to access MRS Manager.

    For example, you can use Internet Explorer 11 in the Windows 2012 OS.

    In the browser address bar, enter https://Floating IP Address:28443/web. Enter the name and password of the MRS cluster user, for example, user admin.

    NOTE:
    • If you access MRS Manager with other MRS cluster usernames, change the password upon your first access. The new password must meet the requirements of the current password complexity policies. For details, contact the administrator.
    • By default, a user is locked after inputting an incorrect password five consecutive times. The user is automatically unlocked after 5 minutes.

  7. If you want to exit MRS Manager, move the cursor to  in the upper-right corner and click Log Out.

Related Operation

Configuring mapping between node names and IP addresses

  1. Log in to MRS Manager and click Host.

    Record the Host Name and OM IP Address of all nodes in a cluster.

  2. In the work environment, use Notepad to open the hosts file and add the mapping relationship between node names and IP addresses to the file.

    Each mapping relationship occupies an independent line. The following is an example:

    192.168.4.127 node-core-Jh3ER
    192.168.4.225 node-master2-PaWVE
    192.168.4.19 node-core-mtZ81
    192.168.4.33 node-master1-zbYN8
    192.168.4.233 node-core-7KoGY

    Save the configurations and exit.