• MapReduce Service

mrs
  1. Help Center
  2. MapReduce Service
  3. User Guide
  4. Management of Clusters with Kerberos Authentication Enabled
  5. Default Users of Clusters with Kerberos Authentication Enabled

Default Users of Clusters with Kerberos Authentication Enabled

User Classification

The MRS cluster provides the following three types of users. Users are required to periodically change the passwords. It is not recommended to use the default passwords.

User Type

Description

System user

  • A user created on MRS Manager for MRS cluster O&M and service scenarios. There are two types of users:
    • Human-machine user: used for MRS Manager O&M scenarios and component client operation scenarios.
    • Machine-machine user: used for MRS cluster application development scenarios.
  • A user used to run OMS system processes.

Internal system user

An internal user provided by the MRS cluster and used to implement communication between processes, save user group information, and associate user rights.

Database user

  • A user used to manage the OMS database and access data.
  • A user used to run the database of service components (Hive, Hue, Loader and DBService).

System Users

NOTE:
  • User ldap of the OS is required in the MRS cluster. Do not delete the account. Otherwise, the cluster may not work properly. Password management policies are maintained by the users.
  • Reset the password when you change the passwords of user ommdba and user omm for the first time. Change the passwords regularly after you have retrieved them.

Type

Username

Initial Password

Description

MRS cluster system user

admin

Specified by the user when the cluster is created

Administrator of MRS Manager.

This user also has the following rights:

  • Common HDFS and ZooKeeper user rights.
  • Rights to submit and query MapReduce and Yarn tasks, to manage Yarn queues, and to access Yarn WebUI.
  • Rights to submit, query, activate, deactivate, reassign, delete topologies, and operate all topologies of the Storm service.
  • Rights to create, delete, authenticate, reassign, consume, write, and query topics of the Kafka service.

MRS cluster node OS user

ommdba

Randomly generated by the system

User who creates the MRS cluster system database. This user is an OS user generated on the management nodes and does not require a unified password.

omm

Randomly generated by the system

Internal running user of the MRS cluster system. This user is an OS user generated on all nodes and does not require a unified password.

User for running MRS cluster jobs

yarn_user

Randomly generated by the system

Internal user used to run the MRS cluster jobs. This user is generated on Core nodes.

Internal System Users

NOTE:

Do not delete the following internal system users. Otherwise, the cluster or services may not work properly.

Type

Default User

Initial Password

Description

Kerberos administrator

kadmin/admin

Admin@123

Account that is used to add, delete, modify, and query users on Kerberos.

OMS Kerberos administrator

kadmin/admin

Admin@123

Account that is used to add, delete, modify, and query users on OMS Kerberos.

LDAP administrator

cn=root,dc=hadoop,dc=com

LdapChangeMe@123

Account that is used to add, delete, modify, and query the user information on LDAP.

OMS LDAP administrator

cn=root,dc=hadoop,dc=com

LdapChangeMe@123

Account that is used to add, delete, modify, and query the user information on OMS LDAP.

LDAP user

cn=pg_search_dn,ou=Users,dc=hadoop,dc=com

pg_search_dn@123

User that is used to query information about users and user groups on LDAP.

OMS LDAP user

cn=pg_search_dn,ou=Users,dc=hadoop,dc=com

pg_search_dn@123

User that is used to query information about users and user groups on OMS LDAP.

LDAP administrator account

cn=krbkdc,ou=Users,dc=hadoop,dc=com

LdapChangeMe@123

Account that is used to query Kerberos component authentication account information.

cn=krbadmin,ou=Users,dc=hadoop,dc=com

LdapChangeMe@123

Account that is used to add, delete, or query Kerberos component authentication account information.

User for querying the MRS cluster

executor

Randomly generated by the system

User that is used to query clusters with Kerberos authentication enabled on the MRS management console.

Component running user

hdfs

Hdfs@123

HDFS system administrator who has the following permission:

  1. File system operation permission:
    • Views, modifies, and creates files.
    • Views and creates directories.
    • Views and modifies the groups where files belong.
    • Views and sets disk quotas of users
  1. HDFS management operation permission:
    • Views the WebUI status.
    • Views and sets the active and standby HDFS status.
    • Enters and exits HDFS in security mode.
    • Checks HDFS.

hbase

Hbase@123

HBase system administrator who has the following permission:

  • Cluster management permission: Enables and disables tables, and triggers MajorCompact and Access Control List (ACL).
  • Grants and reclaims permission, and shuts down the cluster.
  • Table management permission: Creates, modifies, and deletes tables.
  • Data management permission: Reads and writes table-, column family-, and column-level data.
  • Accesses the HBase WebUI.

mapred

Mapred@123

MapReduce system administrator who has the following permission:

  • Submits, stops, and views MapReduce tasks.
  • Modifies the Yarn configuration parameters.
  • Accesses the Yarn and MapReduce WebUI.

spark

Spark@123

Spark system administrator who has the following permission:

  • Accesses the Spark WebUI.
  • Submits Spark tasks.

oms/manager

Randomly generated by the system

Controller and NodeAgent authentication user who has the permission of supergroup

backup/manager

Randomly generated by the system

User who runs backup and recovery tasks and has the permission of supergroup

hdfs/hadoop.hadoop.com

Randomly generated by the system

HDFS system startup user who has the following permission:

  1. File system operation permission:
    • Views, modifies, and creates files.
    • Views and creates directories.
    • Views and modifies the groups where files belong.
    • Views and sets disk quotas of users.
  1. HDFS management operation permission:
    • Views the WebUI status.
    • Views and sets the active and standby HDFS status.
    • Enters and exits HDFS in security mode.
    • Checks HDFS.

mapred/hadoop.hadoop.com

Randomly generated by the system

MapReduce system startup user who has the following permission:

  • Submits, stops, and views MapReduce tasks.
  • Modifies the Yarn configuration parameters.

mr_zk/hadoop.hadoop.com

Randomly generated by the system

User used for MapReduce to access ZooKeeper

hbase/hadoop.hadoop.com

Randomly generated by the system

User used for the authentication between internal components during the HBase system startup

hbase/zkclient.hadoop.com

Randomly generated by the system

User used for HBase to perform ZooKeeper authentication in a cluster in security mode

thrift/hadoop.hadoop.com

Randomly generated by the system

ThriftServer system startup user

thrift/<hostname>

Randomly generated by the system

User used for the ThriftServer system to access HBase. This user has the permission to read, write, execute, create, and manage all HBase NameSpaces and tables. <hostname> specifies the host name of the node where ThriftServer is installed.

hive/hadoop.hadoop.com

Randomly generated by the system

User used for the authentication between internal components during the Hive system startup. The user has the following permission:

  1. Hive administrator permission:
    • Creates, deletes, and modifies databases.
    • Creates, queries, modifies, and deletes tables.
    • Queries, inserts, and loads data.
  2. HDFS file operation permission:
    • Views, modifies, and creates files.
    • Views and creates directories.
    • Views and modifies the groups where files belong.
  3. Submits and stops MapReduce jobs.

spark/hadoop.hadoop.com

Randomly generated by the system

Spark system startup user

spark_zk/hadoop.hadoop.com

Randomly generated by the system

User used for Spark to access ZooKeeper

zookeeper/hadoop.hadoop.com

Randomly generated by the system

ZooKeeper system startup user

zkcli/hadoop.hadoop.com

Randomly generated by the system

ZooKeeper server login user

kafka/hadoop.hadoop.com

Randomly generated by the system

User used for security authentication for Kafka.

storm/hadoop.hadoop.com

Randomly generated by the system

Storm system startup user.

storm_zk/hadoop.hadoop.com

Randomly generated by the system

User for the Worker process to access ZooKeeper.

loader/hadoop.hadoop.com

Randomly generated by the system

User for Loader system startup and Kerberos authentication.

HTTP/<hostname>

Randomly generated by the system

Used to connect to the HTTP interface of each component. <hostname> indicates the name of the node in the cluster.

flume

Randomly generated by the system

User for Flume system startup and HDFS and Hive access. The user has read and write permission of the HDFS directory /flume.

check_ker_M

Randomly generated by the system

Kerberos internal functional user. This user cannot be deleted, and its password cannot be changed. This internal account cannot be used on the nodes where Kerberos service is not installed.

K/M

Randomly generated by the system

kadmin/changepw

Randomly generated by the system

kadmin/history

Randomly generated by the system

krbtgt/HADOOP.COM

Randomly generated by the system

User Group Information

Default User Group

Description

hadoop

Users added to this user group have the permission to submit tasks to all Yarn queues.

hbase

Common user group. Users added to this user group will not have any additional rights.

hive

Users added to this user group can use Hive.

spark

Common user group. Users added to this user group will not have any additional rights.

supergroup

Users added to this user group can have the administrator rights of HBase, HDFS, and Yarn and can use Hive.

check_sec_ldap

Used to test whether the active LDAP works properly. This user group is generated randomly in a test and automatically deleted after the test is complete. This is an internal system user group used only between components.

Manager_tenant_187

Tenant system user group. This is an internal system user group used only between components.

System_administrator_186

MRS cluster system administrator group. This is an internal system user group used only between components.

Manager_viewer_183

MRS Manager system viewer group. This is an internal system user group used only between components.

Manager_operator_182

MRS Manager system operator group. This is an internal system user group used only between components.

Manager_auditor_181

MRS Manager system auditor group. This is an internal system user group used only between components.

Manager_administrator_180

MRS Manager system administrator group. This is an internal system user group used only between components.

compcommon

MRS cluster internal group for accessing public cluster resources. All system users and system running users are added to this user group by default.

default_1000

This group is created for tenants. Internal system user group, which is used only between components.

kafka

Kafka common user group. A user added to this user group can access a topic only when a user in the kafkaadmin group grants the read and write permission of the topic to the user.

kafkasuperuser

Users added to this user group have the read and write permission of all topics.

kafkaadmin

Kafka administrator group. Users added to this user group have the rights to create, delete, authorize, read, and write all topics.

storm

Users added to this user group can submit topologies and manage their own topologies.

stormadmin

Users added to this user group can have the storm administrator rights and can submit topologies and manage all topologies.

OS User Group

Description

wheel

Primary group of MRS internal running user omm

ficommon

MRS cluster common group that corresponds to compcommon for accessing public cluster resource files stored in the OS

Database Users

MRS cluster system database users contain OMS database users and DBService database users.

NOTE:

Do not delete the following database users. Otherwise, the cluster or services may not work properly.

Type

Default User

Initial Password

Description

OMS database

ommdba

dbChangeMe@123456

OMS database administrator who performs maintenance operations, such as creating, starting, and stopping applications

omm

ChangeMe@123456

User used for accessing OMS database data

DBService database

omm

dbserverAdmin@123

Administrator of the GaussDB database in the DBService component

hive

HiveUser@

User used for Hive to connect to the DBService database

hue

HueUser@123

User used for Hue to connect to the DBService database

sqoop

SqoopUser@

User for Loader to connect to the DBService database