Skip to main content

Security

The following section describes the main security aspects that can help you to secure an HBase cluster running on Amazon EMR.

Authentication

By default when launching an Amazon EMR cluster with HBase installed, the service will configure HBase without enabling any type of authentication. This allows every client connecting to HBase to read / write tables stored in the cluster without the need to provide any credentials. In this context it is a best practice to limit access to the cluster by scoping access to the cluster using firewalls or EMR Security Groups attached to the cluster. For more details see Networking

However, if you require to enable a strong authentication system, you can use Kerberos authentication to secure your cluster. HBase implements the Simple Authentication and Security Layer (SASL) at the RPC level, that will handle authentication and encryption negotiation for each connection established with the service.

Amazon EMR automatically configures HBase with the required configurations when you launch a cluster with a Security Configuration where Kerberos authentication is enabled. The following highlights the main HBase configurations set by the service when launching an EMR cluster with Kerberos enabled (generated using Amazon EMR 6.9.0):

ConfigurationValue
hbase.security.authenticationkerberos
hbase.security.authorizationtrue
hbase.master.kerberos.principalhbase/_HOST@<YOUR_KERBEROS_REALM>
hbase.master.keytab.file/etc/hbase.keytab
hbase.regionserver.kerberos.principalhbase/_HOST@<YOUR_KERBEROS_REALM>
hbase.regionserver.keytab.file/etc/hbase.keytab
hbase.thrift.kerberos.principalhbase/_HOST@<YOUR_KERBEROS_REALM>
hbase.thrift.keytab.file/etc/hbase.keytab
hbase.thrift.security.qopauth
hbase.rest.authentication.typekerberos
hbase.rest.authentication.kerberos.principalHTTP/_HOST@<YOUR_KERBEROS_REALM>
hbase.rest.authentication.kerberos.keytab/etc/hbase.keytab
hbase.rest.kerberos.principalhbase/_HOST@<YOUR_KERBEROS_REALM>
hbase.rest.keytab.file/etc/hbase.keytab
hbase.rest.support.proxyusertrue
hadoop.proxyuser.hbase.groups*
hadoop.proxyuser.hbase.hosts*

To launch an EMR cluster with Kerberos Authentication, please refer to Configuring Kerberos on Amazon EMR

Authorization

Once the users are authenticated through Kerberos, we can now implement our Authorization policies to allow restricted access for specific user to our tables. To enable this functionality, it’s required to enable the Access Controller Coprocessor, by adding additional configurations when launching the EMR cluster. Below an example EMR configuration:

[
{
"Classification": "hbase-site",
"Properties": {
"hbase.coprocessor.master.classes": "org.apache.hadoop.hbase.security.access.AccessController",
"hbase.coprocessor.region.classes": "org.apache.hadoop.hbase.security.token.TokenProvider,org.apache.hadoop.hbase.security.access.AccessController",
"hbase.security.authorization": "true",
"hbase.security.exec.permission.checks": "true"
}
}
]

In order to grant permissions to specific users in the cluster, you must define the ACL policies using the hbase admin user. For example, the below command add the READ('R'), WRITE('W'), EXEC('X'), CREATE('C'), ADMIN('A') permissions to the hadoop user:

sudo -s
kdestroy
kinit hbase/`hostname -f`@YOUR_KERBEROS_REALM -k -t /etc/hbase.keytab
hbase shell
grant 'hadoop', 'RWXCA'

For additional details, please see the Administration section in official HBase documentation.

Networking

It’s always a good practice to restrict network access to the cluster to reduce the exposure of the services to external attacks. When using Amazon EMR, you can specify additional Security Groups attached to the cluster to enable network communication with the cluster from pre-defined ranges of IPs or other AWS Security Groups. The tables below provides HBase ports you can control in the EMR Security Groups to allow interactions with trusted parties.

For additional information see Control network traffic with security groups in the EMR documentation.

HBase Services

PortSecurity GroupDescription
2181 / TCPMasterZookeeper client port
16000 / TCPMasterHMaster
16020 / TCPCore & TaskRegion Server
8070 / TCPMasterREST server
9090 / TCPMasterThrift Server

HBase Web UI

PortSecurity GroupDescription
16010 / TCPMasterHMaster Web UI
16030 / TCPCore & TaskRegion Server Web UI
8085 / TCPMasterREST Server UI
9095 / TCPMasterThrift Server UI