Working with Storm Topologies
Also available as:
PDF

Accessing Event Logs on a Secure Cluster

If you want to view logs in secure mode, ensure that your browser is configured to use authentication with all supervisor nodes running logviewer. This process is similar to the process used to configure access to the Storm UI on a secure cluster (described in Configuring the Storm UI).

Add domains to the white list by setting network.negotiate-auth.trusted-uris to a comma-separated list containing one or more domain names and URLs. For example, the following steps configure Firefox to use authentication with two nodes:

  1. Go to the about:config configuration page.
  2. Search for the network.negotiate-auth.trusted-uris configuration option.
  3. Double-click on the option.
  4. An "Enter string value" dialog box opens.
  5. In this box, enter the values http://node1.example.com, http://node2.example.com.
  6. Click OK to finish.
  7. Close and relaunch the browser.

If your cluster is not managed by Ambari, refer to the UI/Logviewer section of Apache Storm security documentation for additional configuration guidelines.