Configuring Secure Clusters for Cross-Cluster NFS Access

Describes how to manually set up cross-cluster NFS access.

MapR-NFS offers many usability and interoperability advantages to the customer, and makes big data radically easier and less expensive to use. In a secure environment, however, you must configure NFS carefully because the NFS protocol is inherently insecure. Running the NFS server on any cluster node might expose the filesystem to be world readable and writeable to any machine that knows the IP address of the cluster node running the NFS server and has access to the network, regardless of the permissions, passwords and other security mechanisms. At the minimum, you should configure iptables firewall rules for all the cluster nodes where the NFS server is running, to restrict incoming NFS traffic to authorized client IP addresses.

Configuring cross-cluster NFS access might expose the entire filesystem of the other cluster to be world readable and writeable as well. Therefore, automated configuration for cross-cluster NFS access is not available with the utility. You should manually configure cross-cluster NFS access only if you are fully aware of the security risks, and taken appropriate steps to mitigate the risks by securing both your NFS gateway, and incoming client traffic.

This section describes the manual configuration process on a secure cluster for accessing another secure cluster using NFS. There are two methods by which an NFS client can access file systems from multiple clusters:
  1. Run the NFS server on one cluster.

    For this method, configure cross-cluster NFS security for the NFS gateway on one cluster, so that the NFS client can mount the mapr filesystem once from the NFS gateway, and then access the file systems for both clusters.

  2. Run the NFS server on both clusters.

    For this method, cross-cluster NFS configuration is not needed. The NFS client can mount the MapR filesystem individually for each cluster. This method requires that the NFS gateway to be run on each cluster, and the client performs one NFS mount for each NFS filesystem to be accessed.

The following procedure describes how to setup NFS for the first method:

  1. Log in to any node on the secure cluster where the NFS server is running.
    In the rest of this procedure, this cluster is referred to as and the remote cluster is referred to as
  2. Set up the /opt/mapr/conf/maprserverticket file on to include the server ticket from To set up:
    1. Copy the /opt/mapr/conf/maprserverticket file from any node on to any directory on the node you are logged into on
    2. Append maprserverticket entry in the maprserverticket file from to the /opt/mapr/conf/maprserverticket file on the node you are logged into on
      Note: If you configured cross-cluster security either automatically using the utility or manually before, there can be multiple entries in the maprserverticket file; copy the first entry with the alias matching the remote cluster name.
      For example, to add maprserverticket of into the /opt/mapr/conf/maprserverticket file of, run the following command:
      cat /tmp/remoteclusterticketfile | grep | head --lines=+1 >> /opt/mapr/conf/maprserverticket
    3. Copy the /opt/mapr/conf/maprserverticket file (on the node you are logged into in to all the other nodes running NFS server on
  3. Verify data access on both clusters using NFS.
    Users with access to the NFS servers must be able to access data in both clusters by providing the correct path. For example, users with NFS server access can verify access by running commands similar to the following:
    # ls /mapr
    # ls /mapr/
    apps  file  CLUSTERB hbase  opt  tmp  user  var