Open
Conversation
idirze
approved these changes
Dec 17, 2025
idirze
approved these changes
Feb 9, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Trino TDP Integration
The steps to configure and deploy the necessary Kubernetes resources for integrating Trino with TDP, enabling support for Kerberos authentication, Hive, and HDFS query federation.
Prerequisites
Ensure you have the following files available in your
../tdp-clientdirectory. Note: Configuration files are auto-generated in the TDP environment.trino.keytab: Kerberos keytab for the Trino service principal.tdp_ca.crt: The CA certificate for the TDP cluster.core-site.xml,hdfs-site.xml,hive-site.xml) andkrb5.conf.1. Secrets Management
Run the following commands to create the required Kubernetes secrets. These secrets store sensitive authentication materials.
Create Trino Keytab Secret
Create CA Certificate Secret
Verification:
You can verify the secrets layout using
kubectl describe:2. Hadoop Client Configuration
The
hadoop-client-configConfigMap is essential for Trino to communicate with the HDFS and Hive Metastore services. It contains the standard Hadoop XML configuration files and the Kerberos configuration, which are auto-generated in the TDP client directory.Create ConfigMap
Navigate to the directory containing your configuration files (e.g.,
../tdp-client/hadoop-client) and run:3. Configuration Reference
Below are examples of the auto-generated configurations included in the
hadoop-client-configConfigMap. These are provided for reference.core-site.xml
Defines the default filesystem, Zookeeper quorum, and proxy user settings.
hdfs-site.xml
Configures HDFS High Availability (HA), NameNode RPC addresses, and Kerberos principals.
hive-site.xml
Configures the Hive Metastore connection and Thrift protocol.
krb5.conf
Standard Kerberos configuration for the TDP realm.