Configuring Hue's Hbase Application

by Community Manager on ‎08-20-2015 01:06 PM - edited on ‎08-20-2015 01:07 PM by Community Manager

Symptoms:   Hue HBase application does not show any tables when Kerberos is enabled.

 

  1. Go to the Hbase Service > Instances. If there is not an HBase Thrift Server instance, click Add Role Instance and follow the wizard to add an HBase Thrift Server Role Instance.
  2. Go to Hue service > Configuration > Service-Wide and check that HBase Service and HBase Thrift Server both have an appropriate instance selected and that it is not None.
  3. If not using Kerberos skip to step 4 below.  Otherwise, set HBase Thrift Authentication

Setting HBase Thrift Authentication

hbase.thrift.security.qop must be set to one of the following for Kerberos:

Note: None is not a valid setting.

  1. Go to Hbase service > Configuration > Service-Wide / Security : HBase Thrift Authentication and select one of the following options:
  • auth-conf: authentication, integrity and confidentiality checking
  • auth-int: authentication and integrity checking
  • auth: authentication only
Note: Integrity implies a validation that data was not changed in transit; confidentiality enables encryption.
Note: This should not be required if the Kerberos Security Wizard was used to enable Kerberos for the cluster. 
Review the configuration in the  Cloudera Security Guide section titled, "To enable HBase Security".
  1. ​Starting in CDH 5.4, HBase now supports Impersonation.  If you are not using Impersonation then skip to the next step. If you are using Impersonation,  navigate to Cloudera Manager and check the following boxes:
    • HBase service > Configuration > Service-Wide : Enable HBase Thrift Http Server
    • HBase service > Configuration > Service-Wide : Enable HBase Thrift Proxy Users
  2. Verify HBase allows proxy users using the following steps:
    1. Navigate to the directory /var/run/cloudera-scm-agent/process/<id>-hbase-HBASETHRIFTSERVER
    2. View or edit the core-site.xml and verify the following properties are set with the asterisk "*":
      • ​​hadoop.proxyuser.hue.hosts
      • hadoop.proxyuser.hue.groups
  3. Navigate to Hue Service > Configuration > Service-Wide > Advanced > Hue Service Advanced Configuration Snippet (Safety Valve) for hue_safety_valve.ini
  4. Set the hbase_conf_dir to the Cloudera Manager auto replaced HBASE_CONF_DIR​​
​Example:
[hbase]
hbase_conf_dir={{HBASE_CONF_DIR}}
  1. Restart HBase and Hue.
  • If HBase has Authorization set to true, then appropriate grants must be made through the HBase shell.
  • If using CDH 5.4 and Impersonation, permissions must be granted per user and not to the hue user.
  • Prior to CDH 5.4 or if not using Impersonation, then the hue user will require grants for any permissions that users will need in the Hue HBase app.
  • Review this guide for information on grants and permissions.

 

NOTE: This article was taken from our internal Knowledge Base.  To access the original article please use the following link (customer login required):

 

Configuring Hue's HBase Application

Contributors
Disclaimer: The information contained in this article was generated by third-parties and not by Cloudera or it's personnel. Cloudera cannot guarantee its accuracy or efficacy. Cloudera disclaims all warranties of any kind and users of this information assume all risk associated with it and with following the advice or directions contained herein. By visiting this page, you agree to be bound by the Terms and Conditions of Site Usage , including all disclaimers and limitations contained therein.