<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: How to prevent access to hive database via hivecontext? in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/How-to-prevent-access-to-hive-database-via-hivecontext/m-p/199583#M161616</link>
    <description>&lt;A rel="user" href="https://community.cloudera.com/users/44533/pee.html" nodeid="44533"&gt;@Pee Tankulrat&lt;/A&gt;&lt;P&gt;Yes, the policy usually denied all except when there's an access policy for it. This should be ok.&lt;/P&gt;</description>
    <pubDate>Wed, 07 Feb 2018 08:09:27 GMT</pubDate>
    <dc:creator>sandyy006</dc:creator>
    <dc:date>2018-02-07T08:09:27Z</dc:date>
    <item>
      <title>How to prevent access to hive database via hivecontext?</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-prevent-access-to-hive-database-via-hivecontext/m-p/199580#M161613</link>
      <description>&lt;P&gt;I've set up ranger on my cluster to enforce permission on databases. It works fantastically with ODBC connections. However, I also have a pyspark kernel for Jupyter Notebook running on the server, which completely bypass any policies applied i.e. by calling HiveContext any users access any database regardless of the permissions I setup on Ranger Hive.&lt;/P&gt;&lt;P&gt;Hive authorization is my primary goal but SparkContext on my Jupyter Notebook would be invaluable as well. Any pointers on how to set this up correctly is highly appreciated.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2018 12:34:31 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-prevent-access-to-hive-database-via-hivecontext/m-p/199580#M161613</guid>
      <dc:creator>pee</dc:creator>
      <dc:date>2018-02-01T12:34:31Z</dc:date>
    </item>
    <item>
      <title>Re: How to prevent access to hive database via hivecontext?</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-prevent-access-to-hive-database-via-hivecontext/m-p/199581#M161614</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/44533/pee.html" nodeid="44533"&gt;@Pee Tankulrat&lt;/A&gt;, As of now Spark will not honour hive acl's. One thing you can do is to add rules for the underlying HDFS directory of a hive db and precent users to access it. &lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2018 09:23:34 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-prevent-access-to-hive-database-via-hivecontext/m-p/199581#M161614</guid>
      <dc:creator>sandyy006</dc:creator>
      <dc:date>2018-02-02T09:23:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to prevent access to hive database via hivecontext?</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-prevent-access-to-hive-database-via-hivecontext/m-p/199582#M161615</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="56554-ranger.png" style="width: 1883px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/17629iB5A29561F1BBFCDC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="56554-ranger.png" alt="56554-ranger.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thank you &lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/18329"&gt;@Sandeep&lt;/a&gt; Nemuri for your tips. But, I went over to my Ranger's HDFS policy and saw that currently the users do not have direct access to the hive directory? As the policy is usually deny all except when there's an access policy for it?&lt;/P&gt;&lt;P&gt;Do I have to modify this policy?&lt;/P&gt;</description>
      <pubDate>Sun, 18 Aug 2019 05:53:11 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-prevent-access-to-hive-database-via-hivecontext/m-p/199582#M161615</guid>
      <dc:creator>pee</dc:creator>
      <dc:date>2019-08-18T05:53:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to prevent access to hive database via hivecontext?</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-prevent-access-to-hive-database-via-hivecontext/m-p/199583#M161616</link>
      <description>&lt;A rel="user" href="https://community.cloudera.com/users/44533/pee.html" nodeid="44533"&gt;@Pee Tankulrat&lt;/A&gt;&lt;P&gt;Yes, the policy usually denied all except when there's an access policy for it. This should be ok.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 08:09:27 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-prevent-access-to-hive-database-via-hivecontext/m-p/199583#M161616</guid>
      <dc:creator>sandyy006</dc:creator>
      <dc:date>2018-02-07T08:09:27Z</dc:date>
    </item>
    <item>
      <title>Re: How to prevent access to hive database via hivecontext?</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-prevent-access-to-hive-database-via-hivecontext/m-p/199584#M161617</link>
      <description>&lt;A rel="user" href="https://community.cloudera.com/users/44533/pee.html" nodeid="44533"&gt;@Pee Tankulrat&lt;/A&gt;&lt;P&gt;Also make sure that it is not failing back to POSIX permission.&lt;/P&gt;&lt;P&gt;Remove all POSIX permission from the directory using hdfs dfs -chmod&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 08:18:15 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-prevent-access-to-hive-database-via-hivecontext/m-p/199584#M161617</guid>
      <dc:creator>rpathak</dc:creator>
      <dc:date>2018-02-07T08:18:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to prevent access to hive database via hivecontext?</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-prevent-access-to-hive-database-via-hivecontext/m-p/199585#M161618</link>
      <description>&lt;P&gt;Thanks &lt;A rel="user" href="https://community.cloudera.com/users/10159/snemuri.html" nodeid="10159"&gt;@Sandeep Nemuri&lt;/A&gt; and &lt;A rel="user" href="https://community.cloudera.com/users/10322/rpathak.html" nodeid="10322"&gt;@Rahul Pathak&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I think the POSIX permission is most likely what's bypassing this. I'll give it a try and let you know again.&lt;/P&gt;&lt;P&gt;Since then I have spotted another problem with group policy in Ranger. &lt;/P&gt;&lt;P&gt;It appears that users' group doesn't seems to be working for us (allowing a group that the user is a member of, does not grant access). I've try setting hive group based policy (Authenticated with LDAP), but none seems to be working (User based policy works flawlessly). Am I missing anything?&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 09:56:05 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-prevent-access-to-hive-database-via-hivecontext/m-p/199585#M161618</guid>
      <dc:creator>pee</dc:creator>
      <dc:date>2018-02-07T09:56:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to prevent access to hive database via hivecontext?</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-prevent-access-to-hive-database-via-hivecontext/m-p/199586#M161619</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/44533/pee.html" nodeid="44533"&gt;@Pee Tankulrat&lt;/A&gt;, As Rahul mentioned you need to make sure that policy is not failing back to POSIX permission. And for group policy issue, you may ask another question with more details.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2018 13:53:39 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-prevent-access-to-hive-database-via-hivecontext/m-p/199586#M161619</guid>
      <dc:creator>sandyy006</dc:creator>
      <dc:date>2018-02-08T13:53:39Z</dc:date>
    </item>
  </channel>
</rss>

