<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Hadoop backup with distcp: org.apache.hadoop.security.AccessControlException: Permission denied: user=XXXX, access=EXECUTE in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Hadoop-backup-with-distcp-org-apache-hadoop-security/m-p/304086#M221878</link>
    <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/79706"&gt;@pazufst&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; How Ranger policies work for HDFS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Apache Ranger offers a federated authorization model for HDFS. Ranger plugin for HDFS checks for Ranger policies and if a policy exists, access is granted to user. If a policy doesn’t exist in Ranger, then Ranger would default to the native permissions model in HDFS (POSIX or HDFS ACL). This federated model is applicable for HDFS and Yarn service in Ranger.&lt;/P&gt;&lt;P&gt;For other services such as Hive or HBase, Ranger operates as the sole authorizer which means only Ranger policies are in effect.&lt;/P&gt;&lt;P&gt;The option for the fallback model is configured using a property in &lt;STRONG&gt;Ambari → Ranger → HDFS config → Advanced ranger-hdfs-security&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;xasecure.add-hadoop-authorization=true&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The federated authorization model enables to safely implement Ranger in an existing cluster without affecting jobs that rely on POSIX permissions to enable this option as the default model for all deployments.&lt;BR /&gt;&lt;FONT color="#FF6600"&gt;&lt;SPAN&gt;org.apache.hadoop.ipc.RemoteException(org.apache.hadoop.security.AccessControlException): Permission denied: user=XXXXX, access=READ,&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;inode="/user/.snapshot/user_201806150000":w93651:hdfs:drwx------&lt;/LI-CODE&gt;&lt;P&gt;Is self-explanatory does the user &lt;FONT color="#FF6600"&gt;w93651&lt;/FONT&gt; exist on both clusters with valid Kerberos tickets if the cluster is kerberized? Ensure the CROSS-REALM is configured and working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is your ranger managing the 2 clusters?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;HTH&lt;/P&gt;</description>
    <pubDate>Thu, 08 Oct 2020 17:52:36 GMT</pubDate>
    <dc:creator>Shelton</dc:creator>
    <dc:date>2020-10-08T17:52:36Z</dc:date>
  </channel>
</rss>

