<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: HBase Snapshotting Failed because of Failure to aquire SAS Token in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/HBase-Snapshotting-Failed-because-of-Failure-to-aquire-SAS/m-p/413395#M254046</link>
    <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/142251"&gt;@MintberryCrunch&lt;/a&gt;&amp;nbsp;FYI&lt;BR /&gt;&lt;BR /&gt;➤ In a Public Cloud Environment using Azure Operational Database (HBase), snapshot copy failures with a &lt;EM&gt;Permission denied&lt;/EM&gt; error while acquiring a SAS token for &lt;EM&gt;get-acl on /&lt;/EM&gt; typically stem from missing Access Control List (ACL) permissions on the root of the storage container, even if Azure Role-Based Access Control (RBAC) roles are correctly assigned.&lt;/P&gt;&lt;P&gt;➤ The &lt;EM&gt;AccessControlException&lt;/EM&gt; at the root directory (/) indicates the driver is attempting to validate permissions at the top level before proceeding with the operation.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;➤ Recommended Troubleshooting Steps&lt;BR /&gt;1. Grant the "Storage Blob Delegator" Role: Add this role to the Managed Identity used by the HBase service to ensure it can generate User Delegation SAS tokens.&lt;/P&gt;&lt;P&gt;2. Inspect ACLs via Storage Explorer: Use Azure Storage Explorer to right-click the root of the container and select Manage ACLs. Confirm the identity has at least Execute permissions.&lt;/P&gt;&lt;P&gt;3. Verify Firewall Settings: Confirm that "Allow trusted Microsoft services to access this storage account" is enabled in the Storage Account's Networking tab.&lt;/P&gt;&lt;P&gt;4. Check for Sticky Bits: Use the Azure CLI command &lt;EM&gt;az storage fs access show&lt;/EM&gt; to see if the sticky bit is enabled on the target path.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 23 Jan 2026 14:32:10 GMT</pubDate>
    <dc:creator>9een</dc:creator>
    <dc:date>2026-01-23T14:32:10Z</dc:date>
    <item>
      <title>HBase Snapshotting Failed because of Failure to aquire SAS Token</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HBase-Snapshotting-Failed-because-of-Failure-to-aquire-SAS/m-p/413360#M254032</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;lt;in a Public Cloud Environment in the Operational Database with Azure: Snapshots were failing.&lt;BR /&gt;The HBase-Service Command Tab showes that it occurs while copying a snapshot to another directory because it could not acquire a SAS token. (*)&lt;BR /&gt;Usually those errors are related to missing rights on Managed Identities.&amp;nbsp;&lt;BR /&gt;- But we double-checked all Azure Managed Identity IAMs and RBACs.&lt;BR /&gt;Sometimes the SAS-Token Failure is related to Kerberos which is disabled./&amp;gt;&lt;BR /&gt;&lt;BR /&gt;What could have gone wrong?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;(*):&lt;BR /&gt;Client.RangerRESTClient: ===&amp;gt;&amp;gt; RangerRESTClient.init() : Since mKeyStoreType is NULL, setting System default.&lt;/P&gt;&lt;P&gt;[mKeyStoreType=jks] Exception in thread "main" Failed to acquire a SAS token for get-acl on / due to org.apache.hadoop.security.AccessControlException: Permission denied. at org.apache.hadoop.fs.azurebfs.services.AbfsClient.appendSASTokenToQuery(AbfsClient.java:1233)&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 06:11:03 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HBase-Snapshotting-Failed-because-of-Failure-to-aquire-SAS/m-p/413360#M254032</guid>
      <dc:creator>MintberryCrunch</dc:creator>
      <dc:date>2026-04-21T06:11:03Z</dc:date>
    </item>
    <item>
      <title>Re: HBase Snapshotting Failed because of Failure to aquire SAS Token</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HBase-Snapshotting-Failed-because-of-Failure-to-aquire-SAS/m-p/413389#M254044</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/142251"&gt;@MintberryCrunch&lt;/a&gt;,&amp;nbsp;Welcome to our community! To help you get the best possible answer, I have tagged in our HBase/CM experts&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/81271"&gt;@9een&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/80393"&gt;@rki_&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/91929"&gt;@SVB&lt;/a&gt;&amp;nbsp; who may be able to assist you further.&lt;BR /&gt;&lt;BR /&gt;Please feel free to provide any additional information or details about your query, and we hope that you will find a satisfactory solution to your question.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jan 2026 05:21:39 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HBase-Snapshotting-Failed-because-of-Failure-to-aquire-SAS/m-p/413389#M254044</guid>
      <dc:creator>VidyaSargur</dc:creator>
      <dc:date>2026-01-22T05:21:39Z</dc:date>
    </item>
    <item>
      <title>Re: HBase Snapshotting Failed because of Failure to aquire SAS Token</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HBase-Snapshotting-Failed-because-of-Failure-to-aquire-SAS/m-p/413395#M254046</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/142251"&gt;@MintberryCrunch&lt;/a&gt;&amp;nbsp;FYI&lt;BR /&gt;&lt;BR /&gt;➤ In a Public Cloud Environment using Azure Operational Database (HBase), snapshot copy failures with a &lt;EM&gt;Permission denied&lt;/EM&gt; error while acquiring a SAS token for &lt;EM&gt;get-acl on /&lt;/EM&gt; typically stem from missing Access Control List (ACL) permissions on the root of the storage container, even if Azure Role-Based Access Control (RBAC) roles are correctly assigned.&lt;/P&gt;&lt;P&gt;➤ The &lt;EM&gt;AccessControlException&lt;/EM&gt; at the root directory (/) indicates the driver is attempting to validate permissions at the top level before proceeding with the operation.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;➤ Recommended Troubleshooting Steps&lt;BR /&gt;1. Grant the "Storage Blob Delegator" Role: Add this role to the Managed Identity used by the HBase service to ensure it can generate User Delegation SAS tokens.&lt;/P&gt;&lt;P&gt;2. Inspect ACLs via Storage Explorer: Use Azure Storage Explorer to right-click the root of the container and select Manage ACLs. Confirm the identity has at least Execute permissions.&lt;/P&gt;&lt;P&gt;3. Verify Firewall Settings: Confirm that "Allow trusted Microsoft services to access this storage account" is enabled in the Storage Account's Networking tab.&lt;/P&gt;&lt;P&gt;4. Check for Sticky Bits: Use the Azure CLI command &lt;EM&gt;az storage fs access show&lt;/EM&gt; to see if the sticky bit is enabled on the target path.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jan 2026 14:32:10 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HBase-Snapshotting-Failed-because-of-Failure-to-aquire-SAS/m-p/413395#M254046</guid>
      <dc:creator>9een</dc:creator>
      <dc:date>2026-01-23T14:32:10Z</dc:date>
    </item>
    <item>
      <title>Re: HBase Snapshotting Failed because of Failure to aquire SAS Token</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HBase-Snapshotting-Failed-because-of-Failure-to-aquire-SAS/m-p/413411#M254051</link>
      <description>&lt;P&gt;Hello 9een,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you for your reply!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. How do I find out which role is used by the HBase Service? I used this guide to assign the roles (&amp;nbsp;&lt;A class="fui-Link ___1q1shib f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1s184ao f1mk8lai fnbmjn9 f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://docs.cloudera.com/cdp-public-cloud/cloud/requirements-azure/topics/mc-az-minimal-setup-for-cloud-storage.html#mc-az-minimal-setup-for-cloud-storage)" href="https://docs.cloudera.com/cdp-public-cloud/cloud/requirements-azure/topics/mc-az-minimal-setup-for-cloud-storage.html#mc-az-minimal-setup-for-cloud-storage)" target="_blank" rel="noopener noreferrer"&gt;https://docs.cloudera.com/cdp-public-cloud/cloud/requirements-azure/topics/mc-az-minimal-setup-for-…&lt;/A&gt;&amp;nbsp;)&lt;BR /&gt;2. I assigned all identities all permissions to get something to work, because I was not sure which Managed Identity is responsible.&lt;BR /&gt;3. In my Azure Storage Account there is no specific "Allow trusted Microsoft services to access this storage Account" setting. But "Microsoft networking Routing" Routing preference is set. "Public network Access" is "Enabled form all networks".&lt;BR /&gt;4. All Sticky Bits are disabled on all path.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jan 2026 12:55:21 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HBase-Snapshotting-Failed-because-of-Failure-to-aquire-SAS/m-p/413411#M254051</guid>
      <dc:creator>MintberryCrunch</dc:creator>
      <dc:date>2026-01-26T12:55:21Z</dc:date>
    </item>
    <item>
      <title>Re: HBase Snapshotting Failed because of Failure to aquire SAS Token</title>
      <link>https://community.cloudera.com/t5/Support-Questions/HBase-Snapshotting-Failed-because-of-Failure-to-aquire-SAS/m-p/413445#M254070</link>
      <description>&lt;P&gt;This Error refers to Hadoop ACLs&lt;BR /&gt;The Azure ACL and RBAC was correctly assigned.&lt;BR /&gt;&lt;BR /&gt;The snapshot location must reside within the &lt;I&gt;same&lt;/I&gt; directory as the HBase directory. The HBase user seems to have only access to this directory. For example, we used something like the following path:&lt;BR /&gt;&amp;gt; abfss://storagefs@mystorageaccount.dfs.core.windows.net/cod-ouiftSmthLikeThis/hbase/.hbase-snapshot&lt;BR /&gt;&lt;BR /&gt;This confusion was caused by the default backup location set to the&amp;nbsp;&lt;I&gt;logs&amp;nbsp;&lt;/I&gt;container during the environment creation.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Follow-up questions:&amp;nbsp;&lt;BR /&gt;1. Where is an official documentation or guidelines location addressing this topic?&lt;BR /&gt;2. What backups are stored in the default location? Only the cluster backups?&amp;nbsp;&lt;BR /&gt;3. How can the Hadoop configuration be modified to allow the use of a different container for storing manual backups?&lt;/P&gt;&lt;P&gt;4. How can we give HBase the rights to access different storage locations?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 09:38:01 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/HBase-Snapshotting-Failed-because-of-Failure-to-aquire-SAS/m-p/413445#M254070</guid>
      <dc:creator>MintberryCrunch</dc:creator>
      <dc:date>2026-01-30T09:38:01Z</dc:date>
    </item>
  </channel>
</rss>

