<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: User impersonation in Spark and Samza in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/User-impersonation-in-Spark-and-Samza/m-p/136850#M19046</link>
    <description>&lt;P&gt;It didn't work for me. Am getting below exception &lt;/P&gt;&lt;PRE&gt;Caused by: org.apache.hadoop.ipc.RemoteException(org.apache.hadoop.security.AccessControlException): &amp;lt;proxyuser&amp;gt; tries to renew a token with renewer &amp;lt;loggeduser&amp;gt;&lt;/PRE&gt;&lt;P style="margin-left: 20px;"&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 16 May 2016 16:50:35 GMT</pubDate>
    <dc:creator>Vinod254581</dc:creator>
    <dc:date>2016-05-16T16:50:35Z</dc:date>
    <item>
      <title>User impersonation in Spark and Samza</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/User-impersonation-in-Spark-and-Samza/m-p/136846#M19042</link>
      <description>&lt;P&gt;When user submits job via Spark/Samza to Yarn, job gets executed as "yarn" user, how can we make sure that job should run as same user who has submitted the job.&lt;/P&gt;&lt;P&gt;Please advise.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2016 11:05:24 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/User-impersonation-in-Spark-and-Samza/m-p/136846#M19042</guid>
      <dc:creator>KuldeepK</dc:creator>
      <dc:date>2016-02-11T11:05:24Z</dc:date>
    </item>
    <item>
      <title>Re: User impersonation in Spark and Samza</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/User-impersonation-in-Spark-and-Samza/m-p/136847#M19043</link>
      <description>&lt;P&gt;@&lt;A href="https://community.hortonworks.com/users/504/kkulkarni.html"&gt;Kuldeep Kulkarni&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I believe this needs to handled with kerberos, if not kerberized it will submit as yarn.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Feb 2016 02:53:40 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/User-impersonation-in-Spark-and-Samza/m-p/136847#M19043</guid>
      <dc:creator>iroberts</dc:creator>
      <dc:date>2016-02-12T02:53:40Z</dc:date>
    </item>
    <item>
      <title>Re: User impersonation in Spark and Samza</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/User-impersonation-in-Spark-and-Samza/m-p/136848#M19044</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/349/iroberts.html" nodeid="349"&gt;@Ian Roberts&lt;/A&gt; &lt;/P&gt;&lt;P&gt;I believe we can do something like this:&lt;/P&gt;&lt;P&gt;For example if you are running spark shell then you can add below configurations in core-site.xml and run your job with --proxy-user &amp;lt;username&amp;gt; &lt;/P&gt;&lt;PRE&gt;&amp;lt;property&amp;gt; 
&amp;lt;name&amp;gt;hadoop.proxyuser.&amp;lt;username&amp;gt;.hosts&amp;lt;/name&amp;gt; 
&amp;lt;value&amp;gt;*&amp;lt;/value&amp;gt; 
&amp;lt;/property&amp;gt; 

&amp;lt;property&amp;gt; 
&amp;lt;name&amp;gt;hadoop.proxyuser.&amp;lt;username&amp;gt;.groups&amp;lt;/name&amp;gt; 
&amp;lt;value&amp;gt;*&amp;lt;/value&amp;gt; 
&amp;lt;/property&amp;gt; &lt;/PRE&gt;

Command to run spark shell with YARN with proxy user: 

&lt;PRE&gt;spark-shell --master yarn-client --proxy-user &amp;lt;username&amp;gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 15 Feb 2016 17:35:44 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/User-impersonation-in-Spark-and-Samza/m-p/136848#M19044</guid>
      <dc:creator>KuldeepK</dc:creator>
      <dc:date>2016-02-15T17:35:44Z</dc:date>
    </item>
    <item>
      <title>Re: User impersonation in Spark and Samza</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/User-impersonation-in-Spark-and-Samza/m-p/136849#M19045</link>
      <description>&lt;P&gt;note that even when running as OS user "yarn", an environment variable, "HADOOP_USER_NAME" passes the name of the account submitting the work into that process, which is then picked up by the HDFS client: the code should be able to work with HDFS directories as the submitter, with the same permissions and things. That is, as you may have guessed, completely insecure and open to abuse —for that you need to make the leap to Kerberos, I'm afraid.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2016 01:33:39 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/User-impersonation-in-Spark-and-Samza/m-p/136849#M19045</guid>
      <dc:creator>stevel</dc:creator>
      <dc:date>2016-02-17T01:33:39Z</dc:date>
    </item>
    <item>
      <title>Re: User impersonation in Spark and Samza</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/User-impersonation-in-Spark-and-Samza/m-p/136850#M19046</link>
      <description>&lt;P&gt;It didn't work for me. Am getting below exception &lt;/P&gt;&lt;PRE&gt;Caused by: org.apache.hadoop.ipc.RemoteException(org.apache.hadoop.security.AccessControlException): &amp;lt;proxyuser&amp;gt; tries to renew a token with renewer &amp;lt;loggeduser&amp;gt;&lt;/PRE&gt;&lt;P style="margin-left: 20px;"&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 May 2016 16:50:35 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/User-impersonation-in-Spark-and-Samza/m-p/136850#M19046</guid>
      <dc:creator>Vinod254581</dc:creator>
      <dc:date>2016-05-16T16:50:35Z</dc:date>
    </item>
    <item>
      <title>Re: User impersonation in Spark and Samza</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/User-impersonation-in-Spark-and-Samza/m-p/136851#M19047</link>
      <description>&lt;P&gt;Is possible to follow above approach in Kerberos environment?  I tried above step to run job as proxy user but it failed. Got GSS initialization exception. Any pointers?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Nov 2016 17:02:46 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/User-impersonation-in-Spark-and-Samza/m-p/136851#M19047</guid>
      <dc:creator>shashi_vish123</dc:creator>
      <dc:date>2016-11-11T17:02:46Z</dc:date>
    </item>
  </channel>
</rss>

