<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Ranger SparkSQL security gap? in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ranger-SparkSQL-security-gap/m-p/151088#M28559</link>
    <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/1486/smanjee.html" nodeid="1486"&gt;@Sunile Manjee&lt;/A&gt; I am not sure this has anything to do with Ranger. As mentioned in this &lt;A href="https://community.hortonworks.com/questions/5403/ranger-security-when-accessing-hive-tables-via-spa.html"&gt;post &lt;/A&gt;, if you are using Spark SQL client it will behave similar to Hive CLI today where HDFS permissions come into the play. There is Spark thriftserver work which is pending &lt;A href="https://issues.apache.org/jira/browse/SPARK-8659" target="_blank"&gt;https://issues.apache.org/jira/browse/SPARK-8659&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 17 May 2016 21:16:29 GMT</pubDate>
    <dc:creator>bganesan</dc:creator>
    <dc:date>2016-05-17T21:16:29Z</dc:date>
    <item>
      <title>Ranger SparkSQL security gap?</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ranger-SparkSQL-security-gap/m-p/151087#M28558</link>
      <description>&lt;P&gt;I understand with ranger security in place users may browse all data in hive via SparkSQL?  Is there a work around as a stop gap until official bug is fixed in apache?  I am aware of &lt;A href="https://community.hortonworks.com/questions/5403/ranger-security-when-accessing-hive-tables-via-spa.html"&gt;this&lt;/A&gt; HCC post.  However it does not have a resolution or clarity in terms of gap stop.&lt;/P&gt;</description>
      <pubDate>Tue, 17 May 2016 10:23:19 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ranger-SparkSQL-security-gap/m-p/151087#M28558</guid>
      <dc:creator>sunile_manjee</dc:creator>
      <dc:date>2016-05-17T10:23:19Z</dc:date>
    </item>
    <item>
      <title>Re: Ranger SparkSQL security gap?</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ranger-SparkSQL-security-gap/m-p/151088#M28559</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/1486/smanjee.html" nodeid="1486"&gt;@Sunile Manjee&lt;/A&gt; I am not sure this has anything to do with Ranger. As mentioned in this &lt;A href="https://community.hortonworks.com/questions/5403/ranger-security-when-accessing-hive-tables-via-spa.html"&gt;post &lt;/A&gt;, if you are using Spark SQL client it will behave similar to Hive CLI today where HDFS permissions come into the play. There is Spark thriftserver work which is pending &lt;A href="https://issues.apache.org/jira/browse/SPARK-8659" target="_blank"&gt;https://issues.apache.org/jira/browse/SPARK-8659&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 May 2016 21:16:29 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/Ranger-SparkSQL-security-gap/m-p/151088#M28559</guid>
      <dc:creator>bganesan</dc:creator>
      <dc:date>2016-05-17T21:16:29Z</dc:date>
    </item>
  </channel>
</rss>

