<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: sentry + hive + kerberos resource  management in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/62921#M6406</link>
    <description>&lt;P&gt;The placement rules are executed as the original user. That means the job will be added to the correct pool. The end user can not override that because the&amp;nbsp;&lt;SPAN&gt;&lt;EM&gt;mapred.job.queuename&lt;/EM&gt;&amp;nbsp;property should be blacklisted.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The hive user should never be accessible for any user, it is a service principal and allowing it to be used by end users will give you far bigger issues.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I thus do not see how adding hive as a user to the acl breaks it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Wilfred&lt;/P&gt;</description>
    <pubDate>Wed, 20 Dec 2017 07:29:35 GMT</pubDate>
    <dc:creator>Wilfred</dc:creator>
    <dc:date>2017-12-20T07:29:35Z</dc:date>
    <item>
      <title>sentry + hive + kerberos resource  management</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/29018#M6390</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have enabled Sentry to work with HiveServer2 with Kerberos Authentication.&amp;nbsp;Therefore, impersonication on HiveServer2 is turned off.&lt;/P&gt;&lt;P&gt;Now all queries are run as 'hive' from Hue Hive UI, and oozie hive action.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How does resource management (YARN resource pool) works in this case? I want jobs to go into right pool, but now all Hive jobs are going into&amp;nbsp;root.hive pool.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Samething happens with Impala when using llma. All impala jobs goes into root.llama pool.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 13:58:18 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/29018#M6390</guid>
      <dc:creator>ben123</dc:creator>
      <dc:date>2026-04-21T13:58:18Z</dc:date>
    </item>
    <item>
      <title>Re: sentry + hive + kerberos resource  management</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/29020#M6391</link>
      <description>Hi Ben,&lt;BR /&gt;&lt;BR /&gt;The hive+sentry issue sounds like an issue that was fixed in CDH5.2.1 and CDH5.3.0+. What version of CDH are you using? Are you seeing the same problem for jobs launched from command-line (as a user other than hive, of course), or only ones launched through hue and oozie?&lt;BR /&gt;&lt;BR /&gt;I'm not sure if we had any releases where llama was known to have this issue.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Darren</description>
      <pubDate>Fri, 26 Jun 2015 23:46:23 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/29020#M6391</guid>
      <dc:creator>Darren</dc:creator>
      <dc:date>2015-06-26T23:46:23Z</dc:date>
    </item>
    <item>
      <title>Re: sentry + hive + kerberos resource  management</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/29274#M6392</link>
      <description>&lt;P&gt;sorry for late response Darren,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm using CDH 5.4.1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This doesn't happen from command-line. If I'm&amp;nbsp;authenticated as ben on shell environment, then the job gets submitted as ben.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On hue+oozie environment, if I submit a workflow job, oozie job-launcher get's submitted as the authenticated user ben. However actual hive job gets submitted as hive user.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2015 13:17:52 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/29274#M6392</guid>
      <dc:creator>ben123</dc:creator>
      <dc:date>2015-07-06T13:17:52Z</dc:date>
    </item>
    <item>
      <title>Re: sentry + hive + kerberos resource  management</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/29276#M6393</link>
      <description>&lt;P&gt;what's the issue tracking URL on 5.2.1 release? can't find it on Google &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2015 13:38:24 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/29276#M6393</guid>
      <dc:creator>ben123</dc:creator>
      <dc:date>2015-07-06T13:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: sentry + hive + kerberos resource  management</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/29290#M6394</link>
      <description>When you ran from command-line, did you use "hive" or "beeline"? I forgot to clarify that you should test using the "beeline" client so it goes through HS2 and fully integrates with Sentry. This is also more similar to how Hue works (it talks to HS2).&lt;BR /&gt;&lt;BR /&gt;When using Sentry, you are supposed to disable impersonation for HS2, which means that all jobs will be submitted as user "hive". When looking up permissions in Sentry and/or deciding which YARN pool to run in, however, it should use the submitting user, not "hive". So it isn't necessarily a problem that the hive job is submitted as the hive user.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Darren</description>
      <pubDate>Mon, 06 Jul 2015 17:45:28 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/29290#M6394</guid>
      <dc:creator>Darren</dc:creator>
      <dc:date>2015-07-06T17:45:28Z</dc:date>
    </item>
    <item>
      <title>Re: sentry + hive + kerberos resource  management</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/29299#M6395</link>
      <description>&lt;P&gt;I tested on both hive and beeline, and running from command line works as intented. jobs get assigned to correct user/group queues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you explain why it's ok for hive jobs get submitted as 'hive' user?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have four different teams using Cloudera, and it gets difficult to manage resources if all hive jobs go to "root.hive" queue. And since "root.hive" queue has limited resouces allocated, most hive jobs will fail.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is our job history.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;U&gt;application_1436195699910_0031&lt;/U&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT color="#ff0000"&gt;hive&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;INSERT INTO TABLE ...(Stage-1)&lt;/TD&gt;&lt;TD&gt;MAPREDUCE&lt;/TD&gt;&lt;TD&gt;&lt;FONT color="#ff0000"&gt;root.hive&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;Mon Jul 6 15:44:38 -0500 2015&lt;/TD&gt;&lt;TD&gt;Mon Jul 6 15:45:11 -0500 2015&lt;/TD&gt;&lt;TD&gt;FINISHED&lt;/TD&gt;&lt;TD&gt;SUCCEEDED&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;U&gt;application_1436195699910_0030&lt;/U&gt;&lt;/TD&gt;&lt;TD&gt;ben&lt;/TD&gt;&lt;TD&gt;oozie:launcher:T=hive2:W=JobName:A=hive2-6df2:ID=0000004-150706101622653-oozie-oozi-W&lt;/TD&gt;&lt;TD&gt;MAPREDUCE&lt;/TD&gt;&lt;TD&gt;root.infra&lt;/TD&gt;&lt;TD&gt;Mon Jul 6 15:44:22 -0500 2015&lt;/TD&gt;&lt;TD&gt;Mon Jul 6 15:45:21 -0500 2015&lt;/TD&gt;&lt;TD&gt;FINISHED&lt;/TD&gt;&lt;TD&gt;SUCCEEDED&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;other workflow actions such as sqoop/pig run on correct user/group queue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think this is problem with our cluster configuration, but please guide us with right direction &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you for your help&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2015 23:04:36 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/29299#M6395</guid>
      <dc:creator>ben123</dc:creator>
      <dc:date>2015-07-06T23:04:36Z</dc:date>
    </item>
    <item>
      <title>Re: sentry + hive + kerberos resource  management</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/29315#M6396</link>
      <description>&lt;P&gt;The fact that the job runs as the hive user is correct. You have impersonation turned off when you turned on Sentry, at least that is what you should have done. The Hive user is thus the user that executes the job.&lt;/P&gt;&lt;P&gt;However the end user should be used to retrieve which queue the application is submitted in (if you use the FairScheduler). This does require some configuration on your side to make this work. There is a Knowledge Base article in our support portal on how to set that up for CM and non CM clusters. Search for "Hive FairScheduler".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can remember already providing the steps using CM before on the forum:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Login to Cloudera Manager&lt;/LI&gt;&lt;LI&gt;Navigate to &lt;STRONG&gt;Cluster&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Yarn&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Instances&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;ResourceManager&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Processes&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Click on the link &lt;U&gt;&lt;SPAN&gt;&lt;STRONG&gt;fair-scheduler.xml&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/U&gt;, this will open a new tab or window&lt;/LI&gt;&lt;LI&gt;Copy the contents into the a new file called: &lt;SPAN&gt;fair-scheduler.xml&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;On the HiveServer2 host create a new directory to store the xml file (for example,&amp;nbsp;&lt;SPAN&gt;/etc/hive/fsxml&lt;/SPAN&gt;)&lt;BR /&gt;&lt;STRONG&gt;Note: T&lt;/STRONG&gt;his file should not be placed in the standard Hive configuration directory since that directory is managed by Cloudera Manager and the file could be removed when changing other configuration settings.&lt;/LI&gt;&lt;LI&gt;Upload the &lt;SPAN&gt;fair-scheduler.xml&lt;/SPAN&gt; file to the above created directory&lt;/LI&gt;&lt;LI&gt;In Cloudera Manager navigate to &lt;STRONG&gt;Cluster&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Hive&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Service-Wide&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Advanced&lt;/STRONG&gt; &amp;gt; &lt;STRONG&gt;Hive Service Advanced Configuration Snippet (Safety Valve) for hive-site.xml&lt;/STRONG&gt; and add the following property:&lt;PRE&gt;&amp;lt;property&amp;gt;
  &amp;lt;name&amp;gt;yarn.scheduler.fair.allocation.file&amp;lt;/name&amp;gt;
  &amp;lt;value&amp;gt;/etc/hive/fsxml/fair-scheduler.xml&amp;lt;/value&amp;gt;
&amp;lt;/property&amp;gt;&lt;/PRE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Save&lt;/STRONG&gt; changes&lt;/LI&gt;&lt;LI&gt;Restart the Hive Service&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;NOTE: you must have the follwoing rule as the first rule in the placement policy:&lt;/P&gt;&lt;PRE&gt;&amp;lt;rule name="specified" /&amp;gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Wiflred&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jul 2015 07:27:58 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/29315#M6396</guid>
      <dc:creator>Wilfred</dc:creator>
      <dc:date>2015-07-07T07:27:58Z</dc:date>
    </item>
    <item>
      <title>Re: sentry + hive + kerberos resource  management</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/29442#M6397</link>
      <description>&lt;P&gt;Tara!&lt;/P&gt;&lt;P&gt;Thank very much for your help. Now I understand that the job runs as hive user but the job will go to the designated queue. And after following your steps it worked &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Initially I changed Placement Rules on resource pools and did not have "specified" pool as first rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do&amp;nbsp;I need&amp;nbsp;to replace the local /etc/hive/fsxml/fair-scheduler.xml everytime I make changes to the "Dynamic Resource Pools"? I'm using CM cluster.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jul 2015 14:46:33 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/29442#M6397</guid>
      <dc:creator>ben123</dc:creator>
      <dc:date>2015-07-09T14:46:33Z</dc:date>
    </item>
    <item>
      <title>Re: sentry + hive + kerberos resource  management</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/29450#M6398</link>
      <description>Until this bug is fixed, yes, you'll need to replace /etc/hive/fsxml/fair-scheduler.xml every time you change Yarn's copy of fair-scheduler.xml.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Darren</description>
      <pubDate>Thu, 09 Jul 2015 18:08:35 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/29450#M6398</guid>
      <dc:creator>Darren</dc:creator>
      <dc:date>2015-07-09T18:08:35Z</dc:date>
    </item>
    <item>
      <title>Re: sentry + hive + kerberos resource  management</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/34983#M6399</link>
      <description>&lt;P&gt;Hi, we have a similar issue and wondering if those steps listed are the resolution.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we have our cluster kerberised and we also deployed Sentry, as part of the setup in hive we disabled impersonation. so all the HIVE queries are being executed by the HIVE user.&lt;BR /&gt;We configured Dynamic resource manager pools, setting up 3 queues. HighPriority, LowPriority and Default.&lt;BR /&gt;Everybody can submit jobs to the default queue, that is working as expected.&lt;BR /&gt;The HighPriority, LowPriority are managed by group membership to two different AD groups.&lt;BR /&gt;&lt;BR /&gt;I assigned a test user both groups so it could submit jobs to both queues (HighPriority, LowPriority) when i submitted a job&lt;BR /&gt;we got the following error message&lt;BR /&gt;&lt;BR /&gt;ERROR : Job Submission failed with exception '&lt;A href="http://java.io" target="_blank"&gt;java.io&lt;/A&gt;.IOException(Failed to run job : User hive cannot submit applications to queue root.HighPriority)'&lt;BR /&gt;&lt;A href="http://java.io" target="_blank"&gt;java.io&lt;/A&gt;.IOException: Failed to run job : User hive cannot submit applications to queue root.HighPriority&lt;BR /&gt;&lt;BR /&gt;this is correct because the hive user doesn't is not a member of any of those groups.&lt;BR /&gt;I modified the submission access control to add the hive user to the pool and this time the job completed, however that breaks the access control model we are trying to implement because now all hive users can make use of both pools even though they don't belong any of the AD groups that are supposed to be controlling who can submit jobs to the pool.&lt;BR /&gt;&lt;BR /&gt;Is there a way to control which users can submit to specific resource pools in HIVE and leverage the Ad groups created for this purpose?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2015 16:44:35 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/34983#M6399</guid>
      <dc:creator>Madhu Ayanala</dc:creator>
      <dc:date>2015-12-09T16:44:35Z</dc:date>
    </item>
    <item>
      <title>Re: sentry + hive + kerberos resource  management</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/62594#M6400</link>
      <description>&lt;P&gt;Hi, we have the similar issue. I use CDH 5.6.0. Is this bug fixed? However, I have no idea about the right way to make it work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I prefer to use the Placement Rules configurated in YARN instead of this workaround method.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And our situation is quit similar with&amp;nbsp;&lt;SPAN class=""&gt;Madhu's. I have setup 3 queues, and there are 3 groups in LDAP(these 3 groups are also in Linux OS).&amp;nbsp;&lt;SPAN&gt;Is there a way to control which users can submit to specific resource pools in HIVE?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;ywheel&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Dec 2017 10:27:00 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/62594#M6400</guid>
      <dc:creator>ywheel</dc:creator>
      <dc:date>2017-12-08T10:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: sentry + hive + kerberos resource  management</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/62597#M6401</link>
      <description>&lt;P&gt;This has been fixed in later releases of Cloudera Manager and CDH. When you manage the cluster through CM the config, and changes later on, will be automatically deployed to hive server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also don't forget to make sure that hive user must have permission to submit to all queues. Simplest way is to add Hive to the root submit queue ACL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Wilfred&lt;/P&gt;</description>
      <pubDate>Fri, 08 Dec 2017 11:35:53 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/62597#M6401</guid>
      <dc:creator>Wilfred</dc:creator>
      <dc:date>2017-12-08T11:35:53Z</dc:date>
    </item>
    <item>
      <title>Re: sentry + hive + kerberos resource  management</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/62599#M6402</link>
      <description>&lt;P&gt;Thanks a lot!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since which version of CDH and Cloudera Manager have this fixed feature? I'm on CHD 5.6.0, and seems it doesn't work yet.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Dec 2017 11:48:03 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/62599#M6402</guid>
      <dc:creator>ywheel</dc:creator>
      <dc:date>2017-12-08T11:48:03Z</dc:date>
    </item>
    <item>
      <title>Re: sentry + hive + kerberos resource  management</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/62600#M6403</link>
      <description>&lt;P&gt;You must be on 5.8.0 or later for both CDH and CM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Wilfred&lt;/P&gt;</description>
      <pubDate>Fri, 08 Dec 2017 11:50:28 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/62600#M6403</guid>
      <dc:creator>Wilfred</dc:creator>
      <dc:date>2017-12-08T11:50:28Z</dc:date>
    </item>
    <item>
      <title>Re: sentry + hive + kerberos resource  management</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/62601#M6404</link>
      <description>Got it! Thanks for your quick reply.&lt;BR /&gt;&lt;BR /&gt;Best,&lt;BR /&gt;ywheel</description>
      <pubDate>Fri, 08 Dec 2017 11:53:35 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/62601#M6404</guid>
      <dc:creator>ywheel</dc:creator>
      <dc:date>2017-12-08T11:53:35Z</dc:date>
    </item>
    <item>
      <title>Re: sentry + hive + kerberos resource  management</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/62909#M6405</link>
      <description>&lt;P&gt;Hi, we have a similar issue with Madhu's, by the way, We are using CDH 5.12.0&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The following is&amp;nbsp;Madhu's&amp;nbsp;describe:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we have our cluster kerberised and we also deployed Sentry, as part of the setup in hive we disabled impersonation. so all the HIVE queries are being executed by the HIVE user.&lt;BR /&gt;We configured Dynamic resource manager pools, setting up 3 queues. HighPriority, LowPriority and Default.&lt;BR /&gt;Everybody can submit jobs to the default queue, that is working as expected.&lt;BR /&gt;The HighPriority, LowPriority are managed by group membership to two different AD groups.&lt;/P&gt;&lt;P&gt;I assigned a test user both groups so it could submit jobs to both queues (HighPriority, LowPriority) when i submitted a job&lt;BR /&gt;we got the following error message&lt;/P&gt;&lt;P&gt;ERROR : Job Submission failed with exception 'java.io.IOException(Failed to run job : User hive cannot submit applications to queue root.HighPriority)'&lt;BR /&gt;java.io.IOException: Failed to run job : User hive cannot submit applications to queue root.HighPriority&lt;/P&gt;&lt;P&gt;this is correct because the hive user doesn't is not a member of any of those groups.&lt;BR /&gt;I modified the submission access control to add the hive user to the pool and this time the job completed, however that breaks the access control model we are trying to implement because now all hive users can make use of both pools even though they don't belong any of the AD groups that are supposed to be controlling who can submit jobs to the pool.&lt;/P&gt;&lt;P&gt;Is there a way to control which users can submit to specific resource pools in HIVE and leverage the Ad groups created for this purpose?&lt;/P&gt;</description>
      <pubDate>Wed, 20 Dec 2017 01:46:00 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/62909#M6405</guid>
      <dc:creator>huadao</dc:creator>
      <dc:date>2017-12-20T01:46:00Z</dc:date>
    </item>
    <item>
      <title>Re: sentry + hive + kerberos resource  management</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/62921#M6406</link>
      <description>&lt;P&gt;The placement rules are executed as the original user. That means the job will be added to the correct pool. The end user can not override that because the&amp;nbsp;&lt;SPAN&gt;&lt;EM&gt;mapred.job.queuename&lt;/EM&gt;&amp;nbsp;property should be blacklisted.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The hive user should never be accessible for any user, it is a service principal and allowing it to be used by end users will give you far bigger issues.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I thus do not see how adding hive as a user to the acl breaks it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Wilfred&lt;/P&gt;</description>
      <pubDate>Wed, 20 Dec 2017 07:29:35 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/62921#M6406</guid>
      <dc:creator>Wilfred</dc:creator>
      <dc:date>2017-12-20T07:29:35Z</dc:date>
    </item>
    <item>
      <title>Re: sentry + hive + kerberos resource  management</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/62939#M6407</link>
      <description>&lt;P&gt;Hi Wilfried,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm sorry to ask again, but i'm facing the same problem and I don't understand how to configure Dynamic Ressource Pool Configuration to work using orginal user groups (me not hive).&lt;/P&gt;&lt;P&gt;I'm using CDH 5.13 with Kerberos and Sentry. As I am using Sentry, impersonation is disabled.&lt;/P&gt;&lt;P&gt;My configuration is&amp;nbsp;&lt;/P&gt;&lt;P&gt;root&lt;/P&gt;&lt;P&gt;|--A&lt;/P&gt;&lt;P&gt;|--B&lt;/P&gt;&lt;P&gt;On root, submission ACL are set to allow only "sentry" user to submit in this pool&lt;/P&gt;&lt;P&gt;On A,&amp;nbsp;&lt;SPAN&gt;submission ACL are set to allow only group A to submit in this pool&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;On B,&amp;nbsp;submission ACL are set to allow only group B&amp;nbsp;to submit in this pool&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Placement rules are : &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1 - "Use the pool Specified at run time, only if the pool exists."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2 - "&lt;SPAN class="description nowrap"&gt;Use the pool root.[username] and create the pool if it does not exist.&lt;/SPAN&gt;&amp;nbsp;"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When I submit a query with a user from the group A, using Hue and setting "set mapred.job.queue.name=A;" I got the error : "User hive cannot submit applications to queue root.A"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If I add hive to allowed user on root, the query is working fine but both A and B user's can submit query&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If I add hive to only "A" resource pool, then user from A and B group can submit query to ressource pool A, but none can submit to resource pool B&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Maybe I am missing an important part, but I&amp;nbsp;don't have the same behavior as you explained and if I add hive in authorized user it will break the ACL's as every user could use all the resource pool.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Can you give us the good configuration to have the same behavior as your's ?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Dec 2017 15:26:19 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/sentry-hive-kerberos-resource-management/m-p/62939#M6407</guid>
      <dc:creator>SachaH</dc:creator>
      <dc:date>2017-12-20T15:26:19Z</dc:date>
    </item>
  </channel>
</rss>

