Created on 08-20-201501:06 PM - edited on 08-20-201501:07 PM by Clint
Symptoms: Hue HBase application does not show any tables when Kerberos is enabled.
Go to the Hbase Service > Instances. If there is not an HBase Thrift Server instance, click Add Role Instance and follow the wizard to add an HBase Thrift Server Role Instance.
Go to Hue service > Configuration > Service-Wide and check that HBase Service and HBase Thrift Server both have an appropriate instance selected and that it is not None.
If not using Kerberos skip to step 4 below. Otherwise, set HBase Thrift Authentication.
Setting HBase Thrift Authentication
hbase.thrift.security.qop must be set to one of the following for Kerberos:
Note: None is not a valid setting.
Go to Hbase service > Configuration > Service-Wide / Security : HBase Thrift Authentication and select one of the following options:
auth-conf: authentication, integrity and confidentiality checking
auth-int: authentication and integrity checking
auth: authentication only
Note:Integrity implies a validation that data was not changed in transit; confidentiality enables encryption. Note: This should not be required if the Kerberos Security Wizard was used to enable Kerberos for the cluster. Review the configuration in the Cloudera Security Guide section titled, "To enable HBase Security".
Starting in CDH 5.4, HBase now supports Impersonation. If you are not using Impersonation then skip to the next step. If you are using Impersonation, navigate to Cloudera Manager and check the following boxes:
HBase service > Configuration > Service-Wide : Enable HBase Thrift Http Server