Community Articles
Find and share helpful community-sourced technical articles
Alert: Welcome to the Unified Cloudera Community. Former HCC members be sure to read and learn how to activate your account here.
Labels (2)
Community Manager

Symptoms:   Hue HBase application does not show any tables when Kerberos is enabled.


  1. Go to the Hbase Service > Instances. If there is not an HBase Thrift Server instance, click Add Role Instance and follow the wizard to add an HBase Thrift Server Role Instance.
  2. Go to Hue service > Configuration > Service-Wide and check that HBase Service and HBase Thrift Server both have an appropriate instance selected and that it is not None.
  3. If not using Kerberos skip to step 4 below.  Otherwise, set HBase Thrift Authentication

Setting HBase Thrift Authentication must be set to one of the following for Kerberos:

Note: None is not a valid setting.

  1. Go to Hbase service > Configuration > Service-Wide / Security : HBase Thrift Authentication and select one of the following options:
  • auth-conf: authentication, integrity and confidentiality checking
  • auth-int: authentication and integrity checking
  • auth: authentication only
Note: Integrity implies a validation that data was not changed in transit; confidentiality enables encryption.
Note: This should not be required if the Kerberos Security Wizard was used to enable Kerberos for the cluster. 
Review the configuration in the  Cloudera Security Guide section titled, "To enable HBase Security".
  1. ​Starting in CDH 5.4, HBase now supports Impersonation.  If you are not using Impersonation then skip to the next step. If you are using Impersonation,  navigate to Cloudera Manager and check the following boxes:
    • HBase service > Configuration > Service-Wide : Enable HBase Thrift Http Server
    • HBase service > Configuration > Service-Wide : Enable HBase Thrift Proxy Users
  2. Verify HBase allows proxy users using the following steps:
    1. Navigate to the directory /var/run/cloudera-scm-agent/process/<id>-hbase-HBASETHRIFTSERVER
    2. View or edit the core-site.xml and verify the following properties are set with the asterisk "*":
      • ​​hadoop.proxyuser.hue.hosts
      • hadoop.proxyuser.hue.groups
  3. Navigate to Hue Service > Configuration > Service-Wide > Advanced > Hue Service Advanced Configuration Snippet (Safety Valve) for hue_safety_valve.ini
  4. Set the hbase_conf_dir to the Cloudera Manager auto replaced HBASE_CONF_DIR​​
  1. Restart HBase and Hue.
  • If HBase has Authorization set to true, then appropriate grants must be made through the HBase shell.
  • If using CDH 5.4 and Impersonation, permissions must be granted per user and not to the hue user.
  • Prior to CDH 5.4 or if not using Impersonation, then the hue user will require grants for any permissions that users will need in the Hue HBase app.
  • Review this guide for information on grants and permissions.


NOTE: This article was taken from our internal Knowledge Base.  To access the original article please use the following link (customer login required):


Configuring Hue's HBase Application

Don't have an account?
Coming from Hortonworks? Activate your account here
Version history
Revision #:
3 of 3
Last update:
‎08-20-2015 01:07 PM
Updated by:
Top Kudoed Authors