Member since
12-14-2015
89
Posts
7
Kudos Received
7
Solutions
My Accepted Solutions
Title | Views | Posted |
---|---|---|
3068 | 08-20-2019 04:30 AM | |
3195 | 08-20-2019 12:29 AM | |
2172 | 10-18-2018 05:32 AM | |
3368 | 12-15-2016 10:52 AM | |
928 | 11-10-2016 09:21 AM |
07-31-2018
06:21 AM
Did you authenticate using Keytabs or using a password-based kinit? Could you please send the result of "klist" and "klist -kte <keytab-file>"
... View more
03-16-2018
10:25 AM
Hi @Jinyu Li your issue is likely produced by Hive Permission Inheritance. After creating the tables, the Sqoop app tries to change the owner/mode of the created HDFS files. Ranger permissions (even rwx) do not give rights to change POSIX owner/mode, which is why the operation fails. Such failure is classified as "EXECUTE" action by Ranger. You can find more details in the HDFS Audit log, stored locally on the NameNode. Solution: Could you please try to set "hive.warehouse.subdir.inherit.perms" to false and re-run the job? This stops Hive Imports from trying to set permissions, which is fine when Ranger is the primary source of authorization. see https://cwiki.apache.org/confluence/display/Hive/Permission+Inheritance+in+Hive for more details. Best, Benjamin
... View more
05-03-2017
08:58 AM
@Adi Jabkowsky This did the trick! Thank you. Now it works.
... View more
05-03-2017
06:56 AM
I am having the same issues after upgrading from Ambari 2.4.0.1 to Ambari 2.5.0.3: The CapSched View is effectively unusable, as no Admin can access it anymore.
... View more
04-04-2017
08:18 PM
Thank you for that answer. I was not sure, if there are any specialities, as Hive did some custom checks for read/write rights until: https://issues.apache.org/jira/browse/HIVE-7583 and https://issues.apache.org/jira/browse/HDFS-6570
... View more
03-29-2017
03:53 PM
Thank you! This answers the second question.
... View more
03-29-2017
03:38 PM
Hi community, I have a question about authorization for the Hive Metastore (not the HiveServer2). Cluster is HDP 2.5 and Kerberos is set up. The Apache community recommends to use a StorageBasedAuthorizationProvider. I understand, how it gets the ACLs from the underlying filesystem. In my situation, I have Ranger set up and want to handle most of authorization there - effectively making Hadoop native permissions unused (for instance by setting the to 000 on the Hive directories). The question now is: - When using the StorageBasedAuthorizationProvider: Will the Hive Metastore consider Ranger policies on HDFS warehouse directories in his decision, if a certain user can read/write to directory? Or do I have to use POSIX permissions or HDFS ACLs? - Is the a better way to realize Hive Metastore authorization (Maybe a custom authorization provider for HiveMetastore, that connects to Ranger and uses Ranger Policies for HiveServer2)? Thank you!
... View more
Labels:
- Labels:
-
Apache Hive
-
Apache Ranger
03-29-2017
12:59 PM
Just to sum it up: I have now chosen to place some regex in the auth-to-local rules to match exactly those hosts, which are used in a certain cluster. While this adds operations overhead, it will make the cluster more secure. The guys of Cloudera have a good summary about that in their documentation: https://www.cloudera.com/documentation/enterprise/5-9-x/topics/sg_auth_to_local_isolate.html
... View more
03-28-2017
07:45 AM
This is the answer I was hoping for. Thanks
... View more
03-24-2017
07:37 AM
Hi @spotluri This is also a great idea, if splitting REALMs is not feasible.
... View more