With Sentry, only hive user has the permission for read/write/execute on
the subdirectories of warehouse. All the users get translated to "hive"
when interacting with hiveserver2. But i think HiveContext is bypassing
hiveserver2.

On Wednesday, June 17, 2015, ayan guha <guha.a...@gmail.com> wrote:

> Try to grant read execute access through sentry.
> On 18 Jun 2015 05:47, "Nitin kak" <nitinkak...@gmail.com
> <javascript:_e(%7B%7D,'cvml','nitinkak...@gmail.com');>> wrote:
>
>> I am trying to run a hive query from Spark code using HiveContext object.
>> It was running fine earlier but since the Apache Sentry has been set
>> installed the process is failing with this exception :
>>
>> *org.apache.hadoop.security.AccessControlException: Permission denied:
>> user=kakn, access=READ_EXECUTE,
>> inode="/user/hive/warehouse/rt_freewheel_mastering.db/digital_profile_cluster_in":hive:hive:drwxrwx--t*
>>
>> I have pasted the full stack trace at the end of this post. My username
>> "kakn" is a registered user with Sentry. I know that Spark takes all the
>> configurations from hive-site.xml to execute the hql, so I added a few
>> Sentry specific properties but seem to have no effect. I have attached the
>> hive-site.xml
>>
>> *<property>*
>> *    <name>hive.security.authorization.task.factory</name>*
>> *
>> <value>org.apache.sentry.binding.hive.SentryHiveAuthorizationTaskFactoryImpl</value>*
>> *  </property>*
>> *  <property>*
>> *    <name>hive.metastore.pre.event.listeners</name>*
>> *
>> <value>org.apache.sentry.binding.metastore.MetastoreAuthzBinding</value>*
>> *    <description>list of comma seperated listeners for metastore
>> events.</description>*
>> *  </property>*
>> *  <property>*
>> *    <name>hive.warehouse.subdir.inherit.perms</name>*
>> *    <value>true</value>*
>> * </property>*
>>
>>
>>
>>
>> *org.apache.hadoop.security.AccessControlException: Permission denied:
>> user=kakn, access=READ_EXECUTE,
>> inode="/user/hive/warehouse/rt_freewheel_mastering.db/digital_profile_cluster_in":hive:hive:drwxrwx--t*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.DefaultAuthorizationProvider.checkFsPermission(DefaultAuthorizationProvider.java:257)*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.DefaultAuthorizationProvider.check(DefaultAuthorizationProvider.java:238)*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.DefaultAuthorizationProvider.checkPermission(DefaultAuthorizationProvider.java:151)*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.FSPermissionChecker.checkPermission(FSPermissionChecker.java:138)*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.FSNamesystem.checkPermission(FSNamesystem.java:6287)*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.FSNamesystem.checkPermission(FSNamesystem.java:6269)*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.FSNamesystem.checkPathAccess(FSNamesystem.java:6194)*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.FSNamesystem.getListingInt(FSNamesystem.java:4793)*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.FSNamesystem.getListing(FSNamesystem.java:4755)*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.NameNodeRpcServer.getListing(NameNodeRpcServer.java:800)*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.AuthorizationProviderProxyClientProtocol.getListing(AuthorizationProviderProxyClientProtocol.java:310)*
>> * at
>> org.apache.hadoop.hdfs.protocolPB.ClientNamenodeProtocolServerSideTranslatorPB.getListing(ClientNamenodeProtocolServerSideTranslatorPB.java:606)*
>> * at
>> org.apache.hadoop.hdfs.protocol.proto.ClientNamenodeProtocolProtos$ClientNamenodeProtocol$2.callBlockingMethod(ClientNamenodeProtocolProtos.java)*
>> * at
>> org.apache.hadoop.ipc.ProtobufRpcEngine$Server$ProtoBufRpcInvoker.call(ProtobufRpcEngine.java:587)*
>> * at org.apache.hadoop.ipc.RPC$Server.call(RPC.java:1026)*
>> * at org.apache.hadoop.ipc.Server$Handler$1.run(Server.java:2013)*
>> * at org.apache.hadoop.ipc.Server$Handler$1.run(Server.java:2009)*
>> * at java.security.AccessController.doPrivileged(Native Method)*
>> * at javax.security.auth.Subject.doAs(Subject.java:415)*
>> * at
>> org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1642)*
>> * at org.apache.hadoop.ipc.Server$Handler.run(Server.java:2007)*
>>
>> * at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native
>> Method)*
>> * at
>> sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:57)*
>> * at
>> sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45)*
>> * at java.lang.reflect.Constructor.newInstance(Constructor.java:526)*
>> * at
>> org.apache.hadoop.ipc.RemoteException.instantiateException(RemoteException.java:106)*
>> * at
>> org.apache.hadoop.ipc.RemoteException.unwrapRemoteException(RemoteException.java:73)*
>> * at org.apache.hadoop.hdfs.DFSClient.listPaths(DFSClient.java:1895)*
>> * at org.apache.hadoop.hdfs.DFSClient.listPaths(DFSClient.java:1876)*
>> * at
>> org.apache.hadoop.hdfs.DistributedFileSystem.listStatusInternal(DistributedFileSystem.java:654)*
>> * at
>> org.apache.hadoop.hdfs.DistributedFileSystem.access$600(DistributedFileSystem.java:104)*
>> * at
>> org.apache.hadoop.hdfs.DistributedFileSystem$14.doCall(DistributedFileSystem.java:716)*
>> * at
>> org.apache.hadoop.hdfs.DistributedFileSystem$14.doCall(DistributedFileSystem.java:712)*
>> * at
>> org.apache.hadoop.fs.FileSystemLinkResolver.resolve(FileSystemLinkResolver.java:81)*
>> * at
>> org.apache.hadoop.hdfs.DistributedFileSystem.listStatus(DistributedFileSystem.java:712)*
>> * at
>> org.apache.spark.sql.parquet.ParquetTypesConverter$.readMetaData(ParquetTypes.scala:440)*
>> * at
>> org.apache.spark.sql.parquet.ParquetTypesConverter$.readSchemaFromFile(ParquetTypes.scala:477)*
>> * at
>> org.apache.spark.sql.parquet.ParquetRelation.<init>(ParquetRelation.scala:65)*
>> * at org.apache.spark.sql.SQLContext.parquetFile(SQLContext.scala:165)*
>> * at
>> org.apache.spark.sql.hive.HiveStrategies$ParquetConversion$.apply(HiveStrategies.scala:149)*
>> * at
>> org.apache.spark.sql.catalyst.planning.QueryPlanner$$anonfun$1.apply(QueryPlanner.scala:58)*
>> * at
>> org.apache.spark.sql.catalyst.planning.QueryPlanner$$anonfun$1.apply(QueryPlanner.scala:58)*
>> * at scala.collection.Iterator$$anon$13.hasNext(Iterator.scala:371)*
>> * at
>> org.apache.spark.sql.catalyst.planning.QueryPlanner.apply(QueryPlanner.scala:59)*
>> * at
>> org.apache.spark.sql.SQLContext$QueryExecution.sparkPlan$lzycompute(SQLContext.scala:418)*
>> * at
>> org.apache.spark.sql.SQLContext$QueryExecution.sparkPlan(SQLContext.scala:416)*
>> * at
>> org.apache.spark.sql.SQLContext$QueryExecution.executedPlan$lzycompute(SQLContext.scala:422)*
>> * at
>> org.apache.spark.sql.SQLContext$QueryExecution.executedPlan(SQLContext.scala:422)*
>> * at
>> org.apache.spark.sql.SQLContext$QueryExecution.toRdd$lzycompute(SQLContext.scala:425)*
>> * at
>> org.apache.spark.sql.SQLContext$QueryExecution.toRdd(SQLContext.scala:425)*
>> * at org.apache.spark.sql.SchemaRDD.getDependencies(SchemaRDD.scala:127)*
>> * at
>> org.apache.spark.rdd.RDD$$anonfun$dependencies$2.apply(RDD.scala:192)*
>> * at
>> org.apache.spark.rdd.RDD$$anonfun$dependencies$2.apply(RDD.scala:190)*
>> * at scala.Option.getOrElse(Option.scala:120)*
>> * at org.apache.spark.rdd.RDD.dependencies(RDD.scala:190)*
>> * at org.apache.spark.rdd.RDD.firstParent(RDD.scala:1239)*
>> * at org.apache.spark.sql.SchemaRDD.getPartitions(SchemaRDD.scala:122)*
>> * at org.apache.spark.rdd.RDD$$anonfun$partitions$2.apply(RDD.scala:205)*
>> * at org.apache.spark.rdd.RDD$$anonfun$partitions$2.apply(RDD.scala:203)*
>> * at scala.Option.getOrElse(Option.scala:120)*
>> * at org.apache.spark.rdd.RDD.partitions(RDD.scala:203)*
>> * at org.apache.spark.rdd.MappedRDD.getPartitions(MappedRDD.scala:28)*
>> * at org.apache.spark.rdd.RDD$$anonfun$partitions$2.apply(RDD.scala:205)*
>> * at org.apache.spark.rdd.RDD$$anonfun$partitions$2.apply(RDD.scala:203)*
>> * at scala.Option.getOrElse(Option.scala:120)*
>> * at org.apache.spark.rdd.RDD.partitions(RDD.scala:203)*
>> * at org.apache.spark.ShuffleDependency.<init>(Dependency.scala:79)*
>> * at
>> org.apache.spark.rdd.ShuffledRDD.getDependencies(ShuffledRDD.scala:80)*
>> * at
>> org.apache.spark.rdd.RDD$$anonfun$dependencies$2.apply(RDD.scala:192)*
>> * at
>> org.apache.spark.rdd.RDD$$anonfun$dependencies$2.apply(RDD.scala:190)*
>> * at scala.Option.getOrElse(Option.scala:120)*
>> * at org.apache.spark.rdd.RDD.dependencies(RDD.scala:190)*
>> * at
>> org.apache.spark.scheduler.DAGScheduler.visit$1(DAGScheduler.scala:301)*
>> * at
>> org.apache.spark.scheduler.DAGScheduler.getParentStages(DAGScheduler.scala:313)*
>> * at
>> org.apache.spark.scheduler.DAGScheduler.newStage(DAGScheduler.scala:247)*
>> * at
>> org.apache.spark.scheduler.DAGScheduler.handleJobSubmitted(DAGScheduler.scala:734)*
>> * at
>> org.apache.spark.scheduler.DAGSchedulerEventProcessActor$$anonfun$receive$2.applyOrElse(DAGScheduler.scala:1389)*
>> * at akka.actor.ActorCell.receiveMessage(ActorCell.scala:498)*
>> * at akka.actor.ActorCell.invoke(ActorCell.scala:456)*
>> * at akka.dispatch.Mailbox.processMailbox(Mailbox.scala:237)*
>> * at akka.dispatch.Mailbox.run(Mailbox.scala:219)*
>> * at
>> akka.dispatch.ForkJoinExecutorConfigurator$AkkaForkJoinTask.exec(AbstractDispatcher.scala:386)*
>> * at scala.concurrent.forkjoin.ForkJoinTask.doExec(ForkJoinTask.java:260)*
>> * at
>> scala.concurrent.forkjoin.ForkJoinPool$WorkQueue.runTask(ForkJoinPool.java:1339)*
>> * at
>> scala.concurrent.forkjoin.ForkJoinPool.runWorker(ForkJoinPool.java:1979)*
>> * at
>> scala.concurrent.forkjoin.ForkJoinWorkerThread.run(ForkJoinWorkerThread.java:107)*
>> *Caused by:
>> org.apache.hadoop.ipc.RemoteException(org.apache.hadoop.security.AccessControlException):
>> Permission denied: user=kakn, access=READ_EXECUTE,
>> inode="/user/hive/warehouse/rt_freewheel_mastering.db/digital_profile_cluster_in":hive:hive:drwxrwx--t*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.DefaultAuthorizationProvider.checkFsPermission(DefaultAuthorizationProvider.java:257)*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.DefaultAuthorizationProvider.check(DefaultAuthorizationProvider.java:238)*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.DefaultAuthorizationProvider.checkPermission(DefaultAuthorizationProvider.java:151)*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.FSPermissionChecker.checkPermission(FSPermissionChecker.java:138)*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.FSNamesystem.checkPermission(FSNamesystem.java:6287)*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.FSNamesystem.checkPermission(FSNamesystem.java:6269)*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.FSNamesystem.checkPathAccess(FSNamesystem.java:6194)*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.FSNamesystem.getListingInt(FSNamesystem.java:4793)*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.FSNamesystem.getListing(FSNamesystem.java:4755)*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.NameNodeRpcServer.getListing(NameNodeRpcServer.java:800)*
>> * at
>> org.apache.hadoop.hdfs.server.namenode.AuthorizationProviderProxyClientProtocol.getListing(AuthorizationProviderProxyClientProtocol.java:310)*
>> * at
>> org.apache.hadoop.hdfs.protocolPB.ClientNamenodeProtocolServerSideTranslatorPB.getListing(ClientNamenodeProtocolServerSideTranslatorPB.java:606)*
>> * at
>> org.apache.hadoop.hdfs.protocol.proto.ClientNamenodeProtocolProtos$ClientNamenodeProtocol$2.callBlockingMethod(ClientNamenodeProtocolProtos.java)*
>> * at
>> org.apache.hadoop.ipc.ProtobufRpcEngine$Server$ProtoBufRpcInvoker.call(ProtobufRpcEngine.java:587)*
>> * at org.apache.hadoop.ipc.RPC$Server.call(RPC.java:1026)*
>> * at org.apache.hadoop.ipc.Server$Handler$1.run(Server.java:2013)*
>> * at org.apache.hadoop.ipc.Server$Handler$1.run(Server.java:2009)*
>> * at java.security.AccessController.doPrivileged(Native Method)*
>> * at javax.security.auth.Subject.doAs(Subject.java:415)*
>> * at
>> org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1642)*
>> * at org.apache.hadoop.ipc.Server$Handler.run(Server.java:2007)*
>>
>> * at org.apache.hadoop.ipc.Client.call(Client.java:1411)*
>> * at org.apache.hadoop.ipc.Client.call(Client.java:1364)*
>> * at
>> org.apache.hadoop.ipc.ProtobufRpcEngine$Invoker.invoke(ProtobufRpcEngine.java:206)*
>> * at com.sun.proxy.$Proxy14.getListing(Unknown Source)*
>> * at
>> org.apache.hadoop.hdfs.protocolPB.ClientNamenodeProtocolTranslatorPB.getListing(ClientNamenodeProtocolTranslatorPB.java:546)*
>> * at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)*
>> * at
>> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)*
>> * at
>> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)*
>> * at java.lang.reflect.Method.invoke(Method.java:606)*
>> * at
>> org.apache.hadoop.io.retry.RetryInvocationHandler.invokeMethod(RetryInvocationHandler.java:187)*
>> * at
>> org.apache.hadoop.io.retry.RetryInvocationHandler.invoke(RetryInvocationHandler.java:102)*
>> * at com.sun.proxy.$Proxy15.getListing(Unknown Source)*
>> * at org.apache.hadoop.hdfs.DFSClient.listPaths(DFSClient.java:1893)*
>>
>>
>> ---------------------------------------------------------------------
>> To unsubscribe, e-mail: user-unsubscr...@spark.apache.org
>> <javascript:_e(%7B%7D,'cvml','user-unsubscr...@spark.apache.org');>
>> For additional commands, e-mail: user-h...@spark.apache.org
>> <javascript:_e(%7B%7D,'cvml','user-h...@spark.apache.org');>
>>
>

-- 
Sent from Gmail Mobile

Reply via email to