Repository: drill Updated Branches: refs/heads/gh-pages b4e36a337 -> 308381737
doc edits Project: http://git-wip-us.apache.org/repos/asf/drill/repo Commit: http://git-wip-us.apache.org/repos/asf/drill/commit/30838173 Tree: http://git-wip-us.apache.org/repos/asf/drill/tree/30838173 Diff: http://git-wip-us.apache.org/repos/asf/drill/diff/30838173 Branch: refs/heads/gh-pages Commit: 3083817376d30717d180e09d834aa31ca27f39a0 Parents: b4e36a3 Author: Bridget Bevens <bbev...@maprtech.com> Authored: Thu May 5 14:44:31 2016 -0700 Committer: Bridget Bevens <bbev...@maprtech.com> Committed: Thu May 5 14:44:31 2016 -0700 ---------------------------------------------------------------------- .../070-configuring-user-impersonation.md | 30 ++++------------ ...ata-sources-and-file-formats-introduction.md | 22 ++++++++++-- .../sql-commands/050-create-view.md | 37 +------------------- 3 files changed, 27 insertions(+), 62 deletions(-) ---------------------------------------------------------------------- http://git-wip-us.apache.org/repos/asf/drill/blob/30838173/_docs/configure-drill/070-configuring-user-impersonation.md ---------------------------------------------------------------------- diff --git a/_docs/configure-drill/070-configuring-user-impersonation.md b/_docs/configure-drill/070-configuring-user-impersonation.md index 5bb3e42..efa0949 100644 --- a/_docs/configure-drill/070-configuring-user-impersonation.md +++ b/_docs/configure-drill/070-configuring-user-impersonation.md @@ -1,6 +1,6 @@ --- title: "Configuring User Impersonation" -date: +date: 2016-05-05 21:44:32 UTC parent: "Configure Drill" --- Impersonation allows a service to act on behalf of a client while performing the action requested by the client. By default, user impersonation is disabled in Drill. You can configure user impersonation in the <DRILLINSTALL_HOME>/conf/drill-override.conf file. @@ -20,28 +20,11 @@ When impersonation is enabled and user Bob issues a query through the SQLLine cl ## Impersonation Support The following table lists the clients, storage plugins, and types of queries that you can use with impersonation in Drill: -<table> - <tr> - <th>Type</th> - <th>Supported</th> - <th>Not Supported</th> - </tr> - <tr> - <td>Clients</td> - <td>SQLLine, ODBC, JDBC</td> - <td>Drill Web Console, REST API</td> - </tr> - <tr> - <td>Storage Plugins</td> - <td>File System</td> - <td>Hive HBase</td> - </tr> - <tr> - <td>Queries</td> - <td>When you enable impersonation, the setting applies to queries on data and metadata. For example, if you issue the SHOW SCHEMAS command, Drill impersonates the user logged into the client to access the requested metadata. If you issue a SELECT query on a workspace, Drill impersonates the user logged in to the client to access the requested data. Drill applies impersonation to queries issued using the following commands: <br>SHOW SCHEMAS <br>SHOW DATABASES<br> SHOW TABLES<br> CTAS<br> SELECT<br> CREATE VIEW<br> DROP VIEW<br> SHOW FILES<br> To successfully run the CTAS and CREATE VIEW commands, a user must have write permissions on the directory where the table or view will exist. Running these commands creates artifacts on the file system.</td> - <td></td> - </tr> -</table> +| Type | Supported | Not Supported | +|-----------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------| +| Clients | SQLLine, ODBC, JDBC | Drill Web Console, REST API | +| Storage Plugins | File System, Hive, MapR-DB | HBase | +| Queries | When you enable impersonation, the setting applies to queries on data and metadata. For example, if you issue the SHOW SCHEMAS command, Drill impersonates the user logged into the client to access the requested metadata. If you issue a SELECT query on a workspace, Drill impersonates the user logged in to the client to access the requested data. Drill applies impersonation to queries issued using the following commands: SHOW SCHEMAS, SHOW DATABASES, SHOW TABLES, CTAS, SELECT, CREATE VIEW, DROP VIEW, SHOW FILES. To successfully run the CTAS and CREATE VIEW commands, a user must have write permissions on the directory where the table or view will exist. Running these commands creates artifacts on the file system. | | ## Impersonation and Views You can use views with impersonation to provide granular access to data and protect sensitive information. When you create a view, Drill stores the view definition in a file and suffixes the file with .drill.view. For example, if you create a view named myview, Drill creates a view file named myview.drill.view and saves it in the current workspace or the workspace specified, such as dfs.views.myview. See [CREATE VIEW]({{site.baseurl}}/docs/create-view) Command. @@ -61,7 +44,6 @@ Only a view owner or a super user can modify permissions on a view file to chang Use the `chmod` and `chown` commands with the appropriate octal code to change permissions on a view file: - hadoop fs âchmod <octal code> <file_name> hadoop fs âchown <user>:<group> <file_name> Example: `hadoop fs âchmod 750 employees.drill.view` http://git-wip-us.apache.org/repos/asf/drill/blob/30838173/_docs/data-sources-and-file-formats/010-data-sources-and-file-formats-introduction.md ---------------------------------------------------------------------- diff --git a/_docs/data-sources-and-file-formats/010-data-sources-and-file-formats-introduction.md b/_docs/data-sources-and-file-formats/010-data-sources-and-file-formats-introduction.md index 95dd89d..276eea8 100644 --- a/_docs/data-sources-and-file-formats/010-data-sources-and-file-formats-introduction.md +++ b/_docs/data-sources-and-file-formats/010-data-sources-and-file-formats-introduction.md @@ -1,6 +1,6 @@ --- title: "Data Sources and File Formats Introduction" -date: +date: 2016-05-05 21:44:33 UTC parent: "Data Sources and File Formats" --- Included in the data sources that Drill supports are these key data sources: @@ -8,7 +8,24 @@ Included in the data sources that Drill supports are these key data sources: * HBase * Hive * MapR-DB -* File system +* File system + +Drill considers data sources to have either a strong schema or a weak schema. + +The following table describes each schema type: + +| Schema Type | Description | +|-------------|-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| +| Strong | With the exception of text file data sources, Drill verifies that data sources associated with a strong schema contain data types compatible with those used in the query. Drill also verifies that the columns referenced in the query exist in the underlying data sources. If the columns do not exist, CREATE VIEW fails. | +| Weak | Drill does not verify that data sources associated with a weak schema contain data types compatible with those used in the query. Drill does not verify if columns referenced in a query on a Parquet data source exist, therefore CREATE VIEW always succeeds. In the case of JSON files, Drill does not verify if the files contain the maps specified in the view. | + +The following table lists the current categories of schema and the data +sources associated with each: + +| | Strong Schema | Weak Schema | +|--------------|-------------------------------------------------|-------------------------------------------------| +| Data Sources | views, hive tables, hbase column families, text | json, mongodb, hbase column qualifiers, parquet | + Drill supports the following input formats for data: @@ -25,3 +42,4 @@ Drill supports the following input formats for data: You set the input format for data coming from data sources to Drill in the workspace portion of the [storage plugin]({{ site.baseurl }}/docs/storage-plugin-registration) definition. The default input format in Drill is Parquet. You change one of the `store` property in the [sys.options table]({{ site.baseurl }}/docs/configuration-options-introduction/) to set the output format of Drill data. The default storage format for Drill CREATE TABLE AS (CTAS) statements is Parquet. + http://git-wip-us.apache.org/repos/asf/drill/blob/30838173/_docs/sql-reference/sql-commands/050-create-view.md ---------------------------------------------------------------------- diff --git a/_docs/sql-reference/sql-commands/050-create-view.md b/_docs/sql-reference/sql-commands/050-create-view.md index 477b7e6..e76a1d3 100644 --- a/_docs/sql-reference/sql-commands/050-create-view.md +++ b/_docs/sql-reference/sql-commands/050-create-view.md @@ -1,6 +1,6 @@ --- title: "CREATE VIEW" -date: +date: 2016-05-05 21:44:33 UTC parent: "SQL Commands" --- The CREATE VIEW command creates a virtual structure for the result set of a @@ -64,41 +64,6 @@ when you run the CREATE VIEW command, suffixed `by .view.drill`. For example, if you create a view named `myview`, Drill stores the view in the designated workspace as `myview.view.drill`. -Data Sources - -Drill considers data sources to have either a strong schema or a weak schema. - -##### Strong Schema - -With the exception of text file data sources, Drill verifies that data sources -associated with a strong schema contain data types compatible with those used -in the query. Drill also verifies that the columns referenced in the query -exist in the underlying data sources. If the columns do not exist, CREATE VIEW -fails. - -#### Weak Schema - -Drill does not verify that data sources associated with a weak schema contain -data types compatible with those used in the query. Drill does not verify if -columns referenced in a query on a Parquet data source exist, therefore CREATE -VIEW always succeeds. In the case of JSON files, Drill does not verify if the -files contain the maps specified in the view. - -The following table lists the current categories of schema and the data -sources associated with each: - -<table> - <tr> - <th></th> - <th>Strong Schema</th> - <th>Weak Schema</th> - </tr> - <tr> - <td valign="top">Data Sources</td> - <td>views<br>hive tables<br>hbase column families<br>text</td> - <td>json<br>mongodb<br>hbase column qualifiers<br>parquet</td> - </tr> -</table> ## Related Commands