[ https://issues.apache.org/jira/browse/CRUNCH-536?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Josh Wills resolved CRUNCH-536. ------------------------------- Resolution: Fixed Fix Version/s: 0.13.0 Pushed to master. > crunch jobs fail to use hbase api of secured hbase > -------------------------------------------------- > > Key: CRUNCH-536 > URL: https://issues.apache.org/jira/browse/CRUNCH-536 > Project: Crunch > Issue Type: Bug > Reporter: Jan Van Besien > Fix For: 0.13.0 > > Attachments: CRUNCH-536.patch, CRUNCH-536b.patch > > > When accessing a secured hbase from within a mapreduce job, it is required > that the hbase credentials are initialized on the job before it was > submitted. This can be done with TableMapReduceUtil.initCredentials(job). > In case the job is the consequence of using HBaseSourceTarget, crunch-hbase > can take care of it, see CRUNCH-535. > However, it is also possible to write DoFn's that use the HBase api directly, > without using hbase input/output format. As an example use case, consider a > job that bulk writes data to hbase by writing HFiles on HDFS which are later > to be loaded into HBase. Such a job doesn't read or write from/to hbase using > an input/output format directly, but it might still require access to other > tables in HBase, for example auxiliary tables with metadata specific to the > application. > We can of course not expect crunch-core to call initCredentials (which is > HBase specific) on all jobs, just in case, but it would be nice to be able to > register a callback on the MRPipeline which is applied to every job before it > is submitted, to cover this use case. > I will provide a patch which will help to explain what I am suggesting here. -- This message was sent by Atlassian JIRA (v6.3.4#6332)