[ 
https://issues.apache.org/jira/browse/SPARK-5159?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15996249#comment-15996249
 ] 

Diego Fustes Villadóniga commented on SPARK-5159:
-------------------------------------------------

We are also experimenting problems with version 2.0.0 when activating 
impersonation on a kerberized cluster. In our case, it seems that impersonation 
is working for SELECT queries. However, when we run a CREATE TABLE SELECT or an 
INSERT we receive an exception. The reason is that it is the service user who 
is writing in the hive staging area instead of the impersonated user. 

Impersonation is crucial in order to secure the access to the cluster 
resources, so please look at this asap.



> Thrift server does not respect hive.server2.enable.doAs=true
> ------------------------------------------------------------
>
>                 Key: SPARK-5159
>                 URL: https://issues.apache.org/jira/browse/SPARK-5159
>             Project: Spark
>          Issue Type: Bug
>          Components: SQL
>    Affects Versions: 1.2.0
>            Reporter: Andrew Ray
>         Attachments: spark_thrift_server_log.txt
>
>
> I'm currently testing the spark sql thrift server on a kerberos secured 
> cluster in YARN mode. Currently any user can access any table regardless of 
> HDFS permissions as all data is read as the hive user. In HiveServer2 the 
> property hive.server2.enable.doAs=true causes all access to be done as the 
> submitting user. We should do the same.



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to