Github user mccheah commented on the pull request: https://github.com/apache/spark/pull/4106#issuecomment-70553855 One other caveat I forgot to mention, and the commit message should be updated and this reflected in the docs: User proxying needs to be enabled. Basically, the user principal configured to access the Hadoop cluster should not be the user that is running the spark job. Suppose the Hadoop principal is userHadoop and the spark user is userSpark. When I run the Spark job, I need userHadoop's privileges, but don't want to run the job as userHadoop. So we have userHadoop impersonate userSpark by using UserGroupInformation.createProxyUser(). HOWEVER this requires that user proxies are configured properly. For details see http://hadoop.apache.org/docs/r1.2.1/Secure_Impersonation.html
--- If your project is set up for it, you can reply to this email and have your reply appear on GitHub as well. If your project does not have this feature enabled and wishes so, or if the feature is enabled but not working, please contact infrastructure at infrastruct...@apache.org or file a JIRA ticket with INFRA. --- --------------------------------------------------------------------- To unsubscribe, e-mail: reviews-unsubscr...@spark.apache.org For additional commands, e-mail: reviews-h...@spark.apache.org