Hive Security Configuration Options

This section describes changes made in Hive default configuration. It shows how to configure Hive after manual installation.

Unlike the previous releases, starting in MEP 4.0, Hive should be configured by running the $MAPR_HOME/server/configure.sh script with the -R option after installing Hive. Hive demons will not start automatically if Hive is not configured correctly. The security configuration are described in the following sections:

  1. Automatic
  2. Manual
  3. Custom
Note: Do not use ecosystem $HIVE_HOME/bin/configure.sh script for Hive configuration. Every configuration of Hive should be done via the $MAPR_HOME/server/configure.sh utility by running it with the -R option. The core $MAPR_HOME/server/configure.sh utility invokes the ecosystem configure.sh script automatically with appropriate security option.

Automatic

If you installed Hive using the MapR Installer, the MapR Installer configures Hive daemons during installation. Additional configuration is not required.

Manual

After a new manual installation, to generate a valid default ecosystem configuration, run:

$MAPR_HOME/server/configure.sh -R 
Table 1. Example: Hive is installed with the following configuration on a secure cluster
Node, Package Hive HiveServer2 Hive Metastore WebHCat
Node 1 X X    
Node 2 X   X  
Node 3 X     X

As a result:

Hive default ports are as follows:

Role Default Port
Hive Metastore 9083
HiveServer2 10000
HiveWebHCat 50111

Custom

For PAM, LDAP, and Kerberos custom configurations, run configure.sh with the -R option:

$MAPR_HOME/server/configure.sh -R

The hive-site.xml file is not changed. However, Warden files are copied and a HIVE_HOME/conf backup folder is created.