Zoomdata Version

Connecting to Hive Sources on A Kerberized HDP Cluster

A secure Hortonworks Data Platform (HDP) cluster uses Kerberos authentication to validate and confirm access requests. You can set up Zoomdata to connect to the secure HDP cluster using the following instructions.

Preparing the Hive cluster

  • Kerberos authentication requires precise time correspondence on all instances to work properly. You need to enable the Network Time Protocol service in your network. For more information, access the topic Using the Network Time Protocol to Synchronize Time .

Configuring Zoomdata Services

Obtaining Kerberos Credentials

Each service must have its own unique identifier called a principal. Perform the following steps:

  1. Install the Kerberos client on the CentOS or Ubuntu machine where the Zoomdata Server resides.

  2. Generate Kerberos principal and corresponding keytab for Zoomdata service. Before you proceed, make sure that:

    • Zoomdata service is running on a node with proper Kerberos configuration: /etc/krb5.conf or similar location for your Linux distribution.
    • The Kerberos realm on your environment is the same as the realm specified in the kdc.conf file from the Hive server.
  3. Check the Kerberos configuration (that is, krb5.conf) and validity of the principal and keytab pair using MIT Kerberos client:

    kinit -V -k -t <zoomdata_principal>.keytab <[email protected]>
  4. Make the keytab accessible for Zoomdata's Hive connector:

    sudo mkdir /etc/zoomdata
    sudo mv <zoomdata_principal>.keytab /etc/zoomdata
    sudo chown zoomdata:zoomdata /etc/zoomdata/<zoomdata_principal>.keytab
    sudo chmod 600 /etc/zoomdata/<zoomdata_principal>.keytab

Configuring a Hive Connector

  1. Create or update the file named /etc/zoomdata/edc-hive.properties. If this file already exists, verify that the information below exists in the file:

    kerberos.krb5.conf.location=/etc/krb5.conf
    kerberos.service.account.authentication=true
    kerberos.service.account.principal=<[email protected]>
    kerberos.service.account.keytab.location=/etc/zoomdata/<zoomdata_principal>.keytab
  2. Restart the Hive connector:

    sudo systemctl restart zoomdata-edc-hive

Connecting to the Kerberized Hive Source

You are now ready to create the Hive source:

  1. Open a new browser window and log into Zoomdata.
  2. Select Sources.
  3. Select Hive.
  4. Specify the name of your source and add a description (if desired). Then click Next.
  5. On the Connection page, define the connection source. You can use an existing connection, if available, or create a new one. To create a new connection, select the Input New Credentials option button and specify the connection name and JDBC URL. Make sure that you enter the JDBC URL in the correct format:

    jdbc:hive2://<hive_host>:10000/;principal=<[email protected]>

    Replace the placeholders as follows:

    • <hive_host>: Specify the IP address/host name of the Hive node to which you are connecting.
    • <[email protected]>: Enter the principal of the Hive node you are connecting to. To get the list of all Hive principals, navigate to Ambari > Admin > Kerberos > Advanced > Hive.
    The 'principal' spec contained in the JDBC URL refers to the principal of the Hive node. [email protected] principal has nothing to do with the [email protected] principal specified for the Zoomdata connector.
  6. Click Validate and once your connection is valid, select Next.

You can continue configuring the data source as described in Managing Data Source Configurations.

After you have completed the configuration, Zoomdata will begin accessing Hive using [email protected] authenticated by its keytab in /etc/zoomdata/<zoomdata_principal>.keytab.

Was this topic helpful?