Design Proposal for Hive Metastore Plugin
|
|
- Everett Carr
- 5 years ago
- Views:
Transcription
1 Design Proposal for Hive Metastore Plugin 1. Use Cases and Motivations 1.1 Hive Privilege Changes as Result of SQL Object Changes SQL DROP TABLE/DATABASE command would like to have all the privileges directly on the table/database to be deleted automatically from Ranger. Similarly, SQL RENAME TABLE command would like to have all the privileges directly on the table to be changed to the renamed table. One more use case is SQL drop/rename column commands would like to see the privileges directly on the column(s) to be adjusted accordingly. 1.2 Hive CLI Users contacts directly with or through the Hive Metastore Server HIVE supports metastore authorization for this use case (HIVE-3705), but it does not work through the existing Ranger Hive Plugin that works only for HiveServer2 now. 1.3 Hadoop Users of M/R, Pig, Hive CLI want to access data sets created by HiveServer2 Specifically, HiveServer2 users want to enjoy the service by the HiveServer2 as a SQL data source with SQL-flavored access control on finer granular objects such as columns, among other advantages from a SQL server. Currently HiveServer2 supports two modes of authorization. The first is storage based authorization and the second is SQL Standard based authorization. The first mode is the default and is intended to share the data between Hive and other Hadoop applications. But the downside is that the Hive SQL access privileges have to be used in combination with those of the underlying HDFS privileges; which is not convenient and natural to SQL users. The second mode is enabled by setting the impersonate flag to false, and is intended to provide the access controls the same as a SQL user would enjoy. This is realized through a superuser named hive who has the full access to the Hive tables. The downside is that the data sharing with other Hadoop application is virtually none. So it is hoped that there is a seamless way of controlling the access to, and supporting the sharing of, the Hadoop data between Hive and other Hadoop applications. 2. Functionalities 2.1 System Authorization It is required that the user of hive be a Ranger admin user to allow him the access to manipulate HDFS privileges (See Section 2.2.3). Otherwise the system authentication and authorization are the same as of now.
2 2.2 Hive Meta Store Plugin and Listeners This is a new Ranger plugin. It uses the same Hive service name as the existing Hive plugin does to communicate with the Ranger Admin server and is co-enabled with the existing Ranger Hive Plugin through the same enabling script of enable-hive-plugin.sh. The new metastore plugin will be used as a static instance by two Hive metastore listener classes to communicate with the Hive service in the Ranger Admin. During the enabling process, the two listeners will be added to hive-site.xml to be instantiated by Hive. And the two listeners can optionally enable logging. The first Hive metastore listener class extends the Hive s MetaStorePreEventListener abstract class to provide 1) Ranger-based authorization on the Hive metastore. Specifically all DML requests, and query requests on databases and tables, are to be authorized this way. But query requests on finer granular levels such as columns or partitions won t be checked here and instead will be checked by the normal RangerHiverAuthorizer that uses the existing RangerHivePlugin for authorization against the Ranger Admin. And 2) handling of the possible needs to sync proper privileges to the HDFS files underlying a Hive table. Details are in Section An object of this class will listen on all Hive metastore events. The second Hive metastore listener class extends the Hive s MetaStoreEventListener abstract class to handle the adjustments of Ranger Hive privileges as result of DDL operations. Details are in Section The new plugin will extend from RangerBasePlugin, handling the authorization requests as therein. It will also send the new requests for the HDFS privilege sync to the Ranger Admin Range Hive Privilege Adjustments as Result of Hive DDL Operations HIVE SQL DDL operations that add/remove/change a HDFS resource name will see the Ranger policy on the exactly matched resource to be added/removed/changed accordingly. Failure of such adjustments will not cause the operation to fail, but just to log a warning of the failure. An example of such a failure is a rename operation that finds an existing policy already on the renamed resource. This is possible because Ranger policy could be on nonexistent objects while SQL does not allow such a scenario Range HDFS Privilege Changes as Result of Hive Metadata Changes There will be a new String member introduced in the configs list of the Hive s servicedef json file, named resourceservice that will specify the HDFS service name whose HDFS entries under a Hive table will have access policies added/deleted according to the existence of the Hive table s objects of data. The default value of null will disable the sync of the HDFS privilege sync due to Hive metadata changes. The setting of this member will be through GUI and RESTful API. To enable the sync of the HDFS privilege due to Hive metadata changes, the proper setting of this new member plus the listener class configuration as described in section are both required. There are four parts of the functionality. The first part is to handle HDFS policy changes as result of Hive DDL operations. This includes any HDFS location creation/deletion from SQL operations of table/partition creation, alteration and deletion. The policy will be for the login user on the HDFS directories on the object s storage location recursively if the login user is different from the current user. The handling is by the new implementation of the MetaStorePreEventListener.
3 The second part is to adjust corresponding HDFS policies to reflect the privilege changes as result of SQL s GRANT/REVOKE calls if such a policy is not present already for GRANT or is present already for REVOKE, and if Hive is not impersonated. The handling is through enhancements to the grant/revokepriveleges methods of the existing RangerHiveAuthorizer class. The name of a Hive-synced HDFS policy will be of the form of hive-grant-<timestamp>. The GRANT will add a policy of recursive access to the HDFS path underlying the Hive object in the GRANT. The REVOKE will remove a policy of the exactly matched resource and on a corresponding privilege. The third part is to adjust Ranger Hive policies as result of SQL s GRANT/REVOKE calls. Right now, Ranger Hive Plugin is only enabled for the HiveServer2 so the Hive CLI does not see corresponding Ranger policies being adjusted as result of Hive GRANT/REVOKE calls. Installation change is required to enable the plugin not just on HiveServer2, but for Hive CLI as well. See 2.4. The names of the new policies created from the sync of the Hive metadata objects will be of the form of hive-grant-<timestamp>. The forth part is to adjust corresponding HDFS policies to reflect the privilege changes as result of Ranger Hive policy changes. Corresponding HDFS policies will have the names of hive-grant-<hive policy name>, and will map the resources, resource patterns, privileges and taggings from the Hive policies. Note that only the SQL objects that have direct backing storage could trigger the HDFS policies changes. These objects include tables and do not include views, locks, plus databases for their not having direct backing stores A prohibitive approach will be adopted when privileges are managed at a finer granularity that the finest backing storage ACL unit of files. On one hand, that is, say, if a user is allowed to access only some, but not all, of columns of a Hive table file, then the file is not accessible to the user. A use case is that a Hive user is only allowed to view the age and address fields but not allowed to view the SSN field of a customer table. The prohibitive approach will not give him the access to the HDFS files containing backing the customer table. If the user has access to all of the columns of the table, he will be allowed to access the backing files on HDFS. On the other hand, Hive privileges will be mapped to HDFS privileges in a prohibitive manner. For instance, both of SQL s CREATE and DROP must be allowed for a backing store s HDFS write to be allowed. Conceivably the full mapping could be complex and could be made ever more comprehensive in a phased approach Sequence Diagram of HDFS Policy Sync from Hive Privilege Changes 2.3 Ranger Admin The RangerServiceREST s grant/revokeaccess methods will handle the policy adjustments as is now, even though the requests could come from both the existing Hive plugin and the new Hive metastore plugin. In addition, the RangerServiceREST s grant/revokeaccess methods, once determined that there is a non-null value of the service s configured key of resourceservice, will locate a HDFS service with the name and adjust policies accordingly therein. A new method of RangerServiceREST, alterresource, will be added to handle the resource renaming requests as result of the SQL s ALTER RENAME operations. 2.4 The ServicePolicies Class
4 This class will be added a new Map<String, String> serviceconfigs field to hold service-specific configurations. For now, if the corresponding servicedef has a non-null resourceservice field, a map entry of resourceservice=>true will be used and, after fetched by the refresher (see 2.5) of a plugin, will trigger the Hive plugin to send over the table storage information to the Admin. 2.5 Refresher The refresher will be enhanced to fetch the serviceconfigs of the ServicePolicies objects from the Admin. 2.6 Hive Plugins If the resourceservice Boolean flag fetched from Admin is true (see 2.4), will send the table storage information to the Admin on DDL commands. 2.7 Installation The Hive configuration needs to enable Hive Metastore Security. Specifically, the hive.metastore.pre.event.listeners and hive.metastore.event. listeners need to be configured to use Ranger implementations. In addition, to support Range Hive policy changes as result of Hive GRANT/REVOKE calls from Hive CLI, the Ranger Hive Plugin is to be enabled in hive-site.xml instead of hiveserver2-site.xml. Essentially through these configuration settings, both Hive Security and Hive Metastore Security are enabled simultaneous through the Ranger. We don t support enabling just one of the two as Hive itself could. 2.8 Ranger DB Store The new resourceservice configuration field of the servicedef will be added to the persistent data store. Backward compatibility should be retained through addition to the x_service_config_map table. 2.9 GUI The Config Properties list of the Hive s Create Service page will be added a new entry named Storage Service that defaults to empty and will otherwise contain the field that denotes the HDFS service name that will see the synched policies as result of the driving Hive table s privilege changes. If the HDFS service of the name does not exist already, an error will be returned and the creation of the Hive service will fail. 3. Appendix 3.1 Hook Invocations by Hive The invocations of the two hooks of MetaStorePreEventListener and HiveAuthorizer by the Hive are examined among different configurations and runtimes. Results are shown in below tables for future references in case when questions/doubts may rise as to what hooks are or should be invoked. MetaStoreEventListener invocations are not examined here and could be added in the future if necessary to clarify things out in that corner. Similarly the experiments are performed using MYSQL as the backing store for the metastore. No other backing store, embedded stores in particular, have been tested here.
5 In the tables, listener denotes MetaStorePreEventListener; Authorizer denotes HiveAuthorizer ; x means no invocation at all; * means seemingly always being denied before possibly proceed further. Conclusions are 1) Hive metastore security needs to be enabled to provide access controls to HIVE CLI; 2) when metastore security is enabled, some checks may be redundantly performed by both of the two hooks, which may represent some inefficiency. When this occurs, metastore checks seem to be performed before the ones by the authorizer, indicating a preference of former over the latter for sake of performance. But the authorizer is capable of finer granular checks like column-level access checks. It remains to be seen how to invoke just one hook over the other depending upon the target to be access controlled. This, however, might require changes on the Hive part Hive CLI, HiveAuthorizer specified in hive-site.xml Hive CLI, HiveAuthorizer specified in hiveserver2-site.xml Hive Server2, HiveAuthorizer specified in hiveserver2-site.xml Hive Server2, HiveAuthorizer specified in hive-site.xml 3.2 Future Extensions It is conceivable that the same sync mechanism as described in Section can be similarly applied to other Hadoop applications. In particular, the new resourceservice field can serve as a link between an application and its underlying storage. It could be even pushed to form a synch chain of morn than two levels. For instance, for a Hive on HBase on HDFS.
Enabling Universal Authorization Models using Sentry
Enabling Universal Authorization Models using Sentry Hao Hao - hao.hao@cloudera.com Anne Yu - anneyu@cloudera.com Vancouver BC, Canada, May 9-12 2016 About us Software engineers at Cloudera Apache Sentry
More informationHive Metadata Caching Proposal
Hive Metadata Caching Proposal Why Metastore Cache During Hive 2 benchmark, we find Hive metastore operation take a lot of time and thus slow down Hive compilation. In some extreme case, it takes much
More informationApache Ranger User Guide
Apache Ranger 0.5 - User Guide USER GUIDE Version : 0.5.0 September 2015 About this document Getting started General Features Login to the system: Log out to the system: Service Manager (Access Manager)
More informationAdministration 1. DLM Administration. Date of Publish:
1 DLM Administration Date of Publish: 2018-07-03 http://docs.hortonworks.com Contents ii Contents Replication Concepts... 4 HDFS cloud replication...4 Hive cloud replication... 4 Cloud replication guidelines
More informationHive and Shark. Amir H. Payberah. Amirkabir University of Technology (Tehran Polytechnic)
Hive and Shark Amir H. Payberah amir@sics.se Amirkabir University of Technology (Tehran Polytechnic) Amir H. Payberah (Tehran Polytechnic) Hive and Shark 1393/8/19 1 / 45 Motivation MapReduce is hard to
More informationLecture 7 (03/12, 03/14): Hive and Impala Decisions, Operations & Information Technologies Robert H. Smith School of Business Spring, 2018
Lecture 7 (03/12, 03/14): Hive and Impala Decisions, Operations & Information Technologies Robert H. Smith School of Business Spring, 2018 K. Zhang (pic source: mapr.com/blog) Copyright BUDT 2016 758 Where
More informationData Access 3. Starting Apache Hive. Date of Publish:
3 Starting Apache Hive Date of Publish: 2018-07-12 http://docs.hortonworks.com Contents Start a Hive shell locally...3 Start Hive as an authorized user... 4 Run a Hive command... 4... 5 Start a Hive shell
More informationOracle Database. Installation and Configuration of Real Application Security Administration (RASADM) Prerequisites
Oracle Database Real Application Security Administration 12c Release 1 (12.1) E61899-04 May 2015 Oracle Database Real Application Security Administration (RASADM) lets you create Real Application Security
More informationRanger 0.5 Audit Configuration
Ranger 0.5 Audit Configuration Introduction Scope of this document Configuration properties naming convention Audit to Solr Audit to Db Audit to HDFS Audit to Log4j Example Configure a log4j appender for
More informationDEC 31, HareDB HBase Client Web Version ( X & Xs) USER MANUAL. HareDB Team
DEC 31, 2016 HareDB HBase Client Web Version (1.120.02.X & 1.120.02.Xs) USER MANUAL HareDB Team Index New features:... 3 Environment requirements... 3 Download... 3 Overview... 5 Connect to a cluster...
More informationReal Application Security Administration
Oracle Database Real Application Security Administration Console (RASADM) User s Guide 12c Release 2 (12.2) E85615-01 June 2017 Real Application Security Administration Oracle Database Real Application
More informationGetting Started 1. Getting Started. Date of Publish:
1 Date of Publish: 2018-07-03 http://docs.hortonworks.com Contents... 3 Data Lifecycle Manager terminology... 3 Communication with HDP clusters...4 How pairing works in Data Lifecycle Manager... 5 How
More informationIntegration of Apache Hive
Integration of Apache Hive and HBase Enis Soztutar enis [at] apache [dot] org @enissoz Page 1 Agenda Overview of Hive and HBase Hive + HBase Features and Improvements Future of Hive and HBase Q&A Page
More informationAbout the Tutorial. Audience. Prerequisites. Copyright & Disclaimer. HCatalog
About the Tutorial HCatalog is a table storage management tool for Hadoop that exposes the tabular data of Hive metastore to other Hadoop applications. It enables users with different data processing tools
More informationUsing Apache Phoenix to store and access data
3 Using Apache Phoenix to store and access data Date of Publish: 2018-07-15 http://docs.hortonworks.com Contents ii Contents What's New in Apache Phoenix...4 Orchestrating SQL and APIs with Apache Phoenix...4
More informationPostgreSQL Documentation. Fast Backward
Prev Fast Backward PostgreSQL 7.4.1 Documentation Fast Forward Next GRANT Name GRANT -- define access privileges Synopsis GRANT { { SELECT INSERT UPDATE DELETE RULE REFERENCES TRIGGER } [,...] ALL [ PRIVILEGES
More informationIntroduction to Hadoop. High Availability Scaling Advantages and Challenges. Introduction to Big Data
Introduction to Hadoop High Availability Scaling Advantages and Challenges Introduction to Big Data What is Big data Big Data opportunities Big Data Challenges Characteristics of Big data Introduction
More informationDelving Deep into Hadoop Course Contents Introduction to Hadoop and Architecture
Delving Deep into Hadoop Course Contents Introduction to Hadoop and Architecture Hadoop 1.0 Architecture Introduction to Hadoop & Big Data Hadoop Evolution Hadoop Architecture Networking Concepts Use cases
More informationAdministration 1. DLM Administration. Date of Publish:
1 DLM Administration Date of Publish: 2018-05-18 http://docs.hortonworks.com Contents Replication concepts... 3 HDFS cloud replication...3 Hive cloud replication... 3 Cloud replication guidelines and considerations...4
More informationMySQL for Developers Ed 3
Oracle University Contact Us: 1.800.529.0165 MySQL for Developers Ed 3 Duration: 5 Days What you will learn This MySQL for Developers training teaches developers how to plan, design and implement applications
More informationData Access 3. Managing Apache Hive. Date of Publish:
3 Managing Apache Hive Date of Publish: 2018-07-12 http://docs.hortonworks.com Contents ACID operations... 3 Configure partitions for transactions...3 View transactions...3 View transaction locks... 4
More informationHDP HDFS ACLs 3. Apache HDFS ACLs. Date of Publish:
3 Apache HDFS ACLs Date of Publish: 2018-07-15 http://docs.hortonworks.com Contents Apache HDFS ACLs... 3 Configuring ACLs on HDFS... 3 Using CLI Commands to Create and List ACLs... 3 ACL Examples... 4
More informationApache Hive for Oracle DBAs. Luís Marques
Apache Hive for Oracle DBAs Luís Marques About me Oracle ACE Alumnus Long time open source supporter Founder of Redglue (www.redglue.eu) works for @redgluept as Lead Data Architect @drune After this talk,
More informationMastering Transact-SQL An Overview of SQL Server 2000 p. 3 SQL Server's Networked Architecture p. 4 SQL Server's Basic Components p.
Acknowledgments p. xxiii Introduction p. xxv Mastering Transact-SQL An Overview of SQL Server 2000 p. 3 SQL Server's Networked Architecture p. 4 SQL Server's Basic Components p. 8 Transact-SQL p. 9 SQL
More informationBecause databases are not easily accessible by Hadoop, Apache Sqoop was created to efficiently transfer bulk data between Hadoop and external
Because databases are not easily accessible by Hadoop, Apache Sqoop was created to efficiently transfer bulk data between Hadoop and external structured datastores. The popularity of Sqoop in enterprise
More informationITS. MySQL for Database Administrators (40 Hours) (Exam code 1z0-883) (OCP My SQL DBA)
MySQL for Database Administrators (40 Hours) (Exam code 1z0-883) (OCP My SQL DBA) Prerequisites Have some experience with relational databases and SQL What will you learn? The MySQL for Database Administrators
More informationMastering phpmyadmiri 3.4 for
Mastering phpmyadmiri 3.4 for Effective MySQL Management A complete guide to getting started with phpmyadmin 3.4 and mastering its features Marc Delisle [ t]open so 1 I community experience c PUBLISHING
More informationT-sql Grant View Definition Example
T-sql Grant View Definition Example View the Definition of a Stored Procedure View the For more information, see GRANT Object Permissions (Transact-SQL). Arrow icon used with Back This example grants EXECUTE
More informationSecurity and Performance advances with Oracle Big Data SQL
Security and Performance advances with Oracle Big Data SQL Jean-Pierre Dijcks Oracle Redwood Shores, CA, USA Key Words SQL, Oracle, Database, Analytics, Object Store, Files, Big Data, Big Data SQL, Hadoop,
More informationMySQL Database Administrator Training NIIT, Gurgaon India 31 August-10 September 2015
MySQL Database Administrator Training Day 1: AGENDA Introduction to MySQL MySQL Overview MySQL Database Server Editions MySQL Products MySQL Services and Support MySQL Resources Example Databases MySQL
More informationHow to Install and Configure EBF14514 for IBM BigInsights 3.0
How to Install and Configure EBF14514 for IBM BigInsights 3.0 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying,
More informationDatabase Management System 9
Database Management System 9 School of Computer Engineering, KIIT University 9.1 Relational data model is the primary data model for commercial data- processing applications A relational database consists
More informationGranting Read-only Access To An Existing Oracle Schema
Granting Read-only Access To An Existing Oracle Schema Oracle recommends that you only grant the ANY privileges to trusted users. Use the IDENTIFIED BY clause to specify a new password for an existing
More informationChapter 1 SQL and Data
Chapter 1 SQL and Data What is SQL? Structured Query Language An industry-standard language used to access & manipulate data stored in a relational database E. F. Codd, 1970 s IBM 2 What is Oracle? A relational
More informationCO MySQL for Database Administrators
CO-61762 MySQL for Database Administrators Summary Duration 5 Days Audience Administrators, Database Designers, Developers Level Professional Technology Oracle MySQL 5.5 Delivery Method Instructor-led
More information5. Single-row function
1. 2. Introduction Oracle 11g Oracle 11g Application Server Oracle database Relational and Object Relational Database Management system Oracle internet platform System Development Life cycle 3. Writing
More informationDatabase Management Systems Design. Week 6 MySQL Project
Database Management Systems Design Week 6 MySQL Project This week we will be looking at how we can control access to users and groups of users on databases, tables. I have attempted to limit coverage of
More informationConfiguring Apache Ranger Authentication with UNIX, LDAP, or AD
3 Configuring Apache Ranger Authentication with UNIX, LDAP, or AD Date of Publish: 2018-07-15 http://docs.hortonworks.com Contents...3 Configure Ranger Authentication for UNIX... 3 Configure Ranger Authentication
More informationInformatica Cloud Spring Hadoop Connector Guide
Informatica Cloud Spring 2017 Hadoop Connector Guide Informatica Cloud Hadoop Connector Guide Spring 2017 December 2017 Copyright Informatica LLC 2015, 2017 This software and documentation are provided
More informationSchema Validate With Oracle 10g Database Status
Schema Validate With Oracle 10g Database Status This exam has been validated against Oracle Database 10g, Oracle Database 11g, Oracle Database 11g Release 2, and Oracle Database 12c Release 1. Copy whole
More informationHCatalog. Table Management for Hadoop. Alan F. Page 1
HCatalog Table Management for Hadoop Alan F. Gates @alanfgates Page 1 Who Am I? HCatalog committer and mentor Co-founder of Hortonworks Tech lead for Data team at Hortonworks Pig committer and PMC Member
More informationHow to Run the Big Data Management Utility Update for 10.1
How to Run the Big Data Management Utility Update for 10.1 2016 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording
More informationCreating Connection With Hive. Version: 16.0
Creating Connection With Hive Version: 16.0 Copyright 2015 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not be copied or derived
More informationMySQL for Developers Ed 3
Oracle University Contact Us: 0845 777 7711 MySQL for Developers Ed 3 Duration: 5 Days What you will learn This MySQL for Developers training teaches developers how to plan, design and implement applications
More informationAlter Change Default Schema Oracle Sql Developer
Alter Change Default Schema Oracle Sql Developer Set default schema in Oracle Developer Tools in Visual STudio 2013 any other schema's. I can run alter session set current_schema=xxx Browse other questions
More informationIBM DB2 Query Patroller. Administration Guide. Version 7 SC
IBM DB2 Query Patroller Administration Guide Version 7 SC09-2958-00 IBM DB2 Query Patroller Administration Guide Version 7 SC09-2958-00 Before using this information and the product it supports, be sure
More informationDeep Dive Into Storage Optimization When And How To Use Adaptive Compression. Thomas Fanghaenel IBM Bill Minor IBM
Deep Dive Into Storage Optimization When And How To Use Adaptive Compression Thomas Fanghaenel IBM Bill Minor IBM Agenda Recap: Compression in DB2 9 for Linux, Unix and Windows New in DB2 10 for Linux,
More informationAPI Gateway Version September Key Property Store User Guide
API Gateway Version 7.5.2 15 September 2017 Key Property Store User Guide Copyright 2017 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.5.2 No
More informationMySQL 8.0: Atomic DDLs Implementation and Impact
MySQL 8.0: Atomic DDLs Implementation and Impact Ståle Deraas, Senior Development Manager Oracle, MySQL 26 Sept 2017 Copyright 2017, Oracle and/or its its affiliates. All All rights reserved. Safe Harbor
More informationRelease Notes 1. DLM Release Notes. Date of Publish:
1 DLM Release Notes Date of Publish: 2018-05-18 http://docs.hortonworks.com Contents...3 What s New in this Release...3 Behavioral Changes... 3 Known Issues...3 Fixed Issues...5 This document provides
More informationCertified Big Data and Hadoop Course Curriculum
Certified Big Data and Hadoop Course Curriculum The Certified Big Data and Hadoop course by DataFlair is a perfect blend of in-depth theoretical knowledge and strong practical skills via implementation
More informationTrafodion Enterprise-Class Transactional SQL-on-HBase
Trafodion Enterprise-Class Transactional SQL-on-HBase Trafodion Introduction (Welsh for transactions) Joint HP Labs & HP-IT project for transactional SQL database capabilities on Hadoop Leveraging 20+
More informationUsing. Safran Planner SQL System Administration. Safran Planner SQL version 4.1
Using Safran Planner SQL System Administration Safran Planner SQL version 4.1 Copyright (c) 1999-2009, Safran Software Solutions AS. All Rights reserved. Accuracy Although every effort has been made to
More informationIf you have ever appeared for the Hadoop interview, you must have experienced many Hadoop scenario based interview questions.
Scenario Based Hadoop Interview Questions & Answers [Mega List] If you have ever appeared for the Hadoop interview, you must have experienced many Hadoop scenario based interview questions. Here I have
More informationMobileFast SyncStudio. A Complete Mobile Database Synchronization Solution. Quick-Start Manual. Release 1.61, May 2014
MobileFast SyncStudio A Complete Mobile Database Synchronization Solution Quick-Start Manual Release 1.61, May 2014 Copyright 2014 by MobileFast Corporation All rights reserved Page 1 of 25 Edition Notes
More informationOracle Database 10g: Introduction to SQL
ORACLE UNIVERSITY CONTACT US: 00 9714 390 9000 Oracle Database 10g: Introduction to SQL Duration: 5 Days What you will learn This course offers students an introduction to Oracle Database 10g database
More informationHow to Configure Informatica HotFix 2 for Cloudera CDH 5.3
How to Configure Informatica 9.6.1 HotFix 2 for Cloudera CDH 5.3 1993-2015 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying,
More informationEDB Postgres Hadoop Data Adapter Guide
EDB Postgres Hadoop Data Adapter Guide September 27, 2016 by EnterpriseDB Corporation EnterpriseDB Corporation, 34 Crosby Drive Suite 100, Bedford, MA 01730, USA T +1 781 357 3390 F +1 978 589 5701 E info@enterprisedb.com
More informationData Governance Overview
3 Data Governance Overview Date of Publish: 2018-04-01 http://docs.hortonworks.com Contents Apache Atlas Overview...3 Apache Atlas features...3...4 Apache Atlas Overview Apache Atlas Overview Apache Atlas
More informationInnovatus Technologies
HADOOP 2.X BIGDATA ANALYTICS 1. Java Overview of Java Classes and Objects Garbage Collection and Modifiers Inheritance, Aggregation, Polymorphism Command line argument Abstract class and Interfaces String
More informationHDI+Talena Resources Deployment Guide. J u n e
HDI+Talena Resources Deployment Guide J u n e 2 0 1 7 2017 Talena Inc. All rights reserved. Talena, the Talena logo are trademarks of Talena Inc., registered in the U.S. Other company and product names
More informationMySQL for Database Administrators Ed 3.1
Oracle University Contact Us: 1.800.529.0165 MySQL for Database Administrators Ed 3.1 Duration: 5 Days What you will learn The MySQL for Database Administrators training is designed for DBAs and other
More informationAccess Control. Access control: ensures that all direct accesses to object are authorized a scheme for mapping users to allowed actions
Access Control 1 Access Control Access control: ensures that all direct accesses to object are authorized a scheme for mapping users to allowed actions Protection objects: system resources for which protection
More informationAdvanced ASP.NET Identity. Brock Allen
Advanced ASP.NET Identity Brock Allen brockallen@gmail.com http://brockallen.com @BrockLAllen Advanced The complicated bits of ASP.NET Identity Brock Allen brockallen@gmail.com http://brockallen.com @BrockLAllen
More informationPASSPORTAL PLUGIN DOCUMENTATION
Contents Requirements... 2 Install or Update Passportal Plugin Solution Center... 3 Configuring Passportal Plugin... 5 Client mapping... 6 User Class Configuration... 7 About the Screens... 8 Passportal
More informationBig Data Hadoop Developer Course Content. Big Data Hadoop Developer - The Complete Course Course Duration: 45 Hours
Big Data Hadoop Developer Course Content Who is the target audience? Big Data Hadoop Developer - The Complete Course Course Duration: 45 Hours Complete beginners who want to learn Big Data Hadoop Professionals
More informationRelational Database Languages
Relational Database Languages Tuple relational calculus ALPHA (Codd, 1970s) QUEL (based on ALPHA) Datalog (rule-based, like PROLOG) Domain relational calculus QBE (used in Access) History of SQL Standards:
More informationHIVE MOCK TEST HIVE MOCK TEST III
http://www.tutorialspoint.com HIVE MOCK TEST Copyright tutorialspoint.com This section presents you various set of Mock Tests related to Hive. You can download these sample mock tests at your local machine
More information4/19/2017. stderr: /var/lib/ambari-agent/data/errors-652.txt. stdout: /var/lib/ambari-agent/data/output-652.txt 1/6
stderr: /var/lib/ambari-agent/data/errors-652.txt Traceback (most recent call last): File "/var/lib/ambari-agent/cache/common-services/hive/0.12.0.2.0/package/scripts/hive_server_interactive.py", line
More informationWorking with Database Connections. Version: 18.1
Working with Database Connections Version: 18.1 Copyright 2018 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not be copied or
More informationHistory of SQL. Relational Database Languages. Tuple relational calculus ALPHA (Codd, 1970s) QUEL (based on ALPHA) Datalog (rule-based, like PROLOG)
Relational Database Languages Tuple relational calculus ALPHA (Codd, 1970s) QUEL (based on ALPHA) Datalog (rule-based, like PROLOG) Domain relational calculus QBE (used in Access) History of SQL Standards:
More informationOracle Big Data SQL High Performance Data Virtualization Explained
Keywords: Oracle Big Data SQL High Performance Data Virtualization Explained Jean-Pierre Dijcks Oracle Redwood City, CA, USA Big Data SQL, SQL, Big Data, Hadoop, NoSQL Databases, Relational Databases,
More informationManaging Configurations
CHAPTER 3 The Configurations page is your starting point for managing device configurations for network elements managed by Cisco Prime Network by using the CM tools. The following table lists the main
More informationHortonworks Data Platform
Data Governance () docs.hortonworks.com : Data Governance Copyright 2012-2017 Hortonworks, Inc. Some rights reserved. The, powered by Apache Hadoop, is a massively scalable and 100% open source platform
More informationLayer-4 to Layer-7 Services
Overview, page 1 Tenant Edge-Firewall, page 1 LBaaS, page 2 FWaaS, page 4 Firewall Configuration, page 6 Overview Layer-4 through Layer-7 services support(s) end-to-end communication between a source and
More informationIntellicus Enterprise Reporting and BI Platform
Working with Database Connections Intellicus Enterprise Reporting and BI Platform Intellicus Technologies info@intellicus.com www.intellicus.com Copyright 2014 Intellicus Technologies This document and
More informationAccess Control. Protects against accidental and malicious threats by
Access Control 1 Access Control Access control: ensures that all direct accesses to object are authorized a scheme for mapping users to allowed actions Protection objects: system resources for which protection
More informationManual Trigger Sql Server 2008 Example Inserted Table
Manual Trigger Sql Server 2008 Example Inserted Table Oracle equivalent for SQL Server INSERTED and DELETED tables (find the msdn article here: msdn.microsoft.com/en-us/library/ms191300.aspx) Or else I
More informationReview -Chapter 4. Review -Chapter 5
Review -Chapter 4 Entity relationship (ER) model Steps for building a formal ERD Uses ER diagrams to represent conceptual database as viewed by the end user Three main components Entities Relationships
More informationHow to Configure Big Data Management 10.1 for MapR 5.1 Security Features
How to Configure Big Data Management 10.1 for MapR 5.1 Security Features 2014, 2016 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying,
More informationNonStop SQL/MX DBS. Concepts and Architecture. Frans Jongma, NonStop Advanced Technology Center
NonStop SQL/MX DBS Concepts and Architecture Frans Jongma, NonStop Advanced Technology Center Agenda Definitions Multi-tenant database What defines a database What defines an instance High level overview
More informationOracle Alter Session Set Current_schema Runs Under What User
Oracle Alter Session Set Current_schema Runs Under What User I performed this installation on a RHEL 6.6 system with a remote Oracle 12c database and run into several issues. ORA-65096: invalid common
More informationUsing Apache Phoenix to store and access data
3 Date of Publish: 2018-08-30 http://docs.hortonworks.com Contents ii Contents What's New in Apache Phoenix...4 Orchestrating SQL and APIs with Apache Phoenix...4 Enable Phoenix and interdependent components...4
More informationIntroduction to Hive Cloudera, Inc.
Introduction to Hive Outline Motivation Overview Data Model Working with Hive Wrap up & Conclusions Background Started at Facebook Data was collected by nightly cron jobs into Oracle DB ETL via hand-coded
More informationVMWARE NSX & OTRS. Automating Security with Help Desk Systems
TECHNICAL WHITE PAPER - MARCH 2018 VMWARE NSX & OTRS Automating Security with Help Desk Systems Sander Martijn (sander@vmguru.com) Anne Jan Elsinga (aelsinga@vmware.com) Martijn Smit (msmit@vmware.com)
More informationManagement Tools. Management Tools. About the Management GUI. About the CLI. This chapter contains the following sections:
This chapter contains the following sections:, page 1 About the Management GUI, page 1 About the CLI, page 1 User Login Menu Options, page 2 Customizing the GUI and CLI Banners, page 3 REST API, page 3
More informationOracle User Administration
Oracle User Administration Creating user accounts User accounts consist of two components. These are: 1. User name - The name of the account. 2. Password - The password associated with the user account.
More informationCompile All Schema This Sql Server 2005 Change Tables
Compile All Schema This Sql Server 2005 Change Tables SQL Server has a pool of memory that is used to store both execution plans When memory pressure exists, the Database Engine uses a cost-based For all
More informationCERTIFICATE IN SOFTWARE DEVELOPMENT LIFE CYCLE IN BIG DATA AND BUSINESS INTELLIGENCE (SDLC-BD & BI)
CERTIFICATE IN SOFTWARE DEVELOPMENT LIFE CYCLE IN BIG DATA AND BUSINESS INTELLIGENCE (SDLC-BD & BI) The Certificate in Software Development Life Cycle in BIGDATA, Business Intelligence and Tableau program
More informationUsing SQL with SQL Developer Part II
One Data Manipulation in SQL Developer 2 Introduction 3 Updating a record in Data 4 Updating a Primary Key in Data 6 Reverting Changes using Refresh 7 Updating a table with a trigger in Data 8 Deleting
More information70-459: Transition Your MCITP: Database Administrator 2008 or MCITP: Database Developer 2008 to MCSE: Data Platform
70-459: Transition Your MCITP: Database Administrator 2008 or MCITP: Database Developer 2008 to MCSE: Data Platform The following tables show where changes to exam 70-459 have been made to include updates
More informationHow To Grant Access To All Tables In A Schema Db2
How To Grant Access To All Tables In A Schema Db2 SELECT on all SYSCAT and SYSIBM tables, SELECT and UPDATE on all EXECUTE with GRANT on all procedures in schema SQLJ, EXECUTE with GRANT. You can grant
More informationIntegration tool user manual
Integration tool user manual contact@ilocksystems.com www.ilocksystems.com tel.+ (48) 61 669 06 87 technical support: support@ilocksystems.com 1 P age Table of contents I. Basic information.... 2 1. What
More informationApache ZooKeeper ACLs
3 Apache ZooKeeper ACLs Date of Publish: 2018-07-15 http://docs.hortonworks.com Contents Apache ZooKeeper ACLs Best Practices...3 ZooKeeper ACLs Best Practices: Accumulo... 3 ZooKeeper ACLs Best Practices:
More informationThis is a brief tutorial that explains how to make use of Sqoop in Hadoop ecosystem.
About the Tutorial Sqoop is a tool designed to transfer data between Hadoop and relational database servers. It is used to import data from relational databases such as MySQL, Oracle to Hadoop HDFS, and
More informationTresorit Active Directory Connector V2.0. User s Guide
Tresorit Active Directory Connector V2.0 User s Guide Copyright by Tresorit 2018 Contents About Tresorit Active Directory Connector... 4 Features... 4 Synchronization logic... 5 About managed users and
More informationSqoop In Action. Lecturer:Alex Wang QQ: QQ Communication Group:
Sqoop In Action Lecturer:Alex Wang QQ:532500648 QQ Communication Group:286081824 Aganda Setup the sqoop environment Import data Incremental import Free-Form Query Import Export data Sqoop and Hive Apache
More informationSecuring the Oracle BDA - 1
Hello and welcome to this online, self-paced course titled Administering and Managing the Oracle Big Data Appliance (BDA). This course contains several lessons. This lesson is titled Securing the Oracle
More informationCTC Accounts Active Directory Synchronizer User Guide
i Contents Overview... 3 System Requirements... 4 Additional Notes... 5 Installation and Configuration... 6 Running the Synchronizer Interactively... 7 Automatic Updates... 7 Logging In... 8 Options...
More informationDefining an ODBC data source
Defining an ODBC data source Cisco IPIVR and ICM Environment ALINEiT LLC alineit.com OVERVIEW This guideline document provides the steps needed to create an ODBC data source for the Cisco IPIVR application.
More information