You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@bigtop.apache.org by "Evans Ye (JIRA)" <ji...@apache.org> on 2017/05/10 15:12:04 UTC
[jira] [Commented] (BIGTOP-2763) Add /user/zeppelin directory for
running Spark job on YARN in Zeppelin
[ https://issues.apache.org/jira/browse/BIGTOP-2763?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16004831#comment-16004831 ]
Evans Ye commented on BIGTOP-2763:
----------------------------------
If it's for zeppelin server to write, isn't it better to be something like 744 or else?
Sorry I'm not familiar with zeppelin at all.
> Add /user/zeppelin directory for running Spark job on YARN in Zeppelin
> -----------------------------------------------------------------------
>
> Key: BIGTOP-2763
> URL: https://issues.apache.org/jira/browse/BIGTOP-2763
> Project: Bigtop
> Issue Type: Bug
> Components: deployment
> Affects Versions: 1.2.0
> Reporter: YoungWoo Kim
> Assignee: YoungWoo Kim
> Fix For: 1.2.1
>
> Attachments: BIGTOP-2763.patch
>
>
> To make running Spark on YARN with Zeppelin, it requires '/user/zeppelin' home directory for zeppelin user:
> {noformat}
> ERROR [2017-04-25 14:47:32,905] ({pool-2-thread-2} Logging.scala[logError]:91) - Error initializing SparkContext.
> org.apache.hadoop.security.AccessControlException: Permission denied: user=zeppelin, access=WRITE, inode="/user/zeppelin/.sparkStaging/application_1493099537608_0001":hdfs:hdfs:drwxr-xr-x
> at org.apache.hadoop.hdfs.server.namenode.FSPermissionChecker.check(FSPermissionChecker.java:320)
> at org.apache.hadoop.hdfs.server.namenode.FSPermissionChecker.check(FSPermissionChecker.java:292)
> at org.apache.hadoop.hdfs.server.namenode.FSPermissionChecker.checkPermission(FSPermissionChecker.java:213)
> at org.apache.hadoop.hdfs.server.namenode.FSPermissionChecker.checkPermission(FSPermissionChecker.java:190)
> at org.apache.hadoop.hdfs.server.namenode.FSDirectory.checkPermission(FSDirectory.java:1728)
> at org.apache.hadoop.hdfs.server.namenode.FSDirectory.checkPermission(FSDirectory.java:1712)
> at org.apache.hadoop.hdfs.server.namenode.FSDirectory.checkAncestorAccess(FSDirectory.java:1695)
> at org.apache.hadoop.hdfs.server.namenode.FSDirMkdirOp.mkdirs(FSDirMkdirOp.java:71)
> at org.apache.hadoop.hdfs.server.namenode.FSNamesystem.mkdirs(FSNamesystem.java:3896)
> at org.apache.hadoop.hdfs.server.namenode.NameNodeRpcServer.mkdirs(NameNodeRpcServer.java:984)
> at org.apache.hadoop.hdfs.protocolPB.ClientNamenodeProtocolServerSideTranslatorPB.mkdirs(ClientNamenodeProtocolServerSideTranslatorPB.java:622)
> at org.apache.hadoop.hdfs.protocol.proto.ClientNamenodeProtocolProtos$ClientNamenodeProtocol$2.callBlockingMethod(ClientNamenodeProtocolProtos.java)
> at org.apache.hadoop.ipc.ProtobufRpcEngine$Server$ProtoBufRpcInvoker.call(ProtobufRpcEngine.java:616)
> at org.apache.hadoop.ipc.RPC$Server.call(RPC.java:982)
> at org.apache.hadoop.ipc.Server$Handler$1.run(Server.java:2049)
> at org.apache.hadoop.ipc.Server$Handler$1.run(Server.java:2045)
> at java.security.AccessController.doPrivileged(Native Method)
> at javax.security.auth.Subject.doAs(Subject.java:422)
> at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1698)
> at org.apache.hadoop.ipc.Server$Handler.run(Server.java:2045)
> {noformat}
--
This message was sent by Atlassian JIRA
(v6.3.15#6346)