You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@bigtop.apache.org by "Evans Ye (JIRA)" <ji...@apache.org> on 2017/05/10 15:12:04 UTC

[jira] [Commented] (BIGTOP-2763) Add /user/zeppelin directory for running Spark job on YARN in Zeppelin

    [ https://issues.apache.org/jira/browse/BIGTOP-2763?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16004831#comment-16004831 ] 

Evans Ye commented on BIGTOP-2763:
----------------------------------

If it's for zeppelin server to write, isn't it better to be something like 744 or else?
Sorry I'm not familiar with zeppelin at all.

> Add /user/zeppelin directory for running Spark job on YARN in Zeppelin 
> -----------------------------------------------------------------------
>
>                 Key: BIGTOP-2763
>                 URL: https://issues.apache.org/jira/browse/BIGTOP-2763
>             Project: Bigtop
>          Issue Type: Bug
>          Components: deployment
>    Affects Versions: 1.2.0
>            Reporter: YoungWoo Kim
>            Assignee: YoungWoo Kim
>             Fix For: 1.2.1
>
>         Attachments: BIGTOP-2763.patch
>
>
> To make running Spark on YARN with Zeppelin, it requires '/user/zeppelin' home directory for zeppelin user:
> {noformat}
> ERROR [2017-04-25 14:47:32,905] ({pool-2-thread-2} Logging.scala[logError]:91) - Error initializing SparkContext.
> org.apache.hadoop.security.AccessControlException: Permission denied: user=zeppelin, access=WRITE, inode="/user/zeppelin/.sparkStaging/application_1493099537608_0001":hdfs:hdfs:drwxr-xr-x
>         at org.apache.hadoop.hdfs.server.namenode.FSPermissionChecker.check(FSPermissionChecker.java:320)
>         at org.apache.hadoop.hdfs.server.namenode.FSPermissionChecker.check(FSPermissionChecker.java:292)
>         at org.apache.hadoop.hdfs.server.namenode.FSPermissionChecker.checkPermission(FSPermissionChecker.java:213)
>         at org.apache.hadoop.hdfs.server.namenode.FSPermissionChecker.checkPermission(FSPermissionChecker.java:190)
>         at org.apache.hadoop.hdfs.server.namenode.FSDirectory.checkPermission(FSDirectory.java:1728)
>         at org.apache.hadoop.hdfs.server.namenode.FSDirectory.checkPermission(FSDirectory.java:1712)
>         at org.apache.hadoop.hdfs.server.namenode.FSDirectory.checkAncestorAccess(FSDirectory.java:1695)
>         at org.apache.hadoop.hdfs.server.namenode.FSDirMkdirOp.mkdirs(FSDirMkdirOp.java:71)
>         at org.apache.hadoop.hdfs.server.namenode.FSNamesystem.mkdirs(FSNamesystem.java:3896)
>         at org.apache.hadoop.hdfs.server.namenode.NameNodeRpcServer.mkdirs(NameNodeRpcServer.java:984)
>         at org.apache.hadoop.hdfs.protocolPB.ClientNamenodeProtocolServerSideTranslatorPB.mkdirs(ClientNamenodeProtocolServerSideTranslatorPB.java:622)
>         at org.apache.hadoop.hdfs.protocol.proto.ClientNamenodeProtocolProtos$ClientNamenodeProtocol$2.callBlockingMethod(ClientNamenodeProtocolProtos.java)
>         at org.apache.hadoop.ipc.ProtobufRpcEngine$Server$ProtoBufRpcInvoker.call(ProtobufRpcEngine.java:616)
>         at org.apache.hadoop.ipc.RPC$Server.call(RPC.java:982)
>         at org.apache.hadoop.ipc.Server$Handler$1.run(Server.java:2049)
>         at org.apache.hadoop.ipc.Server$Handler$1.run(Server.java:2045)
>         at java.security.AccessController.doPrivileged(Native Method)
>         at javax.security.auth.Subject.doAs(Subject.java:422)
>         at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1698)
>         at org.apache.hadoop.ipc.Server$Handler.run(Server.java:2045)
> {noformat}



--
This message was sent by Atlassian JIRA
(v6.3.15#6346)