You are viewing a plain text version of this content. The canonical link for it is here.
Posted to user@drill.apache.org by William Witt <wi...@witt-family.net> on 2015/12/12 23:41:27 UTC

Kerberos on Hive

I’m trying to use Drill on a kerberized CDH cluster.  I attempted to adapt the mapr directions [http://doc.mapr.com/display/MapR/Configuring+Drill+to+Use+Kerberos+with+Hive+Metastore]  to my use case, but keeping getting a stack trace from drill when enabling sasl:

17:24:27.602 [qtp1083696596-53] ERROR o.a.thrift.transport.TSaslTransport - SASL negotiation failure
javax.security.sasl.SaslException: GSS initiate failed
        at com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212) ~[na:1.7.0_79]
        at org.apache.thrift.transport.TSaslClientTransport.handleSaslStartMessage(TSaslClientTransport.java:94) [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
        at org.apache.thrift.transport.TSaslTransport.open(TSaslTransport.java:253) ~[drill-hive-exec-shaded-1.3.0.jar:1.3.0]
        at org.apache.thrift.transport.TSaslClientTransport.open(TSaslClientTransport.java:37) [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
        at org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport$1.run(TUGIAssumingTransport.java:52) [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
        at org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport$1.run(TUGIAssumingTransport.java:49) [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
        at java.security.AccessController.doPrivileged(Native Method) [na:1.7.0_79]
        at javax.security.auth.Subject.doAs(Subject.java:415) [na:1.7.0_79]
        at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1657) [hadoop-common-2.7.1.jar:na]
        at org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport.open(TUGIAssumingTransport.java:49) [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
        at org.apache.hadoop.hive.metastore.HiveMetaStoreClient.open(HiveMetaStoreClient.java:364) [hive-metastore-1.0.0.jar:1.0.0]
        at org.apache.hadoop.hive.metastore.HiveMetaStoreClient.<init>(HiveMetaStoreClient.java:221) [hive-metastore-1.0.0.jar:1.0.0]
        at org.apache.hadoop.hive.metastore.HiveMetaStoreClient.<init>(HiveMetaStoreClient.java:167) [hive-metastore-1.0.0.jar:1.0.0]
        at org.apache.drill.exec.store.hive.DrillHiveMetaStoreClient.<init>(DrillHiveMetaStoreClient.java:134) [drill-storage-hive-core-1.3.0.jar:1.3.0]
        at org.apache.drill.exec.store.hive.DrillHiveMetaStoreClient.<init>(DrillHiveMetaStoreClient.java:52) [drill-storage-hive-core-1.3.0.jar:1.3.0]
        at org.apache.drill.exec.store.hive.DrillHiveMetaStoreClient$NonCloseableHiveClientWithCaching.<init>(DrillHiveMetaStoreClient.java:306) [drill-storage-hive-core-1.3.0.jar:1.3.0]

1) Drill is being started after a kinit
2) Storage plugin configured as follows returns table not found every time:
{
  "type": "hive",
  "enabled": true,
  "configProps": {
    "hive.metastore.uris": "thrift:/[REDACTED]:9083",
    "hive.metastore.warehouse.dir": "/tmp/drill_hive_wh",
    "fs.default.name": "hdfs://[REDACTED]:8020/",
    "hive.server2.enable.doAs": "false",
    "hive.metastore.sasl.enabled": "false",
    "hive.metastore.kerberos.principal": "hive/[REDACTED]@[REDACTED]"
  }
}

Am I missing something obvious?

Will

Re: Kerberos on Hive

Posted by Venki Korukanti <ve...@gmail.com>.
Can you enable the kerberos debug logs to see if we can get a more info on
the error? From the callstack, not obvious what went wrong.

Add the following to Drill's JVM arg list:

-Dsun.security.krb5.debug=true (You can add this to DRILLBIT_JAVA_OPTS env
variable, make sure it is in JVM args (use jps -m or jps -v))

Also make sure your kerberos ticket is valid and Drillbit process can read
the ticket file.

Thanks
Venki

On Mon, Dec 21, 2015 at 10:43 AM, William Witt <wi...@witt-family.net>
wrote:

> Venki,
> Changing it to true yields the stack trace in the original email. I'll
> have to check the class path for the core-site.xml, perhaps that is the
> key....
>
> Will
>
> Sent from my iPhone
>
> > On Dec 21, 2015, at 12:19 PM, Venki Korukanti <ve...@gmail.com>
> wrote:
> >
> > There is one config parameter that needs to be changed in order to work
> > with the kerberos enabled Hive metastore.
> >
> > "hive.metastore.sasl.enabled": "true",
> >
> > For working with Kerberos HDFS, I think you need to have the
> core-site.xml
> > (containing the kerberos credentials of the NamaNode etc.) in Drill's
> > classpath. I haven't tested this configuration, but it is worth a try.
> >
> > Thanks
> > Venki
> >
> > On Tue, Dec 15, 2015 at 7:31 PM, William Witt <wi...@witt-family.net>
> > wrote:
> >
> >> By the lack of response, I take it that Drill on a kerberized cluster
> has
> >> not been successfully implemented (accept maybe on MapR).  So it looks
> like
> >> I might need to join the ranks of the Drill developer community to make
> >> this happen. Any pointers in the right direction would be helpful.
> >>
> >> Will
> >>
> >> Sent from my iPhone
> >>
> >>>> On Dec 12, 2015, at 4:41 PM, William Witt <wi...@witt-family.net>
> >>> wrote:
> >>>
> >>> I’m trying to use Drill on a kerberized CDH cluster.  I attempted to
> >> adapt the mapr directions [
> >>
> http://doc.mapr.com/display/MapR/Configuring+Drill+to+Use+Kerberos+with+Hive+Metastore
> ]
> >> to my use case, but keeping getting a stack trace from drill when
> enabling
> >> sasl:
> >>>
> >>> 17:24:27.602 [qtp1083696596-53] ERROR
> >> o.a.thrift.transport.TSaslTransport - SASL negotiation failure
> >>> javax.security.sasl.SaslException: GSS initiate failed
> >>>       at
> >>
> com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212)
> >> ~[na:1.7.0_79]
> >>>       at
> >>
> org.apache.thrift.transport.TSaslClientTransport.handleSaslStartMessage(TSaslClientTransport.java:94)
> >> [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
> >>>       at
> >> org.apache.thrift.transport.TSaslTransport.open(TSaslTransport.java:253)
> >> ~[drill-hive-exec-shaded-1.3.0.jar:1.3.0]
> >>>       at
> >>
> org.apache.thrift.transport.TSaslClientTransport.open(TSaslClientTransport.java:37)
> >> [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
> >>>       at
> >>
> org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport$1.run(TUGIAssumingTransport.java:52)
> >> [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
> >>>       at
> >>
> org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport$1.run(TUGIAssumingTransport.java:49)
> >> [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
> >>>       at java.security.AccessController.doPrivileged(Native Method)
> >> [na:1.7.0_79]
> >>>       at javax.security.auth.Subject.doAs(Subject.java:415)
> >> [na:1.7.0_79]
> >>>       at
> >>
> org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1657)
> >> [hadoop-common-2.7.1.jar:na]
> >>>       at
> >>
> org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport.open(TUGIAssumingTransport.java:49)
> >> [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
> >>>       at
> >>
> org.apache.hadoop.hive.metastore.HiveMetaStoreClient.open(HiveMetaStoreClient.java:364)
> >> [hive-metastore-1.0.0.jar:1.0.0]
> >>>       at
> >>
> org.apache.hadoop.hive.metastore.HiveMetaStoreClient.<init>(HiveMetaStoreClient.java:221)
> >> [hive-metastore-1.0.0.jar:1.0.0]
> >>>       at
> >>
> org.apache.hadoop.hive.metastore.HiveMetaStoreClient.<init>(HiveMetaStoreClient.java:167)
> >> [hive-metastore-1.0.0.jar:1.0.0]
> >>>       at
> >>
> org.apache.drill.exec.store.hive.DrillHiveMetaStoreClient.<init>(DrillHiveMetaStoreClient.java:134)
> >> [drill-storage-hive-core-1.3.0.jar:1.3.0]
> >>>       at
> >>
> org.apache.drill.exec.store.hive.DrillHiveMetaStoreClient.<init>(DrillHiveMetaStoreClient.java:52)
> >> [drill-storage-hive-core-1.3.0.jar:1.3.0]
> >>>       at
> >>
> org.apache.drill.exec.store.hive.DrillHiveMetaStoreClient$NonCloseableHiveClientWithCaching.<init>(DrillHiveMetaStoreClient.java:306)
> >> [drill-storage-hive-core-1.3.0.jar:1.3.0]
> >>>
> >>> 1) Drill is being started after a kinit
> >>> 2) Storage plugin configured as follows returns table not found every
> >> time:
> >>> {
> >>> "type": "hive",
> >>> "enabled": true,
> >>> "configProps": {
> >>>   "hive.metastore.uris": "thrift:/[REDACTED]:9083",
> >>>   "hive.metastore.warehouse.dir": "/tmp/drill_hive_wh",
> >>>   "fs.default.name": "hdfs://[REDACTED]:8020/",
> >>>   "hive.server2.enable.doAs": "false",
> >>>   "hive.metastore.sasl.enabled": "false",
> >>>   "hive.metastore.kerberos.principal": "hive/[REDACTED]@[REDACTED]"
> >>> }
> >>> }
> >>>
> >>> Am I missing something obvious?
> >>>
> >>> Will
> >>
>

Re: Kerberos on Hive

Posted by William Witt <wi...@witt-family.net>.
Venki,
Changing it to true yields the stack trace in the original email. I'll have to check the class path for the core-site.xml, perhaps that is the key....

Will 

Sent from my iPhone

> On Dec 21, 2015, at 12:19 PM, Venki Korukanti <ve...@gmail.com> wrote:
> 
> There is one config parameter that needs to be changed in order to work
> with the kerberos enabled Hive metastore.
> 
> "hive.metastore.sasl.enabled": "true",
> 
> For working with Kerberos HDFS, I think you need to have the core-site.xml
> (containing the kerberos credentials of the NamaNode etc.) in Drill's
> classpath. I haven't tested this configuration, but it is worth a try.
> 
> Thanks
> Venki
> 
> On Tue, Dec 15, 2015 at 7:31 PM, William Witt <wi...@witt-family.net>
> wrote:
> 
>> By the lack of response, I take it that Drill on a kerberized cluster has
>> not been successfully implemented (accept maybe on MapR).  So it looks like
>> I might need to join the ranks of the Drill developer community to make
>> this happen. Any pointers in the right direction would be helpful.
>> 
>> Will
>> 
>> Sent from my iPhone
>> 
>>>> On Dec 12, 2015, at 4:41 PM, William Witt <wi...@witt-family.net>
>>> wrote:
>>> 
>>> I’m trying to use Drill on a kerberized CDH cluster.  I attempted to
>> adapt the mapr directions [
>> http://doc.mapr.com/display/MapR/Configuring+Drill+to+Use+Kerberos+with+Hive+Metastore]
>> to my use case, but keeping getting a stack trace from drill when enabling
>> sasl:
>>> 
>>> 17:24:27.602 [qtp1083696596-53] ERROR
>> o.a.thrift.transport.TSaslTransport - SASL negotiation failure
>>> javax.security.sasl.SaslException: GSS initiate failed
>>>       at
>> com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212)
>> ~[na:1.7.0_79]
>>>       at
>> org.apache.thrift.transport.TSaslClientTransport.handleSaslStartMessage(TSaslClientTransport.java:94)
>> [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
>>>       at
>> org.apache.thrift.transport.TSaslTransport.open(TSaslTransport.java:253)
>> ~[drill-hive-exec-shaded-1.3.0.jar:1.3.0]
>>>       at
>> org.apache.thrift.transport.TSaslClientTransport.open(TSaslClientTransport.java:37)
>> [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
>>>       at
>> org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport$1.run(TUGIAssumingTransport.java:52)
>> [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
>>>       at
>> org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport$1.run(TUGIAssumingTransport.java:49)
>> [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
>>>       at java.security.AccessController.doPrivileged(Native Method)
>> [na:1.7.0_79]
>>>       at javax.security.auth.Subject.doAs(Subject.java:415)
>> [na:1.7.0_79]
>>>       at
>> org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1657)
>> [hadoop-common-2.7.1.jar:na]
>>>       at
>> org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport.open(TUGIAssumingTransport.java:49)
>> [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
>>>       at
>> org.apache.hadoop.hive.metastore.HiveMetaStoreClient.open(HiveMetaStoreClient.java:364)
>> [hive-metastore-1.0.0.jar:1.0.0]
>>>       at
>> org.apache.hadoop.hive.metastore.HiveMetaStoreClient.<init>(HiveMetaStoreClient.java:221)
>> [hive-metastore-1.0.0.jar:1.0.0]
>>>       at
>> org.apache.hadoop.hive.metastore.HiveMetaStoreClient.<init>(HiveMetaStoreClient.java:167)
>> [hive-metastore-1.0.0.jar:1.0.0]
>>>       at
>> org.apache.drill.exec.store.hive.DrillHiveMetaStoreClient.<init>(DrillHiveMetaStoreClient.java:134)
>> [drill-storage-hive-core-1.3.0.jar:1.3.0]
>>>       at
>> org.apache.drill.exec.store.hive.DrillHiveMetaStoreClient.<init>(DrillHiveMetaStoreClient.java:52)
>> [drill-storage-hive-core-1.3.0.jar:1.3.0]
>>>       at
>> org.apache.drill.exec.store.hive.DrillHiveMetaStoreClient$NonCloseableHiveClientWithCaching.<init>(DrillHiveMetaStoreClient.java:306)
>> [drill-storage-hive-core-1.3.0.jar:1.3.0]
>>> 
>>> 1) Drill is being started after a kinit
>>> 2) Storage plugin configured as follows returns table not found every
>> time:
>>> {
>>> "type": "hive",
>>> "enabled": true,
>>> "configProps": {
>>>   "hive.metastore.uris": "thrift:/[REDACTED]:9083",
>>>   "hive.metastore.warehouse.dir": "/tmp/drill_hive_wh",
>>>   "fs.default.name": "hdfs://[REDACTED]:8020/",
>>>   "hive.server2.enable.doAs": "false",
>>>   "hive.metastore.sasl.enabled": "false",
>>>   "hive.metastore.kerberos.principal": "hive/[REDACTED]@[REDACTED]"
>>> }
>>> }
>>> 
>>> Am I missing something obvious?
>>> 
>>> Will
>> 

Re: Kerberos on Hive

Posted by Venki Korukanti <ve...@gmail.com>.
There is one config parameter that needs to be changed in order to work
with the kerberos enabled Hive metastore.

"hive.metastore.sasl.enabled": "true",

For working with Kerberos HDFS, I think you need to have the core-site.xml
(containing the kerberos credentials of the NamaNode etc.) in Drill's
classpath. I haven't tested this configuration, but it is worth a try.

Thanks
Venki

On Tue, Dec 15, 2015 at 7:31 PM, William Witt <wi...@witt-family.net>
wrote:

> By the lack of response, I take it that Drill on a kerberized cluster has
> not been successfully implemented (accept maybe on MapR).  So it looks like
> I might need to join the ranks of the Drill developer community to make
> this happen. Any pointers in the right direction would be helpful.
>
> Will
>
> Sent from my iPhone
>
> > On Dec 12, 2015, at 4:41 PM, William Witt <wi...@witt-family.net>
> wrote:
> >
> > I’m trying to use Drill on a kerberized CDH cluster.  I attempted to
> adapt the mapr directions [
> http://doc.mapr.com/display/MapR/Configuring+Drill+to+Use+Kerberos+with+Hive+Metastore]
> to my use case, but keeping getting a stack trace from drill when enabling
> sasl:
> >
> > 17:24:27.602 [qtp1083696596-53] ERROR
> o.a.thrift.transport.TSaslTransport - SASL negotiation failure
> > javax.security.sasl.SaslException: GSS initiate failed
> >        at
> com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212)
> ~[na:1.7.0_79]
> >        at
> org.apache.thrift.transport.TSaslClientTransport.handleSaslStartMessage(TSaslClientTransport.java:94)
> [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
> >        at
> org.apache.thrift.transport.TSaslTransport.open(TSaslTransport.java:253)
> ~[drill-hive-exec-shaded-1.3.0.jar:1.3.0]
> >        at
> org.apache.thrift.transport.TSaslClientTransport.open(TSaslClientTransport.java:37)
> [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
> >        at
> org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport$1.run(TUGIAssumingTransport.java:52)
> [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
> >        at
> org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport$1.run(TUGIAssumingTransport.java:49)
> [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
> >        at java.security.AccessController.doPrivileged(Native Method)
> [na:1.7.0_79]
> >        at javax.security.auth.Subject.doAs(Subject.java:415)
> [na:1.7.0_79]
> >        at
> org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1657)
> [hadoop-common-2.7.1.jar:na]
> >        at
> org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport.open(TUGIAssumingTransport.java:49)
> [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
> >        at
> org.apache.hadoop.hive.metastore.HiveMetaStoreClient.open(HiveMetaStoreClient.java:364)
> [hive-metastore-1.0.0.jar:1.0.0]
> >        at
> org.apache.hadoop.hive.metastore.HiveMetaStoreClient.<init>(HiveMetaStoreClient.java:221)
> [hive-metastore-1.0.0.jar:1.0.0]
> >        at
> org.apache.hadoop.hive.metastore.HiveMetaStoreClient.<init>(HiveMetaStoreClient.java:167)
> [hive-metastore-1.0.0.jar:1.0.0]
> >        at
> org.apache.drill.exec.store.hive.DrillHiveMetaStoreClient.<init>(DrillHiveMetaStoreClient.java:134)
> [drill-storage-hive-core-1.3.0.jar:1.3.0]
> >        at
> org.apache.drill.exec.store.hive.DrillHiveMetaStoreClient.<init>(DrillHiveMetaStoreClient.java:52)
> [drill-storage-hive-core-1.3.0.jar:1.3.0]
> >        at
> org.apache.drill.exec.store.hive.DrillHiveMetaStoreClient$NonCloseableHiveClientWithCaching.<init>(DrillHiveMetaStoreClient.java:306)
> [drill-storage-hive-core-1.3.0.jar:1.3.0]
> >
> > 1) Drill is being started after a kinit
> > 2) Storage plugin configured as follows returns table not found every
> time:
> > {
> >  "type": "hive",
> >  "enabled": true,
> >  "configProps": {
> >    "hive.metastore.uris": "thrift:/[REDACTED]:9083",
> >    "hive.metastore.warehouse.dir": "/tmp/drill_hive_wh",
> >    "fs.default.name": "hdfs://[REDACTED]:8020/",
> >    "hive.server2.enable.doAs": "false",
> >    "hive.metastore.sasl.enabled": "false",
> >    "hive.metastore.kerberos.principal": "hive/[REDACTED]@[REDACTED]"
> >  }
> > }
> >
> > Am I missing something obvious?
> >
> > Will
>

Re: Kerberos on Hive

Posted by William Witt <wi...@witt-family.net>.
By the lack of response, I take it that Drill on a kerberized cluster has not been successfully implemented (accept maybe on MapR).  So it looks like I might need to join the ranks of the Drill developer community to make this happen. Any pointers in the right direction would be helpful. 

Will

Sent from my iPhone

> On Dec 12, 2015, at 4:41 PM, William Witt <wi...@witt-family.net> wrote:
> 
> I’m trying to use Drill on a kerberized CDH cluster.  I attempted to adapt the mapr directions [http://doc.mapr.com/display/MapR/Configuring+Drill+to+Use+Kerberos+with+Hive+Metastore]  to my use case, but keeping getting a stack trace from drill when enabling sasl:
> 
> 17:24:27.602 [qtp1083696596-53] ERROR o.a.thrift.transport.TSaslTransport - SASL negotiation failure
> javax.security.sasl.SaslException: GSS initiate failed
>        at com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212) ~[na:1.7.0_79]
>        at org.apache.thrift.transport.TSaslClientTransport.handleSaslStartMessage(TSaslClientTransport.java:94) [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
>        at org.apache.thrift.transport.TSaslTransport.open(TSaslTransport.java:253) ~[drill-hive-exec-shaded-1.3.0.jar:1.3.0]
>        at org.apache.thrift.transport.TSaslClientTransport.open(TSaslClientTransport.java:37) [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
>        at org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport$1.run(TUGIAssumingTransport.java:52) [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
>        at org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport$1.run(TUGIAssumingTransport.java:49) [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
>        at java.security.AccessController.doPrivileged(Native Method) [na:1.7.0_79]
>        at javax.security.auth.Subject.doAs(Subject.java:415) [na:1.7.0_79]
>        at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1657) [hadoop-common-2.7.1.jar:na]
>        at org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport.open(TUGIAssumingTransport.java:49) [drill-hive-exec-shaded-1.3.0.jar:1.3.0]
>        at org.apache.hadoop.hive.metastore.HiveMetaStoreClient.open(HiveMetaStoreClient.java:364) [hive-metastore-1.0.0.jar:1.0.0]
>        at org.apache.hadoop.hive.metastore.HiveMetaStoreClient.<init>(HiveMetaStoreClient.java:221) [hive-metastore-1.0.0.jar:1.0.0]
>        at org.apache.hadoop.hive.metastore.HiveMetaStoreClient.<init>(HiveMetaStoreClient.java:167) [hive-metastore-1.0.0.jar:1.0.0]
>        at org.apache.drill.exec.store.hive.DrillHiveMetaStoreClient.<init>(DrillHiveMetaStoreClient.java:134) [drill-storage-hive-core-1.3.0.jar:1.3.0]
>        at org.apache.drill.exec.store.hive.DrillHiveMetaStoreClient.<init>(DrillHiveMetaStoreClient.java:52) [drill-storage-hive-core-1.3.0.jar:1.3.0]
>        at org.apache.drill.exec.store.hive.DrillHiveMetaStoreClient$NonCloseableHiveClientWithCaching.<init>(DrillHiveMetaStoreClient.java:306) [drill-storage-hive-core-1.3.0.jar:1.3.0]
> 
> 1) Drill is being started after a kinit
> 2) Storage plugin configured as follows returns table not found every time:
> {
>  "type": "hive",
>  "enabled": true,
>  "configProps": {
>    "hive.metastore.uris": "thrift:/[REDACTED]:9083",
>    "hive.metastore.warehouse.dir": "/tmp/drill_hive_wh",
>    "fs.default.name": "hdfs://[REDACTED]:8020/",
>    "hive.server2.enable.doAs": "false",
>    "hive.metastore.sasl.enabled": "false",
>    "hive.metastore.kerberos.principal": "hive/[REDACTED]@[REDACTED]"
>  }
> }
> 
> Am I missing something obvious?
> 
> Will