If you have integrated with an EMR cluster version 5.8.0 or later, you can configure your Hive instance to use AWS Glue Data Catalog for storage and access to Hive metadata.
Tip: For metastores that are used across a set of services, accounts, and applications, AWS Glue is the recommended method of access. |
For more information on AWS Glue, see https://docs.aws.amazon.com/emr/latest/ReleaseGuide/emr-hive-metastore-glue.html.
This section describes how to enable integration with your AWS Glue deployment.
AWS Glue tables can be read under the following conditions:
The Hive deployment must be integrated with AWS Glue.
NOTE: Hive connections are supported when S3 is the backend datastore. |
When you create the EMR cluster, please verify the following in the AWS Glue Data Catalog settings:
Use for Hive table metadata
Use for Spark table metadata
Each Glue table must be created with the following properties specified:
InputFormat
OutputFormat
Serde
These properties must be specified for the Hive JDBC driver to read the Glue tables.
For additional limitations on access Hive tables through Glue, see https://docs.aws.amazon.com/emr/latest/ReleaseGuide/emr-hive-metastore-glue.html#emr-hive-glue-considerations-hive.
To enable integration between the and AWS Glue, a JAR file for managing the
for AWS access must be deployed to S3 in a location that is accessible to the EMR cluster.
When the EMR cluster is launched with the followng custom bootstrap action, the cluster does one of the following:
aws.mode
= user
, then the credentials registered by the user are used to connect to AWS Glue.Steps:
From the installation of the , retrieve the following file:
[TRIFACTA_INSTALL_DIR]/aws/glue-credential-provider/build/libs/trifacta-aws-glue-credential-provider.jar |
Upload this JAR file to an S3 bucket location where the EMR cluster can access it:
Via AWS command line:
aws s3 cp trifacta-aws-glue-credential-provider.jar s3://<YOUR-BUCKET>/ |
Create a bootstrap action script named configure_glue_lib.sh
. The contents must be the following:
sudo aws s3 cp s3://<YOUR-BUCKET>/trifacta-aws-glue-credential-provider.jar /usr/share/aws/emr/emrfs/auxlib/ sudo aws s3 cp s3://<YOUR-BUCKET>/trifacta-aws-glue-credential-provider.jar /usr/lib/hive/auxlib/ |
Via AWS Console S3 UI: Create the bootstrap action to point to the script that you uploaded on S3.
configure_glue_lib.sh
file to the accessible S3 bucket.In the command line cluster creation script, add a custom bootstrap action. Example:
--bootstrap-actions '[ {"Path":"s3://<YOUR-BUCKET>/configure_glue_lib.sh","Name":"Custom action"} ]' |
Authentication methods are required permissions are based on the AWS authentication mode:
"aws.mode": "system", |
aws.mode value | Permissions | Doc |
---|---|---|
system | IAM role assigned to the cluster must provide access to AWS Glue. | See Configure for AWS. |
user | The user role must provide access to AWS Glue. | See below for an example IAM role access control. |
Example fine-grain access control for IAM policy:
If you are using IAM roles to provide access to AWS Glue, you can review the following fine-grained access control, which includes the permissions required to access AWS Glue tables. Please add this to the Permissions section of your AWS Glue Catalog Settings page.
NOTE: Please verify that access is granted in the IAM policy to the default database for AWS Glue, as noted below. |
{ "Sid" : "accessToAllTables", "Effect" : "Allow", "Principal" : { "AWS" : [ "arn:aws:iam::<accountId>:role/glue-read-all" ] }, "Action" : [ "glue:GetDatabases", "glue:GetDatabase", "glue:GetTables", "glue:GetTable", "glue:GetUserDefinedFunctions", "glue:GetPartitions" ], "Resource" : [ "arn:aws:glue:us-west-2:<accountId>:catalog", "arn:aws:glue:us-west-2:<accountId>:database/default", "arn:aws:glue:us-west-2:<accountId>:database/global_temp", "arn:aws:glue:us-west-2:<accountId>:database/mydb", "arn:aws:glue:us-west-2:<accountId>:table/mydb/*" ] } |
AWS Glue crawls available data that is stored on S3. When you import a dataset through AWS Glue:
You should review and, if needed, apply additional read restrictions on your IAM policies so that users are limited to reading data from their own S3 directories. If all users have access to the same areas of the same S3 bucket, then it may be possible for users to access datasets through the platform when it is forbidden through AWS Glue. |
Access is read-only. Publishing to Glue hosted on EMR is not supported.
Please verify the following have been enabled and configured.
Your deployment has been configured to meet the Supported Deployment guidelines above.
You must integrate the platform with Hive.
NOTE: For the Hive hostname and port number, use the Master public DNS values. For more information, see https://docs.aws.amazon.com/emr/latest/ReleaseGuide/emr-hive-metastore-glue.html. |
For more information, see Configure for Hive.
When accessing Glue using temporary per-user credentials, the credentials are given a duration of 1
hour. As needed, you can modify this duration.
NOTE: This value cannot exceed the Maximum Session Duration value for IAM roles, as configured in the IAM Console. |
Locate the following parameter. By default, this value is set to 1
:
"data-service.sqlOptions.glueTempCredentialTimeoutInHours": 1 |
Save your changes and restart the platform.
You can create one or more connections to databases in your AWS Glue deployment.
Key fields:
Field | Description |
---|---|
EMR Master Node DNS | This DNS value can be retrieved from the EMR console. |
Port | The port number through which to connect to the DNS master node |
Connection String Options | No values need to be provided here. |
After the integration has been made between the platform and AWS Glue, you can import datasets.