Hive configuration parameters
To configure the service, use the following configuration parameters in ADCM.
|
NOTE
|
| Parameter | Description | Default value |
|---|---|---|
Sources |
A list of sources that will be written into hive-env.sh |
— |
HADOOP_CLASSPATH |
A list of files/directories to be added to the classpath.
To add more items to the classpath, click |
|
HIVE_HOME |
Hive home directory |
/usr/lib/hive |
METASTORE_PORT |
Hive Metastore port |
9083 |
HADOOP_CLIENT_OPTS |
Hadoop client options. For example, JVM startup parameters |
$HADOOP_CLIENT_OPTS -Djava.io.tmpdir={{ cluster.config.java_tmpdir | d('/tmp') }} |
| Parameter | Description | Default value |
|---|---|---|
Sources |
A list of sources that will be written into hive-server2-env.sh |
— |
HADOOP_CLIENT_OPTS |
Hadoop client options for HiveServer2 |
-Xms256m -Xmx256m |
HIVE_AUX_JARS_PATH |
Allows including custom JAR files to the Hive’s classpath.
A list of files/directories to be added to the classpath.
To add more items to the classpath, click |
— |
Final HIVE_SERVER2_ENV_OPTS |
Final value of the |
— |
| Parameter | Description | Default value |
|---|---|---|
Sources |
A list of sources that will be written into hive-metastore-env.sh |
— |
HADOOP_CLIENT_OPTS |
Hadoop client options for Hive Metastore |
-Xms256m -Xmx256m |
Final HIVE_METASTORE_ENV_OPTS |
Final value of the |
— |
| Parameter | Description | Default value |
|---|---|---|
Encryption enable |
Enables or disables the credential encryption feature. When enabled, Hive stores configuration passwords and credentials required for interacting with other services in the encrypted form |
false |
Credential provider path |
Path to a keystore file with secrets |
jceks://file/etc/hive/conf/hive.jceks |
Ranger plugin credential provider path |
Path to a Ranger keystore file with secrets |
jceks://file/etc/hive/conf/ranger-hive.jceks |
Custom jceks |
Set to |
false |
Password file name |
Name of the file in the service’s classpath that stores passwords |
hive_credstore_pass |
| Parameter | Description | Default value |
|---|---|---|
hive.cbo.enable |
When set to |
true |
hive.compute.query.using.stats |
When set to |
false |
hive.execution.engine |
Selects the execution engine.
Supported values are: |
Tez |
hive.log.explain.output |
When enabled, logs the |
true |
hive.metastore.event.db.notification.api.auth |
Defines whether the Metastore should perform the authorization against database notification related APIs such as |
false |
hive.metastore.uris |
Metastore URI used to access metadata in a remote metastore setup. For a remote metastore, you should specify the Thrift metastore server URI: thrift://<hostname>:<port> where <hostname> is a name or IP address of the Thrift metastore server, <port> is the port, on which the Thrift server is listening |
— |
hive.metastore.warehouse.dir |
Absolute HDFS file path of the default database for the warehouse, that is local to the cluster |
/apps/hive/warehouse |
hive.server2.enable.doAs |
Impersonate the connected user |
false |
hive.stats.fetch.column.stats |
Annotation of the operator tree with statistics information requires column statistics. Column statistics are fetched from the Metastore. Fetching column statistics for each needed column can be expensive, when the number of columns is high. This flag can be used to disable fetching of column statistics from the Metastore |
false |
hive.tez.container.size |
By default, Tez will spawn containers of the size of a mapper. This parameter can be used to overwrite the default value |
1024 |
hive.support.concurrency |
Defines whether Hive should support concurrency or not. A ZooKeeper instance must be up and running for the default Hive Lock Manager to support read/write locks |
false |
hive.txn.manager |
Set this to |
org.apache.hadoop.hive.ql.lockmgr.DummyTxnManager |
hive.users.in.admin.role |
A comma-separated list of users to be assigned the administrator role when the Metastore starts |
— |
javax.jdo.option.ConnectionUserName |
Metastore database user name |
APP |
javax.jdo.option.ConnectionPassword |
Password for the metastore user name |
— |
javax.jdo.option.ConnectionURL |
JDBC connection URI used to access the data stored in the local Metastore setup. Use the following connection URI: jdbc:<datastore type>://<node name>:<port>/<database name> where:
For example, the following URI specifies a local metastore that uses MySQL as a data store: |
jdbc:postgresql://{{ groups['adpg.adpg'][0] | d(omit) }}:5432/hive |
javax.jdo.option.ConnectionDriverName |
JDBC driver class name used to access Hive Metastore |
org.postgresql.Driver |
hive.server2.transport.mode |
Sets the transport mode |
binary |
hive.server2.thrift.port |
Port number used for the binary connection with Thrift Server2 |
10000 |
hive.server2.thrift.http.port |
Port number used for the HTTP connection with Thrift Server2 |
10001 |
hive.server2.thrift.http.path |
HTTP endpoint of the Thrift Server2 service |
cliservice |
hive.metastore.transactional.event.listeners |
Listener class that stores events in a database |
org.apache.hive.hcatalog.listener.DbNotificationListener |
hive.metastore.dml.events |
Indicates whether Hive should track DML events |
true |
hive.server2.authentication.kerberos.principal |
HiveServer2 Kerberos principal |
— |
hive.server2.authentication.kerberos.keytab |
Path to the Kerberos keytab file containing the HiveServer2 principal |
— |
hive.server2.authentication.spnego.principal |
SPNEGO Kerberos principal |
— |
hive.server2.webui.spnego.principal |
SPNEGO Kerberos principal to access Web UI |
— |
hive.server2.webui.spnego.keytab |
SPNEGO Kerberos keytab file to access Web UI |
— |
hive.server2.webui.use.spnego |
Defines whether to use Kerberos SPNEGO for Web UI access |
false |
hive.server2.authentication.spnego.keytab |
Path to SPNEGO principal |
— |
hive.server2.authentication |
Sets the authentication mode |
NONE |
hive.metastore.sasl.enabled |
If |
false |
hive.metastore.kerberos.principal |
Service principal for the metastore Thrift server.
The |
— |
hive.metastore.kerberos.keytab.file |
Path to the Kerberos keytab file containing the metastore Thrift server’s service principal |
— |
hive.server2.use.SSL |
Defines whether to use SSL for HiveServer2 |
false |
hive.server2.keystore.path |
Keystore to be used by HiveServer2 |
— |
hive.server2.keystore.password |
Password to the HiveServer2 keystore |
— |
hive.server2.truststore.path |
Truststore to be used by HiveServer2 |
— |
hive.server2.truststore.password |
Password to the HiveServer2 truststore |
— |
hive.server2.webui.use.ssl |
Defines whether to use SSL for the Hive web UI |
false |
hive.server2.webui.keystore.path |
Path to the keystore file used to access the Hive web UI |
— |
hive.server2.webui.keystore.password |
Password to the keystore file used to access the Hive web UI |
— |
hive.ssl.protocol.blacklist |
A comma-separated list of TLS versions that cannot be used by Hive |
SSLv2Hello,SSLv3,TLSv1,TLSv1.1 |
metastore.keystore.path |
Path to the Hive Metastore keystore |
— |
metastore.keystore.password |
Password to the Hive Metastore keystore |
— |
metastore.truststore.path |
Path to the Hive Metastore truststore |
— |
metastore.truststore.password |
Password to the Hive Metastore truststore |
— |
metastore.use.SSL |
Defines whether to use SSL for interaction with Hive Metastore |
false |
metastore.ssl.protocol.blacklist |
A comma-separated list of TLS versions that cannot be used for communication with Hive Metastore |
SSLv2Hello,SSLv2,SSLv3,TLSv1,TLSv1.1 |
iceberg.engine.hive.enabled |
Enables Iceberg tables support |
true |
hive.security.authorization.sqlstd.confwhitelist.append |
A regex to append configuration properties to the white list in addition to |
kyuubi\.operation\.handle|kyuubi\.client\.version|kyuubi\.client\.ipAddress|tez\.application\.tags |
hive.server2.support.dynamic.service.discovery |
Defines whether to support dynamic service discovery via ZooKeeper |
true |
hive.zookeeper.quorum |
A comma-separated list of ZooKeeper servers (<host>:<port>) running in the cluster |
— |
hive.server2.zookeeper.namespace |
Specifies the root namespace on ZooKeeper |
hiveserver2 |
hive.cluster.delegation.token.store.class |
Name of the class that implements the delegation token store system |
org.apache.hadoop.hive.metastore.security.ZooKeeperTokenStore |
| Parameter | Description | Default value |
|---|---|---|
Enable Housekeeping Thread |
Defines whether background housekeeping tasks are performed by the Hive Metastore |
true |
Cleaner Interval |
Frequency at which the background cleaning threads for ACID transactions are executed |
10s |
Leader Election Mode |
Defines whether to use the host specified by the |
host |
Housekeeping Leader Hostname |
FQDN of the housekeeping leader |
— |
ZK Lock Namespace |
Specifies the lock namespace on ZooKeeper |
— |
Compactor Initiator |
Defines whether to start the |
true |
Compactor Cleaner |
Defines whether to start the |
true |
| Parameter | Description | Default value |
|---|---|---|
HiveServer2 hive-log4j.properties |
Log4j configuration used for logging HiveServer2’s activity |
|
Hive Metastore hive-log4j2.properties |
Log4j2 configuration used for logging Hive Metastore’s activity |
|
Hive Beeline beeline-log4j2.properties |
Log4j2 configuration used for logging Hive Beeline’s activity |
| Parameter | Description | Default value |
|---|---|---|
xasecure.audit.destination.solr.batch.filespool.dir |
Spool directory path |
/srv/ranger/hdfs_plugin/audit_solr_spool |
xasecure.audit.destination.solr.urls |
A URL of the Solr server to store audit events.
Leave this property value empty or set it to |
— |
xasecure.audit.destination.solr.zookeepers |
Specifies the ZooKeeper connection string for the Solr destination |
— |
xasecure.audit.destination.solr.force.use.inmemory.jaas.config |
Whether to use in-memory JAAS configuration file to connect to Solr |
— |
xasecure.audit.is.enabled |
Enables Ranger audit |
true |
xasecure.audit.jaas.Client.loginModuleControlFlag |
Specifies whether the success of the module is |
— |
xasecure.audit.jaas.Client.loginModuleName |
Name of the authenticator class |
— |
xasecure.audit.jaas.Client.option.keyTab |
Name of the keytab file to get the principal’s secret key |
— |
xasecure.audit.jaas.Client.option.principal |
Name of the principal to be used |
— |
xasecure.audit.jaas.Client.option.serviceName |
Name of a user or a service that wants to log in |
— |
xasecure.audit.jaas.Client.option.storeKey |
Set this to |
false |
xasecure.audit.jaas.Client.option.useKeyTab |
Set this to |
false |
| Parameter | Description | Default value |
|---|---|---|
ranger.plugin.hive.policy.rest.url |
The URL to Ranger Admin |
— |
ranger.plugin.hive.service.name |
The name of the Ranger service containing policies for this instance |
— |
ranger.plugin.hive.policy.cache.dir |
The directory where Ranger policies are cached after successful retrieval from the source |
/srv/ranger/hive/policycache |
ranger.plugin.hive.policy.pollIntervalMs |
Defines how often to poll for changes in policies |
30000 |
ranger.plugin.hive.policy.rest.client.connection.timeoutMs |
Hive Plugin RangerRestClient connection timeout (in milliseconds) |
120000 |
ranger.plugin.hive.policy.rest.client.read.timeoutMs |
Hive Plugin RangerRestClient read timeout (in milliseconds) |
30000 |
xasecure.hive.update.xapolicies.on.grant.revoke |
Controls Hive Ranger policy update from SQL Grant/Revoke commands |
true |
ranger.plugin.hive.policy.rest.ssl.config.file |
Path to the RangerRestClient SSL config file for the Hive plugin |
/etc/hive/conf/ranger-hive-policymgr-ssl.xml |
| Parameter | Description | Default value |
|---|---|---|
xasecure.policymgr.clientssl.keystore |
Path to the keystore file used by Ranger |
— |
xasecure.policymgr.clientssl.keystore.credential.file |
Path to the keystore credentials file |
/etc/hive/conf/ranger-hive.jceks |
xasecure.policymgr.clientssl.truststore.credential.file |
Path to the truststore credentials file |
/etc/hive/conf/ranger-hive.jceks |
xasecure.policymgr.clientssl.truststore |
Path to the truststore file used by Ranger |
— |
xasecure.policymgr.clientssl.keystore.password |
Password to the keystore file |
— |
xasecure.policymgr.clientssl.truststore.password |
Password to the truststore file |
— |
| Parameter | Description | Default value |
|---|---|---|
tez.am.resource.memory.mb |
Amount of memory in MB, that YARN will allocate to the Tez Application Master. The size increases with the size of the DAG |
1024 |
tez.history.logging.service.class |
Enables Tez to use the Timeline Server for History Logging |
org.apache.tez.dag.history.logging.ats.ATSHistoryLoggingService |
tez.lib.uris |
HDFS paths containing the Tez JAR files |
${fs.defaultFS}/apps/tez/tez-0.10.3.tar.gz |
tez.task.resource.memory.mb |
Amount of memory used by launched tasks in TEZ containers. Usually this value is set in the DAG |
1024 |
tez.tez-ui.history-url.base |
URL where the Tez UI is hosted |
— |
tez.use.cluster.hadoop-libs |
Specifies, whether Tez will use the cluster Hadoop libraries |
true |
| Parameter | Description | Default value |
|---|---|---|
ssl_certificate |
Path to the SSL certificate for Nginx |
/etc/ssl/certs/host_cert.cert |
ssl_certificate_key |
Path to the SSL certificate key for Nginx |
/etc/ssl/host_cert.key |
ssl_protocols |
A list of allowed TLS protocols to set up SSL connection |
TLSv1.2 |
nginx_http_port |
Nginx HTTP port |
8089 |
nginx_https_port |
Nginx HTTPS port |
9999 |
| Parameter | Description | Default value |
|---|---|---|
ACID Transactions |
Defines whether to enable ACID transactions |
false |
Database type |
Type of the external database used for Hive Metastore |
postgres |
Custom hive-site.xml |
In this section you can define values for custom parameters that are not displayed in ADCM UI, but are allowed in the configuration file hive-site.xml |
— |
Custom hive-env.sh |
In this section you can define values for custom parameters that are not displayed in ADCM UI, but are allowed in the configuration file hive-env.sh |
— |
Ranger plugin enabled |
Whether or not Ranger plugin is enabled |
false |
Custom ranger-hive-audit.xml |
In this section you can define values for custom parameters that are not displayed in ADCM UI, but are allowed in the configuration file ranger-hive-audit.xml |
— |
Custom ranger-hive-security.xml |
In this section you can define values for custom parameters that are not displayed in ADCM UI, but are allowed in the configuration file ranger-hive-security.xml |
— |
Custom ranger-hive-policymgr-ssl.xml |
In this section you can define values for custom parameters that are not displayed in ADCM UI, but are allowed in the configuration file ranger-hive-policymgr-ssl.xml |
— |
Custom tez-site.xml |
In this section you can define values for custom parameters that are not displayed in ADCM UI, but are allowed in the configuration file tez-site.xml |
— |
beeline-hs2-connection.xml |
An XML template to generate property-value pairs from the |
| Parameter | Description | Default value |
|---|---|---|
Java agent path |
Path to the JMX Prometheus Java agent |
/usr/lib/adh-utils/jmx/jmx_prometheus_javaagent.jar |
Prometheus metrics port |
Port on which to display Hive HiveServer2 metrics in the Prometheus format |
9208 |
Mapping config path |
Path to the metrics mapping configuration file |
/etc/hive/conf/jmx_hive_server_metric_config.yml |
Mapping config |
Metrics mapping configuration file |
| Parameter | Description | Default value |
|---|---|---|
Java agent path |
Path to the JMX Prometheus Java agent |
/usr/lib/adh-utils/jmx/jmx_prometheus_javaagent.jar |
Prometheus metrics port |
Port on which to display Hive Metastore metrics in the Prometheus format |
9207 |
Mapping config path |
Path to the metrics mapping configuration file |
/etc/hive/conf/jmx_hive_server_metric_config.yml |
Mapping config |
Metrics mapping configuration file |