Table of Contents

Search

  1. Preface
  2. Introduction to Dynamic Data Masking Administration
  3. Authentication
  4. Security
  5. Connection Management
  6. JDBC Client Configuration
  7. ODBC Client Configuration
  8. Configuration for MicroStrategy
  9. Access Control
  10. Logs
  11. High Availability
  12. Server Control
  13. Performance Tuning
  14. Troubleshooting
  15. Appendix A: Database Keywords

Administrator Guide

Administrator Guide

Configuring the Hive Database for ZooKeeper on the Dynamic Data Masking Server

Configuring the Hive Database for ZooKeeper on the Dynamic Data Masking Server

Configure a connection to the Hive database in Dynamic Data Masking and test the connection.
  1. From the Management Console, click
    Tree
    Add Database
    .
    The
    Add Database
    window appears.
  2. Select
    Hive
    as the database type.
  3. In the
    DDM Database Name
    field, enter the name of the Dynamic Data Masking database.
    Example:
    hive2_serv
  4. In the
    Driver Classpath
    field, enter the absolute path of each driver.
    Example:
    C:\hive_jdbc_driver\*"
    Verify that the folder for each driver contains the required JAR files.
    For example, the Hortonworks distribution Hive driver must contain the following files:
    • hadoop-auth-xxx.jar
    • hadoop-common-xxx.jar
    • hive-jdbc-xxx-standalone.jar
    • zookeeper-xxx.jar
    • commons-collections-xxx.jar
    • commons-configurationxxx.jar
    • commons-lang-xxx.jar
    • guava-xxx.jar
    • slf4j-api-xxx.jar
    • slf4j-log4jxxx.jar
  5. In the
    Driver Class Name
    field, enter the fully qualified class name of the Hive driver.
    Example:
    org.apache.hive.jdbc.HiveDriver
  6. In the
    Connection String (URL)
    field, enter the JDBC connection URL based on the driver.
    If the Hive database is Kerberos-enabled, the URL must include the
    auth
    and
    kerberosAuthType
    properties.
    jdbc:hive2://<zookeeper_ensemble>/<databaseName>;serviceDiscoveryMode=zooKeeper;zooKeeperNamespace=<hive_cluster>;auth=kerberos;kerberosAuthType=fromSubject
    Example:
    jdbc:hive2://server1.informatica.com:2181,server2.informatica.com: 2181,server3.informatica.com:2181/hiveDatabase;serviceDiscoveryMode=zooKeeper;zooKeeperNamespace=hiveserver2;auth=kerberos;kerberosAuthType=fromSubject
    If you do not provide the
    databaseName
    , Dynamic Data Masking connects to the default Hive database.
    For Kerberos-enabled Hive databases, replace the
    _HOST
    value of the property
    hive.server2.authentication.kerberos.principal=hive/_HOST@KERB
    with the Hive server hostname in the Hive configuration.
    After you replace the
    _HOST
    value, the property value appears as:
    _HOST hive.server2.authentication.kerberos.principal=hive/your.host.com@KERB
  7. In the
    Database Server Principal
    field, specify the server principal of Hive.
    Example:
    hive/hiverserver@REALM.COM
    Do not enter a value in the
    DBA Username
    and
    DBA Password
    fields.
  8. Click
    Test Connection
    .
    A JDBC connection to the Dynamic Data Masking service opens. The services uses the defined database connection parameters. A confirmation message appears if the connection is valid.

0 COMMENTS

We’d like to hear from you!