Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the becustom domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/joyplace/public_html/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/joyplace/public_html/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home4/joyplace/public_html/wp-includes/functions.php:6114) in /home4/joyplace/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/joyplace/public_html/wp-includes/functions.php:6114) in /home4/joyplace/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/joyplace/public_html/wp-includes/functions.php:6114) in /home4/joyplace/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/joyplace/public_html/wp-includes/functions.php:6114) in /home4/joyplace/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/joyplace/public_html/wp-includes/functions.php:6114) in /home4/joyplace/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/joyplace/public_html/wp-includes/functions.php:6114) in /home4/joyplace/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/joyplace/public_html/wp-includes/functions.php:6114) in /home4/joyplace/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/joyplace/public_html/wp-includes/functions.php:6114) in /home4/joyplace/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":185,"date":"2014-03-03T23:06:57","date_gmt":"2014-03-04T05:06:57","guid":{"rendered":"https:\/\/www.bigdatainrealworld.com\/?p=185"},"modified":"2023-02-19T07:33:27","modified_gmt":"2023-02-19T13:33:27","slug":"fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied","status":"publish","type":"post","link":"https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/","title":{"rendered":"Fixing org.apache.hadoop.security.AccessControlException: Permission denied"},"content":{"rendered":"

Executions in Hadoop use the underlying logged in username to figure out the permissions in the cluster. When running jobs or working with HDFS, the user who started the Hadoop daemons in the cluster won’t have any access issues because the user has all the necessary permissions as it owns the folders in HDFS. We are most likely to hit the below\u00a0AccessControlException with a user other than the user running the daemons in the cluster and when the permissions are not configured correctly for the user running the jobs or operating HDFS.<\/p>\n

<\/h2>\n

AccessControlException<\/h2>\n
org.apache.hadoop.security.AccessControlException: Permission denied: user=emily.ragland, access=WRITE, inode=\"staging\":ubuntu:supergroup:rwxr-xr-x\r\nException in thread \"main\" org.apache.hadoop.security.AccessControlException: org.apache.hadoop.security.AccessControlException: Permission denied: user=emily.ragland, access=WRITE, inode=\"staging\":ubuntu:supergroup:rwxr-xr-x\r\nat sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)\r\nat sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:57)\r\nat sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45)\r\nat java.lang.reflect.Constructor.newInstance(Constructor.java:526)\r\nat org.apache.hadoop.ipc.RemoteException.instantiateException(RemoteException.java:95)\r\nat org.apache.hadoop.ipc.RemoteException.unwrapRemoteException(RemoteException.java:57)\r\nat org.apache.hadoop.hdfs.DFSClient.mkdirs(DFSClient.java:1459)\r\nat org.apache.hadoop.hdfs.DistributedFileSystem.mkdirs(DistributedFileSystem.java:362)\r\nat org.apache.hadoop.mapreduce.JobSubmissionFiles.getStagingDir(JobSubmissionFiles.java:126)\r\nat org.apache.hadoop.mapred.JobClient$2.run(JobClient.java:942)\r\nat org.apache.hadoop.mapred.JobClient$2.run(JobClient.java:936)\r\nat java.security.AccessController.doPrivileged(Native Method)\r\nat javax.security.auth.Subject.doAs(Subject.java:415)\r\nat org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1190)\r\nat org.apache.hadoop.mapred.JobClient.submitJobInternal(JobClient.java:936)\r\nat org.apache.hadoop.mapreduce.Job.submit(Job.java:550)\r\nat org.apache.hadoop.mapreduce.Job.waitForCompletion(Job.java:580)\r\nat com.jerry.WordCount.main(WordCount.java:61)\r\nat sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)\r\nat sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)\r\nat sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)\r\nat java.lang.reflect.Method.invoke(Method.java:606)\r\nat org.apache.hadoop.util.RunJar.main(RunJar.java:160)<\/pre>\n

From the above exception it is easy to see that a job is trying to a create a directory using the username emily.ragland<\/span>\u00a0under a directory named\u00a0staging<\/span>\u00a0. staging <\/span>\u00a0folder is owned by user\u00a0ubuntu <\/span>\u00a0who belongs to group namedsupergroup<\/span>\u00a0. Since other users don’t have access to the staging <\/span>\u00a0folder(\u00a0rwxr-xr-x<\/span>\u00a0) writes under staging <\/span>\u00a0fails for\u00a0emily.ragland<\/span>\u00a0<\/span><\/p>\n

mapreduce.jobtracker.staging.root.dir<\/h2>\n

Lets understand what is the staging directory first. mapreduce.jobtracker.staging.root.dir<\/span>\u00a0\u00a0property in mapred-site.xml <\/span>\u00a0specifies the location of the staging directory in HDFS. When a job is submitted, staging folder is used to store the files common to the job like the job’s jar.\u00a0For this discussion, lets assume that user ubuntu <\/span>\u00a0is running all the daemons in the cluster. When mapreduce.jobtracker.staging.root.dir<\/span>\u00a0\u00a0property is not specified the location of staging folder would be \/tmp\/hadoop-ubuntu\/mapred\/staging<\/span>\u00a0.<\/span><\/p>\n

When a user submits a job, a folder named as the username will be created (if not already present) under\u00a0\/tmp\/hadoop-ubuntu\/mapred\/staging. After few job executions the listing of the directory for user ubuntu <\/span>\u00a0will look like this.<\/p>\n

ubuntu@ip-172-x-x-x:~$ hadoop fs -ls \/tmp\/hadoop-ubuntu\/mapred\/staging\/ubuntu\/.staging\r\n\r\nFound 6 items\r\n\r\ndrwx------ - ubuntu supergroup 0 2014-01-23 13:01 \/tmp\/hadoop-ubuntu\/mapred\/staging\/ubuntu\/.staging\/job_201401070051_0034\r\ndrwx------ - ubuntu supergroup 0 2014-02-01 12:57 \/tmp\/hadoop-ubuntu\/mapred\/staging\/ubuntu\/.staging\/job_201401070051_0097\r\ndrwx------ - ubuntu supergroup 0 2014-02-01 12:58 \/tmp\/hadoop-ubuntu\/mapred\/staging\/ubuntu\/.staging\/job_201401070051_0098\r\ndrwx------ - ubuntu supergroup 0 2014-02-08 13:52 \/tmp\/hadoop-ubuntu\/mapred\/staging\/ubuntu\/.staging\/job_201401070051_0127\r\ndrwx------ - ubuntu supergroup 0 2014-02-08 14:19 \/tmp\/hadoop-ubuntu\/mapred\/staging\/ubuntu\/.staging\/job_201401070051_0133\r\ndrwx------ - ubuntu supergroup 0 2014-02-08 14:32 \/tmp\/hadoop-ubuntu\/mapred\/staging\/ubuntu\/.staging\/job_201401070051_0139<\/pre>\n

Now going back to the exception we can see when user emily.ragland<\/span>\u00a0\u00a0tried executing a job, creating a directory under \u00a0\/tmp\/hadoop-ubuntu\/mapred\/staging<\/span>\u00a0 failed because emily.ragland<\/span>\u00a0\u00a0does not have access to create folders under\u00a0\/tmp\/hadoop-ubuntu\/mapred\/staging<\/span>\u00a0<\/span><\/p>\n

To keep things clean and for better control lets specify the location of the staging directory by setting the mapreduce.jobtracker.staging.root.dir<\/span>\u00a0\u00a0property in mapred-site.xml<\/span>\u00a0. After the property is set, restart mapred service for the property to take effect.<\/p>\n

<property>\r\n    <name>mapreduce.jobtracker.staging.root.dir<\/name>\r\n    <value>\/user<\/value>\r\n<\/property><\/pre>\n

After the property takes effect, when emily.ragland<\/span>\u00a0\u00a0tries to run a job an attempt is made to create a folder like \/user\/emily.ragland <\/span>\u00a0in HDFS. The other reason I like to override with \/user<\/span>\u00a0\u00a0is because it is more aligned with the UNIX notion of a home folder. Now when emily.ragland runs a job it would still fail with the below exception. It still does not have access to \/user folder and this is expected as we have not done anything to fix the permission issue.<\/p>\n

org.apache.hadoop.security.AccessControlException: Permission denied: user=emily.ragland, access=WRITE, inode=\"\/user\":ubuntu:supergroup:rwxr-xr-x<\/pre>\n

I have seen several suggestions online suggesting to do a chmod <\/span>\u00a0on \/user to 777. This is not advisable as doing so will give other users access to delete or modify other users files in HDFS. Instead create a folder named emily.ragland<\/span>\u00a0\u00a0under \/user<\/span>\u00a0\u00a0using the root user (in our case it isubuntu<\/span>\u00a0) in HDFS. After creating the folder, change the folder permissions to emily.ragland.<\/p>\n

ubuntu@ip-172-x-x-x:~$ hadoop fs -mkdir \/user\/emily.ragland\r\nubuntu@ip-172-x-x-x:~$ hadoop fs -chown emily.ragland:emily.ragland\u00a0\/user\/emily.ragland<\/pre>\n

Now the permissions are set the job should run under emily.ragland<\/span>\u00a0\u00a0with out any issues.<\/p>\n

ubuntu@ip-172-x-x-x:~$ hadoop fs -ls \/user\/emily.ragland\r\nFound 3 items\r\n\r\ndrwx------ - emily.ragland emily.ragland 0 2014-03-03 13:02 \/user\/emily.ragland\/.staging\r\ndrwxr-xr-x - emily.ragland emily.ragland 0 2014-03-03 13:02 \/user\/emily.ragland\/RESULTS\r\n-rw-r--r-- 1 emily.ragland emily.ragland 12 2014-02-26 12:49 \/user\/emily.ragland\/emily.log<\/pre>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

Executions in Hadoop use the underlying logged in username to figure out the permissions in the cluster. When running jobs or working with HDFS, the user [\u2026]<\/span><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-185","post","type-post","status-publish","format-standard","hentry","category-hadoop"],"yoast_head":"\nFixing org.apache.hadoop.security.AccessControlException: Permission denied - Big Data In Real World<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fixing org.apache.hadoop.security.AccessControlException: Permission denied - Big Data In Real World\" \/>\n<meta property=\"og:description\" content=\"Executions in Hadoop use the underlying logged in username to figure out the permissions in the cluster. When running jobs or working with HDFS, the user [\u2026]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/\" \/>\n<meta property=\"og:site_name\" content=\"Big Data In Real World\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/bigdatainrealworld\" \/>\n<meta property=\"article:published_time\" content=\"2014-03-04T05:06:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-19T13:33:27+00:00\" \/>\n<meta name=\"author\" content=\"Big Data In Real World\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Big Data In Real World\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/\"},\"author\":{\"name\":\"Big Data In Real World\",\"@id\":\"https:\/\/www.bigdatainrealworld.com\/#\/schema\/person\/24cab2292ef49c73053440c86515ef67\"},\"headline\":\"Fixing org.apache.hadoop.security.AccessControlException: Permission denied\",\"datePublished\":\"2014-03-04T05:06:57+00:00\",\"dateModified\":\"2023-02-19T13:33:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/\"},\"wordCount\":545,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.bigdatainrealworld.com\/#organization\"},\"articleSection\":[\"Hadoop\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/\",\"url\":\"https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/\",\"name\":\"Fixing org.apache.hadoop.security.AccessControlException: Permission denied - Big Data In Real World\",\"isPartOf\":{\"@id\":\"https:\/\/www.bigdatainrealworld.com\/#website\"},\"datePublished\":\"2014-03-04T05:06:57+00:00\",\"dateModified\":\"2023-02-19T13:33:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.bigdatainrealworld.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fixing org.apache.hadoop.security.AccessControlException: Permission denied\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.bigdatainrealworld.com\/#website\",\"url\":\"https:\/\/www.bigdatainrealworld.com\/\",\"name\":\"Big Data In Real World\",\"description\":\"Learn Big Data from experts!\",\"publisher\":{\"@id\":\"https:\/\/www.bigdatainrealworld.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.bigdatainrealworld.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.bigdatainrealworld.com\/#organization\",\"name\":\"Big Data In Real World\",\"url\":\"https:\/\/www.bigdatainrealworld.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.bigdatainrealworld.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.bigdatainrealworld.com\/wp-content\/uploads\/2023\/02\/black.png\",\"contentUrl\":\"https:\/\/www.bigdatainrealworld.com\/wp-content\/uploads\/2023\/02\/black.png\",\"width\":500,\"height\":500,\"caption\":\"Big Data In Real World\"},\"image\":{\"@id\":\"https:\/\/www.bigdatainrealworld.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/bigdatainrealworld\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.bigdatainrealworld.com\/#\/schema\/person\/24cab2292ef49c73053440c86515ef67\",\"name\":\"Big Data In Real World\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.bigdatainrealworld.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d332bc24fe9b3182f0a22135f163ac4e?s=96&d=retro&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d332bc24fe9b3182f0a22135f163ac4e?s=96&d=retro&r=g\",\"caption\":\"Big Data In Real World\"},\"description\":\"We are a group of Big Data engineers who are passionate about Big Data and related Big Data technologies. We have designed, developed, deployed and maintained Big Data applications ranging from batch to real time streaming big data platforms. We have seen a wide range of real world big data problems, implemented some innovative and complex (or simple, depending on how you look at it) solutions.\",\"sameAs\":[\"https:\/\/www.bigdatainrealworld.com\/\"],\"url\":\"https:\/\/www.bigdatainrealworld.com\/author\/bigdatainrealworld\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fixing org.apache.hadoop.security.AccessControlException: Permission denied - Big Data In Real World","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/","og_locale":"en_US","og_type":"article","og_title":"Fixing org.apache.hadoop.security.AccessControlException: Permission denied - Big Data In Real World","og_description":"Executions in Hadoop use the underlying logged in username to figure out the permissions in the cluster. When running jobs or working with HDFS, the user [\u2026]","og_url":"https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/","og_site_name":"Big Data In Real World","article_publisher":"https:\/\/www.facebook.com\/bigdatainrealworld","article_published_time":"2014-03-04T05:06:57+00:00","article_modified_time":"2023-02-19T13:33:27+00:00","author":"Big Data In Real World","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Big Data In Real World","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/#article","isPartOf":{"@id":"https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/"},"author":{"name":"Big Data In Real World","@id":"https:\/\/www.bigdatainrealworld.com\/#\/schema\/person\/24cab2292ef49c73053440c86515ef67"},"headline":"Fixing org.apache.hadoop.security.AccessControlException: Permission denied","datePublished":"2014-03-04T05:06:57+00:00","dateModified":"2023-02-19T13:33:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/"},"wordCount":545,"commentCount":0,"publisher":{"@id":"https:\/\/www.bigdatainrealworld.com\/#organization"},"articleSection":["Hadoop"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/","url":"https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/","name":"Fixing org.apache.hadoop.security.AccessControlException: Permission denied - Big Data In Real World","isPartOf":{"@id":"https:\/\/www.bigdatainrealworld.com\/#website"},"datePublished":"2014-03-04T05:06:57+00:00","dateModified":"2023-02-19T13:33:27+00:00","breadcrumb":{"@id":"https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.bigdatainrealworld.com\/fixing-org-apache-hadoop-security-accesscontrolexception-permission-denied\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bigdatainrealworld.com\/"},{"@type":"ListItem","position":2,"name":"Fixing org.apache.hadoop.security.AccessControlException: Permission denied"}]},{"@type":"WebSite","@id":"https:\/\/www.bigdatainrealworld.com\/#website","url":"https:\/\/www.bigdatainrealworld.com\/","name":"Big Data In Real World","description":"Learn Big Data from experts!","publisher":{"@id":"https:\/\/www.bigdatainrealworld.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bigdatainrealworld.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.bigdatainrealworld.com\/#organization","name":"Big Data In Real World","url":"https:\/\/www.bigdatainrealworld.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bigdatainrealworld.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.bigdatainrealworld.com\/wp-content\/uploads\/2023\/02\/black.png","contentUrl":"https:\/\/www.bigdatainrealworld.com\/wp-content\/uploads\/2023\/02\/black.png","width":500,"height":500,"caption":"Big Data In Real World"},"image":{"@id":"https:\/\/www.bigdatainrealworld.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/bigdatainrealworld"]},{"@type":"Person","@id":"https:\/\/www.bigdatainrealworld.com\/#\/schema\/person\/24cab2292ef49c73053440c86515ef67","name":"Big Data In Real World","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bigdatainrealworld.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d332bc24fe9b3182f0a22135f163ac4e?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d332bc24fe9b3182f0a22135f163ac4e?s=96&d=retro&r=g","caption":"Big Data In Real World"},"description":"We are a group of Big Data engineers who are passionate about Big Data and related Big Data technologies. We have designed, developed, deployed and maintained Big Data applications ranging from batch to real time streaming big data platforms. We have seen a wide range of real world big data problems, implemented some innovative and complex (or simple, depending on how you look at it) solutions.","sameAs":["https:\/\/www.bigdatainrealworld.com\/"],"url":"https:\/\/www.bigdatainrealworld.com\/author\/bigdatainrealworld\/"}]}},"_links":{"self":[{"href":"https:\/\/www.bigdatainrealworld.com\/wp-json\/wp\/v2\/posts\/185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bigdatainrealworld.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bigdatainrealworld.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bigdatainrealworld.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bigdatainrealworld.com\/wp-json\/wp\/v2\/comments?post=185"}],"version-history":[{"count":3,"href":"https:\/\/www.bigdatainrealworld.com\/wp-json\/wp\/v2\/posts\/185\/revisions"}],"predecessor-version":[{"id":188,"href":"https:\/\/www.bigdatainrealworld.com\/wp-json\/wp\/v2\/posts\/185\/revisions\/188"}],"wp:attachment":[{"href":"https:\/\/www.bigdatainrealworld.com\/wp-json\/wp\/v2\/media?parent=185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bigdatainrealworld.com\/wp-json\/wp\/v2\/categories?post=185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bigdatainrealworld.com\/wp-json\/wp\/v2\/tags?post=185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}