Hive Connector

Overview

The Hive connector allows querying data stored in a Hive data warehouse. Hive is a combination of three components:

  • Data files in varying formats that are typically stored in the Hadoop Distributed File System (HDFS) or in Amazon S3.
  • Metadata about how the data files are mapped to schemas and tables. This metadata is stored in a database such as MySQL and is accessed via the Hive metastore service.
  • A query language called HiveQL. This query language is executed on a distributed computing framework such as MapReduce or Tez.

openLooKeng only uses the first two components: the data and the metadata. It does not use HiveQL or any part of Hive’s execution environment.

Supported File Types

The following file types are supported for the Hive connector:

  • ORC
  • Parquet
  • Avro
  • RCFile
  • SequenceFile
  • JSON
  • Text

In order to enable first-class support for Avro tables and CSV files when using Hive 3.x, you need to add the following property definition to the Hive metastore configuration file hive-site.xml:

  1. <property>
  2. <!-- https://community.hortonworks.com/content/supportkb/247055/errorjavalangunsupportedoperationexception-storage.html -->
  3. <name>metastore.storage.schema.reader.impl</name>
  4. <value>org.apache.hadoop.hive.metastore.SerDeStorageSchemaReader</value>
  5. </property>

Configuration

The Hive connector supports Apache Hadoop 2.x and derivative distributions including Cloudera CDH 5 and Hortonworks Data Platform (HDP).

Create etc/catalog/hive.properties with the following contents to mount the hive-hadoop2 connector as the hive catalog, replacing example.net:9083 with the correct host and port for your Hive metastore Thrift service:

  1. connector.name=hive-hadoop2
  2. hive.metastore.uri=thrift://example.net:9083

Multiple Hive Clusters

You can have as many catalogs as you need, so if you have additional Hive clusters, simply add another properties file to etc/catalog with a different name (making sure it ends in .properties). For example, if you name the property file sales.properties, openLooKeng will create acatalog named sales using the configured connector.

HDFS Configuration

For basic setups, openLooKeng configures the HDFS client automatically and does not require any configuration files. In some cases, such as when using federated HDFS or NameNode high availability, it is necessary to specify additional HDFS client options in order to access your HDFS cluster. To do so, add the hive.config.resources property to reference your HDFS config files:

  1. hive.config.resources=/etc/hadoop/conf/core-site.xml,/etc/hadoop/conf/hdfs-site.xml

Only specify additional configuration files if necessary for your setup. We also recommend reducing the configuration files to have the minimum set of required properties, as additional properties may cause problems.

The configuration files must exist on all openLooKeng nodes. If you are referencing existing Hadoop config files, make sure to copy them to any openLooKeng nodes that are not running Hadoop.

HDFS Username and Permissions

Before running any CREATE TABLE or CREATE TABLE AS statements for Hive tables in openLooKeng, you need to check that the user openLooKeng is using to access HDFS has access to the Hive warehouse directory. The Hive warehouse directory is specified by the configuration variable hive.metastore.warehouse.dir in hive-site.xml, and the default value is /user/hive/warehouse.

When not using Kerberos with HDFS, openLooKeng will access HDFS using the OS user of the openLooKeng process. For example, if openLooKeng is running as nobody, it will access HDFS as nobody. You can override this username by setting the HADOOP_USER_NAME system property in the openLooKeng JVM Config, replacing hdfs_userwith the appropriate username:

  1. -DHADOOP_USER_NAME=hdfs_user

The hive user generally works, since Hive is often started with the hive user and this user has access to the Hive warehouse.

Whenever you change the user openLooKeng is using to access HDFS, remove /tmp/openlookeng-*,/tmp/presto-*,/tmp/hetu-* on HDFS, as the new user may not have access to the existing temporary directories.

Accessing Hadoop clusters protected with Kerberos authentication

Kerberos authentication is supported for both HDFS and the Hive metastore. However, Kerberos authentication by ticket cache is not yet supported.

The properties that apply to Hive connector security are listed in the Hive Configuration Properties table. Please see the hive-security section for a more detailed discussion of the security options in the Hive connector.

Hive Configuration Properties

Property NameDescriptionDefault
hive.metastoreThe type of Hive metastorethrift
hive.config.resourcesAn optional comma-separated list of HDFS configuration files. These files must exist on the machines running openLooKeng. Only specify this if absolutely necessary to access HDFS. Example: /etc/hdfs-site.xml
hive.recursive-directoriesEnable reading data from subdirectories of table or partition locations. If disabled, subdirectories are ignored. This is equivalent to the hive.mapred.supports.subdirectories property in Hive.
hive.storage-formatThe default file format used when creating new tables.ORC
hive.compression-codecThe compression codec to use when writing files.GZIP
hive.force-local-schedulingForce splits to be scheduled on the same node as the Hadoop DataNode process serving the split data. This is useful for installations where openLooKeng is collocated with every DataNode.false
hive.respect-table-formatShould new partitions be written using the existing table format or the default openLooKeng format?true
hive.immutable-partitionsCan new data be inserted into existing partitions?false
hive.create-empty-bucket-filesShould empty files be created for buckets that have no data?false
hive.max-partitions-per-writersMaximum number of partitions per writer.100
hive.max-partitions-per-scanMaximum number of partitions for a single table scan.100,000
hive.hdfs.authentication.typeHDFS authentication type. Possible values are NONE or KERBEROS.NONE
hive.hdfs.impersonation.enabledEnable HDFS end user impersonation.false
hive.hdfs.presto.principalThe Kerberos principal that openLooKeng will use when connecting to HDFS.
hive.hdfs.presto.keytabHDFS client keytab location.
hive.securitySee Hive Security Configuration.
security.config-filePath of config file to use when hive.security=file. See File Based Authorization for details.
hive.non-managed-table-writes-enabledEnable writes to non-managed (external) Hive tables.false
hive.non-managed-table-creates-enabledEnable creating non-managed (external) Hive tables.true
hive.collect-column-statistics-on-writeEnables automatic column level statistics collection on write. See Table Statistics for details.true
hive.s3select-pushdown.enabledEnable query pushdown to AWS S3 Select service.false
hive.s3select-pushdown.max-connectionsMaximum number of simultaneously open connections to S3 for S3 Select Pushdown.500
hive.orc.use-column-namesTo support alter table drop column, it is recommended to add hive.orc.use-column-names=true in hive properties, otherwise the drop column might not work properly.false

Hive Thrift Metastore Configuration Properties

Property NameDescription
hive.metastore.uriThe URI(s) of the Hive metastore to connect to using the Thrift protocol. If multiple URIs are provided, the first URI is used by default and the rest of the URIs are fallback metastores. This property is required. Example: thrift://192.0.2.3:9083 or thrift://192.0.2.3:9083,thrift://192.0.2.4:9083
hive.metastore.usernameThe username openLooKeng will use to access the Hive metastore.
hive.metastore.authentication.typeHive metastore authentication type. Possible values are NONE or KERBEROS (defaults to NONE).
hive.metastore.thrift.client.ssl.enabledUse SSL when connecting to metastore. default value is false When it is true, either keystore or truststore is required. You should set the keystore/truststore path and password in the jvm.config. The keys are listed as below: -Djavax.net.ssl.keystoreType= e.g. jks -Djavax.net.ssl.keyStore= -Djavax.net.ssl.keyStorePassword= -Djavax.net.ssl.trustStore= -Djavax.net.ssl.trustStorePassword=
hive.metastore.service.principalThe Kerberos principal of the Hive metastore service.
hive.metastore.client.principalThe Kerberos principal that openLooKeng will use when connecting to the Hive metastore service.
hive.metastore.client.keytabHive metastore client keytab location.
hive.metastore.thrift.is-role-name-case-sensitivewhether the role name to be Case-Sensitive or not, default value false.

AWS Glue Catalog Configuration Properties

Property NameDescription
hive.metastore.glue.regionAWS region of the Glue Catalog. This is required when not running in EC2, or when the catalog is in a different region. Example: us-east-1
hive.metastore.glue.pin-client-to-current-regionPin Glue requests to the same region as the EC2 instance where openLooKeng is running (defaults to false).
hive.metastore.glue.max-connectionsMax number of concurrent connections to Glue (defaults to 5).
hive.metastore.glue.default-warehouse-dirHive Glue metastore default warehouse directory
hive.metastore.glue.aws-access-keyAWS access key to use to connect to the Glue Catalog. If specified along with hive.metastore.glue.aws-secret-key, this parameter takes precedence over hive.metastore.glue.iam-role.
hive.metastore.glue.aws-secret-keyAWS secret key to use to connect to the Glue Catalog. If specified along with hive.metastore.glue.aws-access-key, this parameter takes precedence over hive.metastore.glue.iam-role.
hive.metastore.glue.iam-roleARN of an IAM role to assume when connecting to the Glue Catalog.

Amazon S3 Configuration

The Hive Connector can read and write tables that are stored in S3. This is accomplished by having a table or database location that uses an S3 prefix rather than an HDFS prefix.

openLooKeng uses its own S3 filesystem for the URI prefixes s3://, s3n://and s3a://.

S3 Configuration Properties

Property NameDescription
hive.s3.use-instance-credentialsUse the EC2 metadata service to retrieve API credentials (defaults to true). This works with IAM roles in EC2.
hive.s3.aws-access-keyDefault AWS access key to use.
hive.s3.aws-secret-keyDefault AWS secret key to use.
hive.s3.iam-roleIAM role to assume.
hive.s3.endpointThe S3 storage endpoint server. This can be used to connect to an S3-compatible storage system instead of AWS. When using v4 signatures, it is recommended to set this to the AWS region-specific endpoint (e.g., http[s]://.s3-.amazonaws.com).
hive.s3.signer-typeSpecify a different signer type for S3-compatible storage. Example: S3SignerType for v2 signer type
hive.s3.path-style-accessUse path-style access for all requests to the S3-compatible storage. This is for S3-compatible storage that doesn’t support virtual-hosted-style access. (defaults to false)
hive.s3.staging-directoryLocal staging directory for data written to S3. This defaults to the Java temporary directory specified by the JVM system property java.io.tmpdir.
hive.s3.pin-client-to-current-regionPin S3 requests to the same region as the EC2 instance where openLooKeng is running (defaults to false).
hive.s3.ssl.enabledUse HTTPS to communicate with the S3 API (defaults to true).
hive.s3.sse.enabledUse S3 server-side encryption (defaults to false).
hive.s3.sse.typeThe type of key management for S3 server-side encryption. Use S3 for S3 managed or KMS for KMS-managed keys (defaults to S3).
hive.s3.sse.kms-key-idThe KMS Key ID to use for S3 server-side encryption with KMS-managed keys. If not set, the default key is used.
hive.s3.kms-key-idIf set, use S3 client-side encryption and use the AWS KMS to store encryption keys and use the value of this property as the KMS Key ID for newly created objects.
hive.s3.encryption-materials-providerIf set, use S3 client-side encryption and use the value of this property as the fully qualified name of a Java class which implements the AWS SDK’s EncryptionMaterialsProvider interface. If the class also implements Configurable from the Hadoop API, the Hadoop configuration will be passed in after the object has been created.
hive.s3.upload-acl-typeCanned ACL to use while uploading files to S3 (defaults to Private).
hive.s3.skip-glacier-objectsIgnore Glacier objects rather than failing the query. This will skip data that may be expected to be part of the table or partition. Defaults to false.

S3 Credentials

If you are running openLooKeng on Amazon EC2 using EMR or another facility, it is highly recommended that you set hive.s3.use-instance-credentials to true and use IAM Roles for EC2 to govern access to S3. If this is the case, your EC2 instances will need to be assigned an IAM Role which grants appropriate access to the data stored in the S3 bucket(s) you wish to use. It’s also possible to configure an IAM role with hive.s3.iam-role that will be assumed for accessing any S3 bucket. This is much cleaner than setting AWS access and secret keys in the hive.s3.aws-access-key and hive.s3.aws-secret-key settings, and also allows EC2 to automatically rotate credentials on a regular basis without any additional work on your part.

Custom S3 Credentials Provider

You can configure a custom S3 credentials provider by setting the Hadoop configuration property presto.s3.credentials-provider to be the fully qualified class name of a custom AWS credentials provider implementation. This class must implement the AWSCredentialsProvider interface and provide a two-argument constructor that takes a java.net.URI and a Hadoop org.apache.hadoop.conf.Configuration as arguments. A custom credentials provider can be used to provide temporary credentials from STS (using STSSessionCredentialsProvider), IAM role-based credentials (using STSAssumeRoleSessionCredentialsProvider), or credentials for a specific use case (e.g., bucket/user specific credentials). This Hadoop configuration property must be set in the Hadoop configuration files referenced by the hive.config.resources Hive connector property.

Tuning Properties

he following tuning properties affect the behavior of the client used by the openLooKeng S3 filesystem when communicating with S3. Most of these parameters affect settings on the ClientConfiguration object associated with the AmazonS3Client.

Property NameDescriptionDefault
hive.s3.max-error-retriesMaximum number of error retries, set on the S3 client.10
hive.s3.max-client-retriesMaximum number of read attempts to retry.5
hive.s3.max-backoff-timeUse exponential backoff starting at 1 second up to this maximum value when communicating with S3.10 minutes
hive.s3.max-retry-timeMaximum time to retry communicating with S3.10 minutes
hive.s3.connect-timeoutTCP connect timeout.5 seconds
hive.s3.socket-timeoutTCP socket read timeout.5 seconds
hive.s3.max-connectionsMaximum number of simultaneous open connections to S3.500
hive.s3.multipart.min-file-sizeMinimum file size before multi-part upload to S3 is used.16 MB
hive.s3.multipart.min-part-sizeMinimum multi-part upload part size.5 MB

S3 Data Encryption

openLooKeng supports reading and writing encrypted data in S3 using both server-side encryption with S3 managed keys and client-side encryption using either the Amazon KMS or a software plugin to manage AES encryption keys.

With S3 server-side encryption, (called SSE-S3 in the Amazon documentation) the S3 infrastructure takes care of all encryption and decryption work (with the exception of SSL to the client, assuming you have hive.s3.ssl.enabled set to true). S3 also manages all the encryption keys for you. To enable this, set hive.s3.sse.enabled to true.

With S3 client-side encryption, S3 stores encrypted data and the encryption keys are managed outside of the S3 infrastructure. Data is encrypted and decrypted by openLooKeng instead of in the S3 infrastructure. In this case, encryption keys can be managed either by using the AWS KMS or your own key management system. To use the AWS KMS for key management, set hive.s3.kms-key-id to the UUID of a KMS key. Your AWS credentials or EC2 IAM role will need to be granted permission to use the given key as well.

To use a custom encryption key management system, set hive.s3.encryption-materials-provider to the fully qualified name of a class which implements the EncryptionMaterialsProvider interface from the AWS Java SDK. This class will have to be accessible to the Hive Connector through the classpath and must be able to communicate with your custom key management system. If this class also implements the org.apache.hadoop.conf.Configurable interface from the Hadoop Java API, then the Hadoop configuration will be passed in after the object instance is created and before it is asked to provision or retrieve any encryption keys.

S3 Select Pushdown

S3 Select Pushdown enables pushing down projection (SELECT) and predicate (WHERE) processing to S3 Select. With S3 Select Pushdown, openLooKeng only retrieves the required data from S3 instead of entire S3 objects, reducing both latency and network usage.

Is S3 Select a good fit for my workload?

Performance of S3 Select Pushdown depends on the amount of data filtered by the query. Filtering a large number of rows should result in better performance. If the query doesn’t filter any data then pushdown may not add any additional value and user will be charged for S3 Select requests. Thus, we recommend that you benchmark your workloads with and without S3 Select to see if using it may be suitable for your workload. By default, S3 Select Pushdown is disabled and you should enable it in production after proper benchmarking and cost analysis. For more information on S3 Select request cost, please see Amazon S3 Cloud Storage Pricing.

Use the following guidelines to determine if S3 Select is a good fit for your workload:

  • Your query filters out more than half of the original data set.
  • Your query filter predicates use columns that have a data type supported by openLooKeng and S3 Select. The TIMESTAMP, REAL, and DOUBLE data types are not supported by S3 Select Pushdown. We recommend using the decimal data type for numerical data. For more information about supported data types for S3 Select, see the Data Types documentation.
  • Your network connection between Amazon S3 and the Amazon EMR cluster has good transfer speed and available bandwidth. Amazon S3 Select does not compress HTTP responses, so the response size may increase for compressed input files.

Considerations and Limitations

  • Only objects stored in CSV format are supported. Objects can be uncompressed or optionally compressed with gzip or bzip2.
  • The “AllowQuotedRecordDelimiters” property is not supported. If this property is specified, the query fails.
  • Amazon S3 server-side encryption with customer-provided encryption keys (SSE-C) and client-side encryption are not supported.
  • S3 Select Pushdown is not a substitute for using columnar or compressed file formats such as ORC and Parquet.

Enabling S3 Select Pushdown

You can enable S3 Select Pushdown using the s3_select_pushdown_enabled Hive session property or using the hive.s3select-pushdown.enabled configuration property. The session property will override the config property, allowing you enable or disable on a per-query basis.

Understanding and Tuning the Maximum Connections

openLooKeng can use its native S3 file system or EMRFS. When using the native FS, the maximum connections is configured via the hive.s3.max-connections configuration property. When using EMRFS, the maximum connections is configured via the fs.s3.maxConnections Hadoop configuration property.

S3 Select Pushdown bypasses the file systems when accessing Amazon S3 for predicate operations. In this case, the value of hive.s3select-pushdown.max-connections determines the maximum number of client connections allowed for those operations from worker nodes.

If your workload experiences the error Timeout waiting for connection from pool, increase the value of both hive.s3select-pushdown.max-connections and the maximum connections configuration for the file system you are using.

Google Cloud Storage Configuration

The Hive connector can access data stored in GCS, using the gs:// URI prefix. Please refer to the hive-gcs-tutorial for step-by-step instructions.

GCS Configuration properties

GCS Configuration properties

Property NameDescription
hive.gcs.json-key-file-pathJSON key file used to authenticate with Google Cloud Storage.
hive.gcs.use-access-tokenUse client-provided OAuth token to access Google Cloud Storage. This is mutually exclusive with a global JSON key file.

ORC Cache Configuration

Hive connector caches the ORC file data to provide better performance. The data is cached in worker local memory. Support for caching partitioned table is only available. cache sql can be used to customize the table and partition that should be cached by the Connector.

ORC Cache Properties

Property NameDescriptionDefault
hive.orc.file-tail.cache.enabledEnable ORC file tail cachefalse
hive.orc.file-tail.cache.ttlTTL for ORC file tail cache30 mins
hive.orc.file-tail.cache.limitMaximum number of entries in ORC file tail cache10,000
hive.orc.stripe-footer.cache.enabledEnable ORC stripe footer cachefalse
hive.orc.stripe-footer.cache.ttlTTL for ORC stripe footer cache30 mins
hive.orc.stripe-footer.cache.limitMaximum number of entries in ORC Stripe footer cache25,000
hive.orc.row-index.cache.enabledEnable ORC row index cachefalse
hive.orc.row-index.cache.ttlTTL for ORC row index cache30 mins
hive.orc.row-index.cache.limitMaximum number of entries in ORC row index cache50,000
hive.orc.bloom-filters.cache.enabledEnable ORC bloom filter cachefalse
hive.orc.bloom-filters.cache.ttlTTL for ORC bloom filter cache30 mins
hive.orc.bloom-filters.cache.limitMaximum number of entries in ORC bloom filter cache50,000
hive.orc.row-data.block.cache.enabledEnable ORC row group block cachefalse
hive.orc.row-data.block.cache.ttlTTL for ORC row group cache30 mins
hive.orc.row-data.block.cache.max.weightMaximum weight of ORC row group cache500 MB

Table Statistics

When writing data, the Hive connector always collects basic statistics (numFiles, numRows, rawDataSize, totalSize) and by default will also collect column level statistics:

Column TypeCollectible Statistics
TINYINTnumber of nulls, number of distinct values, min/max values
SMALLINTnumber of nulls, number of distinct values, min/max values
INTEGERnumber of nulls, number of distinct values, min/max values
BIGINTnumber of nulls, number of distinct values, min/max values
DOUBLEnumber of nulls, number of distinct values, min/max values
REALnumber of nulls, number of distinct values, min/max values
DECIMALnumber of nulls, number of distinct values, min/max values
DATEnumber of nulls, number of distinct values, min/max values
TIMESTAMPnumber of nulls, number of distinct values, min/max values
VARCHARnumber of nulls, number of distinct values
CHARnumber of nulls, number of distinct values
VARBINARYnumber of nulls
BOOLEANnumber of nulls, number of true/false values

Updating table and partition statistics

If your queries are complex and include joining large data sets, running /sql/analyze on tables/partitions may improve query performance by collecting statistical information about the data.

When analyzing a partitioned table, the partitions to analyze can be specified via the optional partitions property, which is an array containing the values of the partition keys in the order they are declared in the table schema:

  1. ANALYZE table_name WITH (
  2. partitions = ARRAY[
  3. ARRAY['p1_value1', 'p1_value2'],
  4. ARRAY['p2_value1', 'p2_value2']])

This query will collect statistics for two partitions with keys p1_value1, p1_value2 and p2_value1, p2_value2.

Hive ACID support

openLooKeng supports ACID transactions (INSERT,UPDATE,DELETE) on a transactional table in Hive.

Create Transactional Table using Hive Connector

To support ACID transactions, following prerequisites must be met:

  1. Table should be created with ‘transactional’ property enabled.
  2. Format as ORC. Refer #Limitations

Example:

  1. CREATE TABLE hive_acid_table (
  2. id int,
  3. name string )
  4. WITH (format='ORC', transactional=true);

INSERT on transactional tables

Insert operation remains same from end-user perspective for both transactional and non-transactional tables.

Example:

  1. INSERT INTO hive_acid_table
  2. VALUES
  3. (1, 'foo'),
  4. (2, 'bar');

UPDATE on transactional tables

UPDATE operation on transactional table lets user update specific rows’ columns matching with WHERE clause.

Example:

  1. UPDATE hive_acid_table
  2. SET name='john'
  3. WHERE id=2;

Above example updates the column name‘s value to john of row with column id having value 2.

SELECT result before UPDATE:

  1. lk:default> SELECT * FROM hive_acid_table;
  2. id | name
  3. ----+------
  4. 2 | bar
  5. 1 | foo
  6. (2 rows)

SELECT result after UPDATE

  1. lk:default> SELECT * FROM hive_acid_table;
  2. id | name
  3. ----+------
  4. 2 | john
  5. 1 | foo
  6. (2 rows)

DELETE on transactional tables

DELETE operation on transactional tables lets user delete specific rows matching with WHERE clause.

Example:

  1. DELETE FROM hive_acid_table
  2. WHERE id=2;

Above example delete the row with column id having value 2.

SELECT result before DELETE:

  1. lk:default> SELECT * FROM hive_acid_table;
  2. id | name
  3. ----+------
  4. 2 | john
  5. 1 | foo
  6. (2 rows)

SELECT result after DELETE:

  1. lk:default> SELECT * FROM hive_acid_table;
  2. id | name
  3. ----+------
  4. 1 | foo
  5. (1 row)

VACUUM on transactional tables

Hive maintains all transactions (INSERT/UPDATE/DELETE) in separate delta directories for bookkeeping purposes. DELETE transactions does not remove the old rows physically in stored data, instead they just mark them as deleted in a new file. UPDATE uses split-update mechanism to update data. Due to these, read operations on table needs to read many files, which adds extra overhead. All these delta files needs to be merged to get consolidated data for faster processing. VACUUM operation in openLooKeng does the work of merging these delta files.

Vacuum operation translates to compaction in Hive. In Hive there are two types of compactions, Major and Minor.

Following are mapping between VACUUM and Hive compactions.

  • VACUUM FULL’ translates to Major compaction.

  • VACUUM’ translates to Minor compaction.

VACUUM

  1. VACUUM TABLE hive_acid_table;

The above operation triggers the VACUUM on hive_acid_table to merge all delta directories to single delta directory. Once operation reaches RUNNING state, it continues to run asynchronously, unblocking client.


NOTE: Currently there is no command to fetch the result of asynchronous VACUUM, but it can be monitored from UI.


VACUUM FULL

Full Vacuum merges the all transactions present in delta directories and creates a base directory containing only final result. After this operation, deleted rows will be deleted permanently. As a result, during read, total data read will be very less, hence improves performance.

  1. VACUUM TABLE hive_acid_table
  2. FULL;

The Above operation triggers the VACUUM FULL on hive_acid_table and once it reaches RUNNING state, it continues to run asynchronously, unblocking client.

VACUUM on partitioned table

If the table is partitioned then VACUUM operation can operate upon the specific partition separately instead of all partitions of the table together.

Example: Creating the partition table and INSERT data:

  1. CREATE TABLE hive_acid_table_partitioned (
  2. id int,
  3. name string,
  4. class int)
  5. WITH (format='ORC', transactional=true, partitioned_by=ARRAY['class']);
  6. INSERT INTO hive_acid_table_partitioned
  7. VALUES
  8. (1, 'foo', 5),
  9. (2, 'bar', 10);

Vacuum on specific partition class=5 can be run as:

  1. VACUUM TABLE hive_acid_table_partitioned
  2. FULL
  3. PARTITION 'class=5';

If PARTITION 'class=5' is not specified then vacuum operation will run on all partitions and if any failure in any one partition fails the entire operation.

AND WAIT option

By default, VACUUM operations runs in asynchronously, i.e. Once the query reaches RUNNING state, client will not wait anymore for completion of operation.

Adding AND WAIT option to vacuum operation makes the client wait synchronously for the completion of Vacuum operation.

Above examples with AND WAIT options looks like below:

  1. VACUUM TABLE hive_acid_table
  2. FULL
  3. AND WAIT;
  1. VACUUM TABLE hive_acid_table
  2. AND WAIT;
  1. VACUUM TABLE hive_acid_table_partitioned
  2. FULL
  3. PARTITION 'class=5'
  4. AND WAIT;

Schema Evolution

Hive allows the partitions in a table to have a different schema than the table. This occurs when the column types of a table are changed after partitions already exist (that use the original column types). The Hive connector supports this by allowing the same conversions as Hive:

  • varchar to and from tinyint, smallint, integer and bigint
  • real to double
  • Widening conversions for integers, such as tinyint to smallint

Any conversion failure will result in null, which is the same behavior as Hive. For example, converting the string 'foo' to a number, or converting the string '1234' to a tinyint (which has a maximum value of 127).

Avro Schema Evolution

openLooKeng supports querying and manipulating Hive tables with Avro storage format which has the schema set based on an Avro schema file/literal. It is also possible to create tables in openLooKeng which infers the schema from a valid Avro schema file located locally or remotely in HDFS/Web server.

To specify that Avro schema should be used for interpreting table’s data one must use avro_schema_url table property. The schema can be placed remotely in HDFS (e.g. avro_schema_url = 'hdfs://user/avro/schema/avro_data.avsc'), S3 (e.g. avro_schema_url = 's3n:///schema_bucket/schema/avro_data.avsc'), a web server (e.g. avro_schema_url = 'http://example.org/schema/avro_data.avsc') as well as local file system. This url where the schema is located, must be accessible from the Hive metastore and openLooKeng coordinator/worker nodes.

The table created in openLooKeng using avro_schema_url behaves the same way as a Hive table with avro.schema.url or avro.schema.literal set.

Example:

  1. CREATE TABLE hive.avro.avro_data (
  2. id bigint
  3. )
  4. WITH (
  5. format = 'AVRO',
  6. avro_schema_url = '/usr/local/avro_data.avsc'
  7. )

The columns listed in the DDL (id in the above example) will be ignored if avro_schema_url is specified. The table schema will match the schema in the Avro schema file. Before any read operation, the Avro schema is accessed so query result reflects any changes in schema. Thus openLooKeng takes advantage of Avro’s backward compatibility abilities.

If the schema of the table changes in the Avro schema file, the new schema can still be used to read old data. Newly added/renamed fields must have a default value in the Avro schema file.

The schema evolution behavior is as follows:

  • Column added in new schema: Data created with an older schema will produce a default value when table is using the new schema.
  • Column removed in new schema: Data created with an older schema will no longer output the data from the column that was removed.
  • Column is renamed in the new schema: This is equivalent to removing the column and adding a new one, and data created with an older schema will produce a default value when table is using the new schema.
  • Changing type of column in the new schema: If the type coercion is supported by Avro or the Hive connector, then the conversion happens. An error is thrown for incompatible types.

Limitations

The following operations are not supported when avro_schema_url is set:

  • CREATE TABLE AS is not supported.
  • Using partitioning(partitioned_by) or bucketing(bucketed_by) columns are not supported in CREATE TABLE.
  • ALTER TABLE commands modifying columns are not supported.

Procedures

  • system.create_empty_partition(schema_name, table_name, partition_columns, partition_values)

    Create an empty partition in the specified table.

  • system.sync_partition_metadata(schema_name, table_name, mode)

    Check and update partitions list in metastore. There are three modes available:

    • ADD : add any partitions that exist on the file system but not in the metastore.
    • DROP: drop any partitions that exist in the metastore but not on the file system.
    • FULL: perform both ADD and DROP.

Examples

The Hive connector supports querying and manipulating Hive tables and schemas (databases). While some uncommon operations will need to be performed using Hive directly, most operations can be performed using openLooKeng.

Create a new Hive schema named web that will store tables in an S3bucket named my-bucket:

  1. CREATE SCHEMA hive.web
  2. WITH (location = 's3://my-bucket/')

Create a new Hive table named page_views in the web schema that is stored using the ORC file format, partitioned by date and country, and bucketed by user into 50 buckets (note that Hive requires the partition columns to be the last columns in the table):

Drop a partition from the page_views table:

  1. DELETE FROM hive.web.page_views
  2. WHERE ds = DATE '2016-08-09'
  3. AND country = 'US'

Add an empty partition to the page_views table:

  1. CALL system.create_empty_partition(
  2. schema_name => 'web',
  3. table_name => 'page_views',
  4. partition_columns => ARRAY['ds', 'country'],
  5. partition_values => ARRAY['2016-08-09', 'US']);

Query the page_views table:

  1. SELECT * FROM hive.web.page_views

List the partitions of the page_views table:

  1. SELECT * FROM hive.web."page_views$partitions"

Create an external Hive table named request_logs that points at existing data in S3:

  1. CREATE TABLE hive.web.request_logs (
  2. request_time timestamp,
  3. url varchar,
  4. ip varchar,
  5. user_agent varchar
  6. )
  7. WITH (
  8. format = 'TEXTFILE',
  9. external_location = 's3://my-bucket/data/logs/'
  10. )

Collect statistics for the request_logs table:

  1. ANALYZE hive.web.request_logs;

The examples shown here should work on Google Cloud Storage after replacing s3:// with gs://.

Cleaning up

Drop the external table request_logs. This only drops the metadata for the table. The referenced data directory is not deleted:

  1. DROP TABLE hive.web.request_logs

Drop a schema:

  1. DROP SCHEMA hive.web

Hive Connector Limitations

  • delete is only supported if the WHERE clause matches entire partitions when table is non-transactional. for transactional table, the WHERE clause can be any condition.

  • alter-schema usage fails, since the Hive metastore does not support renaming schemas.

  • openLooKeng supports ACID transactions on Hive tables only for Hive version 3.x

  • openLooKeng currently supports only ORC format for transactional tables.