[ 
https://issues.apache.org/jira/browse/HIVE-27023?focusedWorklogId=861651&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-861651
 ]

ASF GitHub Bot logged work on HIVE-27023:
-----------------------------------------

                Author: ASF GitHub Bot
            Created on: 12/May/23 00:29
            Start Date: 12/May/23 00:29
    Worklog Time Spent: 10m 
      Work Description: sonarcloud[bot] commented on PR #4015:
URL: https://github.com/apache/hive/pull/4015#issuecomment-1544932325

   Kudos, SonarCloud Quality Gate passed!    [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive&pullRequest=4015)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive&pullRequest=4015&resolved=false&types=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive&pullRequest=4015&resolved=false&types=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive&pullRequest=4015&resolved=false&types=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive&pullRequest=4015&resolved=false&types=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive&pullRequest=4015&resolved=false&types=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive&pullRequest=4015&resolved=false&types=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive&pullRequest=4015&resolved=false&types=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive&pullRequest=4015&resolved=false&types=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive&pullRequest=4015&resolved=false&types=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive&pullRequest=4015&resolved=false&types=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive&pullRequest=4015&resolved=false&types=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive&pullRequest=4015&resolved=false&types=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive&pullRequest=4015&metric=coverage&view=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive&pullRequest=4015&metric=duplicated_lines_density&view=list)
 No Duplication information
   
   




Issue Time Tracking
-------------------

    Worklog Id:     (was: 861651)
    Time Spent: 40m  (was: 0.5h)

> Add setting to disable hive session being started during Hive Cli startup
> -------------------------------------------------------------------------
>
>                 Key: HIVE-27023
>                 URL: https://issues.apache.org/jira/browse/HIVE-27023
>             Project: Hive
>          Issue Type: Improvement
>            Reporter: Alagappan Maruthappan
>            Assignee: Alagappan Maruthappan
>            Priority: Minor
>              Labels: pull-request-available
>          Time Spent: 40m
>  Remaining Estimate: 0h
>
> Added a setting disable Tez session being opened during the startup of Hive 
> cli. This is particularly needed when Hive action is being launched by Oozie 
> to perform DML only operations. In that cases before the tez session thread 
> could complete the launcher gets completed and clears all the scratch 
> directories. This leads to a failure with following stack trace:
> {code:java}
> Application application_1667416881396_24229473 failed 3 times due to AM 
> Container for appattempt_1667416881396_24229473_000003 exited with exitCode: 
> -1000
> Failing this attempt.Diagnostics: [2023-02-02 19:02:12.139]File does not 
> exist: 
> hdfs://<name_node>/tmp/<db>/_tez_session_dir/4050c4b0-b7af-4eda-832b-399c954eb576/.tez/application_1667416881396_24229473/tez.session.local-resources.pbjava.io.FileNotFoundException:
>  File does not exist: 
> hdfs://<name_node>/tmp/<db>/_tez_session_dir/4050c4b0-b7af-4eda-832b-399c954eb576/.tez/application_1667416881396_24229473/tez.session.local-resources.pbat
>  
> org.apache.hadoop.hdfs.DistributedFileSystem$29.doCall(DistributedFileSystem.java:1529)at
>  
> org.apache.hadoop.hdfs.DistributedFileSystem$29.doCall(DistributedFileSystem.java:1522)at
>  
> org.apache.hadoop.fs.FileSystemLinkResolver.resolve(FileSystemLinkResolver.java:81)at
>  
> org.apache.hadoop.hdfs.DistributedFileSystem.getFileStatus(DistributedFileSystem.java:1537)at
>  org.apache.hadoop.yarn.util.FSDownload.copy(FSDownload.java:253)at 
> org.apache.hadoop.yarn.util.FSDownload.access$000(FSDownload.java:63)at 
> org.apache.hadoop.yarn.util.FSDownload$2.run(FSDownload.java:366)at 
> org.apache.hadoop.yarn.util.FSDownload$2.run(FSDownload.java:364)at 
> java.security.AccessController.doPrivileged(Native Method)at 
> javax.security.auth.Subject.doAs(Subject.java:422)at 
> org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:2136)at
>  
> org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:2116)at
>  org.apache.hadoop.yarn.util.FSDownload.call(FSDownload.java:364)at 
> org.apache.hadoop.yarn.server.nodemanager.containermanager.localizer.ContainerLocalizer$FSDownloadWrapper.doDownloadCall(ContainerLocalizer.java:249)at
>  
> org.apache.hadoop.yarn.server.nodemanager.containermanager.localizer.ContainerLocalizer$FSDownloadWrapper.call(ContainerLocalizer.java:242)at
>  
> org.apache.hadoop.yarn.server.nodemanager.containermanager.localizer.ContainerLocalizer$FSDownloadWrapper.call(ContainerLocalizer.java:230)at
>  java.util.concurrent.FutureTask.run(FutureTask.java:266)at 
> java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511)at 
> java.util.concurrent.FutureTask.run(FutureTask.java:266)at 
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)at
>  
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)at
>  java.lang.Thread.run(Thread.java:748) {code}
> Also opening up of tez session in such cases is not needed.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to