Yandex Cloud
Search
Contact UsGet started
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
    • Featured
    • Infrastructure & Network
    • Data Platform
    • Containers
    • Developer tools
    • Serverless
    • Security
    • Monitoring & Resources
    • AI for business
    • Business tools
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
  • Pricing
  • Customer Stories
  • Documentation
  • Blog
© 2025 Direct Cursus Technology L.L.C.
Yandex MetaData Hub
  • About Yandex MetaData Hub
    • Getting started
      • Apache Hive™ Metastore clusters
      • Impersonation in Apache Hive™ Metastore
    • Service roles for access management
    • Troubleshooting
    • Terraform reference
    • Audit Trails events
  • Access management
  • Quotas and limits
  • Pricing policy
  • Public materials
  • Release notes
  1. Apache Hive™ Metastore
  2. Concepts
  3. Impersonation in Apache Hive™ Metastore

Impersonation in Apache Hive™ Metastore

Written by
Yandex Cloud
Updated at October 15, 2025

Impersonation allows a Apache Hive™ Metastore cluster to work with cloud resources on behalf of a service account.

By default, a Apache Hive™ Metastore cluster does not have permissions to access user resources. To provide access to such resources, create a service account with the required roles and attach it to the Apache Hive™ Metastore cluster when creating the cluster. After that, Apache Hive™ Metastore will have access to user resources by authorizing on behalf of a service account.

The roles required for the service account depend on which service you are going to use Apache Hive™ Metastore with. For example, you need the logging.writer role to configure cluster log export in Yandex Cloud Logging, and the monitoring.editor, to use Yandex Monitoring dashboards.

When creating a service account for Apache Hive™ Metastore, we recommend using the managed-metastore.integrationProvider role as it already includes the logging.writer and monitoring.editor roles. For more information about this role, see this reference.

Apache® and Apache Hive™ are either registered trademarks or trademarks of the Apache Software Foundation in the United States and/or other countries.

Was the article helpful?

Previous
Apache Hive™ Metastore clusters
Next
Service roles for access management
© 2025 Direct Cursus Technology L.L.C.