Description
When an application is launched using impersonation in a hadoop cluster that has ACLs enabled and no default admin acl, the impersonating user is unable to access application resources from hadoop services such as logs.
Attachments
Issue Links
- links to