This page explains various error scenarios and troubleshooting steps to resolve the errors.
Connectivity and networking error scenarios
If your service experiences connectivity or networking issues, check the scenarios in the following sections to see if one of them is causing the problem.
Service creation fails due to constraint to restrict VPC peering
Don't set the org-policy constraint to restrict VPC peering. Specifying
constraints/compute.restrictVpcPeering causes your creation request to
fail with an
INVALID_ARGUMENT error. If you must set the constraint, use the
following command to allow
gcloud resource-manager org-policies allow compute.restrictVpcPeering under:folders/270204312590 --organization ORGANIZATION_ID
For more information, see Organization policy constraints.
Cross-project deployment fails where service account may not exist
To create a Dataproc Metastore service that is accessible in a network belonging
to a different project than the one the service belongs to, you must grant
roles/metastore.serviceAgent to the service project's
Dataproc Metastore service agent
in the network project's IAM policy.
gcloud projects add-iam-policy-binding NETWORK_PROJECT_ID \ --role "roles/metastore.serviceAgent" \ --member "serviceAccount:service-SERVICE_PROJECT_NUMBER@gcp-sa-metastore.iam.gserviceaccount.com"
For more information, see Set up a cross-project deployment.
Private IP is required for network connectivity
Dataproc Metastore uses private IP only, so no public IP is exposed. This means that only VMs on the provided Virtual Private Cloud (VPC) network or on-premises (connected through Cloud VPN or Cloud Interconnect) can access the Dataproc Metastore service.
For more information, see Service access.
Required ingress-allow firewall rule for Kerberos
Kerberos requires Dataproc Metastore to initiate connections to
hosts in your project network. You must create a firewall rule that allows TCP
and UDP ingress on all ports from the
/17 IP block that contains the
Dataproc Metastore IP.
Connection error caused by resources provisioned in shared VPC networks
If your Dataproc Metastore service uses a network belonging to a different project, and Compute Engine is protected by the service perimeter, then the metastore project and network project must be in the same perimeter.
To add existing Dataproc Metastore projects to the perimeter, follow the instructions in Updating a service perimeter.
For more information, see VPC Service Controls with Dataproc Metastore.
Allocated IP range is exhausted
The provided VPC network may run out of available RFC 1918 addresses required by Dataproc Metastore services. If that happens, Dataproc Metastore will attempt to reserve private IP address ranges outside of the RFC 1918 ranges for service creation. For a list of supported non-RFC 1918 private ranges, see Valid ranges in the VPC network documentation.
Non-RFC 1918 private IP addresses used in Dataproc Metastore may conflict with a range in an on-premises network that is connected to the provided VPC network. To check the list of RFC 1918 and non-RFC 1918 private IP addresses reserved by Dataproc Metastore:
gcloud compute addresses list \ --project NETWORK_PROJECT_ID \ --filter="purpose:VPC_PEERING AND name ~ cluster|resourcegroup"
If a conflict is determined and cannot be mitigated by re-configuring the on-premises network, delete the offending Dataproc Metastore service and re-create it again after 2 hours.
For more information, see IP address range exhaustion.
Operation timeout error scenarios
The following error scenarios result in an unresponsive service or operation timeouts.
Use Audit logs to troubleshoot operation timeouts
To troubleshoot service operation timeouts, use the Logs Explorer in the Cloud Console to retrieve your audit log entries for your Cloud project.
In the Query builder pane, select Audited Resource or
the Google Cloud resource type, followed by Dataproc Metastore or
metastore.googleapis.com as the service. Selecting a method is optional.
For more information, see Viewing logs.
Import and export error scenarios
This section outlines common Dataproc Metastore import and export issues.
Import fails because the Hive versions don't match
When you import metadata, the Hive metastore and Dataproc Metastore versions must be compatible. Your import may fail if the two don't match.
For more information, see version policy.
Import fails because there are missing Hive table files
When preparing the import for Avro, there should be a file for each Hive table, even if the table is empty, otherwise the import will fail.
You can use the Dataproc Metastore Toolkit as a reference to check the correct Hive metadata schemas.
Service agent or user doesn't have necessary permissions
The Dataproc Metastore service agent (
and the user importing the metadata must have the following read permission to
the Cloud Storage bucket used for the import:
For MySQL, they must have
storage.objects.getpermission on the Cloud Storage object (SQL dump file) used for the import.
For Avro, they must have
storage.objects.getpermission on the Cloud Storage bucket used for the import.
For exports, the Dataproc Metastore service agent
and the user creating the export must have
permission on the bucket.
Job fails because the database file is too big
If your database file is too large, it can take more than the one hour job timeout limit to complete the import or export process.
Backup and restore error scenarios
This section outlines common Dataproc Metastore backup and restore issues.
Unable to create a new backup for a service
If there are already 7 backups in a service, then you must first manually delete a backup before creating a new one. You can delete existing backups from the Backup/Restore tab.
User doesn't have necessary permissions
To backup metadata, you must request an IAM role containing the
metastore.backups.create IAM permission.
To restore metadata, you must request an IAM role containing the
metastore.backups.use IAM permissions.
Job fails because the service metadata file is too big
Dataproc cluster error scenarios
The following sections outline common Dataproc and self-managed cluster issues.
Dataproc cluster attachment fails due to mismatched versions
When you attach a Dataproc cluster, the Dataproc image and Dataproc Metastore Hive version must be compatible. Check the following image versioning pages to ensure that the Hive version is compatible:
For more information, see Dataproc Image version list.
Connection to metastore fails due to time zone issues
Your Hive file returns the error
The server time zone value 'CDT' is
unrecognized or represents more than one time zone.
If you can't connect to your metastore from Dataproc, then you
must delete your current cluster
and update your
gcloud dataproc clusters create command or automation tool to
include the following time zone parameter:
gcloud command-line tool issues
If you encounter an issue where a
gcloud tool command is unavailable,
or if the command behaves differently from how it is documented, try updating
the gcloud SDK:
gcloud components update
- To resolve errors, see Error messages.