<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Ranger policies failed to refresh after implementing Kerberos in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180148#M142394</link>
    <description>&lt;P&gt;can you please check if ranger is also kerberised , because if it is hdp2.5 or above then it will be kerberised.&lt;/P&gt;&lt;P&gt;if it is then can you please try following&lt;/P&gt;&lt;P&gt;1) regenerating keytabs from ambari and restart the services.&lt;/P&gt;&lt;P&gt;2) add following properties in the repos on ranger:&lt;/P&gt;&lt;P&gt;policy.grantrevoke.auth.users: hbase ( or corresponding service user)&lt;/P&gt;&lt;P&gt;tag.download.auth.users: hbase ( or corresponding service user)&lt;/P&gt;&lt;P&gt;policy.download.auth.users: hbase (or corresponding service user)&lt;/P&gt;&lt;P&gt;same way these properties to be added in hdfs repo too , and service user will be hdfs or what ever you have in your cluster.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="14180-screen-shot-2017-03-29-at-34826-pm.png" style="width: 2752px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/19326i3E156E0D7BEA0651/image-size/medium?v=v2&amp;amp;px=400" role="button" title="14180-screen-shot-2017-03-29-at-34826-pm.png" alt="14180-screen-shot-2017-03-29-at-34826-pm.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 18 Aug 2019 09:13:47 GMT</pubDate>
    <dc:creator>dsharma</dc:creator>
    <dc:date>2019-08-18T09:13:47Z</dc:date>
    <item>
      <title>Ranger policies failed to refresh after implementing Kerberos</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180147#M142393</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;Ranger fails to refresh policies after implementing Kerberos. I implemented Kerberos with new local MIT KDC, and using Ambari Automated Setup. HDFS, Hive and HBase works fine with new authentication method, but there are errors in refreshing policies. Every service where Ranger plugin is enabled gives me error:&lt;/P&gt;&lt;PRE&gt;2017-03-29 11:24:52,657 ERROR client.RangerAdminRESTClient (RangerAdminRESTClient.java:getServicePoliciesIfUpdated(124)) - Error getting policies. secureMode=true, user=nn/hadoop1.locald@EXAMPLE.COM (auth:KERBEROS), response={"httpStatusCode":401,"statusCode":0}, serviceName=CLUSTER_hadoop
2017-03-29 11:24:52,657 ERROR util.PolicyRefresher (PolicyRefresher.java:loadPolicyfromPolicyAdmin(240)) - PolicyRefresher(serviceName=CLUSTER_hadoop): failed to refresh policies. Will continue to use last known version of policies (3)
java.lang.Exception: HTTP 401
        at org.apache.ranger.admin.client.RangerAdminRESTClient.getServicePoliciesIfUpdated(RangerAdminRESTClient.java:126)
        at org.apache.ranger.plugin.util.PolicyRefresher.loadPolicyfromPolicyAdmin(PolicyRefresher.java:217)
        at org.apache.ranger.plugin.util.PolicyRefresher.loadPolicy(PolicyRefresher.java:185)
        at org.apache.ranger.plugin.util.PolicyRefresher.run(PolicyRefresher.java:158)
&lt;/PRE&gt;&lt;P&gt;Thats for HDFS, for other services the user is different (hive etc.). I am using HDP 2.5 and Ambari 2.4.1.&lt;/P&gt;&lt;P&gt;These users exist in Kerberos (klist):&lt;/P&gt;&lt;PRE&gt;hive/hadoop1.locald@EXAMPLE.COM
hive/hadoop2.locald@EXAMPLE.COM
hive/hadoop3.locald@EXAMPLE.COM
hive/hadoop4.locald@EXAMPLE.COM
infra-solr/hadoop1.locald@EXAMPLE.COM
jhs/hadoop2.locald@EXAMPLE.COM
jn/hadoop1.locald@EXAMPLE.COM
jn/hadoop2.locald@EXAMPLE.COM
jn/hadoop3.locald@EXAMPLE.COM
kadmin/admin@EXAMPLE.COM
kadmin/changepw@EXAMPLE.COM
kadmin/hadoop1.locald@EXAMPLE.COM
kafka/hadoop1.locald@EXAMPLE.COM
knox/hadoop1.locald@EXAMPLE.COM
krbtgt/EXAMPLE.COM@EXAMPLE.COM
livy/hadoop1.locald@EXAMPLE.COM
livy/hadoop2.locald@EXAMPLE.COM
livy/hadoop4.locald@EXAMPLE.COM
nm/hadoop1.locald@EXAMPLE.COM
nm/hadoop2.locald@EXAMPLE.COM
nm/hadoop3.locald@EXAMPLE.COM
nm/hadoop4.locald@EXAMPLE.COM
nn/hadoop1.locald@EXAMPLE.COM
nn/hadoop2.locald@EXAMPLE.COM


&lt;/PRE&gt;</description>
      <pubDate>Wed, 29 Mar 2017 17:03:22 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180147#M142393</guid>
      <dc:creator>frank93</dc:creator>
      <dc:date>2017-03-29T17:03:22Z</dc:date>
    </item>
    <item>
      <title>Re: Ranger policies failed to refresh after implementing Kerberos</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180148#M142394</link>
      <description>&lt;P&gt;can you please check if ranger is also kerberised , because if it is hdp2.5 or above then it will be kerberised.&lt;/P&gt;&lt;P&gt;if it is then can you please try following&lt;/P&gt;&lt;P&gt;1) regenerating keytabs from ambari and restart the services.&lt;/P&gt;&lt;P&gt;2) add following properties in the repos on ranger:&lt;/P&gt;&lt;P&gt;policy.grantrevoke.auth.users: hbase ( or corresponding service user)&lt;/P&gt;&lt;P&gt;tag.download.auth.users: hbase ( or corresponding service user)&lt;/P&gt;&lt;P&gt;policy.download.auth.users: hbase (or corresponding service user)&lt;/P&gt;&lt;P&gt;same way these properties to be added in hdfs repo too , and service user will be hdfs or what ever you have in your cluster.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="14180-screen-shot-2017-03-29-at-34826-pm.png" style="width: 2752px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/19326i3E156E0D7BEA0651/image-size/medium?v=v2&amp;amp;px=400" role="button" title="14180-screen-shot-2017-03-29-at-34826-pm.png" alt="14180-screen-shot-2017-03-29-at-34826-pm.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Aug 2019 09:13:47 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180148#M142394</guid>
      <dc:creator>dsharma</dc:creator>
      <dc:date>2019-08-18T09:13:47Z</dc:date>
    </item>
    <item>
      <title>Re: Ranger policies failed to refresh after implementing Kerberos</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180149#M142395</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/505/dsharma.html" nodeid="505"&gt;@Deepak Sharma&lt;/A&gt; thank you for a quick answer. Ranger is also Kerberized. I added those properties and changed Authentication Type in HDFS Repo to Kerberos. Now Test connection is done successfully, but the same error appears. After these changes few INFO logs appeared:&lt;/P&gt;&lt;PRE&gt;2017-03-29 12:46:23,368 ERROR client.RangerAdminRESTClient (RangerAdminRESTClient.java:getServicePoliciesIfUpdated(124)) - Error getting policies. secureMode=true, user=nn/hadoop1.locald@EXAMPLE.COM (auth:KERBEROS), response={"httpStatusCode":401,"statusCode":0}, serviceName=3SOFT_HDL_hadoop
2017-03-29 12:46:23,368 ERROR util.PolicyRefresher (PolicyRefresher.java:loadPolicyfromPolicyAdmin(240)) - PolicyRefresher(serviceName=3SOFT_HDL_hadoop): failed to refresh policies. Will continue to use last known version of policies (3)
java.lang.Exception: HTTP 401
        at org.apache.ranger.admin.client.RangerAdminRESTClient.getServicePoliciesIfUpdated(RangerAdminRESTClient.java:126)
        at org.apache.ranger.plugin.util.PolicyRefresher.loadPolicyfromPolicyAdmin(PolicyRefresher.java:217)
        at org.apache.ranger.plugin.util.PolicyRefresher.loadPolicy(PolicyRefresher.java:185)
        at org.apache.ranger.plugin.util.PolicyRefresher.run(PolicyRefresher.java:158)
2017-03-29 12:46:24,577 WARN  protocol.ResponseProcessCookies (ResponseProcessCookies.java:processCookies(122)) - Cookie rejected [hadoop.auth="", version:0, domain:hadoop1.locald, path:/, expiry:Thu Jan 01 01:00:00 CET 1970] Domain attribute "hadoop1.locald" violates the Netscape cookie specification
2017-03-29 12:46:24,582 WARN  protocol.ResponseProcessCookies (ResponseProcessCookies.java:processCookies(122)) - Cookie rejected [hadoop.auth=""u=nn&amp;amp;p=nn/hadoop1.locald@EXAMPLE.COM&amp;amp;t=kerberos&amp;amp;e=1490820384581&amp;amp;s=hi0THf8d5c4wUgzQbs/+W/PENPo="", version:0, domain:hadoop1.locald, path:/, expiry:Wed Mar 29 22:46:24 CEST 2017] Domain attribute "hadoop1.locald" violates the Netscape cookie specification
2017-03-29 12:46:25,229 INFO  BlockStateChange (BlockManager.java:computeReplicationWorkForBlocks(1580)) - BLOCK* neededReplications = 0, pendingReplications = 0.
2017-03-29 12:46:27,578 WARN  protocol.ResponseProcessCookies (ResponseProcessCookies.java:processCookies(122)) - Cookie rejected [hadoop.auth="", version:0, domain:hadoop1.locald, path:/, expiry:Thu Jan 01 01:00:00 CET 1970] Domain attribute "hadoop1.locald" violates the Netscape cookie specification
2017-03-29 12:46:27,582 WARN  protocol.ResponseProcessCookies (ResponseProcessCookies.java:processCookies(122)) - Cookie rejected [hadoop.auth=""u=nn&amp;amp;p=nn/hadoop1.locald@EXAMPLE.COM&amp;amp;t=kerberos&amp;amp;e=1490820387581&amp;amp;s=S0zta5LH3SfBXFh0XoB3T5ldjsQ="", version:0, domain:hadoop1.locald, path:/, expiry:Wed Mar 29 22:46:27 CEST 2017] Domain attribute "hadoop1.locald" violates the Netscape cookie specification
2017-03-29 12:46:28,230 INFO  BlockStateChange (BlockManager.java:computeReplicationWorkForBlocks(1580)) - BLOCK* neededReplications = 0, pendingReplications = 0.
2017-03-29 12:46:28,474 INFO  ipc.Server (Server.java:saslProcess(1538)) - Auth successful for nn/hadoop1.locald@EXAMPLE.COM (auth:KERBEROS)
2017-03-29 12:46:28,475 INFO  authorize.ServiceAuthorizationManager (ServiceAuthorizationManager.java:authorize(137)) - Authorization successful for nn/hadoop1.locald@EXAMPLE.COM (auth:KERBEROS) for protocol=interface org.apache.hadoop.hdfs.protocol.ClientProtocol



&lt;/PRE&gt;</description>
      <pubDate>Wed, 29 Mar 2017 17:47:35 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180149#M142395</guid>
      <dc:creator>frank93</dc:creator>
      <dc:date>2017-03-29T17:47:35Z</dc:date>
    </item>
    <item>
      <title>Re: Ranger policies failed to refresh after implementing Kerberos</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180150#M142396</link>
      <description>&lt;P&gt;did you regenerated keytabs and restarted service?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="14193-screen-shot-2017-03-29-at-42948-pm.png" style="width: 2680px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/19325i355869D1800AD131/image-size/medium?v=v2&amp;amp;px=400" role="button" title="14193-screen-shot-2017-03-29-at-42948-pm.png" alt="14193-screen-shot-2017-03-29-at-42948-pm.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Aug 2019 09:13:39 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180150#M142396</guid>
      <dc:creator>dsharma</dc:creator>
      <dc:date>2019-08-18T09:13:39Z</dc:date>
    </item>
    <item>
      <title>Re: Ranger policies failed to refresh after implementing Kerberos</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180151#M142397</link>
      <description>&lt;P&gt;Yes, I regenerated keytabs and restarted services. I dont get it: The log:&lt;/P&gt;&lt;PRE&gt;2017-03-29 13:26:35,429 ERROR client.RangerAdminRESTClient (RangerAdminRESTClient.java:getServicePoliciesIfUpdated(124)) - Error getting policies. secureMode=true, user=nn/hadoop1.locald@EXAMPLE.COM (auth:KERBEROS), response={"httpStatusCode":401,"statusCode":0}, serviceName=CLUSTER_hadoop
2017-03-29 13:26:35,429 ERROR util.PolicyRefresher (PolicyRefresher.java:loadPolicyfromPolicyAdmin(240)) - PolicyRefresher(serviceName=CLUSTER_hadoop): failed to refresh policies. Will continue to use last known version of policies (3)
java.lang.Exception: HTTP 401
&lt;/PRE&gt;&lt;P&gt;says user nn/hadoop1.locald@EXAMPLE.COM us unauthorized (HTTP 401), but below is:&lt;/P&gt;&lt;PRE&gt;2017-03-29 13:26:38,877 INFO  ipc.Server (Server.java:saslProcess(1538)) - Auth successful for nn/hadoop1.locald@EXAMPLE.COM (auth:KERBEROS)
&lt;/PRE&gt;</description>
      <pubDate>Wed, 29 Mar 2017 18:20:33 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180151#M142397</guid>
      <dc:creator>frank93</dc:creator>
      <dc:date>2017-03-29T18:20:33Z</dc:date>
    </item>
    <item>
      <title>Re: Ranger policies failed to refresh after implementing Kerberos</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180152#M142398</link>
      <description>&lt;P&gt;can you check hadoop.security.auth_to_local config in hdfs &amp;amp; hdfs repo also , if rule is specified for nn ,&lt;/P&gt;&lt;P&gt;RULE:[2:$1@$0](nn@EXAMPLE.COM)s/.*/hdfs/&lt;/P&gt;&lt;P&gt;so that call is sent as hdfs user , and since hdfs user is in policy,download.auth.users so it will be alllowed to download the policy and make sure same config is pres in hdfs repo config also &lt;/P&gt;&lt;P&gt;check this config:&lt;/P&gt;&lt;PRE&gt;RULE:[1:$1@$0](.*@EXAMPLE.COM)s/@.*//
RULE:[2:$1@$0](activity_analyzer@EXAMPLE.COM)s/.*/activity_analyzer/
RULE:[2:$1@$0](activity_explorer@EXAMPLE.COM)s/.*/activity_explorer/
RULE:[2:$1@$0](amshbase@EXAMPLE.COM)s/.*/ams/
RULE:[2:$1@$0](amszk@EXAMPLE.COM)s/.*/ams/
RULE:[2:$1@$0](atlas@EXAMPLE.COM)s/.*/atlas/
RULE:[2:$1@$0](dn@EXAMPLE.COM)s/.*/hdfs/
RULE:[2:$1@$0](hbase@EXAMPLE.COM)s/.*/hbase/
RULE:[2:$1@$0](hive@EXAMPLE.COM)s/.*/hive/
RULE:[2:$1@$0](jhs@EXAMPLE.COM)s/.*/mapred/
RULE:[2:$1@$0](knox@EXAMPLE.COM)s/.*/knox/
RULE:[2:$1@$0](nfs@EXAMPLE.COM)s/.*/hdfs/
RULE:[2:$1@$0](nm@EXAMPLE.COM)s/.*/yarn/
RULE:[2:$1@$0](nn@EXAMPLE.COM)s/.*/hdfs/
RULE:[2:$1@$0](rangeradmin@EXAMPLE.COM)s/.*/ranger/
RULE:[2:$1@$0](rangertagsync@EXAMPLE.COM)s/.*/rangertagsync/
RULE:[2:$1@$0](rangerusersync@EXAMPLE.COM)s/.*/rangerusersync/
RULE:[2:$1@$0](rm@EXAMPLE.COM)s/.*/yarn/
RULE:[2:$1@$0](yarn@EXAMPLE.COM)s/.*/yarn/
DEFAULT
&lt;/PRE&gt;</description>
      <pubDate>Wed, 29 Mar 2017 18:49:56 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180152#M142398</guid>
      <dc:creator>dsharma</dc:creator>
      <dc:date>2017-03-29T18:49:56Z</dc:date>
    </item>
    <item>
      <title>Re: Ranger policies failed to refresh after implementing Kerberos</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180153#M142399</link>
      <description>&lt;P&gt;I have exactly the same rules that you uploaded, both in hdfs and hdfs repo. I deleted my old repo and let Ambari create new one, and the newly created HDFS repo has correct configs and test connection is done successfully.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2017 18:57:27 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180153#M142399</guid>
      <dc:creator>frank93</dc:creator>
      <dc:date>2017-03-29T18:57:27Z</dc:date>
    </item>
    <item>
      <title>Re: Ranger policies failed to refresh after implementing Kerberos</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180154#M142400</link>
      <description>&lt;P&gt;can you share screenshot of your repo config , I want to see which is the repo user ?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2017 19:01:41 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180154#M142400</guid>
      <dc:creator>dsharma</dc:creator>
      <dc:date>2017-03-29T19:01:41Z</dc:date>
    </item>
    <item>
      <title>Re: Ranger policies failed to refresh after implementing Kerberos</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180155#M142401</link>
      <description>&lt;P&gt;and can you please change the repo user to hdfs if it is something else&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="14186-screen-shot-2017-03-29-at-53526-pm.png" style="width: 1106px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/19323iC3F841FD4A256BC1/image-size/medium?v=v2&amp;amp;px=400" role="button" title="14186-screen-shot-2017-03-29-at-53526-pm.png" alt="14186-screen-shot-2017-03-29-at-53526-pm.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="14186-screen-shot-2017-03-29-at-53526-pm.png" style="width: 1106px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/19324i581D5234DDB4AAD4/image-size/medium?v=v2&amp;amp;px=400" role="button" title="14186-screen-shot-2017-03-29-at-53526-pm.png" alt="14186-screen-shot-2017-03-29-at-53526-pm.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Aug 2019 09:13:31 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180155#M142401</guid>
      <dc:creator>dsharma</dc:creator>
      <dc:date>2019-08-18T09:13:31Z</dc:date>
    </item>
    <item>
      <title>Re: Ranger policies failed to refresh after implementing Kerberos</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180156#M142402</link>
      <description>&lt;P&gt;Ok, but what is the password for hdfs user?&lt;/P&gt;&lt;P&gt;I changed the user and password as it was shown here: &lt;A href="https://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.3.2/bk_Ranger_Install_Guide/content/hdfs_plugin_kerberos.html" target="_blank"&gt;https://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.3.2/bk_Ranger_Install_Guide/content/hdfs_plugin_kerberos.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2017 19:13:42 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180156#M142402</guid>
      <dc:creator>frank93</dc:creator>
      <dc:date>2017-03-29T19:13:42Z</dc:date>
    </item>
    <item>
      <title>Re: Ranger policies failed to refresh after implementing Kerberos</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180157#M142403</link>
      <description>&lt;P&gt; &lt;A href="https://community.hortonworks.com/questions/91704/ranger-policies-failed-to-refresh-after-implementi.html#" rel="nofollow noopener noreferrer" target="_blank"&gt;@Deepak Sharma&lt;/A&gt; Sorry I missed this comment, here is my config:&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="14189-przechwytywanie.png" style="width: 842px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/19322i75AC65CB09B80A99/image-size/medium?v=v2&amp;amp;px=400" role="button" title="14189-przechwytywanie.png" alt="14189-przechwytywanie.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Aug 2019 09:13:18 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180157#M142403</guid>
      <dc:creator>frank93</dc:creator>
      <dc:date>2019-08-18T09:13:18Z</dc:date>
    </item>
    <item>
      <title>Re: Ranger policies failed to refresh after implementing Kerberos</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180158#M142404</link>
      <description>&lt;P&gt;you can give password of hdfs user , but that will not matter because in secure env keytab will be used , so just configure hdfs user and something in password it should work then&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2017 19:43:49 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180158#M142404</guid>
      <dc:creator>dsharma</dc:creator>
      <dc:date>2017-03-29T19:43:49Z</dc:date>
    </item>
    <item>
      <title>Re: Ranger policies failed to refresh after implementing Kerberos</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180159#M142405</link>
      <description>&lt;P&gt;I Regenerated Keytabs once again and restarted all services and still not working, here my HDFS repo:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="14201-przechwytywanie.png" style="width: 842px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/19321i7C77130831BBA698/image-size/medium?v=v2&amp;amp;px=400" role="button" title="14201-przechwytywanie.png" alt="14201-przechwytywanie.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Aug 2019 09:13:10 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180159#M142405</guid>
      <dc:creator>frank93</dc:creator>
      <dc:date>2019-08-18T09:13:10Z</dc:date>
    </item>
    <item>
      <title>Re: Ranger policies failed to refresh after implementing Kerberos</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180160#M142406</link>
      <description>&lt;P&gt;Wanted to know which hdp version is this ?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2017 21:11:08 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180160#M142406</guid>
      <dc:creator>dsharma</dc:creator>
      <dc:date>2017-03-29T21:11:08Z</dc:date>
    </item>
    <item>
      <title>Re: Ranger policies failed to refresh after implementing Kerberos</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180161#M142407</link>
      <description>&lt;P&gt;can you also post value of hadoop.security.auth_to_local, because i see nn/hadoop1.locald@EXAMPLE.COM , it should be RULE:[2:$1@$0](nn@EXAMPLE.COM)s/.*/hdfs &lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2017 21:15:53 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180161#M142407</guid>
      <dc:creator>dsharma</dc:creator>
      <dc:date>2017-03-29T21:15:53Z</dc:date>
    </item>
    <item>
      <title>Re: Ranger policies failed to refresh after implementing Kerberos</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180162#M142408</link>
      <description>&lt;P&gt;Do you have HA enabled for Ranger?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2017 21:22:59 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180162#M142408</guid>
      <dc:creator>vperiasamy</dc:creator>
      <dc:date>2017-03-29T21:22:59Z</dc:date>
    </item>
    <item>
      <title>Re: Ranger policies failed to refresh after implementing Kerberos</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180163#M142409</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/505/dsharma.html" nodeid="505"&gt;@Deepak Sharma&lt;/A&gt; it was only list of principles. My hadoop.security.auth_to_local is:&lt;/P&gt;&lt;PRE&gt;RULE:[1:$1@$0](.*@EXAMPLE.COM)s/@.*//
RULE:[2:$1@$0](amshbase@EXAMPLE.COM)s/.*/ams/
RULE:[2:$1@$0](amshbase@EXAMPLE.COM)s/.*/hbase/
RULE:[2:$1@$0](amszk@EXAMPLE.COM)s/.*/ams/
RULE:[2:$1@$0](atlas@EXAMPLE.COM)s/.*/atlas/
RULE:[2:$1@$0](dn@EXAMPLE.COM)s/.*/hdfs/
RULE:[2:$1@$0](falcon@EXAMPLE.COM)s/.*/falcon/
RULE:[2:$1@$0](hbase@EXAMPLE.COM)s/.*/hbase/
RULE:[2:$1@$0](hive@EXAMPLE.COM)s/.*/hive/
RULE:[2:$1@$0](jhs@EXAMPLE.COM)s/.*/mapred/
RULE:[2:$1@$0](jn@EXAMPLE.COM)s/.*/hdfs/
RULE:[2:$1@$0](knox@EXAMPLE.COM)s/.*/knox/
RULE:[2:$1@$0](livy@EXAMPLE.COM)s/.*/livy/
RULE:[2:$1@$0](nm@EXAMPLE.COM)s/.*/yarn/
RULE:[2:$1@$0](nn@EXAMPLE.COM)s/.*/hdfs/
RULE:[2:$1@$0](oozie@EXAMPLE.COM)s/.*/oozie/
RULE:[2:$1@$0](rangeradmin@EXAMPLE.COM)s/.*/ranger/
RULE:[2:$1@$0](rangerkms@EXAMPLE.COM)s/.*/keyadmin/
RULE:[2:$1@$0](rangerusersync@EXAMPLE.COM)s/.*/rangerusersync/
RULE:[2:$1@$0](rm@EXAMPLE.COM)s/.*/yarn/
RULE:[2:$1@$0](yarn@EXAMPLE.COM)s/.*/yarn/
DEFAULT
&lt;/PRE&gt;</description>
      <pubDate>Wed, 29 Mar 2017 21:56:21 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180163#M142409</guid>
      <dc:creator>frank93</dc:creator>
      <dc:date>2017-03-29T21:56:21Z</dc:date>
    </item>
    <item>
      <title>Re: Ranger policies failed to refresh after implementing Kerberos</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180164#M142410</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/47/vperiasamy.html" nodeid="47"&gt;@vperiasamy&lt;/A&gt; I had but I deleted second Ranger Admin long time ago. Now I have single Ranger Admin server.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2017 21:57:41 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180164#M142410</guid>
      <dc:creator>frank93</dc:creator>
      <dc:date>2017-03-29T21:57:41Z</dc:date>
    </item>
    <item>
      <title>Re: Ranger policies failed to refresh after implementing Kerberos</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180165#M142411</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/3241/frank93.html" nodeid="3241"&gt;@Edgar Daeds&lt;/A&gt; In case you are using HA, please make sure to add load balancer principal to spnego keytab. See steps 32 onwards in &lt;A href="http://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.5.3/bk_hadoop-high-availability/content/configure_ranger_admin_ha.html#configure_ranger_admin_ha_without_ssl"&gt;http://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.5.3/bk_hadoop-high-availability/content/configure_ranger_admin_ha.html#configure_ranger_admin_ha_without_ssl&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Even with one Ranger admin, if you are seeing 401 in plugin side... &lt;/P&gt;&lt;P&gt;1] check if you have any error on ranger admin logs for authentication errors during policy download. &lt;/P&gt;&lt;P&gt;2] Verify keytab permissions. &lt;/P&gt;&lt;P&gt;3] Check policy.download.auth.users as mentioned by &lt;A rel="user" href="https://community.cloudera.com/users/505/dsharma.html" nodeid="505"&gt;@Deepak Sharma&lt;/A&gt; above. &lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2017 22:53:28 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180165#M142411</guid>
      <dc:creator>vperiasamy</dc:creator>
      <dc:date>2017-03-29T22:53:28Z</dc:date>
    </item>
    <item>
      <title>Re: Ranger policies failed to refresh after implementing Kerberos</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180166#M142412</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/47/vperiasamy.html" nodeid="47" target="_blank"&gt;@vperiasamy&lt;/A&gt; &lt;/P&gt;&lt;P&gt;I have HTTP/"host"@EXAMPLE.COM princs on all hosts.&lt;/P&gt;&lt;P&gt;Not even a single ERROR in xa_portal.log, only in services logs like HDFS or HIVE (posted above).&lt;/P&gt;&lt;P&gt;policy.download.auth.users is hdfs and hive for HDFS and Hive respectively (repo autocreated after disabling/enabling plugin).&lt;/P&gt;&lt;P&gt;Keytab permissions:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="14223-keybat.png" style="width: 621px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/19320iAEE8093A77574957/image-size/medium?v=v2&amp;amp;px=400" role="button" title="14223-keybat.png" alt="14223-keybat.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Also usersync is not syncing users:&lt;/P&gt;&lt;PRE&gt;30 Mar 2017 09:37:47 ERROR CustomPolicyMgrUserGroupBuilder [UnixUserSyncThread] - Failed to add User Group Info :
com.sun.jersey.api.client.UniformInterfaceException: POST &lt;A href="http://myhost:6080/service/xusers/users/userinfo" target="_blank" rel="nofollow noopener noreferrer"&gt;http://myhost:6080/service/xusers/users/userinfo&lt;/A&gt; returned a response status of 401 Unauthorized
        at com.sun.jersey.api.client.WebResource.handle(WebResource.java:686)
        at com.sun.jersey.api.client.WebResource.access$200(WebResource.java:74)
        at com.sun.jersey.api.client.WebResource$Builder.post(WebResource.java:568)
        at org.apache.ranger.usergroupsync.UserGroupSync.CustomPolicyMgrUserGroupBuilder.getUsergroupInfo(CustomPolicyMgrUserGroupBuilder.java:576)
        at org.apache.ranger.usergroupsync.UserGroupSync.CustomPolicyMgrUserGroupBuilder.access$500(CustomPolicyMgrUserGroupBuilder.java:77)
at
org.apache.ranger.usergroupsync.UserGroupSync.CustomPolicyMgrUserGroupBuilder$2.run(CustomPolicyMgrUserGroupBuilder.java:548)
at
org.apache.ranger.usergroupsync.UserGroupSync.CustomPolicyMgrUserGroupBuilder$2.run(CustomPolicyMgrUserGroupBuilder.java:544)
at java.security.AccessController.doPrivileged(Native Method) at javax.security.auth.Subject.doAs(Subject.java:360) at
org.apache.ranger.usergroupsync.UserGroupSync.CustomPolicyMgrUserGroupBuilder.addUserGroupInfo(CustomPolicyMgrUserGroupBuilder.java:544)
at
org.apache.ranger.usergroupsync.UserGroupSync
.CustomPolicyMgrUserGroupBuilder.addOrUpdateUser(CustomPolicyMgrUserGroupBuilder.java:349) at
org.apache.ranger.usergroupsync.UserGroupSync
.CustomLdapUserGroupBuilder.updateSink(CustomLdapUserGroupBuilder.java:377) at org.apache.ranger.usergroupsync.UserGroupSync.syncUserGroup(UserGroupSync.java:114) at org.apache.ranger.usergroupsync.UserGroupSync.run(UserGroupSync.java:87) at java.lang.Thread.run(Thread.java:745) 30 Mar 2017 09:37:47 INFO CustomLdapUserGroupBuilder [UnixUserSyncThread] - groupSearch is enabled, would search for groups and compute memberships 30 Mar 2017 09:37:47 INFO CustomLdapUserGroupBuilder [UnixUserSyncThread] - CustomLDAPUserGroupBuilder.getGroups() completed with group count: 0 30 Mar 2017 09:37:47 ERROR CustomPolicyMgrUserGroupBuilder [UnixUserSyncThread] - Failed to add User : com.sun.jersey.api.client.UniformInterfaceException: POST &lt;A href="http://192.168.3.82:6080/service/users/default" target="_blank" rel="nofollow noopener noreferrer"&gt;http://192.168.3.82:6080/service/users/default&lt;/A&gt; returned a response status of 401 Unauthorized at com.sun.jersey.api.client.WebResource.handle(WebResource.java:686) at com.sun.jersey.api.client.WebResource.access$200(WebResource.java:74) at com.sun.jersey.api.client.WebResource$Builder.post(WebResource.java:568) at
org.apache.ranger.usergroupsync.UserGroupSync
.CustomPolicyMgrUserGroupBuilder.getMUser(CustomPolicyMgrUserGroupBuilder.java:847) at
org.apache.ranger.usergroupsync.UserGroupSync
.CustomPolicyMgrUserGroupBuilder.access$800(CustomPolicyMgrUserGroupBuilder.java:77) at
org.apache.ranger.usergroupsync.UserGroupSync
.CustomPolicyMgrUserGroupBuilder$5.run(CustomPolicyMgrUserGroupBuilder.java:820) at
org.apache.ranger.usergroupsync.UserGroupSync
.ldapsync.CustomPolicyMgrUserGroupBuilder$5.run(CustomPolicyMgrUserGroupBuilder.java:816) at java.security.AccessController.doPrivileged(Native Method) at javax.security.auth.Subject.doAs(Subject.java:360) at org.apache.ranger.usergroupsync.UserGroupSync.CustomPolicyMgrUserGroupBuilder.addMUser(CustomPolicyMgrUserGroupBuilder.java:816) at org.apache.ranger.usergroupsync.UserGroupSync.CustomPolicyMgrUserGroupBuilder.addOrUpdateUser(CustomPolicyMgrUserGroupBuilder.java:344) at org.apache.ranger.usergroupsync.UserGroupSync.CustomLdapUserGroupBuilder.updateSink(CustomLdapUserGroupBuilder.java:377) at org.apache.ranger.usergroupsync.UserGroupSync.syncUserGroup(UserGroupSync.java:114) at org.apache.ranger.usergroupsync.UserGroupSync.run(UserGroupSync.java:87) at java.lang.Thread.run(Thread.java:745)
&lt;/PRE&gt;</description>
      <pubDate>Sun, 18 Aug 2019 09:13:02 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Ranger-policies-failed-to-refresh-after-implementing/m-p/180166#M142412</guid>
      <dc:creator>frank93</dc:creator>
      <dc:date>2019-08-18T09:13:02Z</dc:date>
    </item>
  </channel>
</rss>

