Created 05-24-2016 04:23 PM
Guys,
We have setup a Kerberized and A/D integrated HDP 2.3 Cluster. On the same cluster, after setting up Ranger, when I try to define policies for any components, I see all the groups available in A/D. For a larger organization, I suspect it would go in terms of hundreds.In such scenario, how can I restrict the number of groups appearing in the drop down when defining policies?
Thanks.
Created 05-24-2016 04:31 PM
@Smart Solutions You can restrict groups to be synced using Group search filter. Refer below for detail.
And other option would be to use Ranger FileSource.
https://cwiki.apache.org/confluence/display/RANGER/File+Source+User+Group+Sync+process
Created 05-24-2016 04:31 PM
@Smart Solutions You can restrict groups to be synced using Group search filter. Refer below for detail.
And other option would be to use Ranger FileSource.
https://cwiki.apache.org/confluence/display/RANGER/File+Source+User+Group+Sync+process
Created 05-24-2016 04:33 PM
Thanks I will have a look at them. What about the group which are already been imported. Can I delete for Ranger now?
Created 05-24-2016 04:43 PM
Yes, I think you can delete if you don't want those.
Created 05-25-2016 09:20 AM
@Pradeep I didn't find the delete option but found setting visibility to "hidden" option. Not sure if you are talking about.
Created 05-25-2016 10:16 AM
@Smart Solutions You can delete users and groups by doing this:
log into the ranger database, and delete the following rows in order.
delete from x_group_users where added_by_id in (1,2)
delete from x_user where added_by_id in (1,2)
delete from x_group where added_by_id in (1,2)
Then you can sync your users/groups again with your restrictions.
Created 05-25-2016 10:36 AM
@Edgar Daeds Thank you. I will try this.
Created 06-07-2016 02:09 PM
We came across a similar issue and our solution was to create a custom synchronization script which replaces the standard LDAP sync process.
We define a "super-group" whose members are all groups that are visible/relevant to Hadoop. This is helpful for several reasons:
The synchronization process knows only the DN of the super-group - it fetches that one LDAP entry; from there it determines the members, which are the authorization groups, and then the members of each authorization group, which are th authorized users.