Member since
12-14-2015
89
Posts
7
Kudos Received
7
Solutions
My Accepted Solutions
Title | Views | Posted |
---|---|---|
3201 | 08-20-2019 04:30 AM | |
3370 | 08-20-2019 12:29 AM | |
2213 | 10-18-2018 05:32 AM | |
3498 | 12-15-2016 10:52 AM | |
972 | 11-10-2016 09:21 AM |
03-23-2017
01:11 PM
Hi community, I am running HDP 2.5.0 in a kerberized cluster including Ranger and Ambari Infra. Ambari Infra is also kerberized and authorization works fine. Now, I would like to secure the Audit Log in Ambari Infra from unintended alteration by using authorization. As Ranger supports authorization: Is there a straightforward way to manage Ambari Infra authorization on SolR collections using Ranger or some other Authorization mechanism? Thank you!
... View more
Labels:
- Labels:
-
Apache Ranger
-
Apache Solr
03-23-2017
06:27 AM
Thank you @Robert Levas and @lmccay for your insights. It appears, protecting the keytabs really is one of the most important Hadoop security tasks. As seperating REALMs is not realizable in my case, I will stick with keeping keytabs secure and maybe tuning auth-to-local-rules. Also thanks to @spotluri for summing it up.
... View more
03-22-2017
03:20 PM
@Robert Levas Thanks for your comment. For any other users than technical users, I agree with you. Authorization is my friend to keep away users from the wrong cluster. In this particular case, however, I am really "blaming" authentication. My problem is, that the technical users of two cluster have the same name and can therefore not be distinguished from another by an authorization engine, such as Ranger. Example: The hive-Principal in cluster B SHOULD have access to all tables (as he is the superuser) but the hive-Principal from cluster B SHOULD NOT. Kerberos authentication, however, does not distinguish between the users, as they both have the same name.
... View more
03-22-2017
02:53 PM
1 Kudo
Hi community, a security related question: I got two clusters in my environment. Both are kerberized and connected to the same Active directory as KDC. Let's look at technical users now: For the hive-user for instance I created a keytab both on the first and second cluster: hive/somehostinclusterA@REALM.COM hive/somehostinclusterB@REALM.COM Now imagine that the first cluster (A) is run by development with moderate rules, while cluster B is run in production with strict rules. When somebody now steals a keytab from cluster A, there is a security threat: Not only can he access cluster A, but he can also access cluster B (=production), which is bad. Why? Because the auth_to_local rules just convert both hive/somehostinclusterA@REALM.COM and hive/somehostinclusterB@REALM.COM to hive, who is Superuser for the Hive Service in both clusters. Is this a known security problem and are there guidelines on how to fix it. I thought about making complex auth_to_local rules, but this seems to be unoperatable.
... View more
Labels:
- Labels:
-
Apache Hive
-
Security
12-15-2016
10:52 AM
Just to sum it up: Disabling the ATS (yarn.timeline-service.enabled = false) solved the issues. In HDP 2.5.3, the bug may be fixed, see: https://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.5.3/bk_release-notes/content/patch_hadoop.html https://issues.apache.org/jira/browse/HADOOP-12954 or with the next version when OOZIE-2490 is included
... View more
11-10-2016
09:21 AM
It was a problem with case conversion. Hadoop seems to require all lowercase principals, whereas the used principals were all uppercase. Adding /L to the Auth_to_local mapping solved the problem.
... View more
11-10-2016
08:09 AM
Hi community, I am running a kerberized HDP 2.5 cluster with Ranger policies activated for everything. I have synced Ranger with LDAP and Linux with AD to have consistent group memberships. With SPNEGO, the access to the ResourceManager ist also a matter of authorization. Only users with administer_queue rights on a queue can view details of applications in that queue. My problem is: When creating Ranger policies for YARN queues, rights based on groups are not respected in the RM WebUI. Only user-based rights are accepted. The group membership is, however, shown correctly in Ranger. Do you have any idea, how to ensure that YARN uses the correct groups for granting rights? Thanks!
... View more
Labels:
- Labels:
-
Apache Ranger
-
Apache YARN
-
Cloudera Manager
10-20-2016
04:44 PM
@Ayub Khan Thanks, there are some insights in how to manage permissions. Still my questions from above aren't really answered in this document.
... View more
10-20-2016
04:02 PM
Hi community, I am searching for a documentation that describes, how Permissions to use Ranger are configured (in Ranger in Settings -> Permissions). In detail, two questions are very relevant for me: - What does each level of Permissions mean in detail? - How are Users granted permissions automatically? Is there a way to change this, e.g. to stop Ranger from granting all new users permissions on "Resource Based Policies" or "Audit"? Thanks for your kind help referencing any valuable sources or answering those questions.
... View more
Labels:
- Labels:
-
Apache Ranger
10-11-2016
07:42 PM
@Mike Hovermale Adding more components to the cluster, more missing sudo-commands were detected. Currently, the cluster is up with this additional block of in the sudoers config: ambari
ALL=(ALL) NOPASSWD:SETENV: /usr/bin/ambari-python-wrap,
/usr/sbin/ambari-metrics-grafana, /usr/bin/java,
/usr/lib/ambari-infra-solr-client/solrCloudCli.sh Could you guys please confirm the really required sudo-config. We do not want to hotfix the config over and over until everything works fine...
... View more