Member since
04-09-2019
254
Posts
140
Kudos Received
34
Solutions
My Accepted Solutions
Title | Views | Posted |
---|---|---|
1724 | 05-22-2018 08:32 PM | |
11544 | 03-15-2018 02:28 AM | |
3121 | 08-07-2017 07:23 PM | |
3935 | 07-27-2017 05:22 PM | |
2137 | 07-27-2017 05:16 PM |
09-25-2016
10:08 AM
1 Kudo
Hello @mliem You almost got it right. The missing piece is the ACL param for YARNUI service. So in your Knox topology, the authorization provider should look like this: <provider>
<role>authorization</role>
<name>AclsAuthz</name>
<enabled>true</enabled>
<param name="knox.acl" value="*;knox;*"/>
<param name="yarnui.acl" value="*;knox;*"/>
</provider> Hope this helps. Do let us know the results.
... View more
09-23-2016
10:11 AM
Hi @xu jerry Few observations: 1. The crontab is set to get a new ticket at midnight every day. But the klist output says that the ticket was acquired on "09/23/16 07:10:35". Meaning, someone (or some program) had refreshed the ticket after midnight at 7:10. 2. By default, the TGT would be valid for a day. But in your case, the validity looks to be '2days and 2 minutes' (from klist output). Is that expected? 3. The KDC logs clearly says that the ticket was expired by "Sep 23 10:57:31". Also you can see that there was a TGT request (AS_REQ) at midnight (that'd be your crontab). And there were two service ticket requests (TGS_REQUEST). So as per KDC log, no one refreshed the TGT after midnight. (so my #1 stand false as of this) To answer your question: My question is : Can other application(such as : hadoop client) edit
/tmp/krb5cc_613 programmly? I think other application (hadoop client)
just read information from /tmp/krb5cc_613 instead writing it. Usually the hadoop clients and applications would only consume (i.e. read) the TGT. The only condition in which a TGT would get updated is when an application try to do kinit programmatically. If you are consistently getting this error, then I'd advice to run kinit in the debug mode. That is once you get ticket expired error, then execute these and check (& post) the output here. export KRB5_TRACE=/dev/stdout
klist -eaf
kvno <name_of_any_service_principal> Also, it'd also make sense to attach your /etc/krb5.conf to know what are the current Kerberos configurations. Hope this help.
... View more
09-19-2016
10:06 AM
4 Kudos
Hello @Avijeet Dash , If you are using AD as Kerberos KDC, then you should not use kadmin to create an ambari server principal. You need to login to AD, create a user account for Ambari server. Once that is done, you can generate a keytab for this user by using this command (on AD's command prompt): ktpass /princ ambari-server@HWX.COM /pass <password> /mapuser ambari-server /pType KRB5_NT_PRINCIPAL /crypto ALL /out c:\temp\ambari.server.keytab Here I've kept the name of AD user account name and Kerberos principal name same as 'ambari-server'. Once the keytab is generated, copy it to the host running Ambari service. And follow from step #3 in the doc link that you have given in question. Hope this helps, Vipin
... View more
08-02-2016
09:32 AM
@mqureshi
I'd like to see the values that you are using, like what
<principal> , <keytab> and <proxyuser> are set to?
Similarly what value are you seeing in <kerberos principal> in the
log?
... View more
07-15-2016
03:20 AM
1 Kudo
@Sarah Maadawy No. That means that the external users can be allowed to access Ranger UI and not every internal user is allowed the access by default.
... View more
07-15-2016
01:24 AM
3 Kudos
Hello @Sarah Maadawy, The internal users are the Linux system users which Ranger usersync syncs from the local Linux OS. They are not always allowed access to the Ranger UI portal. The external users (can be from AD / LDAP) are synced by Ranger usersync to be used for policy creation. Having cleared that, here are you answers: Use LDAP to sync external users http://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.3.4/bk_Ranger_Install_Guide/content/ranger_user_sync_ldap_ad.html User different LDAP settings to sync internal users There is nothing like LDAP to sync internal users, what you might be looking for is - using LDAP users to access the Ranger UI portal. http://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.3.4/bk_Ranger_Install_Guide/content/configure_ranger_authentication.html#configuring_ranger_ldap_authentication So yes, there are two different LDAP sections which you can use to achieve both. Hope this helps. Thanks.
... View more
06-01-2016
07:06 PM
1 Kudo
Great article @Robert Levas ! For the completeness purpose, I'd like to see this information added to the above article: While mapping the Kerberos principals, if the Kerberos principal
names are in the UPPER case or CaMeL case, they won't be recognized on
the Linux machine (as Linux users are always in lower case). So you need
to add the extra switch "/L" in the RULE definition to force the
conversion to lower case. For example, here are some auth_to_local rule examples with lower case switch added: "RULE:[1:$1]/L"
"RULE:[2:$1]/L"
"RULE:[2:$1;$2](^.*;admin$)s/;admin$///L"
"RULE:[2:$1;$2](^.*;guest$)s/;guest$//g/L"
And based on these rules, here are the expected output for the following inputs: "JOE@FOO.COM" to "joe"
"Joe/root@FOO.COM" to "joe"
"Joe/admin@FOO.COM" to "joe"
"Joe/guestguest@FOO.COM" to "joe"
Hope this helps.
... View more
05-25-2016
07:08 PM
3 Kudos
@Nasheb Ismaily Here's you go: https://github.com/abajwa-hw/security-workshops/blob/master/Security-workshop-HDP%202_3-IPA.md Thanks for @Ali Bajwa for putting up this beautiful guide. Cheers.
... View more
05-25-2016
04:53 PM
Thanks @Dale Bradman for updating here. Glad that it worked for you.
... View more
05-23-2016
12:54 PM
Hello @Dale Bradman The correct values in the advance-kms site should be: hadoop.kms.authentication.type=kerberos
hadoop.kms.authentication.kerberos.keytab=/etc/security/keytabs/spnego.service.keytab
hadoop.kms.authentication.kerberos.principal=* Also, the log messages in xa_portal.log doesn't look to be ERROR messages (they are INFO), so i believe that the root cause of error is somewhere above these lines. If they are not there, then I'd suggest you to enable debug logging for Ranger admin service and try the operation once again. How to enable debug logging for Ranger admin service
STEP 1: On the Ranger admin host, edit the /usr/hdp/current/ranger-admin/ews/webapp/WEB-INF/log4j.xml file.
STEP 2: Change "info" to "debug" as shown in the below configuration stanza:
<category name="org.apache.ranger" additivity="false">
<priority value="debug" />
<appender-ref ref="xa_log_appender" />
</category>
STEP 3: Save and Restart the Ranger admin service.
... View more
- « Previous
- Next »