Member since
09-10-2015
261
Posts
86
Kudos Received
43
Solutions
My Accepted Solutions
Title | Views | Posted |
---|---|---|
3632 | 11-15-2018 10:21 PM | |
1638 | 09-05-2018 09:03 PM | |
2827 | 03-19-2018 09:15 PM | |
2509 | 03-16-2018 08:40 PM | |
1315 | 02-09-2018 05:25 PM |
09-11-2017
04:52 PM
1 Kudo
Read/Write permissions are applicable only for S3 URL. See https://issues.apache.org/jira/browse/RANGER-1513 @Ramesh Mani can provide further clarification.
... View more
07-12-2017
03:24 PM
@Sami Ahmad For changing the Ranger Admin password, we need to change the password in 3 different locations. 1. In Ambari you need to change the password at highlighted places: 2. Login to ranger using admin/admin, click on the profile at right-top, then click on change password. Below screenshot helps you to navigate Note: Password should be same across all the places and it should be minimum 8 characters. Hope this helps you.
... View more
07-07-2017
11:14 AM
1 Kudo
If you have changed rangerusersync password in ranger admin, then you need to provide the same updated password in rangerusersync config. You can use /usr/hdp/current/ranger-usersync/updatepolicymgrpassword.py for this purpose.
... View more
06-05-2017
05:51 PM
1 Kudo
yes, i believe the hostname should match.
... View more
03-31-2017
08:11 AM
@Darryl Stoflet @vperiasamy @Deepak Sharma Thank you all! That solved my problem. I've had IP address instead of FQDN in External URL property.
... View more
03-28-2017
05:59 PM
Please note DB based auditing is NOT supported from Ranger 0.6 (HDP 2.5)
... View more
03-28-2017
02:38 AM
EventTime timezone fix is available in Ranger 0.7.0. https://issues.apache.org/jira/browse/RANGER-1249
... View more
02-10-2017
01:49 PM
Sorry guys, that was the issue. Not only me have access to that cluster, and somebody changed ranger policy url in every plugin config. Thank you!
... View more
02-02-2017
08:04 AM
Yes, all clients are installing on the host
... View more
02-08-2017
06:50 PM
2 Kudos
@Sami Ahmad: You have an HDFS policy which does not grant permissions to your user for viewing resources. In most of the components, this would boil down to access request being denied. However, in HDFS, if a Ranger policy does not grant access to a resource, native Hadoop privileges are checked as well. If HDFS grants user 'SAMI' access to resources, 'SAMI' will be able to access the same (inspite of Ranger policy not granting permission). You can check whether its Ranger policy responsible for your user being able to view resources or its native Hadoop ACLs through Audit page->Access tab. In screenshot, Policy ID is -- and also, Access Enforcer=hadoop-acl which means the user had access through native Hadoop ACL. None of the Ranger Hadoop policies are responsible for the Access/ Deny. Hope this helps. screen-shot-2017-02-08-at-104435-am.png
... View more