Github user lisakowen commented on a diff in the pull request:
https://github.com/apache/incubator-hawq-docs/pull/105#discussion_r108809069
--- Diff: markdown/ranger/ranger-integration-config.html.md.erb ---
@@ -84,19 +105,28 @@ The following procedures describe each configuration
activity.
gpadmin@master$ hawq stop cluster --reload
```
-7. To validate connectivity between Ranger and HAWQ, access the Ranger
Admin UI in Ambari, click the edit icon associated with the `hawq` service
definition. Ensure that the Active Status is set to Enabled, and click the
**Test Connection** button. You should receive a message that Ranger connected
succesfully. If it fails to connect, edit your HAWQ connectivity properties
directly in the Ranger Admin UI and re-test the connection.
+7. When setup is complete, use the fully-qualified domain name to log
into the Ambari server. Use the Ranger link in the left nav to bring up the
Ranger Summary pane in the HAWQ Ambari interface. Use the Quick Links to access
Ranger. This link will take you to the Ranger Login interface.
+
+8. Log into the Ranger Access Manager. You will see a list of icons under
the Service Manager. Click the click the icon marked `hawq` under the HAWQ icon
to validate connectivity between Ranger and HAWQ. A list of HAWQ policies will
appear.
+
+9. Now return to the Service Manager and click the Edit icon on the
right, under the HAWQ service icon. Ensure that the Active Status is set to
Enabled, and click the **Test Connection** button. You should receive a message
that Ranger connected succesfully. If it fails to connect, you may need to
edit your Ranger connection in `pg_hba.conf,` perform
+ ``` bash
+ hawq restart cluster
+ ```
+ and re-test the connection.
## <a id="enable"></a>Step 2: Configure HAWQ to Use Ranger Policy
Management
-The default Ranger service definition for HAWQ assigns the HAWQ user
(typically `gpadmin`) all privileges to all objects.
+The default Ranger service definition for HAWQ assigns the HAWQ
administrator (typically `gpadmin`) all privileges to all objects.
-**Warning**: If you enable HAWQ-Ranger authorization with only the default
HAWQ service policies defined, other HAWQ users will have no privileges, even
for HAWQ objects (databases, tables) that they own.
-
-1. Select the **HAWQ** Service, and then select the **Configs** tab.
+Once the connection between HAWQ and Ranger is configured, you can either
set up policies for the HAWQ users according to the procedures in [Creating
HAWQ Authorization Policies in Ranger](ranger-policy-creation.html) or enable
Ranger with only the default policies.
--- End diff --
i don't think we want to imply it is ok to enable ranger with just the
default policies in place. maybe we want to enhance the warning.
---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at [email protected] or file a JIRA ticket
with INFRA.
---