Yes, makes sense to have a 2-way SSL between the plugin and Ranger Admin,
but:
 - 1. Does it mean there's no authentication at all between them?
 - 2. If there's no authentication, shouldn't a simple CURL work? At the
moment if no user/pass is provided the API returns 401, or is there another
different endpoint? If so, which one is it?
 - 3. What is the best way to debug the plugin is communicating or trying
to communicate with Ranger admin?

Thanks.


On Fri, 11 Jan 2019 at 12:53, Velmurugan Periasamy <
vperias...@hortonworks.com> wrote:

> If there is no kerberos HDFS plugin uses the open Download policies API,
> so it is recommended to use 2-way SSL between HDFS plugin and Ranger Admin.
>
> On Jan 11, 2019, at 5:26 AM, Odon Copon <odonco...@gmail.com> wrote:
>
> I cannot perform a CURL to the API from the namenode without
> user/password, I get a 401 when doing that. So it might required
> credentials to do that. If I use the admin/password credentials or
> rangerusersync credentials the CURL works. So wondering if those
> credentials need to be setup somewhere.
>
> On Fri, 11 Jan 2019 at 10:15, Don Bosco Durai <bo...@apache.org> wrote:
>
>> > In terms of "no authentication", is the HDFS plugin using Policy
>> Manager API with no credentials at all?
>>
>> No credentials, because there is no user/password for HDFS service user.
>> It’s been a while, I think we used to have admin/password before, but it
>> was taken out eventually. The code might be still there…
>>
>>
>>
>> > What's the first action the plugin is performing to be detected by the
>> UI as active and 200 response?
>>
>> Abhay or Madhan might be able to give you more specifics. Since the
>> plugins are polling and it knows the previous version number, if there are
>> no changes, then it is not registered in the UI. The plugins primarily pull
>> the policies and tags from Ranger Admin. Rest everything is done by the
>> plugin within the component.
>>
>>
>>
>> Bosco
>>
>>
>>
>>
>>
>> *From: *Odon Copon <odonco...@gmail.com>
>> *Reply-To: *<user@ranger.apache.org>
>> *Date: *Friday, January 11, 2019 at 2:03 AM
>> *To: *<user@ranger.apache.org>
>> *Subject: *Re: Accessing Ranger Policy Manager API from HDFS plugin
>>
>>
>>
>> Indeed, I know that at the moment without something like Kerberos, users
>> can impersonate others, but I'm currently building a POC with the basic
>> security to evaluate Ranger, and once is ready, start improving the
>> security and scalability. But thank you for pointing that out.
>>
>> In terms of "no authentication", is the HDFS plugin using Policy Manager
>> API with no credentials at all? or default ones?
>>
>> What's the first action the plugin is performing to be detected by the UI
>> as active and 200 response? Some king of ping/heartbeat? or just a rest
>> petition to download the policies?
>>
>> Is there anywhere where I can see in the logs what kind of actions the
>> plugin is doing? I don't find any log information coming from the plugin.
>>
>>
>>
>> Thanks!
>>
>>
>>
>> On Fri, 11 Jan 2019 at 09:53, Don Bosco Durai <bo...@apache.org> wrote:
>>
>> If there is no Kerberos, then you have 2 options:
>>
>>    1. No authentication (default)
>>    2. Two way SSL to authenticate the request from the plugin.
>>
>>
>>
>> Note, if it is non-Kerberos environment, then authorization cannot be
>> enforced, because users can impersonate anyone.
>>
>>
>>
>> Bosco
>>
>>
>>
>>
>>
>> *From: *Odon Copon <odonco...@gmail.com>
>> *Reply-To: *<user@ranger.apache.org>
>> *Date: *Friday, January 11, 2019 at 1:22 AM
>> *To: *<user@ranger.apache.org>
>> *Subject: *Re: Accessing Ranger Policy Manager API from HDFS plugin
>>
>>
>>
>> Mmm, but what if the system is not using Kerberos?
>>
>>
>>
>> On Fri, 11 Jan 2019, 04:21 Velmurugan Periasamy <
>> vperias...@hortonworks.com wrote:
>>
>> ​Yes, that's what I referred to.
>>
>>
>> ------------------------------
>>
>> *From:* Odon Copon <odonco...@gmail.com>
>> *Sent:* Thursday, January 10, 2019 5:07 PM
>> *To:* user@ranger.apache.org
>> *Subject:* Re: Accessing Ranger Policy Manager API from HDFS plugin
>>
>>
>>
>> Are we talking about principal in Kerberos or any other principal I'm not
>> understanding?
>>
>>
>>
>> On Thu, 10 Jan 2019 at 18:05, Odon Copon <odonco...@gmail.com> wrote:
>>
>> What do you mean by *HDFS plugin uses service (Namenode) user's
>> principal *?
>>
>> Could you provide an example?
>> Thanks.
>>
>>
>>
>> On Thu, 10 Jan 2019 at 17:08, Velmurugan Periasamy <
>> vperias...@hortonworks.com> wrote:
>>
>> HDFS plugin uses service (Namenode) user's principal.
>>
>>
>> ------------------------------
>>
>> *From:* Odon Copon <odonco...@gmail.com>
>> *Sent:* Thursday, January 10, 2019 8:59 AM
>> *To:* user@ranger.apache.org
>> *Subject:* Accessing Ranger Policy Manager API from HDFS plugin
>>
>>
>>
>> Hi,
>>
>> How does the Ranger HDFS plugin communicates with the Policy Manager API?
>> Is it using a specific user/password combination?
>>
>> I know the User Sync has rangerusersync user and pass, and all that
>> information is stored in rangerusersync.jceks, but what about the HDFS
>> plugin or any other plugin?
>> I'm having issues with that, my plugin once enabled doesn't get displayed
>> in the UI and would like to check the credentials the plugin is using to
>> use the API.
>>
>> For the User Sync - Policy Manager communication works fine.
>>
>>
>>
>> Thanks.
>>
>>

Reply via email to