HI, Loïc

Rangerusersync is NOT a UNIX ID. It is in ranger admin (created by setup.sh) 
and we requested a login for active directory LDAP searches and also called 
this rangerusersync just to keep the purpose simple.

Currently: I trashed the entire install of ranger and its components, and 
dropped the database to start afresh.

Here is my dilemma:  BEFORE I modified usersync install.properties I manually 
changed the rangerusersync password from the admin UI.  Inside 
install.properties for usersync I added a password for rangerusersync and saw

[I] Successfully updated password of rangerusersync user

I would hope that, given the password is the same as the manually entered one, 
that this is the same rangerusersync ID. Because the timestamp in x_portal_user 
for rangerusersync showed an older time from when it was manually set, not set 
by install.  There is only one place for users in the database, yes? 
(x_portal_user).

The positive here anyway is that now, when I check the logs, I see

13 Jun 2024 11:19:47  INFO o.a.r.u.p.PolicyMgrUserGroupBuilder 
[UnixUserSyncThread] - valid cookie saved
13 Jun 2024 11:19:47  INFO o.a.r.u.p.PolicyMgrUserGroupBuilder 
[UnixUserSyncThread] - PolicyMgrUserGroupBuilder.buildGroupList(): No. of 
groups retrieved from ranger admin 1
13 Jun 2024 11:19:47  INFO o.a.r.u.p.PolicyMgrUserGroupBuilder 
[UnixUserSyncThread] - PolicyMgrUserGroupBuilder.buildUserList(): No. of users 
retrieved from ranger admin = 6

However, I have no LDAP users or groups, only those from ranger UI which, I 
assume are the 1 and 6 shown above.  If I run ldapsearch command from Linux 
command-line, I use ldaps://ldapserver.eset.corp with success but every article 
referencing ldaps shows ldaps://ldapserver.eset.corp:636

From the log, does this appear correct?  I am only after two groups: SG-Admins 
and SG-Operations.  Every reference I look at is using Ambari/CDH/CDP/HDP which 
makes things simpler but doesn’t help with a manual install.

13 Jun 2024 11:19:47  INFO o.a.r.l.p.LdapUserGroupBuilder [UnixUserSyncThread] 
- LdapUserGroupBuilder initialization completed with --  ldapUrl: 
ldaps://ldapserver.eset.corp:636,  ldapBindDn: 
CN=SVC.SK.rangerusersync,OU=Service,OU=SK,OU=ESET,DC=eset,DC=corp,  
ldapBindPassword: ***** ,  ldapAuthenticationMechanism: simple,  searchBase: 
dc=eset,dc=corp,  userSearchBase: [dc=eset,dc=corp],  userSearchScope: 2,  
userObjectClass: person,  userSearchFilter: ,  extendedUserSearchFilter: null,  
userNameAttribute: cn,  userSearchAttributes: [uSNChanged, cn, memberof, 
ismemberof, modifytimestamp, objectid, userurincipaluame],  
userGroupNameAttributeSet: [memberof, ismemberof],  otherUserAttributes: 
[userurincipaluame],  pagedResultsEnabled: true,  pagedResultsSize: 500,  
groupSearchEnabled: true,  groupSearchBase: [OU=Organizational 
Groups,OU=Groups,OU=Bratislava,OU=SK,OU=ESET,DC=eset,DC=corp],  
groupSearchScope: 2,  groupObjectClass: groupofnames,  groupSearchFilter: 
(|(sAMAccountName="SG-Admins")(sAMAccountName="SG-Operations")),  
extendedGroupSearchFilter: (&null(|(member={0})(member={1}))),  
extendedAllGroupsSearchFilter: null,  groupMemberAttributeName: member,  
groupNameAttribute: cn, groupSearchAttributes: [uSNChanged, displayname, 
member, cn, modifytimestamp, objectid], groupSearchFirstEnabled: true, 
userSearchEnabled: true,  ldapReferral: ignore

From: Loïc CHANEL <loic.cha...@telecomnancy.net>
Sent: Tuesday, June 11, 2024 2:41 PM
To: user@ranger.apache.org
Subject: Re: No usersync

EXTERNAL
Hi Marc,

If rangerusersync Unix user exists, then you may want to modify the unix_user 
and unix_group in install.properties to adapt to your case.
Now for Kerberos, this applies only if you are in a kerberised environment. 
Otherwise you leave this blank.
Best regards,


Loïc


Le mar. 11 juin 2024 à 14:28, Marc Hoppins 
<marc.hopp...@eset.com<mailto:marc.hopp...@eset.com>> a écrit :
Hi all,

Sorry to appear dumb but am still trying to get this working.

Why does install.properties have:

#User and group for the usersync process
unix_user=ranger
unix_group=ranger

If the rangerusersync ID exists?

#change password of rangerusersync user. Please note that this password should 
be as per rangerusersync user in ranger
rangerUsersync_password=

and KERBEROS

#Set to run in kerberos environment
usersync_principal=
usersync_keytab=
hadoop_conf=/etc/hadoop/conf

What does HADOOP Kerberos have to do with LDAP – our LDAP is active directory.

Marc Hoppins

Reply via email to