Comments inline:

On Mar 31, 2015, at 4:47 PM, Don Bosco Durai 
<[email protected]<mailto:[email protected]>> wrote:

Rich, seems you are using self-signed certificates at Knox. If that is the 
case, you might have to do the following.


  *   cd /var/lib/knox/data/security/keystores/
  *   Keytool –exportcert –alias gateway-identity –keystone gateway.jks –file 
~/knox.crt
     *   Return on password prompt
  *   cd ~
  *   . /etc/ranger/admin/conf/java_home.sh
  *   cp $JAVA_HOME/jre/lib/security/cacerts cacerts.withknox
  *   keytool –import –trustcacerts –file knox.crt –alias knox –keystore 
cacerts.withknox

knox@myhost:/home/knox$ keytool -import -trustcacerts -file knox.crt -alias 
knox -keystore cacerts.withknox
Enter keystore password:
keytool error: java.io.IOException: Keystore was tampered with, or password was 
incorrect

I’m not sure what password I should be using for the cacerts file I copied from 
$JAVA_HOME/jre/lib/security…

  *   cp cacerts.withknox /etc/ranger/admin/conf
  *   cd /etc/ranger/admin/conf
  *   vi ranger-admin-env-knox_cert.sh

#!/bin/bash

certs_with_knox=/etc/ranger/admin/conf/cacerts.withknox
export JAVA_OPTS="$JAVA_OPTS -Djavax.net.ssl.trustStore=${certs_with_knox}”


  *   chmod x+a ranger-admin-env-knox_cert.sh
  *   service ranger-admin stop
  *   service ranger-admin start
  *   ps –ef | grep proc_rangeradmin (verify that javax.net.ssl.trustStore 
property was applied)
  *   Configure Knox repo in Ranger UI using URL - 
https://{ranger-ui-server}:8443/gateway/admin/api/v1/topologies/

If this works for you, I can update the document accordingly.

Thanks

Bosco


From: Rich Haase <[email protected]<mailto:[email protected]>>
Reply-To: 
"<[email protected]<mailto:[email protected]>>" 
<[email protected]<mailto:[email protected]>>
Date: Tuesday, March 31, 2015 at 3:35 PM
To: 
"<[email protected]<mailto:[email protected]>>" 
<[email protected]<mailto:[email protected]>>
Subject: Re: Error from "Test Connection" setting up ranger-knox-plugin in 
policy manager

Sure. I'll open a JIRA and I'll include the detailed logs from xa_portal.log.  
I have noticed that the policies I've created for Knox work perfectly.  The 
ranger admin just can't lookup topology information for autofilling on the 
policy creation screens.  Not tragic, but definitely functionality that would 
be nice.

Sent from my iPhone

On Mar 31, 2015, at 4:25 PM, Balaji Ganesan 
<[email protected]<mailto:[email protected]>> wrote:

We should look into that. Can you create a JIRA on this?

Note that repository connection for resource name look up from the policy 
manager. You can still save the repository and start creating policies.

On Tue, Mar 31, 2015 at 11:18 AM, Rich Haase 
<[email protected]<mailto:[email protected]>> wrote:
Could someone please explain to me the cause of this error?  I’m assuming this 
is some sort of simple configuration mistake on my part, but I’ve not been able 
to find any documentation that explains the SSL setup sufficiently.

======
Connection Failed.
Exception on REST call to KnoxUrl : 
https://<host>:8443/gateway/admin/api/v1/topologies. You can still save the 
repository and start creating policies, but you would not be able to use 
autocomplete for resource names. Check xa_portal.log for more info.

javax.net.ssl.SSLHandshakeException: java.security.cert.CertificateException: 
No name matching <host> found.
java.security.cert.CertificateException: No name matching <host> found.
No name matching <host> found.

=====

I’ve replaced "<host>" with the actual hostname in the error messages.


Thanks,

Rich


Reply via email to