Pfew. Indeed the wrong truststore was my problem. By using the one of the JDK I managed to get rid of the error.
To get the JAVA_HOME location : readlink -f /usr/bin/java | sed "s:bin/java::" Then the cacerts file is located in lib/security/. And the default password is changeit. BR. Lune. On Wed, May 18, 2016 at 9:29 AM, Lune Silver <lunescar.ran...@gmail.com> wrote: > In fact, it uses by default the JDK cacert. > https://issues.apache.org/jira/browse/AMBARI-15917 > > So I'm wondering if I'm not using the wrong truststore for ranger admin in > fact. > > BR. > > Lune > > On Wed, May 18, 2016 at 9:27 AM, Lune Silver <lunescar.ran...@gmail.com> > wrote: > >> In fact, I'm wondering. >> What is the truststore used by default by Ranger Admin ? >> >> I can find a property for the truststore of Ranger User-Sync, but not for >> Ranger Admin. >> >> BR. >> >> >> Lune. >> >> On Wed, May 18, 2016 at 9:16 AM, Lune Silver <lunescar.ran...@gmail.com> >> wrote: >> >>> Re Ramesh. >>> >>> I investigated more my problem and I'm sorry for the confusion. >>> I checked the policy cache directory on the namenode, and also the logs >>> of the namenode. >>> >>> The policycache dir contains an empty file. >>> And the namenode log contains the following error message : >>> ### >>> 2016-05-18 08:53:50,129 ERROR client.RangerAdminRESTClient >>> (RangerAdminRESTClient.java:getServicePoliciesIfUpdated(79)) - Error >>> getting policies. request=https://<RANGER HOST FQDN>:<RANGER ADMIN >>> PORT>/service/plugins/policies/download/<HDFS >>> REPO>?lastKnownVersion=-1&pluginId=hdfs@<NAMENODE HOST FQDN>-<HDFS >>> REPO>, >>> response={"httpStatusCode":400,"statusCode":1,"msgDesc":"Unauthorized >>> access - unable to get client >>> certificate","messageList":[{"name":"OPER_NOT_ALLOWED_FOR_ENTITY","rbKey":"xa.error.oper_not_allowed_for_state","message":"Operation >>> not allowed for entity"}]}, serviceName=<HDFS REPO> >>> 2016-05-18 08:53:50,130 ERROR util.PolicyRefresher >>> (PolicyRefresher.java:loadPolicyfromPolicyAdmin(228)) - >>> PolicyRefresher(serviceName=<HDFS REPO>): failed to refresh policies. Will >>> continue to use last known version of policies (-1) >>> java.lang.Exception: Unauthorized access - unable to get client >>> certificate >>> at >>> org.apache.ranger.admin.client.RangerAdminRESTClient.getServicePoliciesIfUpdated(RangerAdminRESTClient.java:81) >>> at >>> org.apache.ranger.plugin.util.PolicyRefresher.loadPolicyfromPolicyAdmin(PolicyRefresher.java:205) >>> at >>> org.apache.ranger.plugin.util.PolicyRefresher.loadPolicy(PolicyRefresher.java:175) >>> at >>> org.apache.ranger.plugin.util.PolicyRefresher.startRefresher(PolicyRefresher.java:132) >>> at >>> org.apache.ranger.plugin.service.RangerBasePlugin.init(RangerBasePlugin.java:106) >>> at >>> org.apache.ranger.authorization.hadoop.RangerHdfsPlugin.init(RangerHdfsAuthorizer.java:399) >>> at >>> org.apache.ranger.authorization.hadoop.RangerHdfsAuthorizer.start(RangerHdfsAuthorizer.java:83) >>> at >>> org.apache.hadoop.hdfs.server.namenode.FSNamesystem.startCommonServices(FSNamesystem.java:1062) >>> at >>> org.apache.hadoop.hdfs.server.namenode.NameNode.startCommonServices(NameNode.java:763) >>> at >>> org.apache.hadoop.hdfs.server.namenode.NameNode.initialize(NameNode.java:687) >>> at >>> org.apache.hadoop.hdfs.server.namenode.NameNode.<init>(NameNode.java:896) >>> at >>> org.apache.hadoop.hdfs.server.namenode.NameNode.<init>(NameNode.java:880) >>> at >>> org.apache.hadoop.hdfs.server.namenode.NameNode.createNameNode(NameNode.java:1586) >>> at >>> org.apache.hadoop.hdfs.server.namenode.NameNode.main(NameNode.java:1652) >>> ### >>> >>> What does OPER_NOT_ALLOWED_FOR_ENTITY means ? >>> Which user is the operator for the hdfs plugin ? >>> Is it the user created for the plugin (in the property Ranger >>> repository config user) ? >>> >>> I enabled the SSL for HDFS plugin following the HW doc here : >>> >>> http://docs.hortonworks.com/HDPDocuments/HDP2/HDP-2.4.2/bk_Security_Guide/content/ch04s18s02s04s01.html >>> >>> Do you think my problem could come from an error from my SSL >>> configuration ? >>> >>> If I summarize what i did : >>> >>> I have : >>> - one node with the namenode >>> - one node with ranger (admin + usersync) >>> >>> On the namenode host, I created a plugin keystore. >>> This keystore contains the certificate for the alias rangerHdfsAgent. >>> ### >>> cd /etc/hadoop/conf >>> keytool -genkey -keyalg RSA -alias rangerHdfsAgent -keystore >>> /etc/hadoop/conf/ranger-plugin-keystore.jks -validity 3600 -keysize 2048 >>> -dname >>> 'cn=HdfsPlugin,ou=<mycompany>,o=<mycompany>,l=<mycity>,st=<mycountry>,c=<idcountry>' >>> chown hdfs:hdfs /etc/hadoop/conf/ranger-plugin-keystore.jks >>> chmod 400 /etc/hadoop/conf/ranger-plugin-keystore.jks >>> ### >>> >>> On the Ranger host, I exported the certificate for the alias rangeradmin >>> from the admin keystore. >>> ### >>> keytool -export -keystore >>> /etc/ranger/admin/conf/ranger-admin-keystore.jks -alias rangeradmin -file >>> /etc/ranger/admin/conf/ranger-admin-trust.cer >>> ### >>> >>> Then I transfered the cer file from the ranger host to the namenode host. >>> >>> On the namenode host, I imported the certificate of the alias >>> rangeradmin into the plugin truststore. (the truststore was not yet >>> existing) >>> ### >>> keytool -import -file /etc/hadoop/conf/ranger-admin-trust.cer -alias >>> rangeradmintrust -keystore /etc/hadoop/conf/ranger-plugin-truststore.jks >>> chown hdfs:hdfs /etc/hadoop/conf/ranger-plugin-truststore.jks >>> chmod 400 /etc/hadoop/conf/ranger-plugin-truststore.jks >>> ### >>> >>> On the namenode host, I exported the certificate for the alias >>> rangerHdfsAgent from the plugin keystore. >>> ### >>> keytool -export -keystore /etc/hadoop/conf/ranger-plugin-keystore.jks >>> -alias rangerHdfsAgent -file /etc/hadoop/conf/ranger-hdfsAgent-trust.cer >>> ### >>> >>> Then I transfered the ranger-hdfsAgent-trust.cer file from the namenode >>> host to the ranger host. >>> >>> On the ranger host, I imported the certificate for the alias >>> rangerHdfsAgent in the admin truststore (the truststore was not yet >>> existing). >>> ### >>> keytool -import -file /etc/ranger/admin/conf/ranger-hdfsAgent-trust.cer >>> -alias rangerHdfsAgentTrust -keystore >>> /etc/ranger/admin/conf/ranger-admin-truststore.jks >>> chown ranger:ranger /etc/ranger/admin/conf/ranger-admin-truststore.jks >>> chmod 400 /etc/ranger/admin/conf/ranger-admin-truststore.jks >>> ### >>> >>> In the Ambari UI, I added the CN HdfsPlugin in the property "Common Name >>> For Certificate". >>> >>> In the Ranger Admin UI, I checked that, in the repository definition, >>> there is also this property with the right value. >>> >>> Do you think Is there something wrong ? >>> >>> BR. >>> >>> Lune. >>> >>> >>> On Tue, May 17, 2016 at 3:45 PM, Lune Silver <lunescar.ran...@gmail.com> >>> wrote: >>> >>>> Hello ! >>>> >>>> I just enabled the HDFS plugin for Ranger. >>>> The repository was created by Ambari (2.2.1 with HDP cluster 2.3.2). >>>> >>>> In the Ranger Admin UI, in the repository edit window, when I check on >>>> the button "test connection", I have the following error message : >>>> ### >>>> Unable to connect repository with given config for <MYCLUSTER>_hadoop >>>> ### >>>> >>>> And I can see this in the logs : >>>> ### >>>> 2016-05-17 15:41:49,895 [http-bio-6182-exec-5] ERROR >>>> org.apache.ranger.biz.ServiceMgr (ServiceMgr.java:120) - ==> >>>> ServiceMgr.validateConfig Error:java.util.concurrent.ExecutionException: >>>> org.apache.ranger.plugin.client.HadoopException: listFilesInternal: Unable >>>> to get listing of files for directory /null] from Hadoop environment >>>> [<MYCLUSTER>_hadoop]. >>>> ### >>>> >>>> Any idea about why this test connection fails ? >>>> >>>> BR. >>>> >>>> Lune. >>>> >>> >>> >> >