Hi Markus
Multi-tenancy can be tricky based on use cases. In Ranger, at the admin level you can setup multi-tenancy using “Delegated Admin” feature. The Ranger 0.5 user guides talks about it briefly https://cwiki.apache.org/confluence/display/RANGER/Apache+Ranger+0.5+-+User+Guide and also there is more explanation in this forum discussion https://community.hortonworks.com/questions/17782/about-delegate-admin-in-ranger.html. In Ranger 0.6 we have introduced Row level filtering, which can further restrict the users for the rows they have access to it. Madhan from the Ranger team has written a nice document on both row level filtering and masking, which work for both Hive and Spark SQL (when used with LLAP) https://cwiki.apache.org/confluence/display/RANGER/Row-level+filtering+and+column-masking+using+Apache+Ranger+policies+in+Apache+Hive Only Audit doesn’t have filtering, however it is role based access controlled, so only certain users can access audit logs. So it comes back to use cases and deployment scenarios. If you can cleanly separate tenants by HDFS folders, Hive & HBase databases then you can delegate top level “delegated admin” privileges to tenant owners so that they can manage further permissions within their group. Since they can’t give permissions to resources they don’t have permission, you are pretty safe. If your data is inter-mingled or if you need more dynamic access control, then row-level filtering will be the best case, but you have to ensure there is a tenant id column or can be derived with join to do the filtering. Thanks Bosco From: <markus.gier...@fiduciagad.de> Reply-To: <user@ranger.incubator.apache.org> Date: Tuesday, September 6, 2016 at 10:23 AM To: <user@ranger.incubator.apache.org> Subject: Antwort: Re: User running job in forbidden queue Hi Bosco, is there a guide or a best practice document for multi-tenancy ? Can I really separate different use cases on the same cluster without any security doubts? Best regards, Markus Fiducia & GAD IT AG | www.fiduciagad.de AG Frankfurt a. M. HRB 102381 | Sitz der Gesellschaft: Hahnstr. 48, 60528 Frankfurt a. M. | USt-IdNr. DE 143582320 Vorstand: Klaus-Peter Bruns (Vorsitzender), Claus-Dieter Toben (stv. Vorsitzender), Jens-Olaf Bartels, Martin Beyer, Jörg Dreinhöfer, Wolfgang Eckert, Carsten Pfläging, Jörg Staff Vorsitzender des Aufsichtsrats: Jürgen Brinkmann Don Bosco Durai ---06.09.2016 18:41:06---Hi Loïc Von: Don Bosco Durai <bo...@apache.org> An: <user@ranger.incubator.apache.org> Datum: 06.09.2016 18:41 Betreff: Re: User running job in forbidden queue Hi Loïc Just curious, was the audit log helpful? I understand, this could be frustrating, so during the last couple of releases, in the audit logs, we have added more information to help admins understand which policy gave the permission to access (or deny). However, in your case, since it was denied, there might have been no policy, but the resource field should have given the resource name as “root.test”. If not, we should look into this. Any suggestions to improve is welcomed… Thanks Bosco From: Loïc Chanel <loic.cha...@telecomnancy.net> Reply-To: <user@ranger.incubator.apache.org> Date: Tuesday, September 6, 2016 at 8:51 AM To: <user@ranger.incubator.apache.org> Subject: Re: User running job in forbidden queue And now I feel like a complete idiot because my actual problem was the fact that in Ranger policies I wrote "test" instead of "root.test". Sorry for the spam, then. Regards, Loïc Loïc CHANEL System Big Data engineer MS&T - WASABI - Worldline (Villeurbanne, France) 2016-09-06 11:22 GMT+02:00 Loïc Chanel <loic.cha...@telecomnancy.net>: Actually, I ran some further tests and the property ranger.add-yarn-authorization set to false in ranger-yarn-security seems to prevent anyone to run jobs in any queue as my user "test" cannot submit a job into "test" queue according to YARN. Anyone encountered the same issue ? FYI, I am using an HDP 2.4 stack. Regards, Loïc Loïc CHANEL System Big Data engineer MS&T - WASABI - Worldline (Villeurbanne, France) 2016-09-06 10:31 GMT+02:00 Loïc Chanel <loic.cha...@telecomnancy.net>: Hi all, I'm back on the Hadoop & Multi-tenancy topic and as I ran some tests I quite a big issue. Using Ranger to handle which user can submit job to which queue I authorized user "test" to submit jobs on queue "test" only - with the property ranger.add-yarn-authorization set to false in ranger-yarn-security. But even with these settings when user "test" submit a job it goes in the "default" queue - to which he shouldn't be able to submit jobs. Do you see what I miss here ? If not, do anyone knows how to turn on YARN Ranger plugin debug logs ? Thanks in advance for your inputs, Loïc Loïc CHANEL System Big Data engineer MS&T - WASABI - Worldline (Villeurbanne, France)