To enable the Ranger Knox plugin on a Kerberos-enabled cluster, perform the steps described below.
Create the system (OS) user knoxuser. Make sure this user is synced to Ranger Admin (under users/groups tab in the Ranger Admin UI).
Create a Kerberos principal for knoxuser by entering the following command:
kadmin.local -q 'addprinc -pw knoxuser knoxuseer@example.com
Navigate to the Knox service.
Click on the Config tab and navigate to advanced ranger-knox-plugin-properties.
Update the following properties with the values listed in the table below.
Table 5.4. Knox Plugin Properties
Configuration Property Name Value Ranger repository config user knoxuser@example.com Ranger repository config password knoxuser common.name.for.certificate blank After updating these properties, click Save and then restart the Knox service.
Open the Ranger Admin UI by entering the following information:
http://ranger-host>:6080
username/password - admin/admin. or use username as shown in advanced ranger-env under the Config tab of the Ranger service, and password as shown in Admin Settings.
After you have successfully logged into the system, you will be redirected to the Policy Manager page.
Click on the repostory (clusterName_hadoop) Edit option under the HDFS box.
Update the following properties listed in the table below under the Config Properties section:
Table 5.5. Knox Configuration Properties
Configuration Property Name Value fs.default.name hdfs hadoop.rpc.protection blank common.name.for.certificate blank Click on Named Test Connection. You should see a Connected Successfully dialog boxappear.
Click Save.