Install Ranger KMS using Ambari (Kerberized Cluster)
To install Ranger KMS on a Kerberized cluster, complete the following steps.
- Go to the Ambari Web UI,
http://<gateway-URL>:8080
. - From the Ambari dashboard, go to the Actions menu. Choose Add Service.
- On the next screen, check the box next to Ranger KMS:
- Then, choose Next.
-
(Optional) In Assign Masters, if you wish to override the default host
setting, specify the Ranger KMS host address.
-
In Customize Services, set required values (marked in red). Review other
configuration settings, and determine whether you'd like to change any of the default
values. (For more information about these properties, see “Ranger KMS
Properties”.)
-
Provide the required settings, marked in red.
Note
If do not wish to provide system Database Administrator (DBA) account details to the Ambari Ranger installer, you can use the
dba_script.py
Python script to create Ranger DB database users without exposing DBA account information to the Ambari Ranger installer. For more information, see “Set up Database Users Without Sharing DBA Credentials”. -
Confirm if the following properties are present in Custom
kms-site. If not, add values for the following properties in the
"Custom kms-site" section. These properties allow the specified system users
(
hive
,oozie
, and others) to proxy on behalf of other users when communicating with Ranger KMS. This helps individual services (such as Hive) use their own keytabs, but retain the ability to access Ranger KMS as the end user (use access policies associated with the end user).hadoop.kms.proxyuser.hive.users
hadoop.kms.proxyuser.oozie.users
hadoop.kms.proxyuser.HTTP.users
hadoop.kms.proxyuser.ambari.users
hadoop.kms.proxyuser.yarn.users
hadoop.kms.proxyuser.hive.hosts
hadoop.kms.proxyuser.oozie.hosts
hadoop.kms.proxyuser.HTTP.hosts
hadoop.kms.proxyuser.ambari.hosts
hadoop.kms.proxyuser.yarn.hosts
-
Add the following properties to the Custom KMS-site section of the
configuration. These properties use the REPOSITORY_CONFIG_USERNAME specified in
the first step in this section.
If you are using an account other than
keyadmin
to access Ranger KMS, replace “keyadmin” with the configured user for the Ranger KMS repository in Ranger admin:hadoop.kms.proxyuser.keyadmin.groups=*
hadoop.kms.proxyuser.keyadmin.hosts=*
hadoop.kms.proxyuser.keyadmin.users=*
-
Confirm settings of the following values in the "advanced kms-site"
group:
hadoop.kms.authentication.type=kerberos
hadoop.kms.authentication.kerberos.keytab=/etc/security/keytabs/spnego.service.keytab
hadoop.kms.authentication.kerberos.principal=*
-
Provide the required settings, marked in red.
- Then, choose Next.
- Review the default values on the Configure Identities screen. Determine whether you'd like to change any of the default values. Then, choose Next.
- In Review, make sure the configuration values are correct. Ranger KMS will be listed under Services.
- Then, choose Deploy.
- Monitor the progress of installing, starting, and testing the service. When the service installs and starts successfully, choose Next.
- The Summary screen displays the results. Choose Complete.
- Restart the Ranger and Ranger KMS services.