Known Issues in Knox
Learn about the known issues in Knox, the impact or changes to the functionality, and the workaround.
- CDPD-67478: Custom topologies cannot be deleted
- You cannot delete custom topologies that were created.
- Knox Issue with JDK version
- jdk-1.8.0_391 is not supported.
- CDPD-61088: When downgrade is performed from CDP 7.1.9 to CDP 7.1.7 SP2, Knox may fail to start
- When you downgrade from CDP 7.1.9 to CDP 7.1.7 SP2, Knox might fail to start with the following error message:
- CDPD-60996: When downgrade is performed from CDP 7.1.9 to CDP 7.1.7 SP2, Knox is unable to connect to Cloudera Manager.
- Restart Knox service after the downgrade process completes.
- CDPD-28431: Intermittent errors can be potentially encountered when Impala UI is accessed from multiple Knox nodes.
- You must use a single Knox node to access Impala UI.
- CDPD-3125: Logging out of Atlas does not manage the external authentication
- At this time, Atlas does not communicate a log-out event with the external authentication management, Apache Knox. When you log out of Atlas, you can still open the instance of Atlas from the same web browser without re-authentication.
- CDPD-22785: Improvements and issues needs to be addressed in convert-topology Knox CLI command
- None
- OPSAPS-67480: In CDP 7.1.9, default Ranger policy is added from the cdp-proxy-token topology, so that after a new installation of CDP 7.1.9, the knox-ranger policy includes cdp-proxy-token. However, upgrades do not add cdp-proxy-token to cm_knox policies automatically.
- Manually add cdp-proxy-token to the Knox policy, using
Ranger Admin Web UI.
- Log in to , as a Ranger administrator.
- On cm_knox. , click
- In Knox Policies, open the CDP Proxy UI, API and Token policy.
- In Knox Topology*, add cdp-proxy-token.
- Click Save.
- Restart Ranger.
- CDPD-70313: KNOX does not send Authentication header on FIPS configuration
- KNOX does not send neither the Authentication header nor the
hadoop.auth
cookie. Because of this, the SMM UI returns an HTTP 401 response and sets thewww-authenticate: Negotiate
header. After this, KNOX still does not send the Authentication header. This results in the SMM UI being inaccessible through Knox.