Configuring cloud credentials using Knox Alias
Configure the Knox IDBroker role for S3 object stores using a Knox Alias. This process requires setting AWS IAM user credentials, configuring alternative STS endpoints for S3-compatible storage, and managing user or group mappings.
-
Provide the AWS user access key and secret access key to the Knox IDBroker
role.
- Go to Cloudera Manager > Clusters > Knox > Configuration.
- Search for the Save Alias Command Input - IDBroker property to set the AWS IAM user credentials access key alias.
-
Enter
aws-cab.aws.credentials.key=<AWS user Access key>, and click Save Changes. - Click Actions and run the Save Alias - IDBroker command.
- Again, search for the Save Alias Command Input - IDBroker property to set the AWS IAM user credential secret access key alias.
-
Enter
aws-cab.aws.credentials.secret=<AWS user Secret access key>, and click Save Changes. - Click Actions and run the Save Alias - IDBroker command.
- Set the Save Alias Command Input - IDBroker property to empty.
- Click Save Changes.
-
If using an S3-compatible alternative to Amazon storage, configure the IDBroker
topology to reference the alternative STS endpoint.
- Go to Cloudera Manager > Clusters > Knox > Configuration.
-
Add the following configuration to the Knox IDBroker
Advanced Configuration Snippet (Safety Valve) for
conf/cdp-resources.xml advanced configuration
snippet:
Name: aws-cab Value: providerConfigRef=cab-providers# IDBROKER:cloud.policy.config.provider=default# IDBROKER:cloud.client.provider=AWS# IDBROKER:aws.region.name=us-east-1# IDBROKER:org.apache.knox.idbroker.endpoint.override=https://s3.myobjectore.com/# - Click Save Changes.
-
Provide user or group mapping administration.
-
Set the Knox IDBroker AWS User Mapping
configuration property to the following value:
rangerraz=arn:aws:iam::<ARN>:role/S3RazRole - Click Save Changes.
-
Set the Knox IDBroker AWS User Mapping
configuration property to the following value:
