Assigning a Cloudera Observability On-Premises cluster user access role
Steps for assigning a Cluster User access role to your Cloudera Observability On-Premises users.
Describes how to assign a Cloudera Observability On-Premises Role Based Access (RBAC) role for
a cluster user.
In a supported web browser log in to Cloudera Observability On-Premises as a user that has
been granted the System Admin access role.
In the URL field of a supported web browser, enter the Cloudera Observability On-Premises URL and press Enter.
When the Cloudera Observability On-Premises Log in page opens, enter your Cloudera Observability On-Premises user name and password access credentials.
Click Log in.
The Cloudera Observability On-Premises landing page opens.
Verify that you have enabled role based access in Cloudera Manager. For more
information, click the Related Information link
below.
From the Cloudera Observability On-Premises main navigation side-bar, select
Access Management.
In the Access Management page, click New Cluster Policy.
The Create Cluster Policy page opens.
Do one or more of the following:
In the Groups field, enter the name of the LDAP
group account whose users will be assigned this cluster policy's access
role.
In the Users field, enter the user name or user
names who will be assigned this cluster policy's access role.
From the Assign Roles list, select Cluster
User.
From the Cluster list, select the name of the cluster
that will be assigned to this policy’s access role.
Optional: Enable the user or users defined in this cluster policy to view executed
workloads from other users or executed workloads from a pool by doing the
following:
In the Users field, enter the user name or user
names whose jobs and queries can be viewed by the user or users defined
in this cluster policy.
In the Pools field, enter the pool name or pool
names whose jobs and queries can be viewed by the user or users defined
in this cluster policy.
Click Create.
The Successfully created access policy message appears when
the Cluster Policy is created and the policy is displayed in the Access Management’s
home page.