Known Issues in Apache Ranger
Learn about the known issues in Ranger, the impact or changes to the functionality, and the workaround.
- CDPD-3296: Audit files for Ranger plugin components do not appear immediately in S3 after cluster creation
- For Ranger plugin components (Atlas, Hive, HBase, etc.), audit data is updated when the applicable audit file is rolled over. The default Ranger audit rollover time is 24 hours, so audit data appears 24 hours after cluster creation.
- CDPD-12644: Ranger Key Names cannot be reused with the Ranger KMS KTS service
- Key names cannot be reused with the Ranger KMS KTS service. If the key name of a delete key is reused, the new key can be successfully created and used to create an encryption zone, but data cannot be written to that encryption zone.
- OPSAPS-70387: The DataHub cluster deletion process does not delete the Ranger entries which created for the same cluster.
- If the user wants to create a new DataHub cluster with same old name then it fails because as there was an entry with the same name already in Ranger.
- CDPD-17962: Ranger roles do not work when you upgrade from any CDP Private Cloud Base to CDP Private cloud base. Roles which are created prior to upgrade work as expected, issue is only for new roles created post upgrade and authorization enforced via ranger policies wont work for these new roles. This behavior is only observed with the upgraded cluster; a newly installed cluster does not show this behavior.
- There are two possible workarounds to resolve this issue:
- Update database entries (Recommended):
- select * from x_ranger_global_state where state_name='RangerRole';
- update x_ranger_global_state set app_data='{"Version":"2"}' where state_name='RangerRole';
- Add a property in safety valve under ranger-admin-site which will bypass the getAppDataVersion method:
- Update database entries (Recommended):
Technical Service Bulletins
- TSB 2023-655: Apache Ranger (Ranger) S3 policies for READ or WRITE are not evaluated on RAZ-enabled CDP Public Cloud 7.2.16 environments
- Fine-grained Ranger Authorization Service (RAZ) enables users to define Ranger policies on S3 (cm_s3) paths. Due to a recent change in Cloudera Data Platform (CDP) Public Cloud 7.2.16.0, the access type is processed incorrectly. This results in read-only or write-only Ranger policies not being evaluated. Ranger policies with all, or both read and write permissions are not affected.