You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@ranger.apache.org by "Bolke de Bruin (JIRA)" <ji...@apache.org> on 2016/02/24 13:55:18 UTC
[jira] [Created] (RANGER-861) Ranger does not execute jobs under
original user
Bolke de Bruin created RANGER-861:
-------------------------------------
Summary: Ranger does not execute jobs under original user
Key: RANGER-861
URL: https://issues.apache.org/jira/browse/RANGER-861
Project: Ranger
Issue Type: Improvement
Affects Versions: 0.5.2, 0.6.0
Reporter: Bolke de Bruin
When using Ranger hive queries are executed under a superuser account instead of the users' own account . This means that in the UIs one is unable to distinguish who is running what job because they all reside under the same user. This is a usability issue.
Also "What this means is that Hiveserver2 will run MR jobs in HDFS as the original user" mentioned in http://hortonworks.com/blog/best-practices-for-hive-authorization-using-apache-ranger-in-hdp-2-2/ does not seem to be the case. The screenshots also support this as the files are being owned by the hive user and permissions are only set for the hive user.
For HDFS access can be granted by Ranger. It (ranger) however expects the files to be owned by the 'hive' user otherwise they won't be accessible by services that integrate with ranger, although the proper permissions/acls are in place.
Moreover, logging for the different services now also doesn't include the user ids anymore making it easier for someone to manipulate the logs. We consider this a security issue.
We would like to see the option of:
1. Execution of (hive etc) jobs under the original user id
2. Making sure Ranger's hdfs policies are complementary to HDFS permissions (or setting the right permissions on HDFS?), again making sure access is done under the original account, not requiring file ownership by the hive user.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)