You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@ranger.apache.org by co...@apache.org on 2016/04/29 11:54:02 UTC

incubator-ranger git commit: RANGER-914 - Website updates

Repository: incubator-ranger
Updated Branches:
  refs/heads/master 7e08cd9f2 -> 2c6554ca9


RANGER-914 - Website updates


Project: http://git-wip-us.apache.org/repos/asf/incubator-ranger/repo
Commit: http://git-wip-us.apache.org/repos/asf/incubator-ranger/commit/2c6554ca
Tree: http://git-wip-us.apache.org/repos/asf/incubator-ranger/tree/2c6554ca
Diff: http://git-wip-us.apache.org/repos/asf/incubator-ranger/diff/2c6554ca

Branch: refs/heads/master
Commit: 2c6554ca9df6576a21efb1bf3c7f0b05b1cd9dfc
Parents: 7e08cd9
Author: Colm O hEigeartaigh <co...@apache.org>
Authored: Thu Apr 14 10:36:51 2016 +0100
Committer: Colm O hEigeartaigh <co...@apache.org>
Committed: Fri Apr 29 10:53:24 2016 +0100

----------------------------------------------------------------------
 docs/src/site/fml/faq.fml       | 66 ++++++++++++++++++------------------
 docs/src/site/site.xml          |  7 ++--
 docs/src/site/xdoc/download.xml | 62 +++++++++++++++++++++++++++++++++
 3 files changed, 100 insertions(+), 35 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/2c6554ca/docs/src/site/fml/faq.fml
----------------------------------------------------------------------
diff --git a/docs/src/site/fml/faq.fml b/docs/src/site/fml/faq.fml
index 107c13a..71d0c04 100644
--- a/docs/src/site/fml/faq.fml
+++ b/docs/src/site/fml/faq.fml
@@ -26,7 +26,7 @@ under the License.
       <question>What does Apache Ranger offer for Apache Hadoop and related components?</question>
       <answer>
         <p>
-            Apache Ranger offers a centralized security framework to manage fine grained access control over Hadoop and related components (Apache Hive, HBase etc.). Using Ranger administration console, users can easily manage policies around accessing a resource (file, folder, database, table, column etc) for a particular set of users and/or groups, and enforce the policies within Hadoop. They also can enable audit tracking and policy analytics for deeper control of the environment. Ranger’ solution also provides ability to delegate administration of certain data to other group owners, with an aim of decentralizing data ownership
+            Apache Ranger offers a centralized security framework to manage fine grained access control over Hadoop and related components (Apache Hive, HBase etc.). Using the Apache Ranger administration console, users can easily manage policies around accessing a resource (file, folder, database, table, column etc) for a particular set of users and/or groups, and enforce the policies within Hadoop. They also can enable audit tracking and policy analytics for deeper control of the environment. Apache Ranger also provides ability to delegate administration of certain data to other group owners, with an aim of decentralizing data ownership
           </p>
     </answer>
     </faq>
@@ -53,7 +53,7 @@ under the License.
       <question>How does it work over Hadoop and related components</question>
       <answer>
         <p>
-        Apache Ranger' solution at the core has a centralized web application, which consists of the policy administration, audit and reporting modules. Authorized users will be able to manage their security policies using the web tool or using REST APIs.  These security policies are enforced within Hadoop ecosystem using lightweight Ranger Java plugins, which run as part of the same process as the namenode (HDFS), Hive2Server(Hive), HBase server (Hbase), Nimbus server (Storm) and Knox server (Knox) respectively. Thus there is no additional OS level process to manage.
+        Apache Ranger at the core has a centralized web application, which consists of the policy administration, audit and reporting modules. Authorized users will be able to manage their security policies using the web tool or using REST APIs.  These security policies are enforced within Hadoop ecosystem using lightweight Ranger Java plugins, which run as part of the same process as the namenode (HDFS), Hive2Server(Hive), HBase server (Hbase), Nimbus server (Storm) and Knox server (Knox) respectively. Thus there is no additional OS level process to manage.
         </p>
       </answer>
     </faq>
@@ -61,7 +61,7 @@ under the License.
       <question>Is there a single point of failure?</question>
       <answer>
         <p>
-           No, Apache Ranger is not a Single Point of Failure. Ranger' plugins run within the same process as the component, e.g. NameNode for HDFS.  These agents pull the policy-changes using REST API at a configured regular interval (e.g.: 30 second). The plugin is able to function even if the policy server is temporarily down and will provide the authorization enforcement. Also, the policy manager web application can be hosted on a HA infrastructure. (with multiple apache server, multiple tomcat servers and a standby database server w/o replication setup).
+           No, Apache Ranger is not a Single Point of Failure. Apache Ranger's plugins run within the same process as the component, e.g. NameNode for HDFS.  These agents pull the policy-changes using REST API at a configured regular interval (e.g.: 30 second). The plugin is able to function even if the policy server is temporarily down and will provide the authorization enforcement. Also, the policy manager web application can be hosted on a HA infrastructure. (with multiple apache server, multiple tomcat servers and a standby database server w/o replication setup).
         </p>
     </answer>
     </faq>
@@ -69,31 +69,31 @@ under the License.
   
   <part id="Apache Hadoop">
     <title>Apache Hadoop</title>
-    <faq id="How does Ranger provide authorization in Apache Hadoop">
-      <question>How does Ranger provide authorization in Apache Hadoop?</question>
+    <faq id="How does Apache Ranger provide authorization in Apache Hadoop">
+      <question>How does Apache Ranger provide authorization in Apache Hadoop?</question>
       <answer>
         <p>
-          Ranger provides a plugin for Apache Hadoop, specifically for the NameNode as part of the authorization method. Ranger' plugin is in the path of the user request and is able to make a decision on whether the user request shoud be authorized. The plugin also collects access request details required for auditing
+          Apache Ranger provides a plugin for Apache Hadoop, specifically for the NameNode as part of the authorization method. The Apache Ranger plugin is in the path of the user request and is able to make a decision on whether the user request shoud be authorized. The plugin also collects access request details required for auditing
         </p>
         <p>
-            Ranger will enforce the security policies available in the policy database. Users can create a security policy for a specific set of resources (one or more folders and/or files) and assign specific set of permissions (e.g: read, write, execute) to a specific set of users and/or groups. The security policies are stored our policy manager and are independent from native permissions.
+            Apache Ranger will enforce the security policies available in the policy database. Users can create a security policy for a specific set of resources (one or more folders and/or files) and assign specific set of permissions (e.g: read, write, execute) to a specific set of users and/or groups. The security policies are stored in the policy manager and are independent from native permissions.
             </p>
     </answer>
         </faq>
-      <faq id="Does Ranger emulate native unix level permissions?">
-          <question>Does Ranger emulated permissions at the unix level for Apache Hadoop?</question>
+      <faq id="Does Apache Ranger emulate native unix level permissions?">
+          <question>Does Apache Ranger emulated permissions at the unix level for Apache Hadoop?</question>
           <answer>
               <p>
-                 No, Ranger enforces authorization based on policies entered in the policy administration tool and does not emulate the permissions at the unix level.  Ranger does provide a default feature to validate access using native hadoop file-level permissions if the Ranger policies do not cover the requested access
+                 No, Apache Ranger enforces authorization based on policies entered in the policy administration tool and does not emulate the permissions at the unix level.  Apache Ranger does provide a default feature to validate access using native hadoop file-level permissions if the Ranger policies do not cover the requested access
               </p>
               </answer>
           </faq>
   
-  <faq id="Do we need an Ranger plugin in each datanode?">
-      <question>Does Ranger plugin need to be implemented in each datanode ?</question>
+  <faq id="Do we need an Apache Ranger plugin in each datanode?">
+      <question>Does the Apache Ranger plugin need to be implemented in each datanode ?</question>
       <answer>
           <p>
-              No, Ranger plugin for Hadoop is only needed in the NameNode.
+              No, the Apache Ranger plugin for Hadoop is only needed in the NameNode.
               
           </p>
       </answer>
@@ -102,20 +102,20 @@ under the License.
 </part>
     <part id="Apache Hive">
         <title>Apache Hive</title>
-        <faq id="How does Ranger provide authorization in Apache Hive">
-            <question>How does Ranger provide authorization in Apache Hive?</question>
+        <faq id="How does Apache Ranger provide authorization in Apache Hive">
+            <question>How does Apache Ranger provide authorization in Apache Hive?</question>
             <answer>
                 <p>
-                    Ranger plugin is enabled in Hiveserver2 as part of the authorization
+                    The Apache Ranger plugin is enabled in Hiveserver2 as part of the authorization
                 </p>
             </answer>
             </faq>
         
-        <faq id="How does Ranger authorization compared to SQL standard authorization">
-            <question>How does Ranger authorization compare to SQL standard authorization?</question>
+        <faq id="How does Apache Ranger authorization compare to SQL standard authorization">
+            <question>How does Apache Ranger authorization compare to SQL standard authorization?</question>
             <answer>
                 <p>
-                    Apache Hive currently provides two methods of authorization, Storage based authorization and SQL standard authorization, which was introduced in Hive 13. SQL standard authorization provides grant/revoke functionality at database, table level. The commands would be familiar to a DBA admin. Ranger provides a centralized authorization interface for Hive and provides more granular access control at column level through the Hive plugin. Ranger also provides ability to use wildcard in resource names within the policy.
+                    Apache Hive currently provides two methods of authorization, Storage based authorization and SQL standard authorization, which was introduced in Hive 13. SQL standard authorization provides grant/revoke functionality at database, table level. The commands would be familiar to a DBA admin. Apache Ranger provides a centralized authorization interface for Hive and provides more granular access control at column level through the Hive plugin. Ranger also provides ability to use wildcard in resource names within the policy.
                 </p>
             </answer>
         </faq>
@@ -124,41 +124,41 @@ under the License.
 
 <part id="Apache HBase">
     <title>Apache HBase</title>
-    <faq id="How does Ranger provide authorization in Apache HBase">
-        <question>How does Ranger provide authorization in Apache Hbase?</question>
+    <faq id="How does Apache Ranger provide authorization in Apache HBase">
+        <question>How does Apache Ranger provide authorization in Apache Hbase?</question>
         <answer>
             <p>
-                Ranger provides a coprocessor which added to HBase, and includes the logic to perform authorization check and collect audit data.
+                Apache Ranger provides a coprocessor which is added to HBase, and includes the logic to perform authorization check and collect audit data.
             </p>
         </answer>
     </faq>
 </part>
 <part id="Apache Knox">
     <title>Apache Knox</title>
-    <faq id="How does Ranger provide authorization in Apache Knox">
-        <question>How does Ranger provide authorization in Apache Knox?</question>
+    <faq id="How does Apache Ranger provide authorization in Apache Knox">
+        <question>How does Apache Ranger provide authorization in Apache Knox?</question>
         <answer>
             <p>
-                Apache Knox currently provides a service level authorization for users/groups. These acls are stored locally in a file. Ranger has built a plugin for Knox to enable administration of these policies through central UI/REST APIs as well as detailed auditing of Knox user access.
+                Apache Knox currently provides a service level authorization for users/groups. These acls are stored locally in a file. Apache Ranger has built a plugin for Knox to enable administration of these policies through central UI/REST APIs as well as detailed auditing of Knox user access.
             </p>
         </answer>
     </faq>
 </part>
 <part id="Apache Kafka">
     <title>Apache Kafka</title>
-    <faq id="How does Ranger provide authorization in Apache Kafka">
-        <question>How does Ranger provide authorization in Apache Kafka?</question>
+    <faq id="How does Apache Ranger provide authorization in Apache Kafka">
+        <question>How does Apache Ranger provide authorization in Apache Kafka?</question>
         <answer>
             <p>
-                Security was introduced in Kafka in Kafka 0.9 version. Ranger can manage the Kafka ACLs per topic. Users can use Ranger to control who can write to a topic or read from a topic. In addition to providing policies by users and groups, Ranger also supports IP address based permissions to publish or subscribe.
+                Security was introduced in Apache Kafka 0.9. Apache Ranger can manage the Kafka ACLs per topic. Users can use Ranger to control who can write to a topic or read from a topic. In addition to providing policies by users and groups, Apache Ranger also supports IP address based permissions to publish or subscribe.
             </p>
         </answer>
     </faq>
 </part>
 <part id="Apache Solr">
     <title>Apache Solr</title>
-    <faq id="How does Ranger provide authorization in Apache Solr">
-        <question>How does Ranger provide authorization in Apache Solr?</question>
+    <faq id="How does Apache Ranger provide authorization in Apache Solr">
+        <question>How does Apache Ranger provide authorization in Apache Solr?</question>
         <answer>
             <p>
                 Similar to Apache Kafka, security in Apache Solr was introduced recently by the community. Through Apache Ranger, users can build policies for users/groups to query a particular collections in Solr. Efforts are underway in Solr community to provide more granular index level permissions.
@@ -168,11 +168,11 @@ under the License.
 </part>
 <part id="Yarn">
     <title>YARN</title>
-    <faq id="How does Ranger provide authorization in YARN">
-        <question>How does Ranger provide authorization in YARN?</question>
+    <faq id="How does Apache Ranger provide authorization in YARN">
+        <question>How does Apache Ranger provide authorization in YARN?</question>
         <answer>
             <p>
-               YARN is widely used in the Hadoop ecosystem as resource management layer for applications. Adminstrators can use YARN to setup queues with a certain capacity and applications can be given permissions to write to a certain queue. Using Ranger, administrators can manage the policies for who can write to a particular queue
+               YARN is widely used in the Hadoop ecosystem as resource management layer for applications. Adminstrators can use YARN to setup queues with a certain capacity and applications can be given permissions to write to a certain queue. Using Apache Ranger, administrators can manage the policies for who can write to a particular queue
             </p>
         </answer>
     </faq>

http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/2c6554ca/docs/src/site/site.xml
----------------------------------------------------------------------
diff --git a/docs/src/site/site.xml b/docs/src/site/site.xml
index 352732b..195706f 100644
--- a/docs/src/site/site.xml
+++ b/docs/src/site/site.xml
@@ -47,7 +47,8 @@ under the License.
 <body>
     <menu name="Overview">
       <item name="Introduction" href="index.html"/>
-	  <item name="News" href="https://cwiki.apache.org/confluence/display/RANGER/News" />
+      <item name="News" href="https://cwiki.apache.org/confluence/display/RANGER/News" />
+      <item name="Download" href="download.html"/>
       <item name="FAQ" href="faq.html"/>
     </menu>
     <menu name="Resources">
@@ -59,12 +60,14 @@ under the License.
     <menu name="Project Information">
         <item name="Project Summary" href="project-summary.html"/>
         <item name="Mailing Lists" href="mail-lists.html"/>
-        <item name ="Team" href="team-list.html"/>
+        <item name="Issue Tracking" href="https://issues.apache.org/jira/browse/RANGER"/>
+        <item name="Team" href="team-list.html"/>
     </menu>
 	<menu name="Releases">
 		<item name="0.4.0" href="https://cwiki.apache.org/confluence/display/RANGER/Apache+Ranger+0.4.0+Release+Notes" />
 		<item name="0.5.0" href="https://cwiki.apache.org/confluence/display/RANGER/Apache+Ranger+0.5.0+-+Release+Notes" />
 		<item name="0.5.1" href="https://cwiki.apache.org/confluence/display/RANGER/Apache+Ranger+0.5.1+-+Release+Notes" />
+		<item name="0.5.2" href="https://cwiki.apache.org/confluence/display/RANGER/Apache+Ranger+0.5.2+-+Release+Notes" />
 	</menu>
 </body>
 

http://git-wip-us.apache.org/repos/asf/incubator-ranger/blob/2c6554ca/docs/src/site/xdoc/download.xml
----------------------------------------------------------------------
diff --git a/docs/src/site/xdoc/download.xml b/docs/src/site/xdoc/download.xml
new file mode 100644
index 0000000..b3003ba
--- /dev/null
+++ b/docs/src/site/xdoc/download.xml
@@ -0,0 +1,62 @@
+<?xml version="1.0" encoding="ISO-8859-1"?>
+<!--
+  Licensed to the Apache Software Foundation (ASF) under one or more
+  contributor license agreements.  See the NOTICE file distributed with
+  this work for additional information regarding copyright ownership.
+  The ASF licenses this file to You under the Apache License, Version 2.0
+  (the "License"); you may not use this file except in compliance with
+  the License.  You may obtain a copy of the License at
+
+      http://www.apache.org/licenses/LICENSE-2.0
+
+  Unless required by applicable law or agreed to in writing, software
+  distributed under the License is distributed on an "AS IS" BASIS,
+  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+  See the License for the specific language governing permissions and
+  limitations under the License.
+-->
+<document>
+<body>
+<section name="Download Apache Ranger">
+<subsection name="How to Download">
+<p>
+Use the links below to download a distribution of Apache Ranger from one of our mirrors. 
+It is good practice to verify the integrity of the distribution files. Apache Ranger releases are 
+available under the 
+<a href="http://www.apache.org/licenses/LICENSE-2.0">Apache License, Version 2.0</a> - see the 
+LICENSE.txt and NOTICE.txt files contained in each release artifact.
+</p>
+</subsection>
+<subsection name="Current official release (closest mirror site selected automatically)">
+<ul>
+<li>
+<p>
+The current stable release is Apache Ranger 0.5.2:
+</p>
+<p>
+<a href="http://www.apache.org/dyn/closer.lua/incubator/ranger/0.5.2-incubating/apache-ranger-incubating-0.5.2.tar.gz">apache-ranger-incubating-0.5.2.tar.gz</a>
+(<a href="http://www.apache.org/dist/incubator/ranger/0.5.2-incubating/apache-ranger-incubating-0.5.2.tar.gz.asc">PGP</a>)
+(<a href="http://www.apache.org/dist/incubator/ranger/0.5.2-incubating/apache-ranger-incubating-0.5.2.tar.gz.mds">Digests</a>)
+</p>
+</li>
+<li>
+<p>
+The older branch release is Apache Ranger 0.4.0:
+</p>
+<p>
+<a href="http://www.apache.org/dyn/closer.lua/incubator/ranger/0.4.0-incubating/ranger-0.4.0-incubating.tar.gz">ranger-0.4.0-incubating.tar.gz</a>
+(<a href="http://www.apache.org/dist/incubator/ranger/0.4.0-incubating/ranger-0.4.0-incubating.tar.gz.asc">PGP</a>)
+(<a href="http://www.apache.org/dist/incubator/ranger/0.4.0-incubating/ranger-0.4.0-incubating.tar.gz.mds">Digests</a>)
+</p>
+</li>
+</ul>
+</subsection>
+<subsection name="Archive of old releases">
+<p>
+Older releases are available in the <a href="http://archive.apache.org/dist/incubator/ranger/">archive</a>.
+</p>
+</subsection>
+</section>
+            
+</body>
+</document>