| from apache_ranger.model.ranger_service import RangerService |
| from apache_ranger.client.ranger_client import RangerClient |
| from json import JSONDecodeError |
| |
| ranger_client = RangerClient('http://ranger:6080', ('admin', 'rangerR0cks!')) |
| |
| |
| def service_not_exists(service): |
| try: |
| svc = ranger_client.get_service(service.name) |
| except JSONDecodeError: |
| return 1 |
| return 0 if svc is not None else 1 |
| |
| |
| hdfs = RangerService({'name': 'dev_hdfs', 'type': 'hdfs', |
| 'configs': {'username': 'hdfs', 'password': 'hdfs', |
| 'fs.default.name': 'hdfs://ranger-hadoop.rangernw:9000', |
| 'hadoop.security.authentication': 'simple', |
| 'hadoop.security.authorization': 'true', |
| 'policy.download.auth.users': 'hdfs', |
| 'tag.download.auth.users': 'hdfs', |
| 'userstore.download.auth.users': 'hdfs', |
| 'setup.additional.default.policies': 'true', |
| 'default-policy.1.name': 'hive-tez-path', |
| 'default-policy.1.resource.path': '/apps/tez,/tmp/hive', |
| 'default-policy.1.resource.path.is-recursive': 'true', |
| 'default-policy.1.policyItem.1.users': 'hive', |
| 'default-policy.1.policyItem.1.accessTypes': 'read,write,execute', |
| 'default-policy.2.name': 'ranger-audit-path', |
| 'default-policy.2.resource.path': '/ranger/audit', |
| 'default-policy.2.resource.path.is-recursive': 'true', |
| 'default-policy.2.policyItem.1.users': 'rangerauditserver', |
| 'default-policy.2.policyItem.1.accessTypes': 'read,write,execute', |
| 'ranger.plugin.hdfs.policy.refresh.synchronous':'true'}}) |
| |
| hive = RangerService({'name': 'dev_hive', 'type': 'hive', |
| 'configs': {'username': 'hive', 'password': 'hive', |
| 'jdbc.driverClassName': 'org.apache.hive.jdbc.HiveDriver', |
| 'jdbc.url': 'jdbc:hive2://ranger-hive.rangernw:10000', |
| 'hadoop.security.authorization': 'true', |
| 'policy.download.auth.users': 'hive', |
| 'tag.download.auth.users': 'hive', |
| 'userstore.download.auth.users': 'hive', |
| 'ranger.plugin.hive.policy.refresh.synchronous':'true'}}) |
| |
| kafka = RangerService({'name': 'dev_kafka', 'type': 'kafka', |
| 'configs': {'username': 'kafka', 'password': 'kafka', |
| 'zookeeper.connect': 'ranger-zk.rangernw:2181', |
| 'policy.download.auth.users': 'kafka', |
| 'tag.download.auth.users': 'kafka', |
| 'setup.additional.default.policies': 'true', |
| 'default-policy.1.name': 'topic: ATLAS_ENTITIES', |
| 'default-policy.1.resource.topic': 'ATLAS_ENTITIES', |
| 'default-policy.1.policyItem.1.users': 'rangertagsync', |
| 'default-policy.1.policyItem.1.accessTypes': 'create,consume', |
| 'default-policy.2.name': 'consumergroup: ranger_entities_consumer', |
| 'default-policy.2.resource.consumergroup': 'ranger_entities_consumer', |
| 'default-policy.2.policyItem.1.users': 'rangertagsync', |
| 'default-policy.2.policyItem.1.accessTypes': 'consume,describe', |
| 'default-policy.3.name': 'topic: ranger_audit*', |
| 'default-policy.3.resource.topic': 'ranger_audit*,__consumer_offsets', |
| 'default-policy.3.policyItem.1.users': 'rangerauditserver', |
| 'default-policy.3.policyItem.1.accessTypes': 'create,configure,consume,publish,describe,create,delete,alter,describe_configs,alter_configs', |
| 'default-policy.4.name': 'consumergroup: ranger_audit*', |
| 'default-policy.4.resource.consumergroup': 'ranger_audit*', |
| 'default-policy.4.policyItem.1.users': 'rangerauditserver', |
| 'default-policy.4.policyItem.1.accessTypes': 'consume,describe,delete', |
| 'default-policy.5.name': 'cluster: audit server cluster permissions', |
| 'default-policy.5.resource.cluster': '*,dummy', |
| 'default-policy.5.policyItem.1.users': 'rangerauditserver', |
| 'default-policy.5.policyItem.1.accessTypes': 'configure,describe,alter,create,idempotent_write,describe_configs,alter_configs', |
| 'ranger.plugin.audit.filters': "[{'accessResult': 'DENIED', 'isAudited': true},{'resources':{'topic':{'values':['ATLAS_ENTITIES']}},'users':['rangertagsync'],'actions':['create','consume','describe'],'isAudited':false},{'resources':{'consumergroup':{'values':['ranger_entities_consumer']}},'users':['rangertagsync'],'actions':['consume'],'isAudited':false},{'users':['rangerauditserver'],'isAudited':false}]", |
| 'userstore.download.auth.users': 'kafka', |
| 'ranger.plugin.kafka.policy.refresh.synchronous':'true'}}) |
| |
| knox = RangerService({'name': 'dev_knox', 'type': 'knox', |
| 'configs': {'username': 'knox', 'password': 'knox', 'knox.url': 'https://ranger-knox.rangernw:8443', |
| 'policy.download.auth.users': 'knox', |
| 'tag.download.auth.users': 'knox', |
| 'userstore.download.auth.users': 'knox', |
| 'ranger.plugin.knox.policy.refresh.synchronous':'true'}}) |
| |
| yarn = RangerService({'name': 'dev_yarn', 'type': 'yarn', |
| 'configs': {'username': 'yarn', 'password': 'yarn', |
| 'yarn.url': 'http://ranger-hadoop.rangernw:8088', |
| 'policy.download.auth.users': 'yarn', |
| 'tag.download.auth.users': 'yarn', |
| 'userstore.download.auth.users': 'yarn', |
| 'ranger.plugin.yarn.policy.refresh.synchronous':'true'}}) |
| |
| hbase = RangerService({'name': 'dev_hbase', 'type': 'hbase', |
| 'configs': {'username': 'hbase', 'password': 'hbase', |
| 'hadoop.security.authentication': 'simple', |
| 'hbase.security.authentication': 'simple', |
| 'hadoop.security.authorization': 'true', |
| 'hbase.zookeeper.property.clientPort': '2181', |
| 'hbase.zookeeper.quorum': 'ranger-zk.rangernw', |
| 'zookeeper.znode.parent': '/hbase', |
| 'policy.download.auth.users': 'hbase', |
| 'tag.download.auth.users': 'hbase', |
| 'userstore.download.auth.users': 'hbase', |
| 'ranger.plugin.hbase.policy.refresh.synchronous':'true'}}) |
| |
| kms = RangerService({'name': 'dev_kms', 'type': 'kms', |
| 'configs': {'username': 'keyadmin', 'password': 'rangerR0cks!', |
| 'provider': 'http://ranger-kms.rangernw:9292', |
| 'policy.download.auth.users': 'rangerkms', |
| 'tag.download.auth.users': 'rangerkms', |
| 'userstore.download.auth.users': 'rangerkms', |
| 'ranger.plugin.kms.policy.refresh.synchronous':'true'}}) |
| |
| trino = RangerService({'name': 'dev_trino', |
| 'type': 'trino', |
| 'configs': { |
| 'username': 'trino', |
| 'password': 'trino', |
| 'jdbc.driverClassName': 'io.trino.jdbc.TrinoDriver', |
| 'jdbc.url': 'jdbc:trino://ranger-trino.rangernw:8080', |
| 'policy.download.auth.users': 'trino', |
| 'tag.download.auth.users': 'trino', |
| 'userstore.download.auth.users': 'trino', |
| 'ranger.plugin.trino.policy.refresh.synchronous':'true' |
| }}) |
| |
| ozone = RangerService({'name': 'dev_ozone', |
| 'type': 'ozone', |
| 'displayName': 'dev_ozone', |
| 'configs': {'username': 'hdfs', 'password': 'hdfs', |
| 'ozone.om.http-address': 'http://om:9874', |
| 'hadoop.security.authentication': 'simple', |
| 'policy.download.auth.users': 'ozone', |
| 'tag.download.auth.users': 'ozone', |
| 'userstore.download.auth.users': 'ozone', |
| 'ranger.plugin.ozone.policy.refresh.synchronous':'true'}}) |
| |
| solr = RangerService({'name': 'dev_solr', 'type': 'solr', |
| 'configs': {'username': 'solr', 'password': 'rangerR0cks!', |
| 'solr.url': 'http://ranger-solr.rangernw:8983', |
| 'setup.additional.default.policies': 'true', |
| 'default-policy.1.name': 'collection: ranger_audits', |
| 'default-policy.1.resource.collection': 'ranger_audits', |
| 'default-policy.1.policyItem.1.users': 'rangerauditserver', |
| 'default-policy.1.policyItem.1.accessTypes': 'query,update', |
| 'policy.download.auth.users': 'solr', |
| 'tag.download.auth.users': 'solr', |
| 'userstore.download.auth.users': 'solr', |
| 'ranger.plugin.super.users': 'solr', |
| 'ranger.plugin.solr.policy.refresh.synchronous':'true'}}) |
| |
| services = [hdfs, yarn, hive, hbase, kafka, knox, kms, trino, ozone, solr] |
| for service in services: |
| try: |
| if service_not_exists(service): |
| ranger_client.create_service(service) |
| print(f" {service.name} service created!") |
| except Exception as e: |
| print(f"An exception occured: {e}") |