| # Licensed to the Apache Software Foundation (ASF) under one or more |
| # contributor license agreements. See the NOTICE file distributed with |
| # this work for additional information regarding copyright ownership. |
| # The ASF licenses this file to You under the Apache License, Version 2.0 |
| # (the "License"); you may not use this file except in compliance with |
| # the License. You may obtain a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS IS" BASIS, |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| # See the License for the specific language governing permissions and |
| # limitations under the License. |
| |
| # |
| # Location of Policy Manager URL |
| # |
| # Example: |
| # POLICY_MGR_URL=http://policymanager.xasecure.net:6080 |
| # |
| POLICY_MGR_URL= |
| |
| # |
| # This is the repository name created within policy manager |
| # |
| # Example: |
| # REPOSITORY_NAME=atlasdev |
| # |
| REPOSITORY_NAME= |
| |
| # AUDIT configuration with V3 properties |
| |
| #Should audit be summarized at source |
| XAAUDIT.SUMMARY.ENABLE=true |
| |
| # Enable audit logs to Solr |
| #Example |
| #XAAUDIT.SOLR.ENABLE=true |
| #XAAUDIT.SOLR.URL=http://localhost:6083/solr/ranger_audits |
| #XAAUDIT.SOLR.ZOOKEEPER= |
| #XAAUDIT.SOLR.FILE_SPOOL_DIR=/var/log/atlas/audit/solr/spool |
| |
| XAAUDIT.SOLR.ENABLE=false |
| XAAUDIT.SOLR.URL=NONE |
| XAAUDIT.SOLR.USER=NONE |
| XAAUDIT.SOLR.PASSWORD=NONE |
| XAAUDIT.SOLR.ZOOKEEPER=NONE |
| |
| # Enable audit logs to HDFS |
| #Example |
| #XAAUDIT.HDFS.ENABLE=true |
| #XAAUDIT.HDFS.HDFS_DIR=hdfs://node-1.example.com:8020/ranger/audit |
| # If using Azure Blob Storage |
| #XAAUDIT.HDFS.HDFS_DIR=wasb[s]://<containername>@<accountname>.blob.core.windows.net/<path> |
| #XAAUDIT.HDFS.HDFS_DIR=wasb://ranger_audit_container@my-azure-account.blob.core.windows.net/ranger/audit |
| #XAAUDIT.HDFS.FILE_SPOOL_DIR=/var/log/atlas/audit/hdfs/spool |
| |
| XAAUDIT.HDFS.ENABLE=false |
| XAAUDIT.HDFS.HDFS_DIR=hdfs://__REPLACE__NAME_NODE_HOST:8020/ranger/audit |
| |
| # Following additional propertis are needed When auditing to Azure Blob Storage via HDFS |
| # Get these values from your /etc/hadoop/conf/core-site.xml |
| #XAAUDIT.HDFS.HDFS_DIR=wasb[s]://<containername>@<accountname>.blob.core.windows.net/<path> |
| XAAUDIT.HDFS.AZURE_ACCOUNTNAME=__REPLACE_AZURE_ACCOUNT_NAME |
| XAAUDIT.HDFS.AZURE_ACCOUNTKEY=__REPLACE_AZURE_ACCOUNT_KEY |
| XAAUDIT.HDFS.AZURE_SHELL_KEY_PROVIDER=__REPLACE_AZURE_SHELL_KEY_PROVIDER |
| XAAUDIT.HDFS.AZURE_ACCOUNTKEY_PROVIDER=__REPLACE_AZURE_ACCOUNT_KEY_PROVIDER |
| |
| # End of V3 properties |
| |
| |
| # |
| # SSL Client Certificate Information |
| # |
| # Example: |
| # SSL_KEYSTORE_FILE_PATH=/etc/atlas/conf/ranger-plugin-keystore.jks |
| # SSL_KEYSTORE_PASSWORD=none |
| # SSL_TRUSTSTORE_FILE_PATH=/etc/atlas/conf/ranger-plugin-truststore.jks |
| # SSL_TRUSTSTORE_PASSWORD=none |
| # |
| # You do not need use SSL between agent and security admin tool, please leave these sample value as it is. |
| # |
| SSL_KEYSTORE_FILE_PATH=/etc/atlas/conf/ranger-plugin-keystore.jks |
| SSL_KEYSTORE_PASSWORD=myKeyFilePassword |
| SSL_TRUSTSTORE_FILE_PATH=/etc/atlas/conf/ranger-plugin-truststore.jks |
| SSL_TRUSTSTORE_PASSWORD=changeit |
| |
| # |
| # Custom component user |
| # CUSTOM_COMPONENT_USER=<custom-user> |
| # keep blank if component user is default |
| CUSTOM_USER=atlas |
| |
| |
| # |
| # Custom component group |
| # CUSTOM_COMPONENT_GROUP=<custom-group> |
| # keep blank if component group is default |
| CUSTOM_GROUP=hadoop |
| |