Install and Enable Ranger Knox Plug-in
Extract your build at the appropriate place.
Copy
ranger-<version>-SNAPSHOT-knox-plugin.tar.gztoActive_Resourcemanagerhost in directory/usr/hdp/<hdp-version>/.Change directory to
/usr/hdp/<hdp-version>.Untar
ranger-<version>-SNAPSHOT-SNAPSHOT-knox-plugin.tar.gz.Change directories to
ranger-<version>-SNAPSHOT-knox-plugin.Edit the
install.propertiesfile.Enter the appropriate values for each of the following properties:
Table 14.18. install.properties Property Values
Property Values POLICY_MGR_URL http://<FQDN_of_ranger_admin_host>:6080 KNOX_HOME /usr/hdp/<version>/knox/ REPOSITORY_NAME knoxdev Additionally, for the Audit info, Solr/HDFS options are available.
Enable the Knox plug-in:
export JAVA_HOME=/usr/lib/jvm/java-1.7.0-openjdk.x86_64 ./enable-knox-plugin.sh
![[Note]](../common/images/admon/note.png)
Note In the HA environment, the Knox plug-in must be enabled on all Knox instances.
Stop and start the Knox gateway:
su knox -c "/usr/hdp/current/knox-server/bin/gateway.sh stop" su knox -c "/usr/hdp/current/knox-server/bin/gateway.sh start"
Create the default repo for Knox with proper configuration.
In the custom repo configuration, add the component user
knoxfor each of the following properties:policy.grantrevoke.auth.users or policy.download.auth.users
tag.download.auth.users
Use the
Audit->pluginstab to verify that the Knox plug-in is communicating with Ranger admin.For your test connection to be successful, follow the additional step "Trusting Self Signed Knox Certificate." (?? THIS LINK DOES NOT WORK??)

