Skip to content

Commit

Permalink
feat(ranger-plugins): enable log4j for auditlogs
Browse files Browse the repository at this point in the history
  • Loading branch information
giem-git committed Mar 25, 2024
1 parent 2784de6 commit dde4828
Show file tree
Hide file tree
Showing 20 changed files with 184 additions and 6 deletions.
10 changes: 10 additions & 0 deletions roles/hadoop/common/templates/log4j.properties.j2
Original file line number Diff line number Diff line change
Expand Up @@ -309,3 +309,13 @@ log4j.appender.EWMA.maxUniqueMessages=${yarn.ewma.maxUniqueMessages}

# Log levels of third-party libraries
log4j.logger.org.apache.commons.beanutils=WARN

{% if enable_ranger_audit_log4j and ranger_audit_file is defined %}
ranger.logger=INFO,console,RANGERAUDIT
log4j.logger.xaaudit=${ranger.logger}
log4j.appender.RANGERAUDIT=org.apache.log4j.DailyRollingFileAppender
log4j.appender.RANGERAUDIT.File={{ ranger_audit_file }}
log4j.appender.RANGERAUDIT.layout=org.apache.log4j.PatternLayout
log4j.appender.RANGERAUDIT.layout.ConversionPattern={{ tdp_auditlog_layout_pattern }}
#log4j.appender.RANGERAUDIT.DatePattern=.yyyy-MM-dd
{% endif %}
Original file line number Diff line number Diff line change
Expand Up @@ -117,6 +117,13 @@ XAAUDIT.SOLR.MAX_QUEUE_SIZE=1
XAAUDIT.SOLR.MAX_FLUSH_INTERVAL_MS=1000
XAAUDIT.SOLR.SOLR_URL=http://localhost:6083/solr/ranger_audits

{% if enable_ranger_audit_log4j %}
# log4j audit
XAAUDIT.LOG4J.IS_ENABLED=true
XAAUDIT.LOG4J.DESTINATION=true
XAAUDIT.LOG4J.DESTINATION.LOGGER=xaaudit
{% endif %}

#
# SSL Client Certificate Information
#
Expand Down
10 changes: 10 additions & 0 deletions roles/hbase/common/templates/hbase/log4j.properties.j2
Original file line number Diff line number Diff line change
Expand Up @@ -122,3 +122,13 @@ log4j.logger.org.apache.hadoop.hbase.zookeeper.ZKWatcher=${hbase.log.level}
log4j.logger.org.apache.hadoop.metrics2.impl.MetricsConfig=WARN
log4j.logger.org.apache.hadoop.metrics2.impl.MetricsSinkAdapter=WARN
log4j.logger.org.apache.hadoop.metrics2.impl.MetricsSystemImpl=WARN

{% if enable_ranger_audit_log4j and ranger_audit_file is defined %}
ranger.logger=INFO,console,RANGERAUDIT
log4j.logger.xaaudit=${ranger.logger}
log4j.appender.RANGERAUDIT=org.apache.log4j.DailyRollingFileAppender
log4j.appender.RANGERAUDIT.File={{ ranger_audit_file }}
log4j.appender.RANGERAUDIT.layout=org.apache.log4j.PatternLayout
log4j.appender.RANGERAUDIT.layout.ConversionPattern={{ tdp_auditlog_layout_pattern }}
#log4j.appender.RANGERAUDIT.DatePattern=.yyyy-MM-dd
{% endif %}
2 changes: 2 additions & 0 deletions roles/hbase/master/tasks/config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,8 @@
owner: root
group: root
mode: "644"
vars:
ranger_audit_file: "{{ hbase_log_dir }}/{{ hbase_master_ranger_audit_file }}"

- name: Render hbase-site.xml
ansible.builtin.template:
Expand Down
12 changes: 12 additions & 0 deletions roles/hbase/ranger/tasks/config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,18 @@
dest: "{{ hbase_install_dir }}/conf"
state: link

- name: Enable log4j audit in ranger-hive-audit.xml
ansible.builtin.blockinfile:
path: "{{ ranger_hbase_install_dir }}/install/conf.templates/enable/ranger-hbase-audit-changes.cfg"
marker: "# {mark} ANSIBLE MANAGED BLOCK : log4j audit logs"
insertbefore: "^AZURE.ACCOUNTNAME"
block: |
xasecure.audit.log4j.is.enabled %XAAUDIT.LOG4J.IS_ENABLED% mod create-if-not-exists
xasecure.audit.destination.log4j %XAAUDIT.LOG4J.DESTINATION% mod create-if-not-exists
xasecure.audit.destination.log4j.logger %XAAUDIT.LOG4J.DESTINATION.LOGGER% mod create-if-not-exists
when: enable_ranger_audit_log4j

- name: Run enable-hbase-plugin.sh

Check warning on line 39 in roles/hbase/ranger/tasks/config.yml

View workflow job for this annotation

GitHub Actions / ansible-lint

no-changed-when

Commands should not change things if nothing needs doing.
ansible.builtin.shell: |
export JAVA_HOME={{ java_home }}
Expand Down
2 changes: 2 additions & 0 deletions roles/hbase/regionserver/tasks/config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,8 @@
owner: root
group: root
mode: "644"
vars:
ranger_audit_file: "{{ hbase_log_dir }}/{{ hbase_rs_ranger_audit_file }}"

- name: Render hbase-site.xml
ansible.builtin.template:
Expand Down
8 changes: 7 additions & 1 deletion roles/hdfs/common/templates/install_hdfs.properties.j2
Original file line number Diff line number Diff line change
Expand Up @@ -103,12 +103,18 @@ XAAUDIT.HDFS.LOCAL_BUFFER_FLUSH_INTERVAL_SECONDS=60
XAAUDIT.HDFS.LOCAL_BUFFER_ROLLOVER_INTERVAL_SECONDS=600
XAAUDIT.HDFS.LOCAL_ARCHIVE_MAX_FILE_COUNT=10

#Solr Audit Provder
#Solr Audit Provider
XAAUDIT.SOLR.IS_ENABLED=false
XAAUDIT.SOLR.MAX_QUEUE_SIZE=1
XAAUDIT.SOLR.MAX_FLUSH_INTERVAL_MS=1000
XAAUDIT.SOLR.SOLR_URL=http://localhost:6083/solr/ranger_audits

{% if enable_ranger_audit_log4j %}
# log4j audit
XAAUDIT.LOG4J.IS_ENABLED=true
XAAUDIT.LOG4J.DESTINATION=true
XAAUDIT.LOG4J.DESTINATION.LOGGER=xaaudit
{% endif %}

#
# SSL Client Certificate Information
Expand Down
2 changes: 2 additions & 0 deletions roles/hdfs/namenode/tasks/config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,8 @@
owner: root
group: root
mode: "644"
vars:
ranger_audit_file: "{{ hdfs_log_dir }}/{{ hadoop_hdfs_ranger_audit_file }}"

- name: Template HDFS ZKFC service file
ansible.builtin.template:
Expand Down
18 changes: 18 additions & 0 deletions roles/hdfs/ranger/tasks/config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -33,9 +33,27 @@
line: 'ranger.plugin.hdfs.policy.rest.ssl.config.file {{ hadoop_nn_conf_dir }}/ranger-policymgr-ssl.xml \2'
backrefs: true

- name: Enable log4j audit in ranger-hdfs-audit.xml
ansible.builtin.blockinfile:
path: "{{ ranger_hdfs_install_dir }}/install/conf.templates/enable/ranger-hdfs-audit-changes.cfg"
marker: "# {mark} ANSIBLE MANAGED BLOCK : log4j audit logs"
insertbefore: "^AZURE.ACCOUNTNAME"
block: |
xasecure.audit.log4j.is.enabled %XAAUDIT.LOG4J.IS_ENABLED% mod create-if-not-exists
xasecure.audit.destination.log4j %XAAUDIT.LOG4J.DESTINATION% mod create-if-not-exists
xasecure.audit.destination.log4j.logger %XAAUDIT.LOG4J.DESTINATION.LOGGER% mod create-if-not-exists
when: enable_ranger_audit_log4j

- name: Run enable-hdfs-plugin.sh
ansible.builtin.shell: |
export JAVA_HOME={{ java_home }}
./enable-hdfs-plugin.sh
args:
chdir: "{{ ranger_hdfs_install_dir }}"

- name: Reestablish symbolic link from etc/hadoop in {{ hadoop_install_dir }} to {{ hadoop_client_conf_dir }}
ansible.builtin.file:
src: "{{ hadoop_client_conf_dir }}"
dest: "{{ hadoop_install_dir }}/etc/hadoop"
state: link
2 changes: 1 addition & 1 deletion roles/hive/common/templates/hive-env.sh.j2
Original file line number Diff line number Diff line change
Expand Up @@ -73,7 +73,7 @@ if [ "$SERVICE" = "hiveserver2" ]; then
# Setting for HiveServer2 and Client
export HADOOP_HEAPSIZE="{{ hive_hs2_heapsize }}"
export HADOOP_LOGS_OPTS="-Dhive.log.dir={{ hive_log_dir }} -Dhive.log.file={{ hive_s2_log_file }} -Dhive.log.level={{ hive_root_logger_level }} -Dhive.root.logger={{ hive_root_logger }}"
export HADOOP_GC_OPTS="-Xloggc:{{ hive_log_dir }}/hiveserver2-gc-%t.log -XX:+UseG1GC -XX:+PrintGCDetails -XX:+PrintGCTimeStamps -XX:+PrintGCCause -XX:+UseGCLogFileRotation -XX:NumberOfGCLogFiles=10 -XX:GCLogFileSize=10M -XX:+HeapDumpOnOutOfMemoryError -XX:HeapDumpPath={{ hive_log_dir }}/hs2_heapdump.hprof"
export HADOOP_GC_OPTS="-Xloggc:{{ hive_log_dir }}/hiveserver2-gc-%t.log -XX:+UseG1GC -XX:+PrintGCDetails -XX:+PrintGCTimeStamps -XX:+PrintGCCause -XX:+UseGCLogFileRotation -XX:NumberOfGCLogFiles=10 -XX:GCLogFileSize=10M -XX:+HeapDumpOnOutOfMemoryError -XX:HeapDumpPath={{ hive_log_dir }}/hs2_heapdump.hprof"
export HADOOP_OPTS="$HADOOP_OPTS $JMX_OPTS ${HADOOP_LOGS_OPTS}"

fi
Expand Down
28 changes: 26 additions & 2 deletions roles/hive/common/templates/hive-log4j2.properties.j2
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,8 @@ property.hive.log.file = hive.log
property.hive.perflogger.log.level = INFO

# list of all appenders
appenders = {{ hive_root_logger }}
appenders = {%- if enable_ranger_audit_log4j %}RANGERAUDIT, {% endif %}{{ hive_root_logger }}


# console appender
appender.console.type = Console
Expand All @@ -52,7 +53,7 @@ appender.RFA.strategy.max = {{ hive_log_rfa_maxbackupindex }}
appender.DRFA.type = RollingRandomAccessFile
appender.DRFA.name = DRFA
appender.DRFA.fileName = ${sys:hive.log.dir}/${sys:hive.log.file}
appender.DRFA.filePattern = ${sys:hive.log.dir}/${sys:hive.log.file}.{{ hive_log_drfa_date_pattern }}
appender.DRFA.filePattern = ${sys:hive.log.dir}/${sys:hive.log.file}.{{ hive_log_drfa_date_pattern }}
appender.DRFA.layout.type = PatternLayout
appender.DRFA.layout.pattern = {{ hive_log_layout_pattern }}
appender.DRFA.policies.type = Policies
Expand All @@ -62,8 +63,31 @@ appender.DRFA.policies.timebased.modulate = false
appender.DRFA.strategy.type = DefaultRolloverStrategy
appender.DRFA.strategy.max = {{ hive_log_drfa_maxbackupindex }}

{% if enable_ranger_audit_log4j %}
appender.RANGERAUDIT.type = RollingRandomAccessFile
appender.RANGERAUDIT.name = RANGERAUDIT
appender.RANGERAUDIT.fileName = ${sys:hive.log.dir}/{{ hive_ranger_audit_file }}
appender.RANGERAUDIT.filePattern = ${sys:hive.log.dir}/{{ hive_ranger_audit_file }}.{{ hive_log_drfa_date_pattern }}
appender.RANGERAUDIT.layout.type = PatternLayout
appender.RANGERAUDIT.layout.pattern = {{ tdp_auditlog_layout_pattern }}
appender.RANGERAUDIT.policies.type = Policies
appender.RANGERAUDIT.policies.timebased.type = TimeBasedTriggeringPolicy
appender.RANGERAUDIT.policies.timebased.interval = 1
appender.RANGERAUDIT.policies.timebased.modulate = false
appender.RANGERAUDIT.strategy.type = DefaultRolloverStrategy
appender.RANGERAUDIT.strategy.max = {{ hive_log_drfa_maxbackupindex }}
{% endif %}

# list of all loggers
loggers = NIOServerCnxn, ClientCnxnSocketNIO, DataNucleus, Datastore, JPOX, PerfLogger, AmazonAws, ApacheHttp
{%- if enable_ranger_audit_log4j %}, xaaudit{% endif %}


{% if enable_ranger_audit_log4j %}
logger.xaaudit.name = xaaudit
logger.xaaudit.level = INFO
logger.xaaudit.appenderRef.RANGERAUDIT.ref = RANGERAUDIT
{% endif %}

logger.NIOServerCnxn.name = org.apache.zookeeper.server.NIOServerCnxn
logger.NIOServerCnxn.level = WARN
Expand Down
7 changes: 7 additions & 0 deletions roles/hive/common/templates/install.properties.j2
Original file line number Diff line number Diff line change
Expand Up @@ -113,6 +113,13 @@ XAAUDIT.SOLR.MAX_QUEUE_SIZE=1
XAAUDIT.SOLR.MAX_FLUSH_INTERVAL_MS=1000
XAAUDIT.SOLR.SOLR_URL=http://localhost:6083/solr/ranger_audits

{% if enable_ranger_audit_log4j %}
# log4j audit
XAAUDIT.LOG4J.IS_ENABLED=true
XAAUDIT.LOG4J.DESTINATION=true
XAAUDIT.LOG4J.DESTINATION.LOGGER=xaaudit
{% endif %}

#
# SSL Client Certificate Information
#
Expand Down
13 changes: 13 additions & 0 deletions roles/hive/ranger/tasks/config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -33,6 +33,19 @@
line: 'ranger.plugin.hive.policy.rest.ssl.config.file {{ hive_s2_conf_dir }}/ranger-policymgr-ssl.xml \2'
backrefs: true

- name: Enable log4j audit in ranger-hive-audit.xml
ansible.builtin.blockinfile:
path: "{{ ranger_hive_install_dir }}/install/conf.templates/enable/ranger-hive-audit-changes.cfg"
marker: "# {mark} ANSIBLE MANAGED BLOCK : log4j audit logs"
insertbefore: "^AZURE.ACCOUNTNAME"
block: |
xasecure.audit.log4j.is.enabled %XAAUDIT.LOG4J.IS_ENABLED% mod create-if-not-exists
xasecure.audit.destination.log4j %XAAUDIT.LOG4J.DESTINATION% mod create-if-not-exists
xasecure.audit.destination.log4j.logger %XAAUDIT.LOG4J.DESTINATION.LOGGER% mod create-if-not-exists
when: enable_ranger_audit_log4j


- name: Run enable-hive-plugin.sh
ansible.builtin.shell: |
export JAVA_HOME={{ java_home }}
Expand Down
11 changes: 11 additions & 0 deletions roles/knox/common/templates/gateway-log4j.properties.j2
Original file line number Diff line number Diff line change
Expand Up @@ -104,3 +104,14 @@ log4j.appender.KNOXAGENT.File=${app.log.dir}/${ranger.knoxagent.log.file}
log4j.appender.KNOXAGENT.layout=org.apache.log4j.PatternLayout
log4j.appender.KNOXAGENT.layout.ConversionPattern=%d{ISO8601} %p %c{2}: %m%n %L
log4j.appender.KNOXAGENT.DatePattern=.yyyy-MM-dd


{% if enable_ranger_audit_log4j %}
ranger.logger=INFO,console,RANGERAUDIT
log4j.logger.xaaudit=${ranger.logger}
log4j.appender.RANGERAUDIT=org.apache.log4j.DailyRollingFileAppender
log4j.appender.RANGERAUDIT.File={{ knox_log_dir }}/{{ knox_ranger_audit_file }}
log4j.appender.RANGERAUDIT.layout=org.apache.log4j.PatternLayout
log4j.appender.RANGERAUDIT.layout.ConversionPattern={{ tdp_auditlog_layout_pattern }}
#log4j.appender.RANGERAUDIT.DatePattern=.yyyy-MM-dd
{% endif %}
7 changes: 7 additions & 0 deletions roles/knox/common/templates/install.properties.j2
Original file line number Diff line number Diff line change
Expand Up @@ -111,6 +111,13 @@ XAAUDIT.SOLR.MAX_QUEUE_SIZE=1
XAAUDIT.SOLR.MAX_FLUSH_INTERVAL_MS=1000
XAAUDIT.SOLR.SOLR_URL=http://localhost:6083/solr/ranger_audits

{% if enable_ranger_audit_log4j %}
# log4j audit
XAAUDIT.LOG4J.IS_ENABLED=true
XAAUDIT.LOG4J.DESTINATION=true
XAAUDIT.LOG4J.DESTINATION.LOGGER=xaaudit
{% endif %}

#
# SSL Client Certificate Information
#
Expand Down
12 changes: 12 additions & 0 deletions roles/knox/ranger/tasks/config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -34,6 +34,18 @@
line: 'ranger.plugin.knox.policy.rest.ssl.config.file /etc/knox/conf/ranger-policymgr-ssl.xml \2'
backrefs: true

- name: Enable log4j audit in ranger-hive-audit.xml
ansible.builtin.blockinfile:
path: "{{ ranger_knox_install_dir }}/install/conf.templates/enable/ranger-knox-audit-changes.cfg"
marker: "# {mark} ANSIBLE MANAGED BLOCK : log4j audit logs"
insertbefore: "^AZURE.ACCOUNTNAME"
block: |
xasecure.audit.log4j.is.enabled %XAAUDIT.LOG4J.IS_ENABLED% mod create-if-not-exists
xasecure.audit.destination.log4j %XAAUDIT.LOG4J.DESTINATION% mod create-if-not-exists
xasecure.audit.destination.log4j.logger %XAAUDIT.LOG4J.DESTINATION.LOGGER% mod create-if-not-exists
when: enable_ranger_audit_log4j

- name: Run enable-knox-plugin.sh
ansible.builtin.shell: |
export JAVA_HOME={{ java_home }}
Expand Down
7 changes: 7 additions & 0 deletions roles/yarn/common/templates/install_yarn.properties.j2
Original file line number Diff line number Diff line change
Expand Up @@ -109,6 +109,12 @@ XAAUDIT.SOLR.MAX_QUEUE_SIZE=1
XAAUDIT.SOLR.MAX_FLUSH_INTERVAL_MS=1000
XAAUDIT.SOLR.SOLR_URL=http://localhost:6083/solr/ranger_audits

{% if enable_ranger_audit_log4j %}
# log4j audit
XAAUDIT.LOG4J.IS_ENABLED=true
XAAUDIT.LOG4J.DESTINATION=true
XAAUDIT.LOG4J.DESTINATION.LOGGER=xaaudit
{% endif %}

#
# SSL Client Certificate Information
Expand Down Expand Up @@ -138,3 +144,4 @@ CUSTOM_USER=yarn
# CUSTOM_COMPONENT_GROUP=<custom-group>
# keep blank if component group is default
CUSTOM_GROUP=hadoop

18 changes: 18 additions & 0 deletions roles/yarn/ranger/tasks/config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -34,9 +34,27 @@
line: 'ranger.plugin.yarn.policy.rest.ssl.config.file /etc/hadoop/conf.rm/ranger-policymgr-ssl.xml \2'
backrefs: true

- name: Enable log4j audit in ranger-hive-audit.xml
ansible.builtin.blockinfile:
path: "{{ ranger_yarn_install_dir }}/install/conf.templates/enable/ranger-yarn-audit-changes.cfg"
marker: "# {mark} ANSIBLE MANAGED BLOCK : log4j audit logs"
insertbefore: "^AZURE.ACCOUNTNAME"
block: |
xasecure.audit.log4j.is.enabled %XAAUDIT.LOG4J.IS_ENABLED% mod create-if-not-exists
xasecure.audit.destination.log4j %XAAUDIT.LOG4J.DESTINATION% mod create-if-not-exists
xasecure.audit.destination.log4j.logger %XAAUDIT.LOG4J.DESTINATION.LOGGER% mod create-if-not-exists
when: enable_ranger_audit_log4j

- name: Run enable-yarn-plugin.sh
ansible.builtin.shell: |
export JAVA_HOME={{ java_home }}
./enable-yarn-plugin.sh
args:
chdir: "{{ ranger_yarn_install_dir }}"

- name: Reestablish symbolic link from etc/hadoop in {{ hadoop_install_dir }} to {{ hadoop_client_conf_dir }}
ansible.builtin.file:
src: "{{ hadoop_client_conf_dir }}"
dest: "{{ hadoop_install_dir }}/etc/hadoop"
state: link
2 changes: 2 additions & 0 deletions roles/yarn/resourcemanager/tasks/config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,8 @@
owner: root
group: root
mode: "644"
vars:
ranger_audit_file: "{{ yarn_log_dir }}/{{ hadoop_yarn_ranger_audit_file }}"


- name: Render core-site.xml
Expand Down
12 changes: 10 additions & 2 deletions tdp_vars_defaults/tdp-cluster/tdp-cluster.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@

# Directory where TDP component releases are located locally
binaries_local_dir: "{{ lookup('env', 'PWD') }}/files"
# Directory where TDP component releases are uploaded for each host
# Directory where TDP component releases are uploaded for each host
binaries_upload_dir: /tmp

# Name of the cluster. Used as HDFS nameservice and YARN cluster ID
Expand Down Expand Up @@ -164,10 +164,12 @@ exporter_hdfs_httpfs_http_port: 18122
#################################
# Service & Component logs dirs #
#################################
# format : log4j 1.x "%d{ISO8601}" is not fully compliant with ISO8601 standard
# format : log4j 1.x "%d{ISO8601}" is not fully compliant with ISO8601 standard
# (no 'T' as date/time separator) we specify it here.
tdp_date_iso8601_with_tz: "%d{yyyy-MM-dd'T'HH:mm:ss.SSSXXX}"
tdp_log_layout_pattern: '{{ tdp_date_iso8601_with_tz }} - %-5p [%t:%C{1}@%L] - %m%n'
enable_ranger_audit_log4j: true
tdp_auditlog_layout_pattern: '%m%n'

hadoop_log_dir: /var/log/hadoop

Expand All @@ -177,11 +179,13 @@ hadoop_hdfs_journalnode_log_file: "hdfs-journalnode_{{ ansible_fqdn }}.log"
hadoop_hdfs_zkfc_log_file: "hdfs-zkfc_{{ ansible_fqdn }}.log"
hadoop_hdfs_datanode_log_file: "hdfs-datanode_{{ ansible_fqdn }}.log"
hadoop_hdfs_httpfs_log_file: "hdfs-httpfs_{{ ansible_fqdn }}.log"
hadoop_hdfs_ranger_audit_file: "hdfs-rangeraudit_{{ ansible_fqdn }}.log"

yarn_log_dir: /var/log/yarn
hadoop_yarn_resourcemanager_log_file: "yarn-resourcemanager_{{ ansible_fqdn }}.log"
hadoop_yarn_nodemanager_log_file: "yarn-nodemanager_{{ ansible_fqdn }}.log"
hadoop_yarn_timelineserver_log_file: "yarn-timelineserver_{{ ansible_fqdn }}.log"
hadoop_yarn_ranger_audit_file: "yarn-rangeraudit_{{ ansible_fqdn }}.log"

mapred_log_dir: /var/log/mapred
hadoop_mapred_historyserver_log_file: "mapred-historyserver_{{ ansible_fqdn }}.log"
Expand All @@ -190,16 +194,20 @@ hbase_log_dir: /var/log/hbase
hbase_hm_log_file: "hbase-master_{{ ansible_fqdn }}.log"
hbase_hrs_log_file: "hbase-regionserver_{{ ansible_fqdn }}.log"
hbase_hr_log_file: "hbase-rest_{{ ansible_fqdn }}.log"
hbase_master_ranger_audit_file: "hbase-master-rangeraudit_{{ ansible_fqdn }}.log"
hbase_rs_ranger_audit_file: "hbase-region-server-rangeraudit_{{ ansible_fqdn }}.log"

phoenix_log_dir: /var/log/phoenix
phoenix_queryserver_log_file: "phoenix-queryserver_{{ ansible_fqdn }}.log"

hive_log_dir: /var/log/hive
hive_s2_log_file: "hive-hiveserver2_{{ ansible_fqdn }}.log"
hive_ms_log_file: "hive-metastore_{{ ansible_fqdn }}.log"
hive_ranger_audit_file: "hive-rangeraudit_{{ ansible_fqdn }}.log"

knox_log_dir: /var/log/knox
knox_gateway_log_file: "knox-gateway_{{ ansible_fqdn }}.log"
knox_ranger_audit_file: "knox-rangeraudit_{{ ansible_fqdn }}.log"

ranger_log_dir: /var/log/ranger
ranger_admin_log_file: "ranger-admin_{{ ansible_fqdn }}.log"
Expand Down

0 comments on commit dde4828

Please sign in to comment.