Page History
...
- Create the RED Scheduler user role and provide grants.
We can potentially grant "INSERT, UPDATE, DELETE" to only the ws_wrk tables here, but we still need select on the rest.Code Block language sql CREATE ROLE redscheduler_role NOLOGIN ADMIN postgres; GRANT USAGE ON SCHEMA red TO redscheduler_role; GRANT EXECUTE ON ALL FUNCTIONS IN SCHEMA red TO redscheduler_role; GRANT EXECUTE ON ALL PROCEDURES IN SCHEMA red TO redscheduler_role;
Grant redscheduler_role select access to the redadmin schemaCode Block language sql GRANT SELECT, INSERT, UPDATE, DELETE ON ALL TABLES IN SCHEMA red TO redscheduler_role;
Code Block language sql GRANT USAGE ON SCHEMA redadmin TO redscheduler_role; GRANT SELECT ON ALL TABLES IN SCHEMA redadmin TO redscheduler_role;
- Create the RED scheduler user and grant the RED Scheduler role
Code Block language sql CREATE USER redscheduler_user WITH PASSWORD 'redscheduler_pass'; GRANT redscheduler_role to redscheduler_user;
- [OPTIONALLY] Optionally, create the RED Scheduler Profile Role and User, or just use the redadmin_user for Profile maintenance
RED Grant 'red' schema permissionsCode Block language sql CREATE ROLE redschedulerprofile_role NOLOGIN ADMIN postgres;
-- You must run these GRANT's after connecting to the repo database, in psql run: '\c redrepo_db' to connect to the repo db
GRANT USAGE ON SCHEMA red TO redschedulerprofile_role;
GRANT SELECT ON ALL TABLES IN SCHEMA red TO redschedulerprofile_role;
-- RED 'redadmin' schema permissions
GRANT USAGE ON SCHEMA redadmin TO redschedulerprofile_role;
GRANT SELECT, INSERT, UPDATE, DELETE ON ALL TABLES IN SCHEMA redadmin TO redschedulerprofile_role;
-- Create a RED profile admin user and grant the user role
CREATE USER redschedulerprofile_user WITH PASSWORD 'red_pass';
GRANT redschedulerprofile_role to redschedulerprofile_user;.Code Block language sql
...
...
GRANT
...
...
USAGE
...
...
ON
...
SCHEMA red
...
TO
...
redschedulerprofile_role
...
;
...
GRANT
...
...
SELECT ON ALL TABLES IN SCHEMA red TO redschedulerprofile_role;
...
Grant 'redadmin'
...
- schema
...
- permissions
Code Block language sql GRANT USAGE ON SCHEMA redadmin TO redschedulerprofile_role; GRANT SELECT, INSERT, UPDATE, DELETE ON ALL TABLES IN SCHEMA redadmin TO redschedulerprofile_role;
...
Create a RED profile admin user and grant the user roleCode Block language sql CREATE USER redschedulerprofile_user WITH PASSWORD 'red_pass'; GRANT redschedulerprofile_role to redschedulerprofile_user;
...
Create
...
an Azkaban User role and user in PostgreSQL
...
language | sql |
---|---|
title | Create Azkaban Role and User |
collapse | true |
...
This section assumes you have already created the Azkaban Metadata using the admin user.
...
- Create the Azkaban metadata user role and provide grants to the Azkaban metadata objects in schema 'white'
Code Block language sql
CREATE ROLE azkabanmeta_role NOLOGIN ADMIN postgres;
...
GRANT USAGE ON SCHEMA white TO azkabanmeta_role; GRANT USAGE ON ALL SEQUENCES IN SCHEMA white TO azkabanmeta_role; GRANT EXECUTE ON ALL FUNCTIONS IN SCHEMA white TO azkabanmeta_role; GRANT EXECUTE ON ALL PROCEDURES IN SCHEMA white TO azkabanmeta_role; GRANT SELECT, INSERT, UPDATE, DELETE ON ALL TABLES IN SCHEMA white TO azkabanmeta_role;
...
- Create an Azkaban meta user and grant the user role
Code Block language sql CREATE USER azkabanmeta_user
Examples
...
language | sql |
---|---|
title | Full Metadata User Setup Example |
collapse | true |
...
WITH PASSWORD 'azkabanmeta_pass'; GRANT azkabanmeta_role to azkabanmeta_user;
...
Adding Azkaban Users
If you require additional users for the Azkaban dashboard or API, other than the default users, you can add them following this process:
...
Code Block |
---|
<?xml version="1.0" encoding="UTF-8" standalone="no"?> <azkaban-users> <role name="admin" permissions="ADMIN"/> <role name="read" permissions="READ"/> <role name="executor" permissions="EXECUTE"/> <user username="admin" password="admin" roles="admin"/> <user username="readonly" password="readonly" roles="read"/> <user username="executor" password="executor" roles="executor,read"/> </azkaban-users><azkaban-users/> |
Note | ||
---|---|---|
| ||
When entering the passwords they must follow the same password encryption settings configured on Azkaban, for more information refer to the Password Encryption in Azkaban section in RED Scheduler Configuration. |
The possible role permissions are the following:
...