Skip to content

Commit e232e4d

Browse files
Update ranger-policies-for-spark.md
Updated for acrolix score
1 parent 4a81c7d commit e232e4d

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/hdinsight/spark/ranger-policies-for-spark.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ In this article, you learn how to:
3232

3333
## Create domain users
3434

35-
For information on how to create **sparkuser** domain users, see [Create an HDInsight cluster with ESP](../domain-joined/apache-domain-joined-configure-using-azure-adds.md#create-an-hdinsight-cluster-with-esp). In a production scenario, domain users come from your Microsoft Entra tenant.
35+
For information on how to create `sparkuser` domain users, see [Create an HDInsight cluster with ESP](../domain-joined/apache-domain-joined-configure-using-azure-adds.md#create-an-hdinsight-cluster-with-esp). In a production scenario, domain users come from your Microsoft Entra tenant.
3636

3737
## Create a Ranger policy
3838

@@ -61,7 +61,7 @@ In this section, you create two Ranger policies:
6161
| database | default |
6262
| table | hivesampletable |
6363
| column | * |
64-
| Select User | sparkuser |
64+
| Select User | `sparkuser` |
6565
| Permissions | select |
6666

6767
:::image type="content" source="./media/ranger-policies-for-spark/sample-policy-details.png" alt-text="Screenshot that shows sample details for an access policy." lightbox="./media/ranger-policies-for-spark/sample-policy-details.png":::
@@ -101,7 +101,7 @@ The following example shows how to create a policy to mask a column:
101101
|Hive Database|default|
102102
|Hive Table| hivesampletable|
103103
|Hive Column|devicemake|
104-
|Select User|sparkuser|
104+
|Select User|`sparkuser`|
105105
|Access Types|select|
106106
|Select Masking Option|Hash|
107107

@@ -145,7 +145,7 @@ Consider these points:
145145
In such cases, we recommend that you either:
146146

147147
- Use the Hive catalog for both Hive and Spark.
148-
- Maintain different database, table, and column names for both Hive and Spark catalogs so that the policies are not applied to databases across catalogs.
148+
- Maintain different database, table, and column names for both Hive and Spark catalogs so that the policies aren't applied to databases across catalogs.
149149

150150
- If you use the Hive catalog for both Hive and Spark, consider the following example.
151151

@@ -194,7 +194,7 @@ Let's say that you have the policies defined in the Ranger repo already under th
194194

195195
1. For **oldclustername_hive** service, add **rangersparklookup** user in the **policy.download.auth.users** and **tag.download.auth.users** list and click save.
196196

197-
:::image type="content" source="./media/ranger-policies-for-spark/add-new-user-rangerlookup.png" alt-text="Screenshot that shows edit option for ranger service." lightbox="./media/ranger-policies-for-spark/add-new-user-rangerlookup.png":::
197+
:::image type="content" source="./media/ranger-policies-for-spark/add-new-user-rangerlookup.png" alt-text="Screenshot that shows how to add user in Ranger service." lightbox="./media/ranger-policies-for-spark/add-new-user-rangerlookup.png":::
198198

199199
The policies are applied on databases in the Spark catalog. If you want to access the databases in the Hive catalog:
200200

@@ -206,4 +206,4 @@ The policies are applied on databases in the Spark catalog. If you want to acces
206206
## Known issues
207207

208208
- Apache Ranger integration with Spark SQL doesn't work if the Ranger admin is down.
209-
- In Ranger audit logs, when you hover over the **Resource** column, it doesn't show the entire query that you ran.
209+
- In Ranger audit logs, when you hover over the **Resource** column, it can't show the entire query that you ran.

0 commit comments

Comments
 (0)