Security (Authorization System)

Only the administrator account in the security center has permission to operate, which includes queue management, tenant management, user management, alarm group management, worker group management, token management and other functions. In the user management module, you can authorize resources, data sources, projects, etc.

Administrator login, default username/password: admin/dolphinscheduler123

Create Queue

  • The queue is used when executing programs such as spark and mapreduce, and the “queue” parameter needs to be used.
  • The administrator enters the Security Center->Queue Management page and clicks the “Create Queue” button to create a new queue.

create-queue

Add Tenant

  • The tenant corresponds to the Linux user, which is used by the worker to submit the job. If linux does not have this user, it will cause the task to fail. You can automatically create a linux user when the user does not exist by modifying the parameters in the worker.properties configuration file. The parameter will require that the worker can run the command worker.tenant.auto.create = true; worker.tenant.auto.create = truesudo
  • Tenant Code: The tenant code is the user on Linux, unique and cannot be repeated
  • The administrator enters the Security Center->Tenant Management page, and clicks the Create Tenant button to create a tenant.

create-tenant

Create Normal User

Users are divided into administrator users and ordinary users

  • Administrators have permissions such as authorization and user management, but do not have permissions to create projects and actions defined by workflows.
  • Ordinary users can create projects and create, edit, and execute workflow definitions.
  • Note: If the user switches tenants, all resources under the tenant to which the user belongs will be copied to the new tenant that is switched.

Go to the Security Center -> User Management page and click the Create User button to create a user, administrator only.

create-user

Edit user information

The administrator enters the Security Center->User Management page and clicks the Edit button to edit user information.

After logging in as an ordinary user, click the user information in the drop-down box of the user name to enter the user information page, and click the Edit button to edit the user information.

Modify user password

The administrator enters the Security Center -> User Management page and clicks the Edit button. When editing user information, enter the new password to modify the user password.

After logging in as an ordinary user, click the user information in the user name drop-down box to enter the password modification page, enter the password and confirm the password and click the Edit button, then the password modification is successful.

Create Alarm Group

The alarm group is a parameter set at startup. After the process ends, the status of the process and other information will be sent to the alarm group by email.

The administrator enters the Security Center -> Alarm Group Management page and clicks the Create Alarm Group button to create an alarm group.

create-alarmInstance

Token Management

Since the back-end interface has a login check, token management provides a way to perform various operations on the system by calling the interface.

The administrator enters the Security Center -> Token Management page, clicks the Create Token button, selects the expiration time and user, clicks the Generate Token button, and clicks the Submit button, then create the selected user’s token successfully.

create-token

After a normal user logs in, click the user information in the username drop-down box, enter the token management page, select the expiration time, click the Generate Token button, and click the Submit button, then the user creates a token successfully.

Example of calling:

  1. /**
  2. * test token
  3. */
  4. public void doPOSTParam()throws Exception{
  5. // create HttpClient
  6. CloseableHttpClient httpclient = HttpClients.createDefault();
  7. // create http post request
  8. HttpPost httpPost = new HttpPost("http://127.0.0.1:12345/escheduler/projects/create");
  9. httpPost.setHeader("token", "123");
  10. // set parameters
  11. List<NameValuePair> parameters = new ArrayList<NameValuePair>();
  12. parameters.add(new BasicNameValuePair("projectName", "qzw"));
  13. parameters.add(new BasicNameValuePair("desc", "qzw"));
  14. UrlEncodedFormEntity formEntity = new UrlEncodedFormEntity(parameters);
  15. httpPost.setEntity(formEntity);
  16. CloseableHttpResponse response = null;
  17. try {
  18. // execute
  19. response = httpclient.execute(httpPost);
  20. // response status code 200
  21. if (response.getStatusLine().getStatusCode() == 200) {
  22. String content = EntityUtils.toString(response.getEntity(), "UTF-8");
  23. System.out.println(content);
  24. }
  25. } finally {
  26. if (response != null) {
  27. response.close();
  28. }
  29. httpclient.close();
  30. }
  31. }

Granted Permissions

  • Granted permissions include project permissions, resource permissions, data source permissions, and UDF function permissions.
  • Administrators can authorize projects, resources, data sources, and UDF functions that ordinary users do not create. Because the authorization methods of projects, resources, data sources and UDF functions are all the same, the project authorization is used as an example to introduce.
  • Note: For projects created by the user, the user has all permissions. The item list and the selected items list are not displayed.
  • The administrator enters the Security Center -> User Management page, and clicks the “Authorize” button of the user to be authorized, as shown in the following figure:

Security - 图6

  • Select the project to authorize the project.

Security - 图7

  • Resources, data sources, and UDF function authorization are the same as project authorization.

Worker Grouping

Each worker node will belong to its own worker group, and the default group is “default”.

When the task is executed, the task can be assigned to the specified worker group, and finally the worker node in the group will execute the task.

Add or update worker group

  • Open the conf/worker.properties configuration file on the worker node where you want to configure the groups and modify the worker.groups parameter.
  • The worker.groups parameter is followed by the name of the group corresponding to the worker node, which is default.
  • If the worker node corresponds to multiple groups, separate them with commas. Example:
  1. worker.groups=default,test
  • You can also change the worker group for the worker during execution, and if the modification is successful, the worker will use the new group and ignore the configuration in worker.properties. The step to modify work group as below: Security Center -> Worker Group Management -> click 'New Worker Group' -> click 'New Worker Group' -> enter 'Group Name' -> Select Exists Worker -> Click Submit.

Environmental Management

  • Configure the worker running environment online, a worker can specify multiple environments, each environment is equivalent to the dolphinscheduler_env.sh file.
  • The default environment is the dolphinscheduler_env.sh file.
  • When the task is executed, the task can be assigned to the specified worker group, and the corresponding environment can be selected according to the worker group, and finally the worker node in the group executes the environment and then executes the task.

Add or update environment

The environment configuration is equivalent to the configuration in the dolphinscheduler_env.sh file.

create-environment

Usage environment

Create a task node in the workflow definition, select the worker group and the environment corresponding to the worker group. When executing the task, the Worker will execute the environment first before executing the task.

use-environment

NOTE: Please make sure you have associated the Environments with your worker groups if you can not select the Environment Name in workflow definition page or when triggering workflows.

Cluster Management

Add or update cluster

  • Each process can be related to zero or several clusters to support multiple environment, now just support k8s.

Usage cluster

  • After creation and authorization, k8s namespaces and processes will associate clusters. Each cluster will have separate workflows and task instances running independently.

create-cluster

Namespace Management

Add or update k8s cluster

  • First enter the configuration of the k8s cluster connection into the table t_ds_k8s in the database, which will be configured later by the web page.

Add or update namespace

  • After creation and authorization, you can select it from the namespace drop down list when edit k8s task, If the k8s cluster name is ds_null_k8s means test mode which will not operate the cluster actually.

create-environment