Summary

In this chapter, we have reviewed the authentication and authorization principles used in Hadoop. We have discussed the HDFS permissions model, as well as MapReduce access control lists. The default Hadoop security policy is prone to various attacks. We have reviewed how to configure Kerberos support in Hadoop to comply with enterprise-level security requirements.

In the next chapter, we will focus on monitoring Hadoop cluster's health and performance.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset