Home | About | Sematext search-lucene.com search-hadoop.com
NEW: Monitor These Apps!
elasticsearch, apache solr, apache hbase, hadoop, redis, casssandra, amazon cloudwatch, mysql, memcached, apache kafka, apache zookeeper, apache storm, ubuntu, centOS, red hat, debian, puppet labs, java, senseiDB
 Search Hadoop and all its subprojects:

Switch to Threaded View
MapReduce >> mail # user >> Re: How does Kerberos work with Hadoop ?


Copy link to this message
-
Re: How does Kerberos work with Hadoop ?
Thanks Vinod for the wonderful pdf.
It explains how the security can be achieved via Kerberos.
Any other way to implement security in hadoop (without using kerberos)?
On Fri, Feb 22, 2013 at 2:39 AM, Vinod Kumar Vavilapalli <
[EMAIL PROTECTED]> wrote:

>
> You should read the hadoop security design doc which you can find at
> https://issues.apache.org/jira/browse/HADOOP-4487
>
> HTH,
> +Vinod Kumar Vavilapalli
> Hortonworks Inc.
> http://hortonworks.com/
>
> On Feb 21, 2013, at 11:02 AM, rohit sarewar wrote:
>
>
> I am looking for an explanation of Kerberos working with Hadoop cluster .
> I need to know how KDC is used by hdfs and mapred.
>
> (Something like this :- An example of kerberos with mail server ,
> https://www.youtube.com/watch?v=KD2Q-2ToloE)
>
> How the name node and data node are prone to attacks ?
> What all types of attack can occur ?
>
> Please help!
>
>
>
NEW: Monitor These Apps!
elasticsearch, apache solr, apache hbase, hadoop, redis, casssandra, amazon cloudwatch, mysql, memcached, apache kafka, apache zookeeper, apache storm, ubuntu, centOS, red hat, debian, puppet labs, java, senseiDB