Skip to Main Content
Hadoop Security
book

Hadoop Security

by Ben Spivey, Joey Echeverria
June 2015
Intermediate to advanced content levelIntermediate to advanced
340 pages
8h 43m
English
O'Reilly Media, Inc.
Content preview from Hadoop Security

Chapter 13. Case Studies

In this chapter, we present two case studies that cover many of the security topics in the book. First, we’ll take a look at how Sentry can be used to control SQL access to data in a multitenancy environment. This will serve as a good warmup before we dive into a more detailed case study that shows a custom HBase application in action with various security features in place.

Case Study: Hadoop Data Warehouse

One of the key benefits of big data and Hadoop is the notion that many different and disparate datasets can be brought together to solve unique problems. What comes along with this are different types of users that span multiple lines of business. In this case study, we will take a look at how Sentry can be used to provide strong authorization of data in Hive and Impala in an environment consisting of multiple lines of business, multiple data owners, and different analysts.

First, let’s list the assumptions we are making for this case study:

  • The environment consists of three lines of business, which we will call lob1, lob2, and lob3

  • Each line of business has analysts and administrators

    • The analysts are defined by the groups lob1grp, lob2grp, and lob3grp

    • The administrators are defined by the groups lob1adm, lob2adm, and lob3adm

    • Administrators are also in the analysts groups

  • Each line of business needs to have its own sandbox area in HDFS to do ad hoc analysis, as well as to upload self-service data sources

  • Each line of business has ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Introduction to Hadoop Security

Introduction to Hadoop Security

Jeff Bean
Securing Hadoop

Securing Hadoop

Sudheesh Narayan

Publisher Resources

ISBN: 9781491900970Errata Page