O'Reilly logo

Securing Hadoop by Sudheesh Narayanan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Accessing a secured Hadoop cluster from an enterprise network

Typical deployment architecture of a secured Hadoop cluster in an enterprise context is shown in the following diagram:

Accessing a secured Hadoop cluster from an enterprise network

The Corporate Network is firewalled with the Hadoop cluster and connectivity is only provided through the EdgeNodes (also also known as Gateway Servers). The Gateway Server allows an entry point for external applications, tools, and users to the secured Hadoop cluster. It is deployed between the Hadoop cluster and the corporate network. As all users log in to this machine and the credentials for the user defined in this machine are used while accessing the Hadoop ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required