Do not allow direct access to the hadoop cluster from untrusted machines. Also, until further security measures are implemented, hadoop trusts the origin machine and library to identify the user correctly. Soon there will be a better level of authentication, but for now that is it.
This works out fine in almost all hadoop installations. Hadoop was intended to be a batch system that runs large-scale back end processes in a trusted environment and it fits that role very well. It is slowly being outfitted so as to be more suitable for exposure to the real world, but it is a slow process. On Wed, Jul 22, 2009 at 9:49 PM, Palleti, Pallavi < [email protected]> wrote: > Could someone explain me if there is a way to avoid these kind > of scenarios? Otherwise, what should be the best practice? > -- Ted Dunning, CTO DeepDyve
