Kerberos & Hadoop: Securing Big Data (part II)

Celeste Duran Big Data Architecture, Technology Leave a Comment

In this second part of the Kerberos series, we’re going to review how to configure our system to get a properly secured environment. The post will provide some important tips about the configuration, but it isn’t a typical command guide. Also, if your are starting with the basics, in our previous post Kerberos & Hadoop: Securing Big Data (part I) we …

Kerberos & Hadoop: Securing Big Data (part I)

Celeste Duran Big Data Architecture, Technology 1 Comment

When I began to use Hadoop with Kerberos I felt as I was in the middle of the ocean. I found a lot of information about Kerberos technology but it was very difficult for me to find something about how to use it on Hadoop, why to use it and how to configure it for working with Hadoop. This trilogy of posts is going to …