|
1 | 1 |
|
2 |
| -# Hadoop and Kerberos: The Madness beyond the Gate |
| 2 | +# Hadoop and Kerberos: The Madness Beyond the Gate |
3 | 3 |
|
4 | 4 |
|
5 | 5 | Authors:
|
@@ -27,12 +27,13 @@ And forever more, we shall fear those voices calling out to us in the night, the
|
27 | 27 | | Ancient, evil deities oblivious to humanity | Kerberos Domain Controller |
|
28 | 28 | | Books whose reading will drive the reader insane | IETF RFC 4120 |
|
29 | 29 | | Entities which are never spoken of aloud | UserGroupInformation |
|
| 30 | +| People driven insane by their knowledge | You | |
30 | 31 |
|
31 | 32 | This documents contains the notes from previous people who have delved too deep into the mysteries of Apache™ Hadoop® and Kerberos, who have read the forbidden source code, maybe who have even contributed to it. If you wish to preserve your innocence, to view the world as a place of happiness: stop now.
|
32 | 33 |
|
33 | 34 | ## Disclaimer
|
34 | 35 |
|
35 |
| -This document is a collection of notes based on the experience of the author. There are no guarantees that any of the information contained within was correct at the time of writing, let alone the time of reading. The author does not accept any responsibility for actions made on the basis of the information contained herein, be it correct or or incorrect. |
| 36 | +This document is a collection of notes based on the experience of the author. There are no guarantees that any of the information contained within was correct at the time of writing, let alone the time of reading. The author does not accept any responsibility for actions made on the basis of the information contained herein, be it correct or incorrect. |
36 | 37 |
|
37 | 38 | The reader of this document is likely to leave with some basic realisation that Kerberos, while important, is an uncontrolled force of suffering and devastation. The author does not accept any responsibility for the consequences of such knowledge.
|
38 | 39 |
|
@@ -111,7 +112,7 @@ security: the authentication and authentication comes first. Encryption adds a n
|
111 | 112 | secure key management, as well as the inevitable performance overhead. It also complicates
|
112 | 113 | some aspects of HDFS use.
|
113 | 114 |
|
114 |
| -Data stored in HDFS by applications is implicitly encrypted. However applications like |
| 115 | +Data stored in HDFS by applications is implicitly encrypted. However, applications like |
115 | 116 | Hive have had to be reworked to ensure
|
116 | 117 | that when making queries across encrypted datasets, temporary data files are also stored
|
117 | 118 | in the same encryption zone, to stop the intermediate data being stored unencrypted.
|
|
0 commit comments