Hadoop Security Basics (In Under 5 Minutes)

Data Basics Claire Carroll

Between growing data and analytics teams, more collaborative projects, and GDPR, security and governance are becoming bigger issues. As organizations' analytical maturity improves, it's increasingly critical that business and technical users alike understand data best practices.

hadoop architecture basics

Who is allowed to use what data? And what are they allowed to do with it? Big data brings Hadoop clusters, which use Kerberos and ACLs and LDAPs, all to manage rules and access rights. But what are those exactly, and how do they work?

When working in data and analytics, communicating with IT professionals who use technical vocabulary is commonplace. What is a yarn, and what is a metastore? What is the difference between Sentry and Ranger? (Hint: not much.) What does Apache Knox do? What do we mean by impersonation? And what do Hive, Pig, Impala, Tez, Spark, and MapReduce all have in common?

We've created a glossary with some key terms to think about when discussing Hadoop security.

Hadoop definitions.png


Go Further:
Data Architecture Crash Course

Hadoop is not the only distributed architecture, and despite it's popularity it isn't always the right solution for an organization's data needs. Check out our new guidebook on Data Architecture Basics to learn more about how to back data initiatives securely.

Let's go >


You May Also Like

Meet Cyprien, Dataiku’s Youngest Certified User

Read More

5 Pieces of Good News for Data Analysts in 2020

Read More

The Value of Open Source to the Data Community

Read More

3 Trends in Data Analytics that We'll See More of in 2020

Read More