hadoop2.2.0 core-site.xml--security properties
生活随笔
收集整理的這篇文章主要介紹了
hadoop2.2.0 core-site.xml--security properties
小編覺得挺不錯的,現在分享給大家,幫大家做個參考.
<!--- security properties -->
<property><name>hadoop.security.authorization</name><value>false</value><description>Is service-level authorization enabled?</description> </property>注釋:
<property><name>hadoop.security.authentication</name><value>simple</value><description>Possible values are simple (no authentication), and kerberos</description> </property>注釋:
<property><name>hadoop.security.group.mapping</name><value>org.apache.hadoop.security.ShellBasedUnixGroupsMapping</value><description>Class for user to group mapping (get groups for a given user) for ACL</description> </property>
注釋:
注釋:
?
<property><name>hadoop.security.service.user.name.key</name><value></value><description>For those cases where the same RPC protocol is implemented by multipleservers, this configuration is required for specifying the principalname to use for the service when the client wishes to make an RPC call.</description> </property>注釋:
<property><name>hadoop.rpc.protection</name><value>authentication</value><description>This field sets the quality of protection for secured sasl connections. Possible values are authentication, integrity and privacy.authentication means authentication only and no integrity or privacy; integrity implies authentication and integrity are enabled; and privacy implies all of authentication, integrity and privacy are enabled.</description> </property>注釋:
<property><name>hadoop.work.around.non.threadsafe.getpwuid</name><value>false</value><description>Some operating systems or authentication modules are known tohave broken implementations of getpwuid_r and getpwgid_r, such that thesecalls are not thread-safe. Symptoms of this problem include JVM crasheswith a stack trace inside these functions. If your system exhibits thisissue, enable this configuration parameter to include a lock around thecalls as a workaround.An incomplete list of some systems known to have this issue is availableat http://wiki.apache.org/hadoop/KnownBrokenPwuidImplementations</description> </property>注釋:
<property><name>hadoop.kerberos.kinit.command</name><value>kinit</value><description>Used to periodically renew Kerberos credentials when providedto Hadoop. The default setting assumes that kinit is in the PATH of usersrunning the Hadoop client. Change this to the absolute path to kinit if thisis not the case.</description> </property>注釋:
?
?
轉載于:https://www.cnblogs.com/weian404/p/3584927.html
總結
以上是生活随笔為你收集整理的hadoop2.2.0 core-site.xml--security properties的全部內容,希望文章能夠幫你解決所遇到的問題。
- 上一篇: flex 有关数据类型强制转
- 下一篇: How to connect oracl