Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How is the ACL of zookeeper formed?

2025-03-30 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >

Share

Shulou(Shulou.com)06/01 Report--

This article mainly introduces the zookeeper ACL how to constitute the relevant knowledge, the content is detailed and easy to understand, the operation is simple and fast, has a certain reference value, I believe you will gain after reading this zookeeper ACL how to constitute the article, let's take a look at it.

Zookeeper's ACL (Access Control List, access control list) permissions are particularly important in a production environment. ACL permissions can be set for nodes, such as read and write permissions, to ensure data security. Permissions can specify different scope of permissions and roles.

ACL command line getAcl command: gets the acl permission information for a node. SetAcl command: sets the acl permission information for a node. Addauth command: enter the authentication and authorization information, enter the plaintext password when registering, and save it in encrypted form. ACL composition

The acl of zookeeper forms the permission list through [scheme?permissions].

Scheme: represents some kind of permission mechanism adopted, including world, auth, digest, ip, super. Id: represents the user who is allowed to access. Permissions: permission combination string, consisting of cdrwa, where each letter represents support for different permissions, create permission create (c), delete permission delete (d), read permission read (r), write permission write (w), administrative permission admin (a). World instance

Check the default node permissions, and then update the node permissions permission section to crwa, resulting in a failure to delete the node. Where world stands for open permissions.

$getAcl / runoob/child$ setAcl / runoob/child world:anyone:crwa$ delete / runoob/childauth instance

Auth is used to grant permissions. Note that you need to create a user first.

$setAcl / runoob/child auth:user1:123456:cdrwa$ addauth digest user1:123456$ setAcl / runoob/child auth:user1:123456:cdrwa$ getAcl / runoob/childdigest instance

Log out of the current user and reconnect to the terminal. Digest can be used for account password login and verification.

$ls / runoob$ create / runoob/child01 runoob$ getAcl / runoob/child01 $setAcl / runoob/child01 digest:user1:HYGa7IZRm2PUBFiFFu8xY2pPP/s=:cdra$ getAcl / runoob/child01 $addauth digest user1:123456$ getAcl / runoob/child01

Tip: the encrypted password was created in the previous step.

IP instance

Restrict access to the IP address. After setting the permission to the IP address 192.168.3.7, IP has no access rights at 192.168.3.38.

This is the end of the article $create / runoob/ip 0$ getAcl / runoob/ip$ setAcl / runoob/ip ip:192.168.3.7:cdrwa$ get / runoob/ip on "how to constitute the ACL of zookeeper". Thank you for reading! I believe you all have a certain understanding of the knowledge of "how to constitute the ACL of zookeeper". If you want to learn more knowledge, you are welcome to follow the industry information channel.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Development

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report