In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-30 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >
Share
Shulou(Shulou.com)06/01 Report--
This article mainly introduces the zookeeper ACL how to constitute the relevant knowledge, the content is detailed and easy to understand, the operation is simple and fast, has a certain reference value, I believe you will gain after reading this zookeeper ACL how to constitute the article, let's take a look at it.
Zookeeper's ACL (Access Control List, access control list) permissions are particularly important in a production environment. ACL permissions can be set for nodes, such as read and write permissions, to ensure data security. Permissions can specify different scope of permissions and roles.
ACL command line getAcl command: gets the acl permission information for a node. SetAcl command: sets the acl permission information for a node. Addauth command: enter the authentication and authorization information, enter the plaintext password when registering, and save it in encrypted form. ACL composition
The acl of zookeeper forms the permission list through [scheme?permissions].
Scheme: represents some kind of permission mechanism adopted, including world, auth, digest, ip, super. Id: represents the user who is allowed to access. Permissions: permission combination string, consisting of cdrwa, where each letter represents support for different permissions, create permission create (c), delete permission delete (d), read permission read (r), write permission write (w), administrative permission admin (a). World instance
Check the default node permissions, and then update the node permissions permission section to crwa, resulting in a failure to delete the node. Where world stands for open permissions.
$getAcl / runoob/child$ setAcl / runoob/child world:anyone:crwa$ delete / runoob/childauth instance
Auth is used to grant permissions. Note that you need to create a user first.
$setAcl / runoob/child auth:user1:123456:cdrwa$ addauth digest user1:123456$ setAcl / runoob/child auth:user1:123456:cdrwa$ getAcl / runoob/childdigest instance
Log out of the current user and reconnect to the terminal. Digest can be used for account password login and verification.
$ls / runoob$ create / runoob/child01 runoob$ getAcl / runoob/child01 $setAcl / runoob/child01 digest:user1:HYGa7IZRm2PUBFiFFu8xY2pPP/s=:cdra$ getAcl / runoob/child01 $addauth digest user1:123456$ getAcl / runoob/child01
Tip: the encrypted password was created in the previous step.
IP instance
Restrict access to the IP address. After setting the permission to the IP address 192.168.3.7, IP has no access rights at 192.168.3.38.
This is the end of the article $create / runoob/ip 0$ getAcl / runoob/ip$ setAcl / runoob/ip ip:192.168.3.7:cdrwa$ get / runoob/ip on "how to constitute the ACL of zookeeper". Thank you for reading! I believe you all have a certain understanding of the knowledge of "how to constitute the ACL of zookeeper". If you want to learn more knowledge, you are welcome to follow the industry information channel.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.