In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
This article mainly introduces "zookeeper's ACL list introduction". In daily operation, I believe many people have doubts about the introduction of zookeeper's ACL list. The editor consulted all kinds of materials and sorted out simple and easy-to-use methods of operation. I hope it will be helpful to answer the doubts of "zookeeper's ACL list introduction"! Next, please follow the editor to study!
Znode contains two parts: data and state, which contains ACL information
ACL data structure
Attributes:
Perms
Id (id,schema)
Built-in permissions, ACL list, id,schema
ACL create modify ACL verify ACL modify verify ACL request permission
The status information ACL list in znode is very similar to the permission control in UNIX, but the difference is that node permissions exist independently.
Node permissions have no recursive attribution relationship
ACL corresponds to a specific node and does not apply to its child nodes
ACL is made up of schema:expression,perms pairs.
ACL data structure, data dependency
The summary of Id corresponds as follows:
Schema
Id
Meaning
Remarks
Auth
"
Do not use any id to represent any confirmed user
Bring your own Id
World
Anyone
Fixed users, opening permissions for all Client sides
Bring your own Id
Super
"
Have super privileges and can do anything (cdrwa)
Bring your own Id
Ip
No fixed value, fixed format (ip expression)
IP authentication mode
Bring your own schema
Digest
No fixed value, fixed format (digest expression)
User name and password authentication, and then generate summary
Bring your own schema
Sasl
No fixed value, fixed format (sasl expression)
Sasl verification method, which I don't understand very well.
Bring your own schema
ACL creation and modification ACL verification verification of ACL creation and modification
Validate schemes and ids when create and setACL creation and modification are involved in the PrepRequestProcessor class
Think about:
The relationship between ACL and Id? Is the inclusion relationship, is the description of data permissions in acl
There are many types of permissions, how to manage and check?
At this point, the study of "introduction to the ACL list of zookeeper" is over. I hope to be able to solve your doubts. The collocation of theory and practice can better help you learn, go and try it! If you want to continue to learn more related knowledge, please continue to follow the website, the editor will continue to work hard to bring you more practical articles!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.