{"id":5510,"date":"2023-09-15T21:37:45","date_gmt":"2023-09-15T13:37:45","guid":{"rendered":"https:\/\/ixyzero.com\/blog\/?p=5510"},"modified":"2023-09-15T21:37:45","modified_gmt":"2023-09-15T13:37:45","slug":"hadoop%e5%ae%89%e5%85%a8%e5%ad%a6%e4%b9%a0","status":"publish","type":"post","link":"https:\/\/ixyzero.com\/blog\/archives\/5510.html","title":{"rendered":"Hadoop\u5b89\u5168\u5b66\u4e60"},"content":{"rendered":"\n<p>=Start=<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u7f18\u7531\uff1a<\/h4>\n\n\n\n<p>\u8fd1\u671f\u5728\u5185\u90e8\u7ea2\u84dd\u5bf9\u6297\u4e2d\u51fa\u73b0\u4e86\u548cHDFS\u5b89\u5168\u6709\u5173\u7684case\uff0c\u6211\u4e2a\u4eba\u5bf9\u8fd9\u5757\u4e5f\u6bd4\u8f83\u611f\u5174\u8da3\uff0c\u4e0d\u8fc7\u56e0\u4e3a\u4e4b\u524d\u5bf9Hadoop\u5b89\u5168\u8fd9\u5757\u4e86\u89e3\u7684\u4e0d\u591a\uff0c\u6240\u4ee5\u8fd1\u671f\u4e5f\u5728\u5404\u79cd\u67e5\u8d44\u6599\u5b66\u4e60\uff0c\u5feb\u901f\u586b\u8865\u8fd9\u5757\u7684\u77e5\u8bc6\u7f3a\u53e3\uff0c\u65b9\u4fbf\u540e\u9762\u6709\u9700\u8981\u7684\u65f6\u5019\u80fd\u7528\u5230\u3002<\/p>\n\n\n\n<p>\u53e6\u5916\u5c31\u662f\u4e0d\u77e5\u9053\u4ec0\u4e48\u539f\u56e0\uff0c\u73b0\u5728\u641c\u7d22HDFS\u67b6\u6784\u548c\u539f\u7406\u80fd\u641c\u5230\u7684\u6587\u7ae0\u975e\u5e38\u591a\uff0c\u4f46\u662f\u641c\u7d22HDFS\u5b89\u5168\u5c31\u5f88\u5c11\u4e86\uff0c\u641c\u7d22Hadoop\u5b89\u5168\uff0c\u80fd\u591a\u641c\u51fa\u6765\u4e00\u4e9b\uff0c\u4f46\u5728\u7ffb\u9605\u4e86\u5f88\u591a\u6587\u7ae0\u4e4b\u540e\uff0c\u53d1\u73b0\u8fd8\u662f\u4ee5\u524d\u9886\u5bfc\u548c\u540c\u4e8b\u572818\u5e74\u5199\u76842\u7bc7\u6587\u7ae0\u4f1a\u6bd4\u8f83\u7cfb\u7edf\u548c\u5168\u9762\uff08\u4f46\u65f6\u95f4\u4e45\u4e86\uff0c\u968f\u7740HDFS\u7248\u672c\u7684\u66f4\u65b0\u548cHadoop\u751f\u6001\u7684\u53d1\u5c55\u548c\u53d8\u5316\uff0c\u6709\u4e9b\u5185\u5bb9\u4e5f\u6709\u70b9\u8fc7\u65f6\u4e86\uff0c\u4e0d\u8fc7\u4e00\u4e9b\u5e95\u5c42\u7684\u539f\u7406\u548c\u903b\u8f91\u8fd8\u57fa\u672c\u4e00\u6837\uff09\u3002<strong>\u53ef\u80fd\u548c\u5927\u90e8\u5206\u4f01\u4e1a\u7684Hadoop\u4e3b\u8981\u7528\u5728\u516c\u53f8\u5185\u90e8\uff0c\u901a\u8fc7\u7f51\u7edc\u9694\u79bb\u505a\u4e86\u4fdd\u62a4\uff08\u5bf9\u4e8e\u90a3\u79cd\u8fde\u7f51\u7edc\u9694\u79bb\u90fd\u4e0d\u505a\u7684\u8fd9\u91cc\u4e0d\u505a\u8bc4\u4ef7\uff0c\u53ea\u80fd\u662f\u795d\u5979\u4eec\u597d\u8fd0\u4e86\uff09\uff0c\u5982\u679c\u51fa\u6570\u636e\u5b89\u5168\u95ee\u9898\u5927\u6982\u7387\u662f\uff08\u719f\u6089\u5927\u6570\u636e\u5e73\u53f0\u8fd9\u4e00\u5957\u7684\uff09\u5185\u90e8\u4eba\u5458\u6240\u4e3a\uff0c\u8fd9\u79cdcase\u7206\u51fa\u6765\u7684\u6bd4\u8f83\u5c11\uff0c\u5927\u5bb6\u4e5f\u5c31\u6ca1\u90a3\u4e48\u91cd\u89c6<\/strong>\uff08\u8001\u677f\u4e0d\u91cd\u89c6\uff0c\u6982\u7387\u53c8\u4e0d\u5927\uff0c\u5b89\u5168\u6027\u53c8\u4e0d\u662f\u6570\u636e\u5e73\u53f0\u56e2\u961f\u7684\u4e3b\u8981\u8003\u6838\u6307\u6807\uff0c\u6570\u636e\u5b89\u5168\u56e2\u961f\u4eba\u5458\u4e0d\u591a\u4e8b\u60c5\u4e0d\u5c11\uff0c\u6240\u4ee5\u8fd9\u4e2a\u95ee\u9898\u7684\u4f18\u5148\u7ea7\u53ea\u80fd\u662f\u5148\u5f80\u540e\u6392\u4e00\u6392\u4e86\uff0c\u8fd8\u6709\u5c31\u662f\u76f8\u5173\u529f\u80fd\u4ee3\u7801\u5c31\u7b97\u5df2\u7ecf\u5b9e\u73b0\u4e86\uff0c\u4f46\u662f\u56e0\u4e3a\u65b0\u589e\u4e86\u8ba4\u8bc1\u548c\u6743\u9650\u63a7\u5236\u7b49\u673a\u5236\u5f88\u53ef\u80fd\u4f1a\u5f71\u54cd\u539f\u6709\u7684\u76f8\u5173\u6d41\u7a0b\uff0c\u6240\u4ee5\u5b89\u5168\u529f\u80fd\u673a\u5236\u7684\u843d\u5730\u8fd8\u9700\u8981\u8f83\u957f\u7684\u65f6\u95f4\u53bb\u7070\u5ea6\u9a8c\u8bc1\uff09\uff1b\u8fd8\u6709\u5c31\u662f\u56fd\u5185\u8fd9\u5757\u7684\u8d44\u6599\u504f\u5c11\uff0c\u4e86\u89e3\u548c\u719f\u6089\u7684\u4eba\u4e5f\u4e0d\u591a\uff0c\u80fd\u505a\u7684\u4f1a\u505a\u7684\u5c31\u66f4\u5c11\uff0c\u613f\u610f\u5206\u4eab\u548c\u80fd\u5206\u4eab\u7684\u6781\u5c11\uff0c\u8fd9\u4e2a\u5f53\u524d\u662f\u6ca1\u4ec0\u4e48\u529e\u6cd5\u4e86\uff0c\u53ea\u80fd\u662f\u968f\u7740\u65f6\u95f4\u7684\u63a8\u79fb\uff0c\u6574\u4f53\u7684\u5b89\u5168\u610f\u8bc6\u3001\u80fd\u529b\u6c34\u5e73\u3001\u9886\u5bfc\u610f\u613f\u63d0\u9ad8\u4e86\u4e4b\u540e\u518d\u6765\u505a\u8fd9\u4e2a\u5427\u3002<\/p>\n\n\n\n<p>\u7b80\u5355\u6765\u8bf4\u5c31\u662f\uff0c\u56e0\u4e3aHadoop\u96c6\u7fa4\u57fa\u672c\u90fd\u653e\u5728\u5185\u7f51\uff0c\u6709\u4e00\u5c42\u7f51\u7edc\u9694\u79bb\u505a\u4fdd\u62a4\uff0c\u61c2\u8fd9\u4e2a\u4e14\u60f3\u5229\u7528\u548c\u80fd\u5229\u7528\u8fd9\u4e2a\u505a\u574f\u4e8b\u7684\u4eba\u6bd4\u8f83\u5c11\uff0c\u4e00\u822c\u4e0d\u5bb9\u6613\u51fa\u95ee\u9898\uff1b\u5bf9\u4e8e\u6ca1\u653e\u5728\u5185\u7f51\u6216\u8005\u6ca1\u6709\u505a\u9694\u79bb\u7684\u90a3\u4e9b\u516c\u53f8\u6216\u56e2\u961f\uff0c\u5b89\u5168\u610f\u8bc6\u548c\u80fd\u529b\u80af\u5b9a\u662f\u6709\u8f83\u5927\u6b20\u7f3a\uff0c\u6570\u636e\u6cc4\u9732\u7684\u6e20\u9053\u548c\u65b9\u5f0f\u5f88\u591a\uff0c\u4e0d\u7f3a\u8fd9\u4e00\u4e2a\uff0c\u90fd\u4e0d\u9700\u8981\u7528\u8fd9\u79cd\u65b9\u5f0f\u6765\u641e\u6570\u636e\uff1b\u4f7f\u7528\u7b2c\u4e09\u65b9\u4e91\u670d\u52a1\u7684\u516c\u53f8\u6216\u56e2\u961f\u4e00\u822c\u4e0d\u9700\u8981\u64cd\u5fc3\u5e95\u5c42\u670d\u52a1\u7684\u5b89\u5168\u95ee\u9898\uff0c\u53ea\u9700\u8981\u5173\u6ce8\u4e0a\u5c42\u5e94\u7528\u7684\u8d26\u53f7\u5b89\u5168\u548c\u4f7f\u7528\u5b89\u5168\u7b49\u95ee\u9898\u5c31\u884c\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u6b63\u6587\uff1a<\/h4>\n\n\n\n<h5 class=\"wp-block-heading\">\u53c2\u8003\u89e3\u7b54\uff1a<\/h5>\n\n\n\n<h4 class=\"wp-block-heading\">Hadoop\u7684\u76f8\u5173\u77e5\u8bc6<\/h4>\n\n\n\n<h5 class=\"wp-block-heading\">Hadoop\u7248\u672c<\/h5>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>HDFS\u7684\u7248\u672c\u57fa\u672c\u662f\u5bf9\u5e94Hadoop\u7684\u7248\u672c\uff0c\u4e86\u89e3Hadoop\u7684\u7248\u672c\u5386\u7a0b\u7b80\u4ecb\u4e5f\u5c31\u662f\u4e86\u89e3HDFS\u7684\u7248\u672c\u5386\u7a0b\uff0c\u7b80\u800c\u8a00\u4e4b\uff0cHadoop\u7684\u5927\u7248\u672c\u5386\u7a0b\u5982\u4e0b\uff1a<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hadoop 1.x<\/li>\n\n\n\n<li>Hadoop 2.x<\/li>\n\n\n\n<li>Hadoop 3.x<\/li>\n<\/ul>\n\n\n\n<p>\u5176\u4e2dHadoop2.x\u662f\u76ee\u524d\u5927\u90e8\u5206\u4f01\u4e1a\u5728\u4f7f\u7528\u7684\u7248\u672c\uff0cHadoop1.x\u57fa\u672c\u5f88\u5c11\u65b0\u9879\u76ee\u4f1a\u8003\u8651\u4f7f\u7528\u8fd9\u4e2a\u7248\u672c\uff0cHadoop3.x\u662f\u672a\u6765\u66f4\u591a\u65b0\u9879\u76ee\u4f1a\u8003\u8651\u4f7f\u7528\u7684\u4e00\u4e2a\u7248\u672c\uff0c\u8fd9\u91cc\u8981\u6ce8\u610f\uff0c\u4e0d\u540c\u7684Hadoop\u7248\u672c\u5b58\u5728\u86ee\u5927\u7684\u533a\u522b\uff0c\u5728\u6211\u4eec\u67e5\u9605\u7f51\u7edc\u8d44\u6599\u6216\u5b98\u65b9\u6587\u6863\u65f6\u90fd\u8981\u989d\u5916\u6ce8\u610f\uff0c\u8981\u627e\u5230\u5bf9\u4e8e\u7684\u7248\u672c\u8fdb\u884c\u5b66\u4e60\u3002<\/p>\n<\/blockquote>\n<\/blockquote>\n\n\n\n<p><strong>Hadoop 2.x\u5728\u65b0\u7279\u6027\u4e2d\u5f15\u5165\u4e86NameNode Federation\uff0c\u89e3\u51b3\u4e86\u6a2a\u5411namenode\u6269\u5c55\uff1b\u5f15\u5165\u4e86Namenode HA\uff0c\u89e3\u51b3\u4e86namenode\u5355\u70b9\u6545\u969c\u3002<\/strong><\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Hadoop\u6838\u5fc3\u6a21\u5757<\/h5>\n\n\n\n<p>\u5f53\u524d\u5b98\u7f51\u5217\u51fa\u4e864\u4e2a\u6a21\u5757\uff08\u76f8\u6bd4\u4e0b\u9762\u591a\u4e86\u4e00\u4e2aHadoop Common\uff09\uff0c\u5176\u5b9eHadoop\u6838\u5fc3\u4e5f\u5c31\u53ea\u67093\u4e2a\u6a21\u5757\uff1a<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>HDFS<\/li>\n\n\n\n<li>YARN<\/li>\n\n\n\n<li>MapReduce<\/li>\n<\/ul>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u4e3a\u4ec0\u4e48Hadoop\u5e95\u5c42\u53ea\u6709\u8fd93\u4e2a\u6a21\u5757\u5c31\u53ef\u4ee5\u6253\u904d\u5929\u4e0b\uff0c\u53f7\u79f0\u4e3aHadoop\u5e73\u53f0\u5462\uff1f\u539f\u56e0\u5728\u4e8e\uff1aHadoop\u7387\u5148\u63d0\u4f9b\u4e86\u5927\u6570\u636e\u9700\u8981\u7684\u5e95\u5c42\u57fa\u7840\u7ec4\u4ef6\u2014\u2014HDFS\u5b58\u50a8\u3001YARN\u8d44\u6e90\u7ba1\u7406\u548c\u4efb\u52a1\u8c03\u5ea6\u3001MapReduce\u79bb\u7ebf\u8ba1\u7b97\uff0c\u540e\u6765\u7684\u5176\u5b83\u6846\u67b6\u57fa\u672c\u90fd\u662f\u57fa\u4e8e\u8fd93\u4e2a\u8fdb\u884c\u5c01\u88c5\u7684\uff0c\u4f8b\u5982Hive\u3001Hbase\u3001Spark\u7b49\u3002<\/p>\n<\/blockquote>\n<\/blockquote>\n\n\n\n<h5 class=\"wp-block-heading\">HDFS\u67b6\u6784\u56fe<\/h5>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"874\" height=\"604\" src=\"https:\/\/ixyzero.com\/blog\/wp-content\/uploads\/2023\/09\/hdfsarchitecture.gif\" alt=\"\" class=\"wp-image-5511\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th>\u5173\u952e\u8bcd<\/th><th>\u542b\u4e49<\/th><\/tr><\/thead><tbody><tr><td>namenode<\/td><td>\u540d\u5b57\u8282\u70b9\uff0c\u7ba1\u7406\u6587\u4ef6\u7cfb\u7edf\u547d\u540d\u7a7a\u95f4\u7684\u4e3b\u670d\u52a1\u5668\u3002<\/td><\/tr><tr><td>datanode<\/td><td>\u6570\u636e\u8282\u70b9\uff0c\u5b58\u50a8\u6587\u4ef6\u5757<\/td><\/tr><tr><td>replication<\/td><td>\u6587\u4ef6\u5757\u7684\u526f\u672c\uff0c\u76ee\u7684\u662f\u786e\u4fdd\u6570\u636e\u5b58\u50a8\u7684\u53ef\u9760\u6027<\/td><\/tr><tr><td>rack<\/td><td>\u7ffb\u8bd1\u4e3a\u201c\u673a\u67b6\u201d\uff0c\u53ef\u4ee5\u7406\u89e3\u4e3a\u4e24\u4e2a\u5904\u4e8e\u4e0d\u540c\u5730\u65b9\u7684\u96c6\u7fa4\uff0c\u6bcf\u4e2a\u96c6\u7fa4\u5185\u90e8\u6709\u81ea\u5df1\u7684\u8fde\u63a5\u65b9\u5f0f<\/td><\/tr><tr><td>Client<\/td><td>\u51e1\u662f\u901a\u8fc7\u6307\u4ee4\u6216\u4ee3\u7801\u64cd\u4f5c\u7684\u4e00\u7aef\u90fd\u662f\u5ba2\u6237\u7aef<\/td><\/tr><tr><td>Client\u7684Read<\/td><td>\u4eceHDFS\u4e0b\u8f7d\u6587\u4ef6\u5230\u672c\u5730<\/td><\/tr><tr><td>Client\u7684Write<\/td><td>\u4e0a\u4f20\u6587\u4ef6\u5230HDFS\u4e0a<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\">HDFS \u6587\u4ef6\u8bfb\u53d6\u8fc7\u7a0b<\/h5>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"619\" src=\"https:\/\/ixyzero.com\/blog\/wp-content\/uploads\/2023\/09\/HDFS-read-1024x619.png\" alt=\"\" class=\"wp-image-5514\" srcset=\"https:\/\/ixyzero.com\/wp-content\/uploads\/2023\/09\/HDFS-read-1024x619.png 1024w, https:\/\/ixyzero.com\/wp-content\/uploads\/2023\/09\/HDFS-read-300x181.png 300w, https:\/\/ixyzero.com\/wp-content\/uploads\/2023\/09\/HDFS-read-768x464.png 768w, https:\/\/ixyzero.com\/wp-content\/uploads\/2023\/09\/HDFS-read.png 1029w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>\u7b80\u5355\u603b\u7ed3\u4e00\u4e0b\uff1a<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Client \u5148\u4e0e\u96c6\u7fa4\u7684 NameNode \u8fdb\u884c\u4e00\u6b21 RPC \u4ea4\u4e92\uff0c\u83b7\u53d6\u6587\u4ef6 block \u4f4d\u7f6e\u4fe1\u606f\uff1b<\/strong><\/li>\n\n\n\n<li>NameNode \u8fd4\u56de\u5b58\u50a8\u7684\u6bcf\u4e2a\u5757\u7684 DataNode \u5217\u8868\uff1b<\/li>\n\n\n\n<li><strong>Client \u518d\u4e0e\u5217\u8868\u4e2d\u6700\u8fd1\u7684 DataNode \u8fdb\u884c\u4ea4\u4e92\uff1b<\/strong><\/li>\n\n\n\n<li>Client \u5f00\u59cb\u4ece DataNode \u5e76\u884c\u8bfb\u53d6\u6570\u636e\uff1b<\/li>\n\n\n\n<li>\u4e00\u65e6 Client \u83b7\u5f97\u4e86\u6240\u6709\u5fc5\u987b\u7684 block\uff0c\u5b83\u5c31\u4f1a\u5c06\u8fd9\u4e9b block \u7ec4\u5408\u8d77\u6765\u5f62\u6210\u4e00\u4e2a\u6587\u4ef6\u3002<\/li>\n<\/ol>\n\n\n\n<h5 class=\"wp-block-heading\">\u5176\u5b83<\/h5>\n\n\n\n<p><strong>Cloudera \u548c Hortonworks \u57282018\u5e7410\u6708\u4efd\u5ba3\u5e03\u4e86\u5b83\u4eec\u6240\u8c13\u7684\u76f8\u5bf9\u5e73\u7b49\u7684\u5408\u5e76<\/strong>\uff08\u5408\u5e76\u4e4b\u540eCloudera\u5360\u6bd460%\uff0c\u6240\u4ee5\u4e00\u822c\u4eba\u4eec\u4e5f\u8ba4\u4e3a\u662fCloudera\u628aHortonworks\u7ed9\u5408\u5e76\u4e86\uff09\u3002<\/p>\n\n\n\n<p>Cloudera &amp; Hortonworks \u5408\u5e76\uff0cCDH &amp; HDP \u4ea7\u54c1\u91cd\u5408\u5ea6\u5982\u6b64\u4e4b\u9ad8\uff0c\u5f71\u54cd\u6df1\u8fdc\uff0c\u7279\u522b\u662f\u5bf9\u793e\u533a\u5f00\u6e90\u8f6f\u4ef6\u3002\u597d\u5904\u662fHadoop\u751f\u6001\u80fd\u76f8\u5bf9\u66f4\u52a0\u7edf\u4e00\u6807\u51c6\u5316\u4e86\uff08\u5f88\u591a\u4e4b\u524d\u529f\u80fd\u6709\u91cd\u5408\u6216\u8005\u662f\u7ade\u4e89\u5173\u7cfb\u7684\u7ec4\u4ef6\u6700\u540e\u53ea\u4f1a\u5269\u4e0b\u5c11\u90e8\u5206\u7cbe\u54c1\u7ee7\u7eed\u7ef4\u62a4\uff0c\u5176\u5b83\u7684\u5c31\u9000\u51fa\u5386\u53f2\u821e\u53f0\u4e86\uff09\u3002\u574f\u5904\u662f\u793e\u533a\u5f00\u6e90\u751f\u6001\u5e73\u8861\u88ab\u6253\u7834\uff0c\u5176\u4ed6\u5927\u6570\u636e\u53d1\u884c\u7248\u751f\u5b58\u7a7a\u95f4\u6324\u538b\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Hadoop \u5b89\u5168<\/h4>\n\n\n\n<p><strong>\u4e00\u822c\u6765\u8bf4\u5b89\u5168\u9700\u8981\u5173\u6ce8 CIA \u4e09\u8981\u7d20\uff0c\u5373\uff1a\u673a\u5bc6\u6027\u3001\u5b8c\u6574\u6027\u3001\u53ef\u7528\u6027\u3002<\/strong>\u5bf9\u4e8e\u5b89\u5168\u6574\u7406\u6765\u8bf4\u786e\u5b9e\u9700\u8981\u4fdd\u8bc1\u8fd93\u4e2a\u65b9\u9762\uff0c\u4f46\u5177\u4f53\u5230\u516c\u53f8\u5185\u90e8\uff0c\u4e0d\u540c\u804c\u8d23\u4e00\u822c\u843d\u5728\u4e0d\u540c\u7684\u56e2\u961f\u8eab\u4e0a\uff0c\u6216\u8005\u8bf4\u5404\u6709\u4fa7\u91cd\u2014\u2014\u6bd4\u5982\u6570\u636e\u7684\u5b8c\u6574\u6027\u548c\u53ef\u7528\u6027\u4e00\u822c\u662f\u7531\u6570\u636e\u5e73\u53f0\u56e2\u961f\u6765\u8d1f\u8d23\uff0c\u56e0\u4e3a\u5e73\u53f0\u662f\u4ed6\u4eec\u642d\u5efa\u7684\uff0c\u4ed6\u4eec\u6700\u719f\u6089\uff0c\u800c\u4e14\u4ed6\u4eec\u9700\u8981\u4fdd\u8bc1\u5e73\u53f0\u7684\u7a33\u5b9a\u6027\uff0c\u800c\u8fd9\u4e24\u70b9\u4e5f\u90fd\u5305\u542b\u5728\u7a33\u5b9a\u6027\u8981\u6c42\u4e2d\uff1b<strong>\u673a\u5bc6\u6027\u4e3b\u8981\u662f\u7531\u6570\u636e\u5b89\u5168\u56e2\u961f\u6765\u8d1f\u8d23\uff0c\u56e0\u4e3a\u6570\u636e\u5b89\u5168\u9700\u8981\u5bf9\u516c\u53f8\u5185\u90e8\u6570\u636e\u6cc4\u9732\u7684\u95ee\u9898\u8d1f\u8d23<\/strong>\u3002<\/p>\n\n\n\n<p>Hadoop\u751f\u6001\u5982\u6b64\u4e4b\u5927\uff0c\u7ec4\u4ef6\u5f88\u591a\uff0c\u5b89\u5168\u95ee\u9898\u5176\u5b9e\u5f88\u590d\u6742\uff0c\u4e00\u53e5\u8bdd\u4e24\u53e5\u8bdd\u8bf4\u4e0d\u6e05\u695a\uff0c\u4f46\u5982\u679c\u975e\u8981\u603b\u7ed3\u7684\u8bdd\uff0c\u4e5f\u53ef\u4ee5\u6574\u7406\u6210\u5982\u4e0b6\u70b9\uff08\u5728\u539f\u51485\u70b9\u603b\u7ed3\u7684\u57fa\u7840\u4e0a\u52a0\u4e861\u70b9\uff09\uff1a<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>\u5b89\u5168\u8ba4\u8bc1(Authentication)\u2014\u2014\u907f\u514d\u51fa\u4e86\u95ee\u9898\u65e0\u6cd5\u6eaf\u6e90\u548c\u65e5\u5e38\u5ba1\u8ba1<\/li>\n\n\n\n<li>\u6743\u9650\u63a7\u5236(Authorization)\u2014\u2014\u907f\u514d\u672a\u6388\u6743\u8bbf\u95ee\/\u7be1\u6539\u3001\u4eff\u5192\u8eab\u4efd\u540e\u64cd\u4f5c<\/li>\n\n\n\n<li>\u64cd\u4f5c\u5ba1\u8ba1(Audit)\u2014\u2014\u9ad8\u5371\u64cd\u4f5c\u5ba1\u8ba1\u3001\u5f02\u5e38\u64cd\u4f5c\u5ba1\u8ba1<\/li>\n\n\n\n<li>\u9759\u6001\u52a0\u5bc6(Encrypting Data at Rest)\u2014\u2014\u6587\u4ef6\u5b58\u50a8\u52a0\u5bc6\uff0c\u907f\u514d\u6587\u4ef6\u88ab\u83b7\u53d6\u540e\u7684\u6587\u4ef6\u5185\u5bb9\u6cc4\u6f0f<\/li>\n\n\n\n<li>\u52a8\u6001\u52a0\u5bc6(Encrypting Data in Transit)\u2014\u2014\u6570\u636e\u4f20\u8f93\u52a0\u5bc6<\/li>\n\n\n\n<li>\u5b89\u5168\u72b6\u6001\u53ef\u89c1\u6027(Visibility)\u2014\u2014\u6574\u4f53Hadoop\u5b89\u5168\u5927\u76d8\uff0c\u5927\u6570\u636e\u65b9\u9762\u7684\u5b89\u5168\u6c34\u4f4d\u548c\u8d8b\u52bf\u53d8\u5316\u60c5\u51b5<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"678\" height=\"225\" src=\"https:\/\/ixyzero.com\/blog\/wp-content\/uploads\/2023\/09\/security_facets.png\" alt=\"\" class=\"wp-image-5512\" srcset=\"https:\/\/ixyzero.com\/wp-content\/uploads\/2023\/09\/security_facets.png 678w, https:\/\/ixyzero.com\/wp-content\/uploads\/2023\/09\/security_facets-300x100.png 300w\" sizes=\"auto, (max-width: 678px) 100vw, 678px\" \/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Perimeter &#8211; Access to the cluster must be protected from a variety of threats coming from internal and external networks and from a variety of actors. Network isolation can be provided by proper configuration of firewalls, routers, subnets, and the proper use of public and private IP addresses, for example. Authentication mechanisms ensure that people, processes, and applications properly identify themselves to the cluster and prove they are who they say they are, before gaining access to the cluster.<br>\u5fc5\u987b\u4fdd\u62a4\u96c6\u7fa4\u7684\u5916\u56f4\u8bbf\u95ee\u4e0d\u53d7\u6765\u81ea\u5185\u90e8\u548c\u5916\u90e8\u7f51\u7edc\u4ee5\u53ca\u5404\u79cd\u884c\u4e3a\u8005\u7684\u5404\u79cd\u5a01\u80c1\u3002\u4f8b\u5982\uff0c\u53ef\u901a\u8fc7\u6b63\u786e\u914d\u7f6e\u9632\u706b\u5899\u3001\u8def\u7531\u5668\u3001\u5b50\u7f51\u4ee5\u53ca\u6b63\u786e\u4f7f\u7528\u516c\u5171\u548c\u4e13\u7528 IP \u5730\u5740\u6765\u5b9e\u73b0\u7f51\u7edc\u9694\u79bb\u3002\u8eab\u4efd\u9a8c\u8bc1\u673a\u5236\u53ef\u786e\u4fdd\u4eba\u5458\u3001\u8fdb\u7a0b\u548c\u5e94\u7528\u7a0b\u5e8f\u5728\u8bbf\u95ee\u7fa4\u96c6\u4e4b\u524d\u5411\u7fa4\u96c6\u6b63\u786e\u8868\u660e\u81ea\u5df1\u7684\u8eab\u4efd\uff0c\u5e76\u8bc1\u660e\u81ea\u5df1\u7684\u8eab\u4efd\u3002<\/p>\n\n\n\n<p>Data &#8211; Data in the cluster must always be protected from unauthorized exposure. Similarly, communications between the nodes in the cluster must be protected. Encryption mechanisms ensure that even if network packets are intercepted or hard-disk drives are physically removed from the system by bad actors, the contents are not usable.<br>\u5fc5\u987b\u59cb\u7ec8\u4fdd\u62a4\u96c6\u7fa4\u4e2d\u7684\u6570\u636e\uff0c\u9632\u6b62\u672a\u7ecf\u6388\u6743\u7684\u6570\u636e\u6cc4\u9732\u3002\u540c\u6837\uff0c\u96c6\u7fa4\u4e2d\u8282\u70b9\u4e4b\u95f4\u7684\u901a\u4fe1\u4e5f\u5fc5\u987b\u53d7\u5230\u4fdd\u62a4\u3002\u52a0\u5bc6\u673a\u5236\u53ef\u786e\u4fdd\u5373\u4f7f\u7f51\u7edc\u6570\u636e\u5305\u88ab\u622a\u83b7\u6216\u786c\u76d8\u9a71\u52a8\u5668\u88ab\u574f\u4eba\u4ece\u7cfb\u7edf\u4e2d\u53d6\u51fa\uff0c\u5176\u5185\u5bb9\u4e5f\u65e0\u6cd5\u4f7f\u7528\u3002<\/p>\n\n\n\n<p>Access &#8211; Access to any specific service or item of data within the cluster must be specifically granted. Authorization mechanisms ensure that once users have authenticated themselves to the cluster, they can only see the data and use the processes to which they have been granted specific permission.<br>\u8bbf\u95ee\u6743\u9650 \u8bbf\u95ee\u7fa4\u96c6\u4e2d\u7684\u4efb\u4f55\u7279\u5b9a\u670d\u52a1\u6216\u6570\u636e\u9879\u90fd\u5fc5\u987b\u7ecf\u8fc7\u4e13\u95e8\u6388\u6743\u3002\u6388\u6743\u673a\u5236\u53ef\u786e\u4fdd\u7528\u6237\u5728\u5bf9\u7fa4\u96c6\u8fdb\u884c\u8eab\u4efd\u9a8c\u8bc1\u540e\uff0c\u53ea\u80fd\u67e5\u770b\u83b7\u5f97\u7279\u5b9a\u6743\u9650\u7684\u6570\u636e\u548c\u4f7f\u7528\u83b7\u5f97\u7279\u5b9a\u6743\u9650\u7684\u6d41\u7a0b\u3002<\/p>\n\n\n\n<p>Visibility &#8211; Visibility means that the history of data changes is transparent and capable of meeting data governance policies. Auditing mechanisms ensure that all actions on data and its lineage\u2014source, changes over time, and so on\u2014are documented as they occur.<br>\u53ef\u89c1\u6027 \u53ef\u89c1\u6027\u610f\u5473\u7740\u6570\u636e\u53d8\u5316\u7684\u5386\u53f2\u662f\u900f\u660e\u7684\uff0c\u80fd\u591f\u6ee1\u8db3\u6570\u636e\u7ba1\u7406\u653f\u7b56\u7684\u8981\u6c42\u3002\u5ba1\u8ba1\u673a\u5236\u53ef\u786e\u4fdd\u5728\u53d1\u751f\u65f6\u8bb0\u5f55\u5bf9\u6570\u636e\u53ca\u5176\u8109\u7edc\uff08\u6765\u6e90\u3001\u968f\u65f6\u95f4\u53d1\u751f\u7684\u53d8\u5316\u7b49\uff09\u7684\u6240\u6709\u64cd\u4f5c\u3002<\/p>\n<\/blockquote>\n<\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"287\" src=\"https:\/\/ixyzero.com\/blog\/wp-content\/uploads\/2023\/09\/security_maturity_model.jpg\" alt=\"\" class=\"wp-image-5513\" srcset=\"https:\/\/ixyzero.com\/wp-content\/uploads\/2023\/09\/security_maturity_model.jpg 650w, https:\/\/ixyzero.com\/wp-content\/uploads\/2023\/09\/security_maturity_model-300x132.jpg 300w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th>Level \u7ea7\u522b<\/th><th>Security \u5b89\u5168<\/th><th>Characteristics \u7279\u70b9<\/th><\/tr><\/thead><tbody><tr><td>0<\/td><td>Non-secure \u975e\u5b89\u5168<\/td><td>No security configured. Non-secure clusters should never be used in production environments because they are vulnerable to any and all attacks and exploits. \u672a\u914d\u7f6e\u5b89\u5168\u6027\u3002\u751f\u4ea7\u73af\u5883\u4e2d\u7edd\u5bf9\u4e0d\u8981\u4f7f\u7528\u4e0d\u5b89\u5168\u7684\u96c6\u7fa4\uff0c\u56e0\u4e3a\u5b83\u4eec\u5bb9\u6613\u53d7\u5230\u4efb\u4f55\u653b\u51fb\u548c\u5229\u7528\u3002<\/td><\/tr><tr><td>1<\/td><td>Minimal \u6700\u4f4e\u9650\u5ea6<\/td><td>Configured for authentication, authorization, and auditing. Authentication is first configured to ensure that users and services can access the cluster only after proving their identities. Next, authorization mechanisms are applied to assign privileges to users and user groups. Auditing procedures keep track of who accesses the cluster (and how). \u914d\u7f6e\u4e86\u8eab\u4efd\u9a8c\u8bc1\u3001\u6388\u6743\u548c\u5ba1\u8ba1\u3002\u9996\u5148\u914d\u7f6e\u8eab\u4efd\u9a8c\u8bc1\uff0c\u4ee5\u786e\u4fdd\u7528\u6237\u548c\u670d\u52a1\u53ea\u6709\u5728\u8bc1\u660e\u5176\u8eab\u4efd\u540e\u624d\u80fd\u8bbf\u95ee\u7fa4\u96c6\u3002\u7136\u540e\uff0c\u5e94\u7528\u6388\u6743\u673a\u5236\u4e3a\u7528\u6237\u548c\u7528\u6237\u7ec4\u5206\u914d\u6743\u9650\u3002\u5ba1\u8ba1\u7a0b\u5e8f\u53ef\u8ddf\u8e2a\u8c01\u8bbf\u95ee\u4e86\u7fa4\u96c6\uff08\u4ee5\u53ca\u5982\u4f55\u8bbf\u95ee\uff09\u3002<\/td><\/tr><tr><td>2<\/td><td>More \u66f4\u8fdb\u4e00\u6b65<\/td><td>Sensitive data is encrypted. Key management systems handle encryption keys. Auditing has been setup for data in metastores. System metadata is reviewed and updated regularly. Ideally, cluster has been setup so that lineage for any data object can be traced (data governance). \u5bf9\u654f\u611f\u6570\u636e\u8fdb\u884c\u52a0\u5bc6\u3002\u5bc6\u94a5\u7ba1\u7406\u7cfb\u7edf\u5904\u7406\u52a0\u5bc6\u5bc6\u94a5\u3002\u5bf9\u5143\u6570\u636e\u5e93\u4e2d\u7684\u6570\u636e\u8fdb\u884c\u5ba1\u8ba1\u3002\u5b9a\u671f\u5ba1\u67e5\u548c\u66f4\u65b0\u7cfb\u7edf\u5143\u6570\u636e\u3002\u7406\u60f3\u60c5\u51b5\u4e0b\uff0c\u96c6\u7fa4\u7684\u8bbe\u7f6e\u53ef\u8ffd\u6eaf\u4efb\u4f55\u6570\u636e\u5bf9\u8c61\u7684\u6765\u6e90\uff08\u6570\u636e\u7ba1\u7406\uff09\u3002<\/td><\/tr><tr><td>3<\/td><td>Most \u5c3d\u5176\u6240\u80fd<\/td><td>The secure enterprise data hub (EDH) is one in which all data, both data-at-rest and data-in-transit, is encrypted and the key management system is fault-tolerant. Auditing mechanisms comply with industry, government, and regulatory standards (PCI, HIPAA, NIST, for example), and extend from the EDH to the other systems that integrate with it. Cluster administrators are well-trained, security procedures have been certified by an expert, and the cluster can pass technical review. \u5728\u5b89\u5168\u7684\u4f01\u4e1a\u6570\u636e\u4e2d\u5fc3\uff08EDH\uff09\u4e2d\uff0c\u6240\u6709\u6570\u636e\uff08\u5305\u62ec\u9759\u6001\u6570\u636e\u548c\u4f20\u8f93\u4e2d\u7684\u6570\u636e\uff09\u90fd\u7ecf\u8fc7\u52a0\u5bc6\uff0c\u5bc6\u94a5\u7ba1\u7406\u7cfb\u7edf\u5177\u6709\u5bb9\u9519\u6027\u3002\u5ba1\u8ba1\u673a\u5236\u7b26\u5408\u884c\u4e1a\u3001\u653f\u5e9c\u548c\u76d1\u7ba1\u6807\u51c6\uff08\u5982 PCI\u3001HIPAA \u548c NIST\uff09\uff0c\u5e76\u4ece EDH \u6269\u5c55\u5230\u4e0e\u5176\u96c6\u6210\u7684\u5176\u4ed6\u7cfb\u7edf\u3002\u96c6\u7fa4\u7ba1\u7406\u5458\u8bad\u7ec3\u6709\u7d20\uff0c\u5b89\u5168\u7a0b\u5e8f\u7ecf\u8fc7\u4e13\u5bb6\u8ba4\u8bc1\uff0c\u96c6\u7fa4\u53ef\u901a\u8fc7\u6280\u672f\u5ba1\u67e5\u3002<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">Hadoop\u5e73\u53f0\u5b89\u5168\u6210\u719f\u5ea6<\/figcaption><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\">\u4e00\u4e9b\u5f00\u6e90\u7684\u5b89\u5168\u89e3\u51b3\u65b9\u6848<\/h5>\n\n\n\n<p>Apache Ranger \u7684\u613f\u666f\u662f<strong>\u5728Apache Hadoop\u751f\u6001\u7cfb\u7edf\u4e2d\u63d0\u4f9b\u5168\u9762\u7684\u5b89\u5168\u6027<\/strong>\u3002<br><a href=\"https:\/\/ranger.apache.org\/\">https:\/\/ranger.apache.org\/<\/a><br><a href=\"https:\/\/ranger.apache.org\/faq.html\">https:\/\/ranger.apache.org\/faq.html<\/a><\/p>\n\n\n\n<p>Apache Atlas \u4e3a\u7ec4\u7ec7\u63d0\u4f9b\u5f00\u653e\u53ef\u6269\u5c55\u7684<strong>\u5143\u6570\u636e\u7ba1\u7406\u548c\u6cbb\u7406<\/strong>\u529f\u80fd\uff0c\u4ee5\u6784\u5efa\u6570\u636e\u8d44\u4ea7\u7684\u76ee\u5f55\uff0c\u5bf9\u8fd9\u4e9b\u8d44\u4ea7\u8fdb\u884c\u5206\u7c7b\u548c\u6cbb\u7406\uff0c\u5e76\u4e3a\u6570\u636e\u79d1\u5b66\u5bb6\u3001\u5206\u6790\u5e08\u548c\u6570\u636e\u6cbb\u7406\u56e2\u961f\u63d0\u4f9b\u56f4\u7ed5\u8fd9\u4e9b\u6570\u636e\u8d44\u4ea7\u7684\u534f\u4f5c\u529f\u80fd\u3002<br><a href=\"https:\/\/atlas.apache.org\/#\/\">https:\/\/atlas.apache.org\/#\/<\/a><\/p>\n\n\n\n<p>Apache Falcon \u8fd9\u4e2a\u9879\u76ee\u5df2\u7ecf\u4e0d\u7ef4\u62a4\u4e86(Last Published: 2018-03-12. Apache Falcon moved into the Attic in June 2019.)<br><a href=\"https:\/\/falcon.apache.org\/\">https:\/\/falcon.apache.org\/<\/a><br><a href=\"https:\/\/attic.apache.org\/projects\/falcon.html\">https:\/\/attic.apache.org\/projects\/falcon.html<\/a><\/p>\n\n\n\n<p>Apache Eagle \u8fd9\u4e2a\u9879\u76ee\u5df2\u7ecf\u4e0d\u7ef4\u62a4\u4e86(Apache Eagle moved into the Attic in 2020-11.)<br><a href=\"https:\/\/eagle.apache.org\/\">https:\/\/eagle.apache.org\/<\/a><br><a href=\"https:\/\/attic.apache.org\/projects\/eagle.html\">https:\/\/attic.apache.org\/projects\/eagle.html<\/a><\/p>\n\n\n\n<h5 class=\"wp-block-heading\">\u53c2\u8003\u94fe\u63a5\uff1a<\/h5>\n\n\n\n<p>Cloudera Security Overview<br><a href=\"https:\/\/docs.cloudera.com\/documentation\/enterprise\/latest\/topics\/sg_edh_overview.html\">https:\/\/docs.cloudera.com\/documentation\/enterprise\/latest\/topics\/sg_edh_overview.html<\/a><\/p>\n\n\n\n<p>\u3010\u6280\u672f\u5206\u4eab\u3011\u8c08\u8c08Hadoop\u5b89\u5168\u7684\u90a3\u4e9b\u4e8b\u513f<br><a href=\"https:\/\/mp.weixin.qq.com\/s\/bThdTMGUZDXQzI0ts2IGEw\">https:\/\/mp.weixin.qq.com\/s\/bThdTMGUZDXQzI0ts2IGEw<\/a><\/p>\n\n\n\n<p>HADOOP\u5b89\u5168\u57fa\u7840\u7bc7<br><a href=\"https:\/\/www.freebuf.com\/articles\/database\/190734.html\">https:\/\/www.freebuf.com\/articles\/database\/190734.html<\/a><\/p>\n\n\n\n<p>Hadoop\u5b89\u5168\u95ee\u9898\u4ecb\u7ecd\u4ee5\u53ca\u5b89\u5168\u52a0\u56fa!<br><a href=\"https:\/\/mp.weixin.qq.com\/s\/nK0RlAhDCd7FZTgHfhCIZA\">https:\/\/mp.weixin.qq.com\/s\/nK0RlAhDCd7FZTgHfhCIZA<\/a><\/p>\n\n\n\n<p>\u6d45\u8c08Hadoop\u5b89\u5168\uff08\u4e0b\uff09<br><a href=\"https:\/\/mp.weixin.qq.com\/s\/ZAsssxshRHlgUp6WVUaweQ\">https:\/\/mp.weixin.qq.com\/s\/ZAsssxshRHlgUp6WVUaweQ<\/a><\/p>\n\n\n\n<p>\u6d45\u8c08Hadoop\u5b89\u5168\uff08\u4e0a\uff09<br><a href=\"https:\/\/mp.weixin.qq.com\/s\/zmmL0yIQ2Lm66JUh8nRYgA\">https:\/\/mp.weixin.qq.com\/s\/zmmL0yIQ2Lm66JUh8nRYgA<\/a><\/p>\n\n\n\n<p>\u3010\u6570\u636e\u5b89\u5168\u63a8\u8350\u4e66\u7c4d1\u3011Hadoop\u5b89\u5168 \u5927\u6570\u636e\u5e73\u53f0\u9690\u79c1\u4fdd\u62a4<br><a href=\"https:\/\/mp.weixin.qq.com\/s\/7ipPvx8Nfr2bTn4fb779rg\">https:\/\/mp.weixin.qq.com\/s\/7ipPvx8Nfr2bTn4fb779rg<\/a><\/p>\n\n\n\n<p>\u817e\u8baf\u2014\u2014\u5927\u6570\u636e\u5b89\u5168\u4f53\u7cfb\u4ecb\u7ecd<br><a href=\"https:\/\/mp.weixin.qq.com\/s\/KrtVbG7mjXlR7tC5PszuiQ\">https:\/\/mp.weixin.qq.com\/s\/KrtVbG7mjXlR7tC5PszuiQ<\/a><\/p>\n\n\n\n<p>\u6ef4\u6ef4\u5927\u6570\u636e\u5b89\u5168\u6743\u9650\u5b9e\u8df5<br><a href=\"https:\/\/mp.weixin.qq.com\/s\/-0PGwGZ_fcssP0SxGe04xg\">https:\/\/mp.weixin.qq.com\/s\/-0PGwGZ_fcssP0SxGe04xg<\/a><\/p>\n\n\n\n<p>\u3010\u6280\u672f\u5206\u4eab\u3011\u540c\u7a0b\u65c5\u6e38Hadoop\u5b89\u5168\u5b9e\u8df5<br><a href=\"https:\/\/www.anquanke.com\/post\/id\/85343\">https:\/\/www.anquanke.com\/post\/id\/85343<\/a><\/p>\n\n\n\n<p>Hadoop 2.10.1 HDFS \u900f\u660e\u52a0\u5bc6\u539f\u7406 + \u5b9e\u6218 + \u9a8c\u8bc1<br><a href=\"https:\/\/mp.weixin.qq.com\/s\/gjEqu_hx3GunlkNlmHiX2g\">https:\/\/mp.weixin.qq.com\/s\/gjEqu_hx3GunlkNlmHiX2g<\/a><\/p>\n\n\n\n<p>\u6570\u636e\u4ed3\u5e93\u4e4bHadoop\u5b89\u5168\u521d\u63a2<br><a href=\"https:\/\/mp.weixin.qq.com\/s\/HMuAe9cFFl6zGltka6QZlQ\">https:\/\/mp.weixin.qq.com\/s\/HMuAe9cFFl6zGltka6QZlQ<\/a><\/p>\n\n\n\n<p>=END=<\/p>\n","protected":false},"excerpt":{"rendered":"<p>=Start= \u7f18\u7531\uff1a \u8fd1\u671f\u5728\u5185\u90e8\u7ea2\u84dd\u5bf9\u6297\u4e2d\u51fa\u73b0\u4e86\u548cHDFS\u5b89\u5168\u6709\u5173\u7684case\uff0c\u6211\u4e2a\u4eba\u5bf9\u8fd9\u5757\u4e5f\u6bd4\u8f83\u611f\u5174\u8da3\uff0c\u4e0d\u8fc7 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,23,25,12],"tags":[1255,933,2011,2020,37,963],"class_list":["post-5510","post","type-post","status-publish","format-standard","hentry","category-database","category-knowledgebase-2","category-security","category-tools","tag-datasecurity","tag-hadoop","tag-hdfs","tag-ranger","tag-security","tag-963"],"views":2225,"_links":{"self":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/5510","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/comments?post=5510"}],"version-history":[{"count":1,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/5510\/revisions"}],"predecessor-version":[{"id":5515,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/5510\/revisions\/5515"}],"wp:attachment":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/media?parent=5510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/categories?post=5510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/tags?post=5510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}