Hadoop platform security management and control method based on multi-protocol reverse proxy
A technology of reverse proxy and security control, which is applied in the field of platform security control and can solve problems such as late interface appearance and security issues
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0033] like figure 1 and 2 As shown, the detailed process of a typical file operation (directory creation) for the hdfs service in the hadoop platform is as follows:
[0034] 1. The client builds a local access agent according to the configuration, and initializes the account and other information;
[0035] 2. The client starts to establish a tcp connection with NameNode's reverse proxy service, and sends an encrypted string for identity authentication;
[0036] 3. The proxy server receives the request to establish a connection, obtains identity authentication information, and authenticates the user identity according to predefined rules;
[0037] 4. If the authentication is passed, a successful response is written through the tcp channel, and the connection is formally established;
[0038] 5. The client starts to construct and send the rpc request packet of MKDIRS, and the serialization part is completed by the protobuf framework;
[0039] 6. After receiving the rpc requ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

