You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 3 Next »

Apache Ranger is getting a lot of momentum in the open source community, and 0.5 release promises to be a bigger step towards the vision of providing comprehensive security for Hadoop. The 0.5 release is focused on the following areas

 

Release ThemeDescriptionBenefit to usersApache JIRA#
Extensibility - Ranger StacksComplete re-architecting Ranger to enable new plugins easilyEasily add custom plugins and use Ranger to support multiple datatores Unable to render Jira issues macro, execution error.
Hooks for dynamic access controlUsers need to support dynamic access control conditions such as geo, time etcUsers can add dynamic rules in addition to static RBAC policy evaluation Unable to render Jira issues macro, execution error.
Authorization and auditing support for YARNProvide ability to manage queue level authorization within Yarn and also auditUsers can manage Yarn ACLs along with other Hadoop component in single UI Unable to render Jira issues macro, execution error.
Authorization and auditing support for KafkaManage Kafka authorization policies in Ranger and also audit KafkaLike Yarn, users can manage Kafka security through the centralized security console that other Hadoop components are using Unable to render Jira issues macro, execution error.
Audit Optimization

Couple of things

  1. We would want to summarize audit at source, to handle high volume audit scenarios such as in Kafka or HBase
  2. Include Policy id in the audit logs
Ranger audit would expand into newer components. With audit summarization, we would be able to manage audit volumes for large event systems like Kafka while still maintaining the traceability required by auditors and compliance teams Unable to render Jira issues macro, execution error.
Metadata tags and tag based policiesAs complexity of data increases, it is important to classify and tag data it is coming into Hadoop. This feature provides a method to create security policies based on the metadata tagsUsers can classify data as "sensitive" or "PII" and then would be able to create policies in Ranger at a tag level. Ranger can then enforce policies for any resources classified under that tag Unable to render Jira issues macro, execution error.
    
  • No labels