Tagged articles
13 articles
Page 1 of 1
DataFunTalk
DataFunTalk
Jan 12, 2024 · Big Data

Building a Unified Data Empowerment Layer with Apache Kyuubi at GF Securities

The article describes how GF Securities designed and implemented a unified big‑data empowerment layer based on Apache Kyuubi to address data‑centric challenges, improve efficiency, ensure controllable governance, and support agile data scenarios across ingestion, processing, storage, and security.

Apache KyuubiBig DataData Empowerment
0 likes · 33 min read
Building a Unified Data Empowerment Layer with Apache Kyuubi at GF Securities

How to Build a Unified Big Data Security Platform with Ranger and Custom Authorization

This article explains the design and implementation of a unified data security control platform that protects user privacy and corporate data across multiple big‑data components (Hive, Hetu, GaussDB) by integrating Apache Ranger, custom authorization APIs, asynchronous processing, distributed locking, and SDK‑based authentication to achieve fine‑grained, one‑stop permission management.

AuthorizationBig DataDistributed Systems
0 likes · 17 min read
How to Build a Unified Big Data Security Platform with Ranger and Custom Authorization
Liangxu Linux
Liangxu Linux
Aug 2, 2022 · Fundamentals

Master Ranger: The Powerful Terminal File Manager for Linux

This guide explains how to install, configure, and use the lightweight, Vim‑integrated terminal file manager Ranger on Linux, covering its three‑pane layout, essential commands, preview capabilities for files, images, and PDFs, as well as customization through its configuration files.

LinuxVimfile manager
0 likes · 9 min read
Master Ranger: The Powerful Terminal File Manager for Linux
ITPUB
ITPUB
Jul 23, 2022 · Information Security

How Bilibili Secured Hadoop: Ranger‑Based HDFS and Hive Access Control Deep Dive

This article details Bilibili's implementation of Apache Ranger for fine‑grained access control across Hadoop, HDFS, Hive, Spark, and Presto, covering architecture, API redesign, admin optimizations, gray‑release strategies, permission pre‑checks, data masking, and future plans for incremental policy loading.

HDFSHivePresto
0 likes · 16 min read
How Bilibili Secured Hadoop: Ranger‑Based HDFS and Hive Access Control Deep Dive
Bilibili Tech
Bilibili Tech
Jul 22, 2022 · Information Security

Design and Optimization of Ranger‑Based Access Control for HDFS and Hive in Bilibili's Data Platform

Bilibili’s data platform redesigns Ranger‑based access control by simplifying HDFS and Hive policy APIs, parallelizing policy loading, adding gray‑release and pre‑check mechanisms, integrating fine‑grained Hive authorization with data‑masking, extending support to Spark and Presto, and planning incremental loading, policy fusion, and a NameNode proxy to boost security and performance.

HDFSHivePresto
0 likes · 15 min read
Design and Optimization of Ranger‑Based Access Control for HDFS and Hive in Bilibili's Data Platform
Top Architect
Top Architect
Dec 13, 2021 · Big Data

Design and Implementation of BanYu's Big Data Access Control System

This article describes the evolution from an unsecured data warehouse to a comprehensive big‑data access control system at BanYu, detailing the background, data access methods, design goals, authentication and authorization mechanisms, policy configuration, integration with Metabase, and the overall workflow that balances security with efficiency.

Big DataHiveLDAP
0 likes · 15 min read
Design and Implementation of BanYu's Big Data Access Control System
21CTO
21CTO
Dec 9, 2021 · Big Data

Designing a Scalable Big Data Permission System: From Hive to Metabase

BanYu’s early data warehouse lacked any access controls, prompting the creation of a comprehensive big‑data permission system that integrates authentication and authorization across Hive, Presto, HDFS, and Metabase using LDAP, Ranger policies, workflow automation, and both synchronous and asynchronous policy initialization.

AuthorizationBig DataHive
0 likes · 16 min read
Designing a Scalable Big Data Permission System: From Hive to Metabase
Liangxu Linux
Liangxu Linux
Mar 22, 2021 · Fundamentals

Master Linux File Navigation with Ranger: A Quick Start Guide

This guide introduces the terminal‑based file manager Ranger, covering installation, its four‑column interface, navigation shortcuts, built‑in commands like chmod and edit, and how it offers a powerful alternative to traditional cd‑based file browsing on Linux.

Linuxfile managerranger
0 likes · 6 min read
Master Linux File Navigation with Ranger: A Quick Start Guide
Didi Tech
Didi Tech
Dec 17, 2020 · Information Security

Didi's Big Data Security Permission System: User Authentication and Column-Level Authorization

Didi’s big‑data platform secures user access by adding a custom password‑based Hadoop authentication stored on the NameNode and managed through its Shumeng user‑management service, while enforcing column‑level, role‑based permissions via an Apache Ranger‑powered system that classifies data, generates policies, and now governs millions of assets.

AuthorizationColumn Levelranger
0 likes · 12 min read
Didi's Big Data Security Permission System: User Authentication and Column-Level Authorization
ITPUB
ITPUB
Apr 7, 2020 · Operations

11 Must‑Know Linux Terminal Tricks to Supercharge Your Workflow

Discover a curated list of 11 powerful Linux terminal commands and shortcuts—including clipboard tricks, sudo shortcuts, background execution, scheduling, process management, file browsing, shutdown cancellation, and YouTube video downloading—to dramatically boost your productivity and streamline everyday tasks.

Sudocommand-linehtop
0 likes · 10 min read
11 Must‑Know Linux Terminal Tricks to Supercharge Your Workflow
Youzan Coder
Youzan Coder
Jan 18, 2019 · Information Security

Security Architecture and Data Masking in a Big Data Platform

The article outlines Youzan’s evolving security architecture for its big‑data platform—starting with Apache Ranger‑based permission control, moving to a centralized permission‑management service for easier requests and audits, and finally implementing column‑level masking via SQL rewriting to protect sensitive data while balancing usability.

Column MaskingSQL Rewritingaccess control
0 likes · 10 min read
Security Architecture and Data Masking in a Big Data Platform
ITPUB
ITPUB
Jul 18, 2017 · Fundamentals

11 Little‑Known Linux Terminal Tricks to Supercharge Your Workflow

This guide shares eleven practical Linux command‑line techniques—from essential shortcut keys and sudo shortcuts to background execution, scheduling, process management, file browsing, shutdown cancellation, and YouTube video downloading—helping seasoned and new users work faster and smarter in the terminal.

Linuxcommand-linehtop
0 likes · 11 min read
11 Little‑Known Linux Terminal Tricks to Supercharge Your Workflow