Jan Kunigk and Paul Wilkinson show how to secure Solr collections:
The policy shown below establishes four Sentry roles based on the
admin
,operators
,users
, andtechusers
groups.
Administrators are entitled to all actions.
Operators are granted update and query privileges.
Users are granted query privileges.
Tech users are granted update privileges.
These are pretty straightforward role-based access controls. The authors also look at accessing the data via Flume and a couple other technologies.
Comments closed