Ok rohit, You have the code and documentation. Your last question is confusing me as it looks having little experience on Unix. Unix: - The root-key is the holy grail you do not want to use without a good reason. Root-kits are with the bad guys, the blackhats. - you have mountpoints defining the ammount of storage of storage pool. Needing "root" acces and (SAN) storage mangement - Security is set up/done by the "owner" that is the key creating the files/directories. Within a HFS you have to define a well defined structure with keys and groups to orgnize and the logic and the security that is associated with it. It is complicated and confusing when you have never faced it. Knowing all things like the special behavior lik gid-sticky bit on directories it is becoming seen "as usual". Some special versions of Unix exist adding some security approach of the far more advanced (of this aspect) MS-Windows. Hadoop is based in a Unix approach, never stop learning. The instructions are about: - placing the sources. You need to store it somewhere. - placing all aggregated data and reprots. You need to run the code and update tables to do that. - You need to able to read the source-data (log-files) As long as you are the only person you could use your personal key. Place it somewhere you have enough storage for that. If this key has limites access it will hold you in this environment (sand-box) If you are fine using a DMS system possible by a SAS/connect you could by-pass the metadata bi/di processing. Not very sensible are: - sasinst as could be possible change unintended your SAS installation - sassrv as kind of root keys to all SAS-data and SAS customers and ....., could be possible change unintended delete or access something form those parts. So you need to define more keys for each dedicate segregated prupose under the condition of the requirement of strict security. This is also something to add as addtional application-server context or a dedicated metadata (other level) on your machine. You do not want to have access to other parts on your system or do you? With a sand-box I mean setting up OS storage and the security in a way you can not access something you do not need. Category:Principle - OWASP
... View more