SmartData 3.4.0 and later support JindoFS OSS credential providers. You can use a JindoFS OSS credential provider to save an encrypted AccessKey pair in a file. This prevents the AccessKey pair from being leaked.
Limits
JindoRangerCredentialsProvider and AssumeRoleStsCredentialsProvider are available only in SmartData 3.8.0 and later.
Configure a JindoFS OSS credential provider
Global configuration
You can configure different credential providers based on your business requirements. The following table describes the supported credential providers.
Type | Description |
---|---|
TemporaryAliyunCredentialsProvider | This credential provider is suitable for scenarios in which an AccessKey pair with
a validity period and a security token with a validity period are used to access OSS.
To use this credential provider, you must append com.aliyun.emr.fs.auth.TemporaryAliyunCredentialsProvider to the value of the fs.jfs.cache.oss.credentials.provider parameter and add the following configuration items on the smartdata-site tab:
|
SimpleAliyunCredentialsProvider | This credential provider is suitable for scenarios in which an AccessKey pair with
a long validity period is used to access OSS.
To use this credential provider, you must append com.aliyun.emr.fs.auth.SimpleAliyunCredentialsProvider to the value of the fs.jfs.cache.oss.credentials.provider parameter and add the following configuration items on the smartdata-site tab:
|
EnvironmentVariableCredentialsProvider | To use this credential provider, you must configure the following parameters in the
environment variable file:
|
JindoCommonCredentialsProvider | This is a common credential provider. After you configure the required parameters,
you can use this credential provider in JindoOSS and JindoFS.
To use this credential provider, you must append com.aliyun.emr.fs.auth.JindoCommonCredentialsProvider to the value of the fs.jfs.cache.oss.credentials.provider parameter and add the following configuration items on the smartdata-site tab:
|
EcsStsCredentialsProvider | This credential provider does not require an AccessKey pair. You can access OSS in
password-free mode.
To use this credential provider, you must append com.aliyun.emr.fs.auth.EcsStsCredentialsProvider to the value of the fs.jfs.cache.oss.credentials.provider parameter. |
JindoRangerCredentialsProvider | This credential provider is suitable for scenarios in which you configure parameters
in Ranger to control access to OSS.
To use this credential provider, you must append com.aliyun.emr.fs.auth.JindoRangerCredentialsProvider to the value of the fs.jfs.cache.oss.credentials.provider parameter and add a custom parameter whose name is namespace.oss.permission.method and value is ranger on the namespace tab. Note You must restart Jindo Namespace Service after you add the custom parameter. For more
information, see Restart Jindo Namespace Service.
|
AssumeRoleStsCredentialsProvider | This credential provider is suitable for scenarios in which a temporary AccessKey
pair that assumes a RAM role is obtained to access OSS.
To use this credential provider, you must append com.aliyun.emr.fs.auth.AssumeRoleStsCredentialsProvider to the value of the fs.jfs.cache.oss.credentials.provider parameter and add the following configuration items on the smartdata-site tab:
|
Bucket-level configuration
You can configure different credential providers based on your business requirements. The following table describes the supported credential providers.
Type | Description |
---|---|
TemporaryAliyunCredentialsProvider | This credential provider is suitable for scenarios in which an AccessKey pair with
a validity period and a security token with a validity period are used to access OSS.
To use this credential provider, you must set the fs.jfs.cache.oss.bucket.XXX.credentials.provider parameter to com.aliyun.emr.fs.auth.TemporaryAliyunCredentialsProvider and add the following configuration items on the smartdata-site tab:
|
SimpleAliyunCredentialsProvider | This credential provider is suitable for scenarios in which an AccessKey pair with
a long validity period is used to access OSS.
To use this credential provider, you must set the fs.jfs.cache.oss.bucket.XXX.credentials.provider parameter to com.aliyun.emr.fs.auth.SimpleAliyunCredentialsProvider and add the following configuration items on the smartdata-site tab:
|
EnvironmentVariableCredentialsProvider | To use this credential provider, you must configure the following parameters in the
environment variable file:
|
JindoCommonCredentialsProvider | This is a common credential provider. After you configure the required parameters,
you can use this credential provider in JindoOSS and JindoFS.
To use this credential provider, you must set the fs.jfs.cache.oss.bucket.XXX.credentials.provider parameter to com.aliyun.emr.fs.auth.JindoCommonCredentialsProvider and add the following configuration items on the smartdata-site tab:
|
EcsStsCredentialsProvider | This credential provider does not require an AccessKey pair. You can access OSS in
password-free mode.
To use this credential provider, you must set the fs.jfs.cache.oss.bucket.XXX.credentials.provider parameter to com.aliyun.emr.fs.auth.EcsStsCredentialsProvider. |
JindoRangerCredentialsProvider | This credential provider is suitable for scenarios in which you configure parameters
in Ranger to control access to OSS.
To use this credential provider, you must append com.aliyun.emr.fs.auth.JindoRangerCredentialsProvider to the value of the fs.jfs.cache.oss.bucket.XXX.credentials.provider parameter and add a custom parameter whose name is namespace.oss.permission.method and value is ranger on the namespace tab. Note You must restart Jindo Namespace Service after you add the custom parameter. For more
information, see Restart Jindo Namespace Service.
|
AssumeRoleStsCredentialsProvider | This credential provider is suitable for scenarios in which a temporary AccessKey
pair that assumes a RAM role is obtained to access OSS.
To use this credential provider, you must append com.aliyun.emr.fs.auth.AssumeRoleStsCredentialsProvider to the value of the fs.jfs.cache.oss.bucket.XXX.credentials.provider parameter and add the following configuration items on the smartdata-site tab:
|
Restart Jindo Namespace Service
If you use JindoRangerCredentialsProvider, you must restart Jindo Namespace Service after you add the required configuration items.
- In the upper-right corner of the Configure tab on the SmartData service page, choose .
- In the Cluster Activities dialog box, specify Description and click OK.
- In the Confirm message, click OK.