Managing Cloud Hadoop permissions
    • PDF

    Managing Cloud Hadoop permissions

    • PDF

    Article Summary

    Available in VPC

    By using Sub Account, NAVER Cloud Platform's account management service, you can set various access permissions for Cloud Hadoop. Sub Account provides System Managed policies and User Created policies for setting management and administration permissions.

    Note

    Sub Account is a service provided free of charge upon subscription request. For more details about Sub Account, refer to the Service > Management & Governance > Sub Account menu in the NAVER Cloud Platform portal, as well as the Sub Account Guide.

    System Managed policies

    System Managed policies are role-based policies defined by NAVER Cloud Platform for user convenience. Once System Managed policies are granted to a sub account created in Sub Account, that sub account can use Cloud Hadoop. The following is a brief description about System Managed policies of Cloud Hadoop.

    Policy namePolicy description
    NCP_ADMINISTRATORPermission to access the portal and console in NAVER Cloud Platform in the same manner as main accounts
    NCP_INFRA_MANAGERPermission to use all services in NAVER Cloud Platform and access My Page > Manage notifications in the portal
    NCP_VPC_CLOUD_HADOOP_MANAGERPermission to use all features within VPC-based Cloud Hadoop
    NCP_VPC_CLOUD_HADOOP_VIEWERPermission to only use the View list and Search features in VPC-based Cloud Hadoop

    User Created policies

    User Created policies are policies that users may create. Once User Created policies are granted to a sub account created in Sub Account, that sub account can only use the user-assigned action combinations. The following is a brief description about User Created policies of Cloud Hadoop.

    ClassificationAction nameRelated action(s)Resource typeGroup by resource typeAction description
    ViewView/getClusterList--ClusterView cluster list
    ViewView/getClusterDetailView/getClusterListClusterClusterView cluster details
    ViewView/getVPCList--ClusterView VPC list
    ViewView/getVPCDetailView/getVPCListVPC:VPCClusterSelect a VPC to place the cluster in
    ViewView/getSubnetList--ClusterView subnet list
    ViewView/getSubnetDetailView/getSubnetListVPC:SubnetClusterSelect subnet to place cluster
    ViewView/getLoginKeyList--ClusterView authentication key list
    ViewView/getBucketList--ClusterView bucket list
    ViewView/getBucketDetailView/getBucketListObject Storage:BucketClusterSelect bucket to connect
    ViewView/getClusterACGDetail-ClusterClusterView ACG details
    ViewView/getDBUserListView/getDBServiceList
    View/getDBServiceDetail
    View/getClusterList
    View/getClusterDetail
    Cluster
    VPCCloudDBforMySQL:Service
    ClusterView user list on Cloud DB for MySQL
    ViewView/getDBServiceListView/getClusterList
    View/getClusterDetail
    ClusterClusterView service (DB) list on Cloud DB for MySQL
    ViewView/getDBServiceDetailView/getDBServiceList
    View/getClusterList
    View/getClusterDetail
    Cluster
    VPCCloudDBforMySQL:Service
    ClusterView service (DB) details on Cloud DB for MySQL
    ViewView/getObjectListView/getBucketListObject Storage:BucketClusterViews bucket object list and details
    ViewView/getHadoopDashboardView/getClusterListClusterClusterViews Hadoop monitoring dashboard of cluster
    ViewView/getOSDashboardView/getClusterListClusterClusterViews OS monitoring dashboard of cluster
    ViewView/getNotebookListNotebookView notebook list
    ViewView/getNotebookDetailView/getNotebookListNotebookNotebookView notebook details
    ViewView/getNotebookACGDetailNotebookNotebookCheck Notebook ACG details
    ViewView/getNotebookBucketDetailView/getBucketListObject Storage:BucketNotebookSelect a bucket to connect to the notebook
    ViewView/getDependentClusterListView/getClusterList
    View/getClusterDetail
    ClusterNotebookView Cloud Hadoop cluster list to connect to the notebook
    ViewView/getNotebookBucketListNotebookView Cloud Hadoop bucket list to connect to the notebook
    ViewView/getHadoopClusterEventListView/getClusterListClusterQuery event history of Cloud Hadoop cluster.
    ChangeChange/createCloudHadoopClusterView/getClusterList
    View/getVPCList
    View/getSubnetList
    View/getLoginKeyList
    View/getBucketList
    View/getVPCDetail
    View/getSubnetDetail
    View/getBucketDetail
    View/getObjectList
    ObjectStorage:Bucket
    VPC:Subnet
    VPC:VPC
    ClusterCreate cluster
    ChangeChange/createLoginKey--ClusterCreate authentication key
    ChangeChange/deleteCloudHadoopClusterView/getClusterList
    View/getClusterDetail
    ClusterClusterDelete cluster
    ChangeChange/changeCountOfDataNodeView/getClusterList
    View/getClusterDetail
    ClusterClusterChange the number of cluster nodes
    ChangeChange/resetAdminPasswordView/getClusterList
    View/getClusterDetail
    ClusterClusterInitialize cluster admin password
    ChangeChange/manageLoginKeyView/getClusterList
    View/getClusterDetail
    View/getLoginKeyList
    -ClusterManage authentication key
    ChangeChange/changeSpecView/getClusterList
    View/getClusterDetail
    ClusterClusterChange cluster specifications
    ChangeChange/connectExternalHiveMetastoreView/getDBServiceList
    View/getDBServiceDetail
    View/getClusterList
    View/getClusterDetail
    View/getDBUserList
    ClusterClusterConnect an external Hive metastore with the Cloud Hadoop cluster in operation.
    ChangeChange/createCloudHadoopNotebookView/getNotebookList
    View/getVPCList
    View/getVPCDetail
    View/getSubnetList
    View/getSubnetDetail
    View/getLoginKeyList
    View/getNotebookBucketList
    View/getNotebookBucketDetail
    View/getDependentClusterList
    View/getClusterList
    View/getClusterDetail
    NotebookCreate Cloud Hadoop Notebook
    ChangeChange/deleteCloudHadoopNotebookView/getNotebookList
    View/getNotebookDetail
    NotebookNotebookDelete Cloud Hadoop Notebook
    Caution

    Even when you are granted permission for a specific action, if you are not also granted permissions for the related actions that are required, then you won't be able to perform jobs properly. To prevent such issues, Sub Account provides a feature that automatically grants permissions for related actions when granting action permissions. However, if you deselect related actions that are automatically granted, then the system determines that it was done intentionally by the main account user and does not forcibly include them. Thus, be careful when setting permissions.


    Was this article helpful?

    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.