Configure Drill
- Configure Drill Introduction
- Configuring Drill Memory
- Securing Drill
- Securing Drill Introduction
- Secure Communication Paths
- Roles and Privileges
- Configuring User Impersonation
- Configuring Inbound Impersonation
- Configuring User Impersonation with Hive Authorization
- Configuring User Security
- Configuring Plain Security
- Configuring SSL/TLS for Encryption
- Using libpam4j as the PAM Authenticator
- Using jpam as the PAM Authenticator
- Configuring htpasswd file authentication
- Configuring HashiCorp Vault authentication
- Configuring Kerberos Security
- Configuring Drill to use SPNEGO for HTTP Authentication
- Configuring Web UI and REST API Security
- Configuring Custom ACLs to Secure znodes
- Configuring a Multitenant Cluster
- Configuring a Multitenant Cluster Introduction
- Configuring Multitenant Resources
- Configuring Resources for a Shared Drillbit
- Configuration Options
- Configuration Options Introduction
- Start-Up Options
- Planning and Execution Options
- Persistent Configuration Storage
- Global Query List
- Ports and Bind Addresses Used by Drill
- Configuring the Drill Shell
- Configuring cgroups to Control CPU Usage