Hi Aaron,

Are you talking about Securing Lucene Index ?

If so You can try using https://code.google.com/p/lucenetransform/.

Thanks and Regards
Vignesh Srinivasan
9739135640


On Mon, Jun 24, 2013 at 11:21 AM, Aaron Greenspan
<aar...@thinkcomputer.com>wrote:

> Hi,
>
> Some more unsolicited feedback since my last experience setting up Solr…
>
> I am concerned that having a duplicate copy of a large part of my database
> up on the internet at a guessable location, available for the world to see,
> is probably not such a good idea. So I went to look up the various methods
> available to secure Solr, and found that all of them are terrible, if
> recent documentation is even available, which it's often not. Most of the
> blog posts I found are from 2010, presumably long before the version I use
> was created.
>
> According to the Solr Security wiki (
> http://wiki.apache.org/solr/SolrSecurity), it looks like you can edit
> some XML files (if you can find them) in complex ways to turn on HTTP
> authentication, or you can restrict the IP that Solr runs on. Less clear is
> some way to change the default port number from 8983.
>
> The wiki itself is full of semi-useless information, which is pretty
> infuriating since it's supposed to be the best source. The XML edits seem
> to change for different versions of Solr. Statements like "standard Java
> web security can be added by tuning the container and the Solr web
> application configuration itself via web.xml" are not helpful to me. I
> don't know what "standard Java web security" is, nor am I inclined to trust
> it since "Java security" is already believed by many to be something of an
> oxymoron. I don't have any idea where the file web.xml is--the default Solr
> install is a nest of needlessly complex folders. (Is it the one at
> ~/example/solr-webapp/webapp/WEB-INF/web.xml?) At the end of the page,
> there is a reference to "server.xml", but according to my install there is
> no such file.
>
> Basically, instead of (or at least on top of) this giant mess, the web
> interface for Solr should prompt the user, before doing anything else, to
> set up an administrative username and password, which one should be able to
> optionally require for queries and/or updates. It's just common sense. If I
> remember correctly, Netscape Enterprise Server prompted you to do that a
> decade and a half ago, and the internet has gotten a lot less friendly
> since then. You should also be able to limit the IP addresses that Solr
> runs on through the web interface, and change the port if desired, (or
> add/remove/edit users and passwords).
>
> The web server should also log when someone signs into the administrative
> interface, and from what IP address. There's probably some way to do this
> through the "Logging/Level" tree, but it's not exactly clear to me.
>
> In the meantime, I found that the approach most likely to work, and least
> likely to take a week to implement, was just to use iptables to set up a
> firewall on port 8983. Contrary to what one post on StackExchange (voted
> -1) says, it works only if you do the ACCEPT rules (iptables -A INPUT -p
> tcp -s xxx.xxx.xxx.xxx --dport 8983 -j ACCEPT) before the DROP all rule
> (iptables -A INPUT -p tcp --dport 8983 -j DROP). But either way, that's a
> pretty ridiculous solution. I don't know of any other server product that
> disregards security so willingly.
>
> Aaron
>
>
> Aaron Greenspan
> President & CEO
> Think Computer Corporation
>
> telephone +1 415 670 9350
> fax +1 415 373 3959
> e-mail aar...@thinkcomputer.com
> web http://www.thinkcomputer.com
>
>
>


-- 
Thanks and Regards
Vignesh Srinivasan
9739135640

Reply via email to