Skip to main content

How to Perform Detection in HBase

The Detection process allows user to perform discovery in the HBase database. This process helps you to fetch sensitive information across HBase system.

Pre-requisites

Following are the pre-requisites:

  1. Controller must be installed. For detailed information about the installation process, refer Install DSM Administrator in Linux and Install DSM Administrator in Windows.

  2. HBase IDP must be Installed. To know more on how to install HBase IDP, refer HBase IDP.

Steps to Perform Detection

The following section of this page outlines the step-by-step procedure to discover sensitive information stored on HBase system.

  1. The first step is to create a policy in the PK Protect. Policy allows you create a set of Sensitive Data Types which are presented in the buckets. You can define your policies as well. To know more about each field in the Policy screen, refer Hadoop & Files Policy.

  2. The next step in the process of performing Detection is to create a task. The Task screen enables a user to select buckets of the objects in which sensitive information is stored. To know more about each field in the Task screen, refer Create Task in HBase.

View Detection Results

Once the task is executed successfully, the results get generated which depict what all information in the selected objects were sensitive. A list of detailed information is displayed in the Results screen. To know more about each tab in the Results, refer HBase Results.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.