Book Image

Hadoop Operations and Cluster Management Cookbook

By : Shumin Guo
Book Image

Hadoop Operations and Cluster Management Cookbook

By: Shumin Guo

Overview of this book

<p>We are facing an avalanche of data. The unstructured data we gather can contain many insights that could hold the key to business success or failure. Harnessing the ability to analyze and process this data with Hadoop is one of the most highly sought after skills in today's job market. Hadoop, by combining the computing and storage powers of a large number of commodity machines, solves this problem in an elegant way!</p> <p>Hadoop Operations and Cluster Management Cookbook is a practical and hands-on guide for designing and managing a Hadoop cluster. It will help you understand how Hadoop works and guide you through cluster management tasks.</p> <p>This book explains real-world, big data problems and the features of Hadoop that enables it to handle such problems. It breaks down the mystery of a Hadoop cluster and will guide you through a number of clear, practical recipes that will help you to manage a Hadoop cluster.</p> <p>We will start by installing and configuring a Hadoop cluster, while explaining hardware selection and networking considerations. We will also cover the topic of securing a Hadoop cluster with Kerberos, configuring cluster high availability and monitoring a cluster. And if you want to know how to build a Hadoop cluster on the Amazon EC2 cloud, then this is a book for you.</p>
Table of Contents (15 chapters)
Hadoop Operations and Cluster Management Cookbook
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Securing a Hadoop cluster with Kerberos


Recent Hadoop releases have added the security feature by integrating Kerberos into Hadoop. Kerberos is a network authentication protocol that provides strong authentication for client/server applications. Hadoop uses Kerberos to secure data from unexpected and unauthorized accesses. It achieves this by authenticating on the underlying Remote Procedure Calls (RPC). In this recipe, we will outline steps to configure Kerberos authentication for a Hadoop cluster.

Getting ready

Kerberos was created by MIT. It was designed to provide strong authentication for client/server applications by using secret key cryptography. The Kerberos protocol requires that a client provide its identity to the server and vice versa. When their identities are proved by Kerberos, all of their following communication will be encrypted.

Before getting started, we assume that our Hadoop has been properly configured without any problems, and all the Hadoop daemons are running without...