Book Image

Mastering Mesos

By : Dipa Dubhashi, Akhil Das
Book Image

Mastering Mesos

By: Dipa Dubhashi, Akhil Das

Overview of this book

Apache Mesos is open source cluster management software that provides efficient resource isolations and resource sharing distributed applications or frameworks. This book will take you on a journey to enhance your knowledge from amateur to master level, showing you how to improve the efficiency, management, and development of Mesos clusters. The architecture is quite complex and this book will explore the difficulties and complexities of working with Mesos. We begin by introducing Mesos, explaining its architecture and functionality. Next, we provide a comprehensive overview of Mesos features and advanced topics such as high availability, fault tolerance, scaling, and efficiency. Furthermore, you will learn to set up multi-node Mesos clusters on private and public clouds. We will also introduce several Mesos-based scheduling and management frameworks or applications to enable the easy deployment, discovery, load balancing, and failure handling of long-running services. Next, you will find out how a Mesos cluster can be easily set up and monitored using the standard deployment and configuration management tools. This advanced guide will show you how to deploy important big data processing frameworks such as Hadoop, Spark, and Storm on Mesos and big data storage frameworks such as Cassandra, Elasticsearch, and Kafka.
Table of Contents (16 chapters)
Mastering Mesos
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Preface
Index

Frameworks – Authentication, authorization, and access control


From the user's perspective, authentication, authorization, and access control often appear to be the same thing because they are typically implemented together. However, there are some important distinctions between them. Some of these are listed below to provide better clarity on what each of these concepts means:

  • Authentication: Authentication is a process by which you verify that someone or something is who or what they claim to be, respectively. It typically involves implementing one or more methods of demonstrating identity. The result of an authentication procedure is normally a yes/no answer.

  • Authorization: Authorization is used to establish whether the application or user (already authenticated) is allowed to perform the requested task. It is used to define and determine what an authenticated application/user can and cannot do. An authorization module typically includes a mechanism for defining rules (such as roles,...