Book Image

Hands-on DevOps

By : Sricharan Vadapalli
Book Image

Hands-on DevOps

By: Sricharan Vadapalli

Overview of this book

<p>DevOps strategies have really become an important factor for big data environments.</p> <p>This book initially provides an introduction to big data, DevOps, and Cloud computing along with the need for DevOps strategies in big data environments. We move on to explore the adoption of DevOps frameworks and business scenarios. We then build a big data cluster, deploy it on the cloud, and explore DevOps activities such as CI/CD and containerization. Next, we cover big data concepts such as ETL for data sources, Hadoop clusters, and their applications. Towards the end of the book, we explore ERP applications useful for migrating to DevOps frameworks and examine a few case studies for migrating big data and prediction models.</p> <p>By the end of this book, you will have mastered implementing DevOps tools and strategies for your big data clusters.</p>
Table of Contents (22 chapters)
Title Page
Credits
About the Author
About the Reviewers
www.PacktPub.com
Customer Feedback
Preface
11
DevOps Adoption by ERP Systems
12
DevOps Periodic Table
13
Business Intelligence Trends
14
Testing Types and Levels
15
Java Platform SE 8

DevOps for authentication and security


Data security with Kerberos is listed as the the following process

  • An authentication protocol
  • Tickets to authenticate
  • Avoid locally storing passwords or sending them over the internet
  • A trusted third-party validation
  • Symmetric-key cryptography

Kerberos realm

Kerberos realm is based on policy management definitions; it encompasses all that is available to access such as clients, services, hosts, and a Key Distribution Center (KDC) (Authentication Server and the Ticket Granting Server (TGS)). Proof of identity is user/password credentials encrypted with a secret key for the particular service requested, and single sign-on (SSO) authenticates ticket created with a new login or with a cache on the system.

Accessing request to a service or host happens through the following interactions:

  • The authentication server
  • The ticket granting server
  • The service or host machine needed to access
  • KDC stores all of the secret keys for user machines and services in its database
  • The...