Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Securing Hadoop
  • Table Of Contents Toc
  • Feedback & Rating feedback
Securing Hadoop

Securing Hadoop

By : Sudheesh Narayan
4.5 (2)
close
close
Securing Hadoop

Securing Hadoop

4.5 (2)
By: Sudheesh Narayan

Overview of this book

Security of Big Data is one of the biggest concerns for enterprises today. How do we protect the sensitive information in a Hadoop ecosystem? How can we integrate Hadoop security with existing enterprise security systems? What are the challenges in securing Hadoop and its ecosystem? These are the questions which need to be answered in order to ensure effective management of Big Data. Hadoop, along with Kerberos, provides security features which enable Big Data management and which keep data secure. This book is a practitioner's guide for securing a Hadoop-based Big Data platform. This book provides you with a step-by-step approach to implementing end-to-end security along with a solid foundation of knowledge of the Hadoop and Kerberos security models. This practical, hands-on guide looks at the security challenges involved in securing sensitive data in a Hadoop-based Big Data platform and also covers the Security Reference Architecture for securing Big Data. It will take you through the internals of the Hadoop and Kerberos security models and will provide detailed implementation steps for securing Hadoop. You will also learn how the internals of the Hadoop security model are implemented, how to integrate Enterprise Security Systems with Hadoop security, and how you can manage and control user access to a Hadoop ecosystem seamlessly. You will also get acquainted with implementing audit logging and security incident monitoring within a Big Data platform.
Table of Contents (15 chapters)
close
close
Securing Hadoop
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
2
Index

Prerequisites


The following are the prerequisites for installing a secure Hadoop cluster:

  • Root or sudo access for the user installing the cluster.

  • Hadoop cluster is configured and running in a non-secured mode.

  • Proper file permissions are assigned to local and Hadoop system directories.

  • Incase, we are building Kerberos from the source code, we will need the GCC compiler to compile the Kerberos source code. On RHEL/CentOS, run the yum groupinstall 'Development Tools' command to install all the dependencies.

  • DNS resolutions and host mappings are working for all machines in the cluster. Kerberos doesn't work with IP. Reverse DNS lookup on all nodes should be working and returning the fully qualified hostname.

  • The ports required for Kerberos are port 88 for KDC and port 749 for admin services. Since all nodes will have to connect with KDC for authentication, port 88 should be open for all nodes in the cluster running the Hadoop daemons.

  • The name of the Kerberos realm that will be used for authenticating...

Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Securing Hadoop
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon