下载  >  行业  >  互联网  > Securing Hadoop

Securing Hadoop 评分

教你如何搭建安全的Hadoop的相关策略及其他安全问题
Securing Hadoop Copyright o 2013 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals However Packt publishing cannot guarantee the accuracy of this information. First published: November 2013 Production reference: 1181113 Published by Packt Publishing Ltd Livery place 35 Livery street Birmingham b3 2PB, UK lSBN978-1-78328-5259 www.packtpub.com CoverImagebyRavajiBabu(ravajibabu@outlook.com) Credits Author Project Coordinator Sudheesh Narayanan Akash PooJary Reviewers Proofreader Mark Kerzner Ameesha Green Nitin Paw Acquisition Editor Rekha nair Antony Lowe Graphics Commissioning Editor Sheetal Aute Shaon basu Ronak dhruv Valentina silva Technical editors Disha haria Amit ramadas Abhinash sahu amit shetty Production Coordinator Nileshr. mohite Cover work Nileshr. mohite About the author Sudheesh Narayanan is a Technology Strategist and Big Data Practitioner with expertise in technology consulting and implementing Big Data solutions. With over 15 years of it experience in Information management, Business Intelligence Big data &r analytics, and cloud j2Ee application development, he provided his expertise in architecting, designing, and developing Big Data products, Cloud management platforms, and highly scalable platform services. His expertise in Big Data includes Hadoop and its ecosystem components, NOSQL databases(MongoDB, Cassandr and HBase), Text Analytics(GATE and Open NLP), Machine Learning( Mahout Weka, and r), and Complex Event Processing Sudheesh is currently working with Genpact as the Assistant Vice President and Chief Architect- Big Data, with focus on driving innovation and building Intellectual Property assets, frameworks, and solutions. Prior to Genpact, he was the co-inventor and Chief Architect of the Infosys Big Data Edge product i would like to thank my wife, smita and son aryan for their sacrifices and support during this journey, and my dad, mom, and sister for encouraging me at all times to make a difference by contributing back to the community. This book would not have been possible without their encouragement and constant support pecial thanks to Rupak and Debika for investing their personal time over weekends to help me experiment with a few ideas on Hadoop security, and for being the bouncing board I would like to thank Shwetha Sivaram, Ajay manpreet and venky for providing constant feedback and helping me make continuous improvements in my securing Hadoop journey Above all, I would like to acknowledge my sincere thanks to my teacher, Prof N. C. Jain; my leaders and coach paddy vishnu bhat Sandeep bhagat, Jaikrishnan, Anil D'Souza, and KNM Rao for their mentoring and guidance in making me who i am today so that i could write this book About the reviewers Mark Kerzner holds degrees in Law, Math, and Computer Science. He has been designing software for many years and Hadoop-based systems since 2008. He is the President of SHMsoft, a provider of Hadoop applications for various verticals, and a co-author of the I hadoop illuminated book/project. Ile has authored and cO-authored books and patents I would like to acknowledge the help of my colleagues, in particular, Sujee maniyam, and last but not the least, my multitalented family Nitin Pawar started his career as a Release engineer and Tools Developer, then moved into different roles such as operations, solutions engineering, process Architect, and trying to solve problems related to customer success managemen p engineering, and Big Data analytics. Currently, he is working as a Big Data Syste He has mainly been working with technologies revolving around the first generation Hadoop ecosystem Www.Packtpub.com Support files, eBooks, discount offers and more Youmightwanttovisitwww.Packtpub.comforsupportfilesanddownloadsrelatedto your boo k Did you know that Packt offers eBook versions of every book published, with PDF and epubfilesavailable?YoucanupgradetotheeboOkversionatwww.packtpub.comand as a print book customer, you are entitled to a discount on the ebook copy. Get in touch withusatservice@packtpub.comformoredetails Atwww.packtpub.comyoucanalsoreadacollectionoffreetechnicalarticlessignup for a range of free newsletters and receive exclusive discounts and offers on Packt books and e books RIPACKT LiB http://packtlib.Packtpub.com Do you need instant solutions to your If questions? PacktLib is Packt's online digital book library. Here, you can access, read and search across Packt's entire library of books Why Subscribe? Fully searchable across every book published by Packt Copy and paste, print and bookmark content On demand and accessible via web browser Free Access for Packt account holders IfyouhaveanaccountwithPacktatwww.Packtpub.comyoucanusethistoaccess PacktLib today and view nine entirely free books Simply use your login credentials for immediate access Table of contents Preface Chapter 1: Hadoop Security Overview 7 Why do we need to secure Hadoop? Challenges for securing the Hadoop ecosystem Key security considerations 890 Reference architecture for Big data security Summary 12 Chapter 2: Hadoop Security Design 13 What is Kerberos Key Kerberos terminologies 14 How Kerberos works? 15 Kerberos advantages The hadoop default security model without Kerberos Hadoop Kerberos security implementation 19 User-level access controls 19 Service-level access controls 19 User and service authentication 20 Delegation Token 20 Job token 20 Block Access Token 21 Summary Chapter 3: Setting Up a Secured Hadoop Cluster 25 Prerequisites 25 Setting up Kerberos 26 Installing the Key Distribution Center 27 Configuring the Key Distribution Center 29 Establishing the KDC database Setting up the administrator principal for KDc 32 Table of contents Starting the Kerberos daemons Setter the first Kerb Adding the user or service principals 33 Configuring LDAP as the Kerberos database Supporting aES-256 encryption for a Kerberos ticket 33 Configuring Hadoop with Kerberos authentication 34 Setting up the Kerberos client on all the Hadoop nodes 34 Setting up the Hadoop service principals 35 Creating a keytab file for Hadoop services Distributing the keytab file for all the slaves Setting up Hadoop configuration files HDFS-related configurations 37 MRV1-related configurations MRV2-related configurations 39 Setting up secured DataNode Setting up the Task Controller class Configuring users for Hadoop 42 Automation of a secured Hadoop deployment 43 Summary 43 Chapter 4: Securing the Hadoop Ecosystem 45 Configuring Kerberos for Hadoop ecosystem components 46 Securing Hive 46 Securing Hive using Sentry 4 Securing Oozie 49 Securing Flume Securing Flume sources Securing Hadoop sink Securing a Flume channel 55 Securing HBase 55 Securing Sqoop 59 Securing pig 60 Best practices for securing the hadoop ecosystem components 61 Summary 62 Chapter 5: Integrating Hadoop with Enterprise Security Systems 63 Integrating Enterprise Identity Management systems 64 Configuring EIM integration with Hadoop 66 Integrating Active-Directory-based ElM with the Hadoop ecosystem 66 Accessing a secured Hadoop cluster from an enterprise network 67 Https 68 HUE 69 Knox Gateway Server Summary 72 Table of Contents Chapter 6: Securing Sensitive Data in Hadoop 73 Securing sensitive data in Hadoop 74 Approach for securing insights in Hadoop 75 Securing data in motion 75 Securing data at rest 76 Implementing data encryption in Hadoop Summary 80 Chapter 7: Security Event and Audit Logging in Hadoop 81 Security Incident and Event Monitoring in a Hadoop Cluster 82 The Security Incident and Event Monitoring(SIEM)system 84 Setting up audit logging in a secured Hadoop cluster 86 Configuring Hadoop audit logs 86 Summary 88 Appendix: Solutions Available for Securing Hadoop 89 Hadoop distribution with enhanced security support 89 Automation of a secured Hadoop cluster deployment 90 Cloudera Manager 90 Zettaset Different Hadoop data encryption options 91 Dataguise for Hadoop 91 Gazzang zNcrypl 92 e Cryptfs for Hadoop 92 Securing the Hadoop ecosystem with Project Rhino 92 Mapping of security technologies with the reference architecture 93 Infrastructure security 93 OS and filesystem security 94 Application security 94 Network perimeter security 94 Data masking and encryption 94 Authentication and authorization 94 Audit logging, security policies, and procedures 95 Security Incident and Event Monitoring 95 Index 97

...展开详情
所需积分/C币:3 上传时间:2015-10-28 资源大小:4.05MB
举报 举报 收藏 收藏
分享 分享
Expert Hadoop Administration Managing Tuning and Securing Spark YARN and HDFS 0分

Expert Hadoop Administration Managing Tuning and Securing Spark YARN and HDFS 英文无水印pdf pdf使用FoxitReader和PDF-XChangeViewer测试可以打开

立即下载
Expert Hadoop Administration Managing,Tuning,and Securing Spark,YARN,and HDFS

Expert Hadoop Administration Managing,Tuning,and Securing Spark,YARN,and HDFS

立即下载
[Hadoop] Hadoop 集群操作管理技巧 (英文版)

☆ 资源说明:☆ [Packt Publishing] Hadoop 集群操作管理技巧 (英文版) [Packt Publishing] Hadoop Operations and Cluster Management Cookbook (E-Book) ☆ 图书概要:☆ Over 60 recipes showing you how to design, configure, manage, monitor, and tune a Hadoop cluster Overview Hands-on recipes to configure a Hadoop cluster from

立即下载
Hadoop in 24 Hours, Sams Teach Yourself

Apache Hadoop is the technology at the heart of the Big Data revolution, and Hadoop skills are in enormous demand. Now, in just 24 lessons of one hour or less, you can learn all the skills and techniques you'll need to deploy each key component of a Hadoop platform in your local environment or in th

立即下载
Hadoop.Security.Protecting.Your.Big.Data.Platform.1491900989

As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also sh

立即下载
Apache Accumulo for Developers

Editorial Reviews Build and integrate Accumulo clusters with various cloud platforms Overview Shows you how to build Accumulo, Hadoop, and ZooKeeper clusters from scratch on both Windows and Linux Allows you to get hands-on knowledge about how to run Accumulo on Amazon EC2, Google Cloud Platform, R

立即下载
Amazon.S3.Cookbook.1785280708

Over 30 hands-on recipes that will get you up and running with Amazon Simple Storage Service (S3) efficiently About This Book Learn how to store, manage, and access your data with AWS SDKs Study the Amazon S3 pricing model and learn how to calculate costs by simulating practical scenarios Optimize

立即下载
英文原版-Expert Hadoop 2 Administration 1st Edition

Managing, Tuning, and Securing Spark, YARN, and HDFS The Comprehensive, Up-to-Date Apache Hadoop Administration Handbook and Reference  ,解压密码 share.weimo.info

立即下载
ModbusTCP/RTU网关设计

基于UIP协议栈,实现MODBUS联网,可参考本文档资料,有MODBUS协议介绍

立即下载
html+css+js制作的一个动态的新年贺卡

该代码是http://blog.csdn.net/qq_29656961/article/details/78155792博客里面的代码,代码里面有要用到的图片资源和音乐资源。

立即下载
iCopy解码软件v1.0.1.7.exe

解ic,id,hid卡密码破解ic,id,hid卡密码破解ic,id,hid破解ic,id,hid卡破解ic,id,hid卡密码密码卡密码破解ic,id,hid卡...

立即下载
分布式服务框架原理与实践(高清完整版)

第1章应用架构演进1 1.1传统垂直应用架构2 1.1.1垂直应用架构介绍2 1.1.2垂直应用架构面临的挑战4 1.2RPC架构6 1.2.1RPC框架原理6 1.2.2最简单的RPC框架实现8 1.2.3业界主流RPC框架14 1.2.4RPC框架面临的挑战17 1.3SOA服务化架构18 1.3.1面向服务设计的原则18 1.3.2服务治理19 1.4微服务架构21 1.4.1什么是微服务21 1.4.2微服务架构对比SOA22 1.5总结23 第2章分布式服务框架入门25 2.1分布式服务框架诞生背景26 2.1.1应用从集中式走向分布式.26?

立即下载
Camtasia 9安装及破解方法绝对有效

附件中注册方法亲测有效,加以整理与大家共享。 由于附件大于60m传不上去,另附Camtasia 9百度云下载地址。免费自取 链接:http://pan.baidu.com/s/1kVABnhH 密码:xees

立即下载
电磁场与电磁波第四版谢处方 PDF

电磁场与电磁波第四版谢处方 (清晰版),做天线设计的可以作为参考。

立即下载
压缩包爆破解密工具(7z、rar、zip)

压缩包内包含三个工具,分别可以用来爆破解密7z压缩包、rar压缩包和zip压缩包。

立即下载
source insight 4.0.0087 注册机序列号Patched(2017/10/17)

最新的sourceinsight4.0.0087和谐license及和谐文件。真正的4087版本,使用附件中的license文件,替换sourceinsight4.exe

立即下载
Java项目经验汇总(简历项目素材)

Java项目经验汇总(简历项目素材)

立即下载
支付宝转账demo-实现提现功能

支付宝单笔转账,实现提现功能,自己用到,所以分享给大家,希望可以帮到大家。(内有demo实例,望大家多多提意见)

立即下载
算法第四版 高清完整中文版PDF

《算法 第4版 》是Sedgewick之巨著 与高德纳TAOCP一脉相承 是算法领域经典的参考书 涵盖所有程序员必须掌握的50种算法 全面介绍了关于算法和数据结构的必备知识 并特别针对排序 搜索 图处理和字符串处理进行了论述 第4版具体给出了每位程序员应知应会的50个算法 提供了实际代码 而且这些Java代码实现采用了模块化的编程风格 读者可以方便地加以改造

立即下载
计算机中丢失api-ms-win-crt-runtime-l1-1-0.dll的修复方案

计算机中丢失api-ms-win-crt-runtime-l1-1-0.dll的修复方案

立即下载