We will use here HAProxy which is an open-source HA load balancer and proxy server for TCP and HTTP based applications. Ngnix is not recommended as we do not have webserver traffic to load balance. Let’s first install HAProxy on the proxy server. yum -y inst…
Read moreThere are multiple ways to do real time analytics on Azure, depends on source type and the analytics which we want to perform. This article will introduce the major services in Azure which are involved for real time data solution and at the end will compare all to kno…
Read moreBefore I start details for Delta Architecture lets recap Lambda Architecture first, then you will be able to appreciate the beauty of delta Architecture. Lambda architecture is a popular technique where records are processed by a batch system and streaming system…
Read moreIf you need to capture a network trace/TCP Dump of a client or server here are some simple ways using which usually I do this: Capture fiddler trace 1) Install Fiddler from http://www.telerik.com/download/fiddler/fiddler4 if not already done 2) Launch fid…
Read moreInstalling a Hadoop cluster typically involves unpacking the software on all the machines in the cluster or installing it via a packaging system as appropriate for your operating system. It is important to divide up the hardware into functions. Typically one machin…
Read moreSecurity-Enhanced Linux (SELinux) is a Linux kernel security module that provides a mechanism for supporting access control security policies, including mandatory access controls (MAC). Without SELinux enabled, only traditional discretionary access control (DAC) …
Read moreWhen we install hadoop we get few jars to test the installation and for benchmarking. In Cloudera distribution: /opt/cloudera/parcels/CDH-6.1.1-1.cdh6.1.1.p0.875250/lib/hadoop-mapreduce/hadoop-mapreduce-examples.jar /opt/cloudera/parcels/CDH-6.1.1-1.cdh6.1.1.p0.…
Read moreBefore start using ACL, make sure it is enable. If you are using Cloudera distribution use below property in HDFS configuration: Alternatively you can find in yarn-site.xml
Read moreRPC server stores authorization in relation database. Apache Sentry is a granular, role-based authorization module for Hadoop. Sentry provides the ability to control and enforce precise levels of privileges on data for authenticated users and applications on a Hadoo…
Read moreUser security contains three parts: Authentication, Authorization and Audit Authentication simply means verifying who the user claims to be. There are three factors of authentication: Who you are, What you know and What you have You may have heard the term two-facto…
Read moreHadoop cluster setup requires SSH key based authentication among master and slave nodes. Using SSH key based authentication, master node can connect to slave nodes or secondary nodes to start/stop the daemons\processes without any password.
Read moreHDFS Replication is expensive – the default 3x replication scheme in HDFS has 200% overhead in storage space and other resources (e.g., network bandwidth). However, for warm and cold datasets with relatively low I/O activities, additional block replicas are rarely acc…
Read moreMRv1 daemon • Namenode • Secondary namenode • Jobtracker • Datanode • Tasktracker The jobtracker daemon had these two parts tightly coupled within itself and was responsible for managing the tasks and all its related operations by interacting with th…
Read more