Practical Hadoop Security

By Bhushan Lakhe

Practical Hadoop Security Cover Image

Practical Hadoop Security is a comprehensive resource for administrators planning a production Hadoop deployment who want to secure and encrypt their Hadoop clusters.

Full Description

  • ISBN13: 978-1-4302-6544-3
  • 260 Pages
  • User Level: Intermediate to Advanced
  • Publishing December 16, 2014, but available now as part of the Alpha Program
  • Available eBook Formats: EPUB, MOBI, PDF
  • Print Book Price: $59.99
  • eBook Price: $41.99

Related Titles

Full Description

Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive study of how to implement defined security within a Hadoop cluster in a hands-on way.

You will start with a detailed overview of all the security options available for Hadoop, including popular extensions like Kerberos and OpenSSH, and then delve into a hands-on implementation of user security (with illustrated code samples) with both in-the-box features and with security extensions implemented by leading vendors.

No security system is complete without a monitoring and tracing facility, so Practical Hadoop Security next steps you through audit logging and monitoring technologies for Hadoop, as well as ready to use implementation and configuration examples--again with illustrated code samples.

The book concludes with the most important aspect of Hadoop security – encryption. Both types of encryptions, for data in transit and data at rest, are discussed at length with leading open source projects that integrate directly with Hadoop at no licensing cost.

Practical Hadoop Security:

  • Explains importance of security, auditing and encryption within a Hadoop installation
  • Describes how the leading players have incorporated these features within their Hadoop distributions and provided extensions
  • Demonstrates how to set up and use these features to your benefit and make your Hadoop installation secure without impacting performance or ease of use

What you’ll learn

  • Understand your options for implementing Hadoop user security
  • Learn how to configure and set up security for your Hadoop cluster
  • Set up Hadoop audit logs, Hadoop metrics, monitoring technologies and related products
  • Configure and set up logging, metrics and monitoring for your Hadoop cluster
  • Discover and implement encryption for data in transit and data at rest
  • and much more.

Who this book is for

Practical Hadoop Security is an excellent resource for Hadoop administrators who want to secure their environment. IT management planning a production Hadoop environment will also find this text useful. This book is also for students who wish to learn about Hadoop security.

Table of Contents

Table of Contents

Introduction

Part I: Security

Chapter 1: Understanding Security in Hadoop

1. Hadoop security overview and challenges

2. POSIX based user security

3. Kerberos Architecture

4. OpenSSH Architecture

Chapter 2: Implementing User Security in Hadoop

1. POSIX based user security implementation

2. Kerberos security implementation

3. OpenSSH security implementation

Chapter 3: Security extensions provided by various vendors

1. Sentry by Cloudera

2. LDAP/Active Directory linked gateways (Knox) – used by Hortonworks

3. DgHadoop (developed by Dataguise) offered with MapR Hadoop Distribution

4. Zettaset Secure Data Warehouse

Part II: Audit Logging and Monitoring

Chapter 4: Hadoop Audit Logs: Enabling and Interpreting

1. Enabling Hadoop auditing

2. Configuring log files

3. Using Log4j API

4. Understanding and Interpreting log files

5. Using Flume to consolidate logs

Chapter 5: Monitoring in Hadoop: Popular options

1. Monitoring Overview

2. Metrics in Hadoop

3. Metrics vs. Mapreduce counters

4. InfoSphere Guardium from IBM

5. Cloudera Navigator

6. Nagios

7. Ganglia

Part III: Encryption

Chapter 6: Encryption in Hadoop and current options

1. Hadoop encryption overview

2. Intel Project Rhino

3. IBM InfoSphere Optim

4. Encryption Solutions from Dataguise, Voltage security and Gazzang

Chapter 7: A case study in setting up and using Hadoop encryption

1. Overview of setup

2. Step-by-step instructions with relevant screenshots

Part IV Appendixes

Appendix A: Kerberos & OpenSSH command reference

Appendix B: Hadoop Metrics & Mapreduce counters

Errata

Please Login to submit errata.

No errata are currently published