Reader small image

You're reading from  Mastering Hadoop 3

Product typeBook
Published inFeb 2019
Reading LevelExpert
PublisherPackt
ISBN-139781788620444
Edition1st Edition
Languages
Tools
Right arrow
Authors (2):
Chanchal Singh
Chanchal Singh
author image
Chanchal Singh

Chanchal Singh has over half decades experience in Product Development and Architect Design. He has been working very closely with leadership team of various companies including directors ,CTO's and Founding members to define technical road-map for company.He is the Founder and Speaker at meetup group Big Data and AI Pune MeetupExperience Speaks. He is Co-Author of Book Building Data Streaming Application with Apache Kafka. He has a Bachelor's degree in Information Technology from the University of Mumbai and a Master's degree in Computer Application from Amity University. He was also part of the Entrepreneur Cell in IIT Mumbai. His Linkedin Profile can be found at with the username Chanchal Singh.
Read more about Chanchal Singh

Manish Kumar
Manish Kumar
author image
Manish Kumar

Manish Kumar works as Director of Technology and Architecture at VSquare. He has over 13 years' experience in providing technology solutions to complex business problems. He has worked extensively on web application development, IoT, big data, cloud technologies, and blockchain. Aside from this book, Manish has co-authored three books (Mastering Hadoop 3, Artificial Intelligence for Big Data, and Building Streaming Applications with Apache Kafka).
Read more about Manish Kumar

View More author details
Right arrow

Chapter 15. Monitoring Hadoop

In the previous chapter, we focused on the different aspects of Hadoop security. So far, we have walked you through the different components in Hadoop, some advanced concepts of the Hadoop ecosystem, and a few of the best design practices that have to be taken into consideration while designing and implementing Hadoop applications. Above all, it is also important to monitor and alert any application system to avoid unnecessary losses or system failure by taking appropriate actions. In this chapter, we will cover the following topics:

  • General monitoring
  • Security monitoring

General monitoring


The of applications goes through various stages, such as the development environment, load test environment, stage environment, and then, finally, it goes to the production environment. Most of the application architecture has more than one component, such as the UI server, backend server, and database server. All components interacts with each other to fulfill the overall application objectives in any enterprise, no matter how big or small, so it is very important to monitor the health of the services. These server are intended to run 24/7 and if any of the servers go down it may lead to the failure of the business objective and may cause huge losses to the company. It is very important to have the proper mechanisms in place to continuously observe the health, failure, network issues, database performance, application performance, and so on, of the applications. Monitoring is the process of capturing important application matrices that can help us obtain a server report...

Security monitoring


Production-level Hadoop ecosystems are implemented with sufficient authentication, authorization, and data security in place. We have already covered various ways to implement security in Hadoop in previous chapters. But, as discussed, while implementation is one thing, monitoring and alerting are another. What if someone log into your system using some other mechanism or someone tries to enter your system by some other route? What if a user performs operations they are not allowed to?

Security information and event management

Security information and event management (SIEM) is an audit that logs entries and from the security system and converts them into an actionable item. This actionable information can be used to detect any potential threat, take action, and add a new investigation into the compliance process. Depending on how the SIEM system is designed, this entire process can be either in batch or real time, based on how critical the security threat is. The following...

Summary


In this chapter, we covered how we monitor the Hadoop ecosystem. We started by covering general security parameters such as a few metrics that can be helpful in identifying system bottlenecks. We also looked at the basic rules for configuring monitoring and alerting systems are. In the security monitoring section, we talked about the SIEM system and how this system works. There are many tools on the market that have SIEM implementation and can be used as plug and play modules. Later in the chapter, we covered intrusion detection systems and intrusion prevention systems.

lock icon
The rest of the chapter is locked
You have been reading a chapter from
Mastering Hadoop 3
Published in: Feb 2019Publisher: PacktISBN-13: 9781788620444
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Authors (2)

author image
Chanchal Singh

Chanchal Singh has over half decades experience in Product Development and Architect Design. He has been working very closely with leadership team of various companies including directors ,CTO's and Founding members to define technical road-map for company.He is the Founder and Speaker at meetup group Big Data and AI Pune MeetupExperience Speaks. He is Co-Author of Book Building Data Streaming Application with Apache Kafka. He has a Bachelor's degree in Information Technology from the University of Mumbai and a Master's degree in Computer Application from Amity University. He was also part of the Entrepreneur Cell in IIT Mumbai. His Linkedin Profile can be found at with the username Chanchal Singh.
Read more about Chanchal Singh

author image
Manish Kumar

Manish Kumar works as Director of Technology and Architecture at VSquare. He has over 13 years' experience in providing technology solutions to complex business problems. He has worked extensively on web application development, IoT, big data, cloud technologies, and blockchain. Aside from this book, Manish has co-authored three books (Mastering Hadoop 3, Artificial Intelligence for Big Data, and Building Streaming Applications with Apache Kafka).
Read more about Manish Kumar