Question: A data analysis cluster is built using Apache Hadoop technology with a Master and a set of Slave nodes. Despite the security perimeter around this

 A data analysis cluster is built using Apache Hadoop technology with

A data analysis cluster is built using Apache Hadoop technology with a Master and a set of Slave nodes. Despite the security perimeter around this cluster, it has been subject to a hacker attack. One of the Slave nodes is behaving inconsistently and not responding to the Master node. We do not have any idea if the problem is with hardware, OS, or the Hadoop software stack on this node. We have to quickly isolate the extent of this attack. Name and briefly describe 3 techniques to make sure that the impact does not spread to rest of the cluster. What is the collective name given to these set of techniques in cluster management ? [Marks: 4]

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!