Question: A data analysis cluster is built using Apache Hadoop technology with a Master and a set of Slave nodes. Despite the security perimeter around this

A data analysis cluster is built using Apache Hadoop technology with a Master and a set of Slave nodes. Despite the security perimeter around this cluster, it has been subject to a hacker attack. One of the Slave nodes is behaving inconsistently and not responding to the Master node. We do not have any idea if the problem is with hardware, OS, or the Hadoop software stack on this node. We have to quickly isolate the extent of this attack. Name and briefly describe 3 techniques to make sure that the impact does not spread to rest of the cluster. What is the collective name given to these set of techniques in cluster management ? [Marks: 4]
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
