0% found this document useful (0 votes)
15 views7 pages

Cloud Computing Assignment 2

Register number 20CS116 Name VANISHREE B Subject code 17CSC14 Subject Cloud Computing The document contains details about installing and configuring a Hadoop cluster, analyzing basic cloud security concepts, and creating Amazon EC2 Windows instances. It provides step-by-step explanations of setting up a Hadoop distributed file system, key terms related to cloud security like encryption and identity access management, and a 12-step process for launching EC2 Windows instances on AWS.

Uploaded by

Rahul s
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views7 pages

Cloud Computing Assignment 2

Register number 20CS116 Name VANISHREE B Subject code 17CSC14 Subject Cloud Computing The document contains details about installing and configuring a Hadoop cluster, analyzing basic cloud security concepts, and creating Amazon EC2 Windows instances. It provides step-by-step explanations of setting up a Hadoop distributed file system, key terms related to cloud security like encryption and identity access management, and a 12-step process for launching EC2 Windows instances on AWS.

Uploaded by

Rahul s
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

ASSIGNMENT 2

Register number 20CS116

Name VANISHREE B

Subject code 17CSC14

Subject Cloud Computing


1.How to install and configure Hadoop
cluster setup?

Installing and configuring a Hadoop cluster setup involves


several steps. Here's a high-level overview of the process:

1. Prepare the Environment:


- Set up a network with multiple machines that will form the
cluster.
- Ensure that each machine has a compatible operating system
(e.g., Linux) and meets the hardware requirements for running
Hadoop.

2. Install Java:
- Hadoop requires Java to run. Install a compatible version of
Java on each machine in the cluster.

3. Set Up SSH:
- Configure SSH (Secure Shell) to enable passwordless
communication between nodes in the cluster. Generate SSH
keys and distribute them to all machines to allow seamless
communication.

4. Download and Extract Hadoop:


- Download the desired version of Hadoop from the Apache
Hadoop website.
- Extract the downloaded archive to a directory on each
machine in the cluster.

5. Configure Hadoop:
- Modify the Hadoop configuration files to suit your cluster
setup.
- The key configuration files are core-site.xml, hdfs-site.xml,
and mapred-site.xml. These files specify parameters such as
cluster node addresses, replication factor, and other settings.
- Update these configuration files on all machines consistently.
6. Set Up Hadoop Environment Variables:
- Configure the Hadoop environment variables on each
machine to specify the Java installation path and Hadoop home
directory.
- Add these variables to the respective user profiles or set them
in the hadoop-env.sh file.

7. Set Up Hadoop Distributed File System (HDFS):


- Format the HDFS by running the "hdfs namenode -format"
command on the designated NameNode machine. This
initializes the HDFS metadata.

8. Start Hadoop Services:


- Start the Hadoop daemons by executing the relevant scripts
on the appropriate machines.
- Use the "start-dfs.sh" script to start the HDFS daemons
(NameNode and DataNodes).
- Use the "start-yarn.sh" script to start the YARN daemons
(ResourceManager and NodeManagers).
9. Verify the Cluster Setup:
- Check the Hadoop daemons' status using the "jps" command
on each machine.
- Access the Hadoop web user interfaces to ensure they are
running correctly. The NameNode web UI is typically available
at http://<NameNode-Host>:50070.

10. Run a Sample Hadoop Job:


- Execute a sample Hadoop job, such as running a word count
program, to test the cluster setup.
- Upload input data to the HDFS, submit the job, and verify
the output.
It's worth noting that the above steps provide a basic outline of
installing and configuring a Hadoop cluster setup. Depending on
your specific requirements and cluster size, additional steps or
customizations may be necessary. It's recommended to refer to
the official Hadoop documentation for detailed instructions and
troubleshooting guidelines.
2. Analyze the terms and concepts that address basic
information security within the cloud environment.

In the cloud environment, basic information security revolves


around protecting data, systems, and networks from
unauthorized access, data breaches, and other security threats.
Here are some key terms and concepts that address basic
information security within the cloud environment:

1. Cloud Security: Refers to the set of policies, technologies,


and controls implemented to protect data, applications, and
infrastructure in the cloud. It includes measures to ensure
confidentiality, integrity, and availability of resources.

2. Data Encryption: The process of encoding data to prevent


unauthorized access. In the cloud, encryption is used to protect
data at rest (stored in databases or storage systems) and data in
transit (moving between different cloud components).

3. Identity and Access Management (IAM): IAM involves


managing and controlling user identities, permissions, and
privileges in the cloud. It ensures that only authorized
individuals or entities have access to specific resources, and that
access is granted based on the principle of least privilege.

4. Multi-Factor Authentication (MFA): MFA adds an extra layer


of security by requiring users to provide multiple forms of
identification to access cloud resources. This typically involves
combining something the user knows (password), something the
user has (smartphone or hardware token), and something the
user is (biometric authentication).

5. Virtual Private Cloud (VPC): VPC enables organizations to


create isolated and logically segmented private networks within
a public cloud provider's infrastructure. It provides network
security controls, such as firewalls and access control lists, to
protect cloud resources.
6. Security Groups: Security groups are virtual firewalls that
control inbound and outbound traffic to cloud resources. They
act as a barrier, allowing or denying access based on predefined
rules, and help protect against unauthorized access attempts.

7. Intrusion Detection and Prevention Systems (IDPS): IDPS are


security tools that monitor and analyze network traffic in real-
time to detect and respond to potential security incidents. They
can identify malicious activities, such as unauthorized access
attempts, and take actions to prevent or mitigate threats.

8. Security Information and Event Management (SIEM): SIEM


systems collect and analyze security event logs from various
cloud resources to identify potential security incidents or
patterns of suspicious behavior. They provide centralized
monitoring, threat detection, and incident response capabilities.

9. Data Loss Prevention (DLP): DLP tools help prevent the


unauthorized disclosure or leakage of sensitive data in the cloud.
They can detect and block the transmission of sensitive
information, such as credit card numbers or social security
numbers, based on predefined policies.

10. Incident Response: Incident response involves a systematic


approach to managing and responding to security incidents in
the cloud. It includes steps like identification, containment,
eradication, recovery, and lessons learned to minimize the
impact of security breaches.

These terms and concepts provide a foundation for


understanding basic information security in the cloud
environment. It is important to note that cloud security is a
complex and evolving field, and organizations should
implement a comprehensive security strategy tailored to their
specific needs and requirements.
3. How to create amazon EC2 window instances?Explain

To create Amazon EC2 Windows instances, you can follow


these steps:

1. Sign in to the AWS Management Console: Go to the AWS


Management Console (https://console.aws.amazon.com/) and
sign in with your AWS account credentials.

2. Open the EC2 Dashboard: Once you're logged in, navigate to


the EC2 service by either searching for "EC2" in the search bar
or selecting it from the list of available services.

3. Launch an Instance: In the EC2 Dashboard, click on the


"Launch Instance" button to start the instance creation process.

4. Choose an Amazon Machine Image (AMI): In the instance


launch wizard, you'll be prompted to choose an AMI. Select the
"Microsoft Windows" option to filter the available Windows
AMIs.

5. Select an Instance Type: Next, choose the instance type that


suits your requirements in terms of CPU, memory, storage, and
networking capabilities. Click on the desired instance type to
select it.

6. Configure Instance Details: In this step, you can configure


various instance settings such as the number of instances,
network settings, IAM roles, monitoring, and more. Review and
adjust the settings according to your needs.

7. Add Storage: Specify the amount of storage needed for your


Windows instance. You can add or modify the storage volumes
based on your requirements.

8. Configure Security Group: Security groups act as virtual


firewalls and control inbound and outbound traffic to your
instance. Create a new security group or select an existing one,
and configure the necessary rules to allow access to your
instance.

9. Review Instance Details: Review all the chosen


configurations and settings for your instance. Ensure that
everything is as intended before proceeding.

10. Launch the Instance: Click on the "Launch" button to initiate


the instance creation process. You'll be prompted to choose or
create a new key pair to securely connect to your instance.

11. Access the Instance: After launching the instance, you can
connect to it using remote desktop protocol (RDP) for Windows
instances. AWS provides a public DNS name or IP address that
you can use to connect to your Windows instance.

12. Configure Windows: Once you're connected to your


Windows instance, follow the initial setup steps, including
setting up passwords and configuring any necessary settings.

That's it! You have successfully created an Amazon EC2


Windows instance. You can now install and run your Windows
applications, configure security settings, and manage the
instance according to your requirements. Remember to regularly
monitor and manage your instances to ensure they are secure
and optimized.

You might also like