Skip to main content

IBM BigInsights Security Implementation Part 2: Securing the IBM BigInsights Cluster Perimeter

Web Doc

thumbnail 

Published on 09 December 2016

  1. View in HTML
  2. .PDF (0.1 MB)

Share this page:   

IBM Form #: TIPS1348


Authors: Bharath Devaraju, Shankar Kuchibhotla and Nisanth Simon

    menu icon

    Abstract

    Big data analytics is network intensive because it runs on a cluster of nodes. Due to the high volumes of data exchanged between nodes in the IBM® BigInsights® cluster, network isolation is vital for the following reasons:

    • To prevent sniffing attacks
    • To reduce the network congestion so that the corporate network is not affected by the big data cluster traffic

    Isolating the cluster network also gives administrators greater flexibility in enforcing the cluster access.

    This IBM® Redbooks® Analytics Support web doc serves as a guide for system implementers who are creating a secure zone for an IBM BigInsights cluster by providing an example of current industry practices. This document applies to IBM BigInsights Version 4.2 and later.

    Contents

     

    Others who read this also read

    Special Notices

    The material included in this document is in DRAFT form and is provided 'as is' without warranty of any kind. IBM is not responsible for the accuracy or completeness of the material, and may update the document at any time. The final, published document may not include any, or all, of the material included herein. Client assumes all risks associated with Client's use of this document.