HADOOP

  • Big-data analysis
Please feel free to contact us
Go

About

Hadoop is a software framework for storing data and running applications on clusters of commodity hardware. Hadoop solves big data problems and can be considered as a suite which encompasses a number of services (ingesting, storing, analyzing and maintaining) inside it. A Java-based framework, Hadoop is extremely popular for handling and analyzing large sets of data. It delivers massive storage for any kind of data, huge processing power and the ability to handle virtually limitless coexisting jobs or tasks.
 

Niles Partners is launching a product which will configure and publish Hadoop eco-system which is embedded pre-configured tool with Ubuntu 16.04 and ready-to-launch VM on Azure that contains Hadoop, HDFS, Hbase, drill, mahout,pig,hive ,etc.

Hadoop saves the user from having to acquire additional hardware for a traditional database system to process data. It also reduces the effort and time required to load the data into another system as you can process it directly within Hadoop.
 

Importance of Hadoop

  • Capacity to store and process great amounts of any kind of data, quickly.
  • It’s a distributed computing model processes big data fast.
  • Application and Data processing are protected against hardware failure.
  • It is flexible, unlike traditional relational databases. With Hadoop, you don’t have to preprocess data before storing it.
  • You can easily develop your system to handle more data simply by adding nodes.
  1. Type virtual machines in the search.
     
  2. Under Services, select Virtual machines.
  3. In the Virtual machines page, select Add. The Create a virtual machine page opens.
  4. In the Basics tab, under Project details, make sure the correct subscription is selected and then choose to Create new resource group. Type myResourceGroup for the name.*.
  5. Under Instance details, type myVM for the Virtual machine name, choose East US for your Region, and choose Ubuntu 18.04 LTS for your Image. Leave the other defaults.
  6. Under Administrator account, select SSH public key, type your user name, then paste in your public key. Remove any leading or trailing white space in your public key.
     
  7. Under Inbound port rules > Public inbound ports, choose Allow selected ports and then select SSH (22) and HTTP (80) from the drop-down.
  8. Leave the remaining defaults and then select the Review + create button at the bottom of the page.
  9. On the Create a virtual machine page, you can see the details about the VM you are about to create. When you are ready, select Create.

It will take a few minutes for your VM to be deployed. When the deployment is finished, move on to the next section.

Connect to virtual machine

Create an SSH connection with the VM.

  1. Select the Connect button on the overview page for your VM.
  2. In the Connect to virtual machine page, keep the default options to connect by IP address over port 22. In Login using VM local account a connection command is shown. Select the button to copy the command. The following example shows what the SSH connection command looks like:

bashCopy

ssh azureuser@10.111.12.123

  1. Using the same bash shell you used to create your SSH key pair (you can reopen the Cloud Shell by selecting >_ again or going to https://shell.azure.com/bash), paste the SSH connection command into the shell to create an SSH session.

Usage / Deployment Instruction

Step 1: Access the Hadoop in Azure Marketplace and click ON Get it now button.

Click on Get it now and then on create;

 

Click on Create;

Step 2: In the Create a virtual machine, enter or select appropriate values for zone, machine type, resource group and so on as per your choice.

Click on review+create then on create;

Once Deployment is complete, follow the Below Steps;

Step 1: Open Putty and do SSH using the Public ip.

Step 2: Use following Linux command to start Hadoop

Step 2.1: sudo vi /etc/hosts

Take the Private Ip address from your machine as per the below screenshot and then replace the second line of your command screen with that Private ip address

https://www.cloud.miritech.com/img/ubuntu.jpg

Step 2.2: ssh-keygen -t rsa -P “”

This command is used to generate the ssh key.

https://www.cloud.miritech.com/img/ssh-key.jpg

Step 2.3: cat $HOME/.ssh/id_rsa.pub >> $HOME/.ssh/authorized_keys

This command is used to move the generated ssh key to the desired location

https://www.cloud.miritech.com/img/authorized_keys.jpg

Step 2.4: ssh localhost

https://www.cloud.miritech.com/img/localhost.jpg

Step 2.5: hdfs namenode –format

You have to write “yes” when it prompts you – Are you sure you want to continue?

https://www.cloud.miritech.com/img/hdfs-namenode.jpg

Step 2.6: start-all.sh

https://www.cloud.miritech.com/img/start-all.sh.jpg

Step 2.7: After the above command executes successfully, you should check the below urls in the browser –

http://<instanceId>:8088

https://www.cloud.miritech.com/img/hadoop-urls.jpg

http://<instanceId>:50070

https://www.cloud.miritech.com/img/50070.jpg

http://<instanceId>:50090

https://www.cloud.miritech.com/img/50090.jpg

 

 

 

 

 

Submit Your Request

Captcha

The Apache Hadoop software library allows for the distributed processing of large data sets across clusters of computers using a simple programming model. The software library is designed to scale from single servers to thousands of machines; each server using local computation and storage. Instead of relying on hardware to deliver high-availability, the library itself handles failures at the application layer. As a result, the impact of failures is minimized by delivering a highly-available service on top of a cluster of computers.

Hadoop, as a scalable system for parallel data processing, is useful for analyzing large data sets. Examples are search algorithms, market risk analysis, data mining on online retail data, and analytics on user behavior data.

Add the words “information security” (or “cybersecurity” if you like) before the term “data sets” in the definition above. Security and IT operations tools spit out an avalanche of data like logs, events, packets, flow data, asset data, configuration data, and assortment of other things on a daily basis. Security professionals need to be able to access and analyze this data in real-time in order to mitigate risk, detect incidents, and respond to breaches. These tasks have come to the point where they are “difficult to process using on-hand data management tools or traditional (security) data processing applications.”

Until now, small developers did not have the capital to acquire massive compute resources and ensure they had the capacity they needed to handle unexpected spikes in load. Amazon EC2 enables any developer to leverage Amazon’s own benefits of massive scale with no up-front investment or performance compromises. Developers are now free to innovate knowing that no matter how successful their businesses become, it will be inexpensive and simple to ensure they have the compute capacity they need to meet their business requirements.

The “Elastic” nature of the service allows developers to instantly scale to meet spikes in traffic or demand. When computing requirements unexpectedly change (up or down), Amazon EC2 can instantly respond, meaning that developers have the ability to control how many resources are in use at any given point in time. In contrast, traditional hosting services generally provide a fixed number of resources for a fixed amount of time, meaning that users have a limited ability to easily respond when their usage is rapidly changing, unpredictable, or is known to experience large peaks at various intervals.

 

Traditional hosting services generally provide a pre-configured resource for a fixed amount of time and at a predetermined cost. Amazon EC2 differs fundamentally in the flexibility, control and significant cost savings it offers developers, allowing them to treat Amazon EC2 as their own personal data center with the benefit of Amazon.com’s robust infrastructure.

When computing requirements unexpectedly change (up or down), Amazon EC2 can instantly respond, meaning that developers have the ability to control how many resources are in use at any given point in time. In contrast, traditional hosting services generally provide a fixed number of resources for a fixed amount of time, meaning that users have a limited ability to easily respond when their usage is rapidly changing, unpredictable, or is known to experience large peaks at various intervals.

Secondly, many hosting services don’t provide full control over the compute resources being provided. Using Amazon EC2, developers can choose not only to initiate or shut down instances at any time, they can completely customize the configuration of their instances to suit their needs – and change it at any time. Most hosting services cater more towards groups of users with similar system requirements, and so offer limited ability to change these.

Finally, with Amazon EC2 developers enjoy the benefit of paying only for their actual resource consumption – and at very low rates. Most hosting services require users to pay a fixed, up-front fee irrespective of their actual computing power used, and so users risk overbuying resources to compensate for the inability to quickly scale up resources within a short time frame.

 

No. You do not need an Elastic IP address for all your instances. By default, every instance comes with a private IP address and an internet routable public IP address. The private address is associated exclusively with the instance and is only returned to Amazon EC2 when the instance is stopped or terminated. The public address is associated exclusively with the instance until it is stopped, terminated or replaced with an Elastic IP address. These IP addresses should be adequate for many applications where you do not need a long lived internet routable end point. Compute clusters, web crawling, and backend services are all examples of applications that typically do not require Elastic IP addresses.

 

You have complete control over the visibility of your systems. The Amazon EC2 security systems allow you to place your running instances into arbitrary groups of your choice. Using the web services interface, you can then specify which groups may communicate with which other groups, and also which IP subnets on the Internet may talk to which groups. This allows you to control access to your instances in our highly dynamic environment. Of course, you should also secure your instance as you would any other server.

 

The Hadoop JDBC driver can be used to pull data out of Hadoop and then use the DataDirect JDBC Driver to bulk load the data into Oracle, DB2, SQL Server, Sybase, and other relational databases.

Front-end use of AI technologies to enable Intelligent Assistants for customer care is certainly key, but there are many other applications. One that I think is particularly interesting is the application of AI to directly support — rather than replace — contact center agents. Technologies such as natural language understanding and speech recognition can be used live during a customer service interaction with a human agent to look up relevant information and make suggestions about how to respond. AI technologies also have an important role in analytics. They can be used to provide an overview of activities within a call center, in addition to providing valuable business insights from customer activity.

There are many machine learning algorithms in use today, but the most popular ones are:

  • Decision Trees
  • Naive Bayes Classification
  • Ordinary Least Squares Regression
  • Logistic Regression
  • Support vector machines
  • Ensemble Methods
  • Clustering Algorithms
  • Principal Component Analysis
  • Singular Value Decomposition
  • Independent Component Analysis

 

 

Highlights

  • Application and Data processing are protected against hardware failure.
  • It is flexible, unlike traditional relational databases. With Hadoop, you don’t have to preprocess data before storing it.
  • You can easily develop your system to handle more data simply by adding nodes.

Application Installed