Self-service BI and exploratory analytics are some of the most common use cases we see our customers running on Cloudera’s analytic database solution. Over the past year, we made significant advancements to provide a more powerful user experience for SQL developers and make them more productive for their everyday self-service BI tasks and workflows. Leveraging Hue as the SQL development workbench, we continue to see usage of the platform increase and the number of analytic use cases grow –
A few weeks back, we announced the upcoming beta of Cloudera Altus Analytic DB for cloud-based data warehousing. As promised, the beta is now available and we wanted to spend some time describing the unique architecture.
Architecture of Cloudera Altus Analytic DB
Altus Analytic DB is built on the Cloudera Altus platform-as-a-service foundation, which also supports the Altus Data Engineering service. The architecture of Cloudera Altus is based around a few simple but important premises —
For the Apache Spot novice or for quick evaluation of a Cybersecurity solution on Cloudera Enterprise Data Hub (EDH) without the arduous tasks of manual installation, we’ve created a rapid deployment of Apache Spot on Amazon Web Services (AWS) using Cloudera Director.
You will immediately see how you can isolate and identify suspicious activities from the Apache Spot UI using the sample data provided in the deployment at cloud scale.
In Part 1: Infrastructure Considerations in this three part revamped series on deploying clusters like a boss, we provided a general explanation for how nodes are classified, disk layout configurations and network topologies to think about when deploying your clusters.
In this Part 2: Service and Role Layouts segment of the series, we take a step higher up the stack looking at the various services and roles that make up your Cloudera Enterprise deployment.
Cloudera Director 2.6 and Cloudera Manager 5.13 offer a simple way to have TLS configured for Cloudera Manager and CDH clusters. In this blog post, Bill Havanki describes how to use the new feature and offers technical details behind how the automatic configuration happens.
Why TLS in the Cloud
An important tenet of information security is defense in depth. The idea behind defense in depth is to have multiple layers of security protecting valued assets,