Covers putting CDAP into production, with componentswith components, system requirements, deployment architectures, Hadoop compatibility, installation, configuration, security setup, and operations. Appendices describe the XML files used the XML files used to configure the CDAP installation and its security configuration.
Deployment Architectures: Minimal and high Minimal and high availability, highly scalable deploymentsscalable deployments.
Hadoop Compatibility: The Hadoop The Hadoop/HBase environment that environment that CDAP requires.
CDAP and Hadoop Compatibility: The different versions of CDAP and the Hadoop distributions they work with.
System Requirements: Hardware, memory, core, and network requirementsnetwork requirements, software prerequisitessoftware prerequisites, and using CDAP with firewallswith firewalls.
Installation: Installation and configuration instructions for either specific distributions using either specific distributions using a distribution manager or generic or generic Apache Hadoop clusters Hadoop clusters using RPM or Debian Package Managers:
Cloudera Manager: Installing on CDH (Cloudera Distribution of Apache Hadoop) clusters managed with Cloudera Manager.
Amazon Hadoop (EMR): Installing on Amazon EMR (Elastic MapReduce).
Apache Ambari: Installing on HDP (Hortonworks Data Platform) clusters managed with Apache Ambari.
Manual Installation using Packages Installing on generic Apache Hadoop clusters, CDH (Cloudera Distribution of Apache Hadoop) clusters not managed with Cloudera Manager, or HDP (Hortonworks Data Platform) clusters not managed with Apache Ambari
Replication Covers the replication of CDAP clusters from a master to one or more slave clusters
Verification: How to verify the CDAP installation on your Hadoop cluster by using an example application and health an example application and health checks.
Incompatibilities with 5.x clusters: What are various incompatibilities with 5.x clusters.
Upgrading: Instructions for upgrading both CDAP and its underlying Hadoop distribution.
Security: CDAP supports securing clusters using a perimeter security, authorization, impersonation, SSL for system services, and secure storage. This section describes enabling, configuring, and testing security. It also provides example configuration files.
...