Covers putting CDAP into production, with components, system requirements, deployment architectures, Hadoop compatibility, installation, configuration, security setup, and operations. Appendices describe the XML files used to configure the CDAP installation and its security configuration.
System Requirements: Hardware, memory, core, and network requirements, software prerequisites, and using CDAP with firewalls.
Security: CDAP supports securing clusters using a perimeter security, authorization, impersonation, SSL for system services, and secure storage. This section describes enabling, configuring, and testing security. It also provides example configuration files.