If you’ve used SAS Environment Manager, you know what kind of information it’s capable of providing – the metrics that show you how the resources in your SAS environment are performing. But what if it could do more? What if it could automatically collect and standardize metric data from SAS
Tech
The Chicago weather cooperated for MWSUG 2014 with nice crisp fall temperatures, clear skies and beautiful sunrises over the lake. Aside from the weather, here are my five favorite memories of MWSUG 2014: 1. Location-location-location. The location and venue were fabulous! Not only were we along the Chicago River with a beautiful
Beginning with the first maintenance of SAS 9.4, you have the ability to define your own symbol markers using the SYMBOLCHAR and SYMBOLIMAGE statements. With these statements you can select a Unicode value or you can select an image file that exists on the local file system—making the possibilities for
In this post we dig deeper into the fourth recommended practice for securing the SAS-Hadoop environment through Kerberos authentication: When configuring SAS and Hadoop jointly in a high-performance environment, ensure that all SAS servers are recognized by Kerberos. Before explaining the complex steps in connecting to secure Hadoop within a
➤ DISCLOSURE! In June 2018 Google introduced changes to the way it handles its Maps platform. They now require API key in order to embed a map, plus Google Maps "projects" must now be associated with a billing account. Unless these new Google rules are met, Google maps described in
The only thing that’s constant is change. The continual cycle of computing changes leads to common questions about the effects of these changes—operating systems are getting upgraded, customers are moving to new SAS clients, upgrading to new releases of SAS, working with new Java and browser versions. All of these
In previous posts, we’ve shared the importance of understanding the fundamentals of Kerberos authentication and how we can simplify processes by placing SAS and Hadoop in the same realm. For SAS applications to interact with a secure Hadoop environment, we must address the third key practice: Ensure Kerberos prerequisites are met
When SAS is used for analysis on large volumes of data (in the gigabytes), SAS reads and writes the data using large block sequential IO. To gain the optimal performance from the hardware when doing these IOs, we strongly suggest that you review the information below to ensure that the
Report design includes several phases. Granted, these phases aren’t official: they’re more a reflection of my own thought processes and how my report designs typically unfold: the initial “get the data on the screen to see what we have” phase the addition of filters and prompts to assist with guided
So, with the simple introduction in Understanding Hadoop security, configuring Kerberos with Hadoop alone looks relatively straightforward. Your Hadoop environment sits in isolation within a separate, independent Kerberos realm with its own Kerberos Key Distribution Center. End users can happily type commands as they log into a machine hosting the