Blog Archives

Apache NiFi and TLS Toolkit Ansible Roles to create a multi-node secure NiFi cluster

I’ve created 2 Ansible Roles (chilcano.apache-nifi and chilcano.apache-nifi-toolkit) to automate the creation of a multi-node and secure NiFi cluster. At the moment, the chilcano.apache-nifi Ansible Role doesn’t implement Cluster State coordination through Apache ZooKeeper. It will be implemented in the

Tagged with: , , , , ,
Posted in Big Data, DevOps, Security

My 3 Ansible Roles to mass provision Kismet and Apache MiNiFi for wardriving at scale

This blog post is implementing the same scenario used in the previous post Mass provisioning of Kismet and Apache MiNiFi in Raspberry Pi using Ansible. The unique difference is this new blog post I’m using Ansible Roles instead of Ansible

Tagged with: , , , , ,
Posted in Big Data, DevOps, IoT, Security

Mass provisioning of Kismet and Apache MiNiFi in Raspberry Pi using Ansible

Lately I’m focusing on Automation in Big-Data Projects, and with my experience in Cyber Security I can bring new approaches and ideas to those Big-Data Projects are related to IT Security aspects (Threat Analisys, Privacy, Intrusion Detection, etc.). With this

Tagged with: , , , , , , , ,
Posted in Big Data, DevOps, IoT, Security

Data routing, transformation, and system mediation in Big Data & IoT scenarios with Apache NiFi

So a few months ago I published a serie of post explaining how to capture WIFI traffic and process it near to real time by using WSO2 BAM, CEP Siddhi, Apache Cassandra, Apache Thrift, Kismet running on a Raspberry Pi

Tagged with: , , ,
Posted in BAM, Big Data, DevOps, IoT

Everything generates data: Capturing WIFI anonymous traffic using Raspberry Pi and WSO2 BAM (Part III)

After configuring the Raspberry Pi in monitor WIFI/802.11 mode (first blog post) and after configuring Raspberry Pi to send the 802.11 captured traffic to WSO2 BAM and Apache Thrift listener (second blog post), now I will explain how to create

Tagged with: , , , , , , ,
Posted in BAM, Big Data, IoT, Security

Everything generates data: Capturing WIFI anonymous traffic using Raspberry Pi and WSO2 BAM (Part II)

After configuring the Raspberry Pi to capture WIFI/802.11 traffic (first blog post), we have to store this traffic in a Database (NoSQL and RDBMS). Because, the idea is to process in real-time and/or batch the stored data. To capture this

Tagged with: , , , , , , ,
Posted in BAM, Big Data, IoT, Security

Everything generates data: Capturing WIFI anonymous traffic using Raspberry Pi and WSO2 BAM (Part I)

Yes, in this digital world, everything generates data, but before to do BigData, you have to follow these steps: 1. Capture Acquires, Integrates data. 2. Store Classification, Consolidate, Transformation, Storage Design, etc. 3. Analysis Exploration, visualization, modeling, prediction, etc. Everything

Tagged with: , , , , , , ,
Posted in BAM, Big Data, IoT, Security
Archives