How we utilized Jena (an RDF data store), Mina (the SSH implementation) and Kafka to implement a system to monitor and verify configurations of devices in a protected network. This talk discusses how we implemented an application framework that gathers information about devices (Servers, IoT, applications, etc) in secured networks and passes that data to a processing environment where analysis on the configurations are performed to determine if any configuration has become non-compliant. We will touch on the use of RDF over Kafka and RDF datastores to create schema less data repositories that support reasoning and advanced machine learning strategies.
Jena, Kafka, Mina: Configuration Management Using Apache Components Claude Warren
September 12, 2019