<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://blog.upala.com/2023/09/21/modernizing-data-lakes/</loc><image:image><image:loc>https://blog.upala.com/wp-content/uploads/2023/09/modern-data-architecture.png</image:loc><image:title>modern-data-architecture</image:title></image:image><lastmod>2023-10-05T16:21:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.upala.com/2023/08/25/aws-cloud-migration-case-study/</loc><lastmod>2023-08-25T22:47:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.upala.com/2023/08/20/oauth-integration-for-kafka/</loc><lastmod>2023-08-21T03:11:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.upala.com/2019/11/07/kafkakerberos/</loc><image:image><image:loc>https://blog.upala.com/wp-content/uploads/2019/11/detailed-kafka-security-architecture.png</image:loc><image:title>Detailed Kafka Security Architecture</image:title></image:image><image:image><image:loc>https://blog.upala.com/wp-content/uploads/2019/11/dimsecurityarchitecture.png</image:loc><image:title>DIMSecurityArchitecture</image:title></image:image><lastmod>2020-04-30T04:06:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.upala.com/2017/11/09/kafka-security/</loc><image:image><image:loc>https://blog.upala.com/wp-content/uploads/2017/11/slide2.jpg</image:loc><image:title>Slide2</image:title></image:image><image:image><image:loc>https://blog.upala.com/wp-content/uploads/2017/11/tls-configuration.jpg</image:loc><image:title>TLS Configuration</image:title></image:image><image:image><image:loc>https://blog.upala.com/wp-content/uploads/2017/11/architecture.jpg</image:loc><image:title>Architecture</image:title></image:image><lastmod>2019-11-07T16:47:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.upala.com/2017/03/04/setting-up-tez-on-cdh-cluster/</loc><image:image><image:loc>https://blog.upala.com/wp-content/uploads/2017/03/screen-shot-2017-03-04-at-4-26-17-pm.png</image:loc><image:title>screen-shot-2017-03-04-at-4-26-17-pm</image:title></image:image><lastmod>2020-09-20T07:00:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.upala.com/2015/10/05/building-rack-aware-mirroring-scheme-in-greenplum/</loc><image:image><image:loc>https://blog.upala.com/wp-content/uploads/2015/10/rack.jpg</image:loc><image:title>Rack</image:title><image:caption>GPDB Rack setup</image:caption></image:image><lastmod>2015-10-06T00:55:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.upala.com/2015/07/20/performing-full-vaccum-in-greenplum-efficiently/</loc><lastmod>2016-06-15T13:12:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.upala.com/2015/02/12/design-pattern-avoid-hawq-creating-too-many-small-files-on-hdfs-for-tables/</loc><lastmod>2015-06-03T12:25:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.upala.com/2015/01/24/authorization-in-hadoop-using-apache-ranger/</loc><image:image><image:loc>https://blog.upala.com/wp-content/uploads/2015/01/audit.png</image:loc><image:title>Audit</image:title></image:image><image:image><image:loc>https://blog.upala.com/wp-content/uploads/2015/01/policy.png</image:loc><image:title>Policy</image:title></image:image><lastmod>2017-03-04T23:07:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.upala.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2023-10-05T16:21:15+00:00</lastmod></url></urlset>
