SSL

Users and RBAC authorizations in Kubernetes

Having your Kubernetes cluster up and running is just the start of your journey and you now need to operate. To secure its access, user identities must be declared along with authentication and authorization properly managed. This article focus on how to create users with X.509 client certificates and how to manage authorizations with the [...]

Deploying a secured Flink cluster on Kubernetes

When deploying secured Flink applications inside Kubernetes, you are faced with two choices. Assuming your Kubernetes is secure, you may rely on the underlying platform or rely on Flink native solutions to secure your application from the inside. Note, those two solutions are not mutually exclusive. […]

By |2018-10-09T11:25:29+00:00October 8th, 2018|Categories: Big Data, Cyber Security|Tags: , , , , , |0 Comments