Thanks Steven for your details response. Things are more clear to me now.

A follow up Qs -
Looks like most of the security support depends on Hadoop ? What happens if
anyone wants to use Flink with Hadoop (in a cluster where Hadoop is not
there) ?

Regards,
Sourav

On Sun, Jan 10, 2016 at 12:41 PM, Stephan Ewen <se...@apache.org> wrote:

> Hi Sourav!
>
> There is user-authentication support in Flink via the Hadoop / Kerberos
> infrastructure. If you run Flink on YARN, it should seamlessly work that
> Flink acquires the Kerberos tokens of the user that submits programs, and
> authenticate itself at YARN, HDFS, and HBase with that.
>
> If you run Flink standalone, Flink can still authenticate at HDFS/HBase
> via Kerberos, with a bit of manual help by the user (running kinit on the
> workers).
>
> With Kafka 0.9 and Flink's upcoming connector (
> https://github.com/apache/flink/pull/1489), streaming programs can
> authenticate themselves as stream brokers via SSL (and read via encrypted
> connections).
>
>
> What we have on the roadmap for the coming months it the following:
>   - Encrypt in-flight data streams that are exchanged between worker nodes
> (TaskManagers).
>   - Encrypt the coordination messages between client/master/workers.
> Note that these refer to encryption between Flink's own components only,
> which would use transient keys generated just for a specific job or session
> (hence would not need any user involvement).
>
>
> Let us know if that answers your questions, and if that meets your
> requirements.
>
> Greetings,
> Stephan
>
>
> On Fri, Jan 8, 2016 at 3:23 PM, Sourav Mazumder <
> sourav.mazumde...@gmail.com> wrote:
>
>> Hi,
>>
>> Can anyone point me to ant documentation on support for Security in Flink
>> ?
>>
>> The type of information I'm looking for are -
>>
>> 1. How do I do user level authentication to ensure that a job is
>> submitted/deleted/modified by the right user ? Is it possible though the
>> web client ?
>> 2. Authentication across multiple slave nodes (where the task managers
>> are running) and driver program so that they can communicate with each other
>> 3. Support for SSL/encryption for data exchanged happening across the
>> slave nodes
>> 4. Support for pluggable authentication with existing solution like LDAP
>>
>> If not there today is there a roadmap for these security features ?
>>
>> Regards,
>> Sourav
>>
>
>

Reply via email to