You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* docs: Document users in e2e-security demo
* Add some more information to the e2e demo docs.
* Add textual representation of the image in the documentation for accessibility reasons.
* Fix Spark mention
---------
Co-authored-by: Sönke Liebau <[email protected]>
Install this demo on an existing Kubernetes cluster:
5
+
This is a demo to showcase what can be done with Open Policy Agent around authorization in the Stackable Data Platform.
6
+
It covers the following aspects of security:
7
+
8
+
This demo will:
9
+
10
+
* Install the Stackable operators
11
+
* Spin up the following data products
12
+
***Trino*: A fast distributed SQL query engine for big data analytics that helps you explore your data universe. This demo uses it to enable SQL access to the data.
13
+
***Spark*: A multi-language engine for executing data engineering, data science, and machine learning. This demo uses it to create a (rather simple) report and write the results back into the persistence.
14
+
***HDFS*: A distributed file system that is designed to scale up from single servers to thousands of machines, each offering local computation and storage.
15
+
***Hive metastore*: A service that stores metadata related to Apache Hive and other services. This demo uses it as metadata storage for Trino and Spark.
16
+
***Open policy agent (OPA)*: An open-source, general-purpose policy engine unifies policy enforcement across the stack. This demo uses it as the authorizer for Trino, which decides which user can query which data.
17
+
***Superset*: A modern data exploration and visualization platform. This demo utilizes Superset to retrieve data from Trino via SQL queries and build dashboards on top of that data.
18
+
* Configure security to showcase the following features
19
+
** Column- and row-level filtering
20
+
** OIDC support across the board
21
+
** Kerberos on Kubernetes
22
+
** Keycloak and flexible group lookup
23
+
** Open Policy Agent for the utmost flexibility in building access rules
24
+
25
+
The following figure gives an overview of how the components interact with each other:
6
26
7
27
[source,console]
8
28
----
@@ -25,8 +45,8 @@ To run this demo, your system needs at least:
25
45
26
46
== Recording
27
47
28
-
// We don't embed the video but only link it becuase of privacy concerns.
29
-
*On 2024-05-16 our collegue Sönke Liebau held a Stackable TechTalk - Mastering Data Platform Security.
48
+
// We don't embed the video but only link it because of privacy concerns.
49
+
*On 2024-05-16 our colleague Sönke Liebau held a Stackable TechTalk - Mastering Data Platform Security.
30
50
You can find the recording on https://www.youtube.com/watch?v=ATlq_l3WNiA[Youtube].*
31
51
32
52
== Overview
@@ -35,7 +55,73 @@ You can see the deployed products and their relationship in the following diagra
0 commit comments