Security
Also available as:
PDF
loading table of contents...

Securing SAM – An End-to-End Workflow

To help understand how all of this fits together, let's walk through a use case to see how SAM to deploys applications in a secure cluster.

The use case details are the following:

  • An organization has a secure HDF/HDP cluster and all cluster services have been kerborized.

  • User gvetticaden is a developer and part of the release engineering team, builds a streaming application that includes of the following capabilities:

    • Creating streams from a set of Kafka topics from a secure Kafka Broker.

    • Doing analytics on the stream.

    • Persisting different events to following secure data stores: HDFS, HBase, HIve

  • User gvetticaden wants to deploy the streaming application to a secure storm Service.