Securing SAM – An End-to-End Workflow
To help understand how all of this fits together, let's walk through a use case to see how SAM to deploys applications in a secure cluster.
The use case details are the following:
An organization has a secure HDF/HDP cluster and all cluster services have been Kerberize.
User gvetticaden is a developer and part of the release engineering team, builds a streaming application that includes of the following capabilities:
Creating streams from a set of Kafka topics from a secure Kafka Broker.
Doing analytics on the stream.
Persisting different events to following secure data stores: HDFS, HBase, Hive
User gvetticaden wants to deploy the streaming application to a secure storm Service.