-
Notifications
You must be signed in to change notification settings - Fork 266
Mount sensitive Flink Properties as Secrets #383
Comments
This is a nice security feature that we could support in the future. I think there are 2 things here: 1) CRD: some properties shouldn't be presented as plain text in the We welcome your contribution if you could make the PR. |
There are 2 problems with this (might not be problems for everyone) ,
I have a solution if we want to take those problems into consideration but its not as elegant.
More complex but supports all secret solutions. I can go ahead and make a PR for this if this gets approved. What do you think? |
The only problem with this, is you lose the ability to react to updates to the configmap without restarting the pod. However it seems like we are limited by the capabilities of Flink configuration here. So if the loss of those while running updates is fine, then this approach seems sensible to me |
@shashken LGTM, but can we do it in a way that use tempDir/emptyDir and init container only when necessary? Because most of the cases the current design is good enough and simpler. |
Thanks for the feedback, ill try to create a PR this week. And the flag you suggested sounds like a good idea, ill try to do that @functicons |
Resolves GoogleCloudPlatform#383 Signed-off-by: Sunghoon Kang <[email protected]>
Resolves GoogleCloudPlatform#383 Signed-off-by: Sunghoon Kang <[email protected]>
When setting up security for Flink through the Flink Properties as #309 describes, the following properties are stored in a ConfigMap and mounted into the JobManager and TaskManager containers:
These passwords are stored in the ConfigMap, and should instead be stored in a Secret.
Has this been thought about before? or something that could be planned? Thanks!
The text was updated successfully, but these errors were encountered: