January 2019
Intermediate to advanced
754 pages
18h 13m
English
The final step is to provide certificate information to secure the cluster. You can secure communication between the clients and the cluster and the communication between the nodes of the cluster using X509 certificates. The communication security can be implemented by adding X509 certificates to a key vault store and configuring the cluster to apply the certificates in this step. To keep this walk-through simple, we will not secure our cluster this time:

It is highly recommended that you always use a secured cluster for your production workloads. You have to plan for security at ...
Read now
Unlock full access