Data Security

Links to data security configuration topics

A newly installed Hydrolix cluster comes with centralized user authentication, a wide array of support for TLS, and encrypted data at rest.

Unified auth

Each Hydrolix cluster can be configured to support Single Sign-On (SSO) and apply different access restrictions for users.

Network security

Hydrolix strongly recommends installing certificates to secure client to cluster traffic.

Hydrolix can enforce TLS communication between end users and your cluster. To enforce TLS between end users and your cluster, Enable TLS. When TLS is enabled, Hydrolix disables non-secure port access to endpoints, including ingest, the UI, and query.

  • Enable TLS - support different ways to terminate TLS on the cluster
  • IP allow-lists - limit allowed IPs with network access control lists

Hydrolix clusters securely retrieve data from object storage with token-based authentication over TLS. The data remains accessible only in the Virtual Private Cloud (VPC) hosting the Kubernetes deployment, isolating it from external networks.

Load balancer choices

When you create your Hydrolix cluster, you can select different load balancers. Hydrolix supports the following load balancers using the traefik_service_type variable:

NameidentifierBehavior
public load balancerpublic_lbA load balancer using a routable public IP address
private load balancerprivate_lbA load balancer using a private IP in the same subnet as the Kubernetes nodes
cluster IPcluster_ipNo load balancer at all. You can only access your cluster from within your Kubernetes cluster
node portnode_portA custom load balancer provided externally

Depending on your usage and use case you might want a publicly addressable cluster or a private one.

Whichever load balancer you choose, be sure to Configure IP Access for it.

Encrypt data at rest

For AWS, Google Cloud, and Azure, Hydrolix uses cloud storage layers which encrypt data at rest by default. For more information, see the platform documentation:

Encrypt data at rest to ensure your data storage layer is secure and can't be accessed without authorization.

Object storage access credentials

To connect to data storage layers, Hydrolix requires a service account or a secret key for interacting with the object storage system.

Use a service account or secret key to control access so only your Hydrolix cluster can access your storage layers.

Hydrolix clusters use a cache that stores metadata to disk. This cache is managed by your cloud storage layer provider, and thus is encrypted.