可以web ui去监听一个内部地址,然后部署一个"side car proxy"对外暴露,在这个proxy上做鉴权,这也是官方推荐的方式:



“Simple mutual authentication may be enabled by configuration if authentication 
of connections to the REST endpoint is required, but we recommend to deploy a 
“side car proxy”: Bind the REST endpoint to the loopback interface (or the 
pod-local interface in Kubernetes) and start a REST proxy that authenticates 
and forwards the requests to Flink. Examples for proxies that Flink users have 
deployed are Envoy Proxy or NGINX with MOD_AUTH.

The rationale behind delegating authentication to a proxy is that such proxies 
offer a wide variety of authentication options and thus better integration into 
existing infrastructures.”

https://ci.apache.org/projects/flink/flink-docs-release-1.13/docs/deployment/security/security-ssl/#external--rest-connectivity



如果你的JM是静态部署的,那么可以配置:https://ci.apache.org/projects/flink/flink-docs-release-1.13/docs/deployment/config/#rest-bind-address



如果是动态调度的,那么就要看编排引擎了,比如K8s要做就很容易。









在 2021-08-24 21:42:46,"yidan zhao" <hinobl...@gmail.com> 写道:
>如上是个思路,但是对于原始地址是不是还是可以直接访问,这样本质还是会被扫描出问题。我这边是有专门部门扫描内网,扫描到要求改。
>
>东东 <dongdongking...@163.com> 于2021年8月24日周二 下午6:01写道:
>
>> 前面挂一个反向代理,在代理上配置简单的鉴权?
>>
>>
>> 在 2021-08-24 17:25:49,"yidan zhao" <hinobl...@gmail.com> 写道:
>> >如题,请问当前有什么简单的鉴权方案不,针对flink的web ui,目前这部分存在安全风险如果不鉴权。
>>

回复