LH For Kubernetes
LittleHorse for Kubernetes (LHK) is a distribution of the LittleHorse Platform delivered via Kubernetes Operator into your own Kubernetes Cluster.
For more information about what a Kubernetes Operator is, this CNCF blog post is fantastic.
Features
LHK is a fully-featured Process Orchestration platform that runs on Kubernetes and is fit for any company from Startup to Enterprise.
Full Support of LH Platform
All of the products and features available in the LH Cloud distribution of the LH Platform are available on LHK:
- The LittleHorse Process Orchestrator.
- Enterprise-ready Apache Kafka without the hassle.
- A User Tasks plugin that can integrate your own identity provider with your LittleHorse Workflows.
LHK subscriptions come with:
- An enterprise-grade and battle-tested Kubernetes Operator that allows you to manage the entire LittleHorse Platform in your own Kubernetes environment without hassle.
- 24/7 support from an expert staff who created the LittleHorse Process Orchestrator, and have received recognition for open-source contributions to projects like Apache Kafka and Terraform.
Flexibility and Convenience
The LittleHorse Platform is built around the LittleHorse Server, which is a cutting-edge open-source Workflow Orchestrator. The LittleHorse Server has the following dependencies and integrations:
- Apache Kafka as a write-ahead log for the internal data store.
- Local hard-disk storage for both Kafka and the LittleHorse Servers.
- [Optional] TLS and mTLS for network encryption and/or authentication.
- [Optional] an OAuth-compatible Identity Provider, such as Keycloak, for authentication.
Security
LHK is capable of meeting even the most stringent enterprise security requirements:
- All of your data stays within your own Kubernetes environment.
- LHK integrates with Cert Manager to encrypt traffic for external clients, internal clients, and between the components of the LH Platform.
- LHK integrates with your custom OIDC providers.
- If necessary, components of the LH Platform can be deployed with no external network access for maximum security.