Skip to content

Commit c9e7931

Browse files
committed
fix links and clarify component descriptions
1 parent cca6978 commit c9e7931

1 file changed

Lines changed: 9 additions & 5 deletions

File tree

docs/cloud/features/security/security.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -28,17 +28,21 @@ Below is a diagram of the components along with their description.
2828

2929
![tobiko_cloud_hybrid_deployment](./tcloud_hybrid_deployment.png){ width=80% height=60% style="display: block; margin: 0 auto" }
3030

31-
32-
- **Helm Chart**: For production environements, we provide a [Helm chart](/cloud/features/scheduler/hybrid_executors_helm.md) that includes robust configurability, secret management, and scaling options.
33-
- **Docker Compose**: For simpler environments or testing, we offer a [Docker Compose setup](/scheduler/hybrid_executors_docker_compose) to quickly deploy executors on any machine with Docker.
31+
- **Scheduler**: Orchestrates schedule cadence and hosts state metadata(code versions, logs, cost). Never **pushes** instructions to executor.
32+
- **Executor**: Appplies code changes and runs SQL queries and python models in proper DAG order (actual data processing in SQL Engine)
33+
- **Gateway**: Stores authentication to SQL Engine. Secured through your secrets manager or Kubernetes Secrets.
34+
- **SQL Engine**: Processes and stores data based on the above instructions
35+
- **Executor -> Scheduler**: This is a pull-only mechanism as stated abvoe.
36+
- **Helm Chart**: For production environements, we provide a [Helm chart](../scheduler/hybrid_executors_helm.md) that includes robust configurability, secret management, and scaling options.
37+
- **Docker Compose**: For simpler environments or testing, we offer a [Docker Compose setup](../scheduler/hybrid_executors_docker_compose) to quickly deploy executors on any machine with Docker.
3438

3539

3640

3741
## Internal Code Practices
3842

3943
Our coding standards are guidelines we enforce throughout the organization to write, maintain, and collaborate on code effectively. These practice ensure consistency, maintainability, reliability, and most importantly, trust.
4044

41-
Below you will find a few examples of our interal code requirements.
45+
Below you will find a few examples of our internal code requirements.
4246

4347
- We used signed commits, required approvers, and signed Docker artifacts.
4448
- Each commit to main must be approved by someone other than the author.
@@ -49,7 +53,7 @@ Below you will find a few examples of our interal code requirements.
4953
- We back up each state database nightly and before upgrades. These backups are stored indefinitely.
5054

5155

52-
## Physical Property
56+
## Asset and Access Management
5357

5458
### How do we protect PGP keys?
5559

0 commit comments

Comments
 (0)