Security option: Verifying Dynamic Engine artifact signatures
From v0.22 (R2025-06), you can validate the authenticity of Dynamic Engine artifacts (images and Helm charts) by verifying their digital signatures before deployment.
Before you begin
- Use Dynamic Engine v0.22 (R2025-06) onwards.
- Access the list of required artifacts and details for your Dynamic Engine
version in changelog:
- Name: the functional name of the chart or service
- Version: the x.y.z version of an artifact
- Path: a string with the coordinates of the artifacts, for example, ghcr.io/talend/job-controller
- Official Dynamic Engine
public key, valid from June 2025:
-----BEGIN PUBLIC KEY----- MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEk6LwoCuQitMxk4RCWfCAN1lpJk5p+ 91oaQHTYrZnvSLqEP59vw/dz2F/7xaoHkFqEG+9Yv6DwG01Apty1A9KMw== -----END PUBLIC KEY-----
About this task
Qlik provides digital signatures for all official images and Helm charts from Dynamic Engine v0.22 onwards. All artifacts are signed at build time with an asymmetric key pair: the private key is used for signing, and the public key is made available for signature verification.
Signature validation can be automated using admission controllers from the Kubernetes community, such as PolicyController, Kyverno, connaisseur, or Gatekeeper. In this example, the Cosign tool is used to perform manual verification.
Procedure
Results
After confirming the authenticity of your Dynamic Engine artifact, you ensure that only validated artifacts are deployed.