This is an automated email from the ASF dual-hosted git repository.
weichiu pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/ozone.git
The following commit(s) were added to refs/heads/master by this push:
new b9d4e6585b HDDS-13371. [Docs] Protect in-transit traffic (#8729)
b9d4e6585b is described below
commit b9d4e6585bb7dabc186590ae4dd782834e0b022a
Author: Wei-Chiu Chuang <[email protected]>
AuthorDate: Thu Jul 3 03:29:45 2025 -0700
HDDS-13371. [Docs] Protect in-transit traffic (#8729)
Co-authored-by: Chung En Lee <[email protected]>
Generated-by: Google Gemini Cli, Gemini 2.5 Flash
---
.../content/security/protect-in-transit-traffic.md | 60 ++++++++++++++++++++++
1 file changed, 60 insertions(+)
diff --git a/hadoop-hdds/docs/content/security/protect-in-transit-traffic.md
b/hadoop-hdds/docs/content/security/protect-in-transit-traffic.md
new file mode 100644
index 0000000000..502a29b523
--- /dev/null
+++ b/hadoop-hdds/docs/content/security/protect-in-transit-traffic.md
@@ -0,0 +1,60 @@
+---
+title: Protect In-Transit Traffic
+name: Protect In-Transit Traffic
+menu:
+ main:
+ parent: Security
+weight: 6
+---
+<!---
+ Licensed to the Apache Software Foundation (ASF) under one or more
+ contributor license agreements. See the NOTICE file distributed with
+ this work for additional information regarding copyright ownership.
+ The ASF licenses this file to You under the Apache License, Version 2.0
+ (the "License"); you may not use this file except in compliance with
+ the License. You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
+-->
+
+This document describes how to protect data in transit within Apache Ozone,
both between the cluster and clients, and internally within the cluster.
+
+## Hadoop RPC Encryption
+
+Ozone traffic, whether between the cluster and client, or internal inside the
cluster, may be transferred via Hadoop RPC (e.g. client to Ozone Manager). To
encrypt client-OM (Ozone Manager) communication, configure
`hadoop.rpc.protection` to `privacy` in your `core-site.xml`. This ensures that
all data exchanged over Hadoop RPC is encrypted.
+
+```xml
+<property>
+ <name>hadoop.rpc.protection</name>
+ <value>privacy</value>
+</property>
+```
+
+### ozone.om.transport.class
+
+While the default is
`org.apache.hadoop.ozone.om.protocolPB.Hadoop3OmTransportFactory`, it is
possible to specify a gRPC based transport using the `ozone.om.transport.class`
configuration property:
`org.apache.hadoop.ozone.om.protocolPB.GrpcOmTransportFactory`. In this case,
the Hadoop RPC configuration is not applicable.
+
+## gRPC TLS Encryption
+
+Ozone traffic may also be transferred via gRPC (e.g., Ratis write pipeline or
client reading blocks from DataNode). To enable TLS for gRPC traffic, set
`hdds.grpc.tls.enabled` to `true`. This encrypts communication between Ozone
services that use gRPC.
+
+```xml
+<property>
+ <name>hdds.grpc.tls.enabled</name>
+ <value>true</value>
+</property>
+```
+
+## Ozone HTTP Web Console
+
+For information on securing the Ozone HTTP web console, please refer to the
[Securing HTTP](SecuringOzoneHTTP.md) documentation.
+
+## Further Reading
+
+For details on the specific network ports used by Ozone roles and the types of
transport between them, refer to the [Network
Ports](../concept/NetworkPorts.md) documentation.
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]