This is an automated email from the ASF dual-hosted git repository.

weichiu pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/ozone.git


The following commit(s) were added to refs/heads/master by this push:
     new b9d4e6585b HDDS-13371. [Docs] Protect in-transit traffic (#8729)
b9d4e6585b is described below

commit b9d4e6585bb7dabc186590ae4dd782834e0b022a
Author: Wei-Chiu Chuang <[email protected]>
AuthorDate: Thu Jul 3 03:29:45 2025 -0700

    HDDS-13371. [Docs] Protect in-transit traffic (#8729)
    
    Co-authored-by: Chung En Lee <[email protected]>
    Generated-by: Google Gemini Cli, Gemini 2.5 Flash
---
 .../content/security/protect-in-transit-traffic.md | 60 ++++++++++++++++++++++
 1 file changed, 60 insertions(+)

diff --git a/hadoop-hdds/docs/content/security/protect-in-transit-traffic.md 
b/hadoop-hdds/docs/content/security/protect-in-transit-traffic.md
new file mode 100644
index 0000000000..502a29b523
--- /dev/null
+++ b/hadoop-hdds/docs/content/security/protect-in-transit-traffic.md
@@ -0,0 +1,60 @@
+---
+title: Protect In-Transit Traffic
+name: Protect In-Transit Traffic
+menu:
+  main:
+    parent: Security
+weight: 6
+---
+<!---
+    Licensed to the Apache Software Foundation (ASF) under one or more
+    contributor license agreements.  See the NOTICE file distributed with
+    this work for additional information regarding copyright ownership.
+    The ASF licenses this file to You under the Apache License, Version 2.0
+    (the "License"); you may not use this file except in compliance with
+    the License.  You may obtain a copy of the License at
+
+        http://www.apache.org/licenses/LICENSE-2.0
+
+    Unless required by applicable law or agreed to in writing, software
+    distributed under the License is distributed on an "AS IS" BASIS,
+    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+    See the License for the specific language governing permissions and
+    limitations under the License.
+-->
+
+This document describes how to protect data in transit within Apache Ozone, 
both between the cluster and clients, and internally within the cluster.
+
+## Hadoop RPC Encryption
+
+Ozone traffic, whether between the cluster and client, or internal inside the 
cluster, may be transferred via Hadoop RPC (e.g. client to Ozone Manager). To 
encrypt client-OM (Ozone Manager) communication, configure 
`hadoop.rpc.protection` to `privacy` in your `core-site.xml`. This ensures that 
all data exchanged over Hadoop RPC is encrypted.
+
+```xml
+<property>
+  <name>hadoop.rpc.protection</name>
+  <value>privacy</value>
+</property>
+```
+
+### ozone.om.transport.class
+
+While the default is 
`org.apache.hadoop.ozone.om.protocolPB.Hadoop3OmTransportFactory`, it is 
possible to specify a gRPC based transport using the `ozone.om.transport.class` 
configuration property: 
`org.apache.hadoop.ozone.om.protocolPB.GrpcOmTransportFactory`. In this case, 
the Hadoop RPC configuration is not applicable.
+
+## gRPC TLS Encryption
+
+Ozone traffic may also be transferred via gRPC (e.g., Ratis write pipeline or 
client reading blocks from DataNode). To enable TLS for gRPC traffic, set 
`hdds.grpc.tls.enabled` to `true`. This encrypts communication between Ozone 
services that use gRPC.
+
+```xml
+<property>
+  <name>hdds.grpc.tls.enabled</name>
+  <value>true</value>
+</property>
+```
+
+## Ozone HTTP Web Console
+
+For information on securing the Ozone HTTP web console, please refer to the 
[Securing HTTP](SecuringOzoneHTTP.md) documentation.
+
+## Further Reading
+
+For details on the specific network ports used by Ozone roles and the types of 
transport between them, refer to the [Network 
Ports](../concept/NetworkPorts.md) documentation.


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to