Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.


The Big Data store components (Nodes) communicate between them. The components do not authenticate each other.

When deploying DPOD All-In-One appliance, all communication between the big data store components is done internally making the authentication between components less significant security wise.

When deploying DPOD in a distributed architecture we highly recommend restrict access to big data store components using network security components like firewall.

Encryption at Rest

Encryption at rest is only available in the Non-Appliance installation mode
Note
Note

Non-Appliance Mode Only

The steps below are only applicable for DPOD non-appliance mode installation.


You may leverage the operating system (Red Hat Enterprise Linux) capabilities for handling encryption of data at rest, such as LUKS Disk Encryption.

...