Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The Big Data store components (Nodes) communicate between them. The components do not authenticate each other.

When deploying DPOD All-In-One appliance, all communication between the big data store components is done internally making the authentication between components less significant security wise.

When deploying DPOD in a distributed architecture we highly recommend restrict access to big data store components using network security components like firewall

Info

Non-Appliance Mode Only

The steps below are only applicable for DPOD non-appliance mode installation.

You may leverage the operating system (Red Hat Enterprise Linux) capabilities for handling encryption of data at rest, such as LUKS Disk Encryption.

The following links provide more information on that topic:

Please make sure to use XFS file system where required to match the product prerequisites.