The Vitess 7.0 Documentation
and authentication scheme used depends on the transport used. With gRPC (the default for Vitess), TLS can be used to secure both internal and external RPCs. We’ll detail what the options are. Caller ID gRPC transport, Vitess can use the usual TLS security features (familiarity with SSL / TLS is necessary here): • Any Vitess server can be configured to use TLS with the following command line parameters: in the provided file. • A Vitess go client can be configured with symmetrical parameters to enable TLS: – ..._grpc_ca: list of server cert signers to trust. – ..._grpc_server_name: name of the server cert0 码力 | 254 页 | 949.63 KB | 1 年前3The Vitess 12.0 Documentation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369 Securing Vitess Using TLS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . VTGate to support TLS set -mysql_server_ssl_cert and -mysql_server_ssl_key. Client certificates can also be mandated by setting -mysql_server_ssl_ca. If there is no CA specified then TLS is optional. X services and internally uses RPCs. These RPCs can optionally utilize secure transport options to use TLS over the gRPC HTTP/2 transport protocol. This document explains how to use these features. Finally0 码力 | 534 页 | 3.32 MB | 1 年前3The Vitess 8.0 Documentation
services and internally uses RPCs. These RPCs can optionally utilize secure transport options to use TLS over the gRPC HTTP/2 transport protocol. This document explains how to use these features. Finally transport, Vitess can use the usual TLS security features. Please note that familiarity with TLS is necessary here: • Any Vitess server can be configured to use TLS with the following command line parameters: in the provided file. • A Vitess go client can be configured with symmetrical parameters to enable TLS: 83 – xxxx_grpc_ca: list of server cert signers to trust. I.E. the client will only connect to servers0 码力 | 331 页 | 1.35 MB | 1 年前3The Vitess 9.0 Documentation
VTGate to support TLS set -mysql_server_ssl_cert and -mysql_server_ssl_key. Client certificates can also be mandated by setting -mysql_server_ssl_ca. If there is no CA specified then TLS is optional. Temporary services and internally uses RPCs. These RPCs can optionally utilize secure transport options to use TLS over the gRPC HTTP/2 transport protocol. This document explains how to use these features. Finally transport, Vitess can use the usual TLS security features. Please note that familiarity with TLS is necessary here: • Any Vitess server can be configured to use TLS with the following command line parameters:0 码力 | 417 页 | 2.96 MB | 1 年前3The Vitess 11.0 Documentation
VTGate to support TLS set -mysql_server_ssl_cert and -mysql_server_ssl_key. Client certificates can also be mandated by setting -mysql_server_ssl_ca. If there is no CA specified then TLS is optional. Temporary services and internally uses RPCs. These RPCs can optionally utilize secure transport options to use TLS over the gRPC HTTP/2 transport protocol. This document explains how to use these features. Finally transport, Vitess can use the usual TLS security features. Please note that familiarity with TLS is necessary here: • Any Vitess server can be configured to use TLS with the following command line parameters:0 码力 | 481 页 | 3.14 MB | 1 年前3The Vitess 10.0 Documentation
VTGate to support TLS set -mysql_server_ssl_cert and -mysql_server_ssl_key. Client certificates can also be mandated by setting -mysql_server_ssl_ca. If there is no CA specified then TLS is optional. Temporary services and internally uses RPCs. These RPCs can optionally utilize secure transport options to use TLS over the gRPC HTTP/2 transport protocol. This document explains how to use these features. Finally transport, Vitess can use the usual TLS security features. Please note that familiarity with TLS is necessary here: • Any Vitess server can be configured to use TLS with the following command line parameters:0 码力 | 455 页 | 3.07 MB | 1 年前3The Vitess 6.0 Documentation
VTGate to support TLS set -mysql_server_ssl_cert and -mysql_server_ssl_key. Client certificates can also be mandated by setting -mysql_server_ssl_ca. If there is no CA specified then TLS is optional. Session and authentication scheme used depends on the transport used. With gRPC (the default for Vitess), TLS can be used to secure both internal and external RPCs. We’ll detail what the options are. Caller ID gRPC transport, Vitess can use the usual TLS security features (familiarity with SSL / TLS is necessary here): • Any Vitess server can be configured to use TLS with the following command line parameters:0 码力 | 210 页 | 846.79 KB | 1 年前3The Vitess 5.0 Documentation
VTGate to support TLS set -mysql_server_ssl_cert and -mysql_server_ssl_key. Client certificates can also be mandated by setting -mysql_server_ssl_ca. If there is no CA specified then TLS is optional. 52 and authentication scheme used depends on the transport used. With gRPC (the default for Vitess), TLS can be used to secure both internal and external RPCs. We’ll detail what the options are. Caller ID gRPC transport, Vitess can use the usual TLS security features (familiarity with SSL / TLS is necessary here): • Any Vitess server can be configured to use TLS with the following command line parameters:0 码力 | 206 页 | 875.06 KB | 1 年前3Pentest-Report Vitess 02.2019
services. In focus were Denial-of-Service and similar resource-depletion scenarios. • The deployed TLS configurations were analyzed for common misconfigurations, again to no avail. Cure53, Berlin · 03/08/190 码力 | 9 页 | 155.02 KB | 1 年前3
共 9 条
- 1