Skip to content

Commit 8d9a96c

Browse files
authored
security: remove mention of "TiFlow" (pingcap#21886) (pingcap#21891)
1 parent fad9282 commit 8d9a96c

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

best-practices-for-security-configuration.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ By default, TiDB Dashboard is designed for trusted users. The default port inclu
6464

6565
By default, TiDB installation includes several privileged interfaces for inter-component communication. These ports typically do not need to be accessible to users, because they are primarily for internal communication. Exposing these ports on public networks increases the attack surface, violates the principle of least privilege, and raises the risk of security vulnerabilities. The following table lists the default listening ports in a TiDB cluster:
6666

67-
| Component | Default port | Protocol |
67+
| Component | Default port| Protocol |
6868
|-------------------|-------------|------------|
6969
| TiDB | 4000 | MySQL |
7070
| TiDB | 10080 | HTTP |
@@ -76,10 +76,10 @@ By default, TiDB installation includes several privileged interfaces for inter-c
7676
| TiFlash | 20170 | Protocol |
7777
| TiFlash | 20292 | HTTP |
7878
| TiFlash | 8234 | HTTP |
79-
| TiFlow | 8261 | HTTP |
80-
| TiFlow | 8291 | HTTP |
81-
| TiFlow | 8262 | HTTP |
82-
| TiFlow | 8300 | HTTP |
79+
| DM master | 8261 | HTTP |
80+
| DM master | 8291 | HTTP |
81+
| DM worker | 8262 | HTTP |
82+
| TiCDC | 8300 | HTTP |
8383
| TiDB Lightning | 8289 | HTTP |
8484
| TiDB Operator | 6060 | HTTP |
8585
| TiDB Dashboard | 2379 | HTTP |
@@ -98,7 +98,7 @@ By default, TiDB installation includes several privileged interfaces for inter-c
9898
| AlertManager | 9093 | HTTP |
9999
| AlertManager | 9094 | Protocol |
100100
| Node Exporter | 9100 | HTTP |
101-
| Blackbox Exporter | 9115 | HTTP |
101+
| Blackbox Exporter | 9115 | HTTP |
102102
| NG Monitoring | 12020 | HTTP |
103103

104104
It is recommended to only expose the `4000` port for the database and the `9000` port for the Grafana dashboard to ordinary users, while restricting access to other ports using network security policies or firewalls. The following is an example of using `iptables` to restrict port access:

0 commit comments

Comments
 (0)