You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: best-practices-for-security-configuration.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,7 +64,7 @@ By default, TiDB Dashboard is designed for trusted users. The default port inclu
64
64
65
65
By default, TiDB installation includes several privileged interfaces for inter-component communication. These ports typically do not need to be accessible to users, because they are primarily for internal communication. Exposing these ports on public networks increases the attack surface, violates the principle of least privilege, and raises the risk of security vulnerabilities. The following table lists the default listening ports in a TiDB cluster:
66
66
67
-
| Component | Default port| Protocol|
67
+
| Component | Default port| Protocol |
68
68
|-------------------|-------------|------------|
69
69
| TiDB | 4000 | MySQL |
70
70
| TiDB | 10080 | HTTP |
@@ -76,10 +76,10 @@ By default, TiDB installation includes several privileged interfaces for inter-c
76
76
| TiFlash | 20170 | Protocol |
77
77
| TiFlash | 20292 | HTTP |
78
78
| TiFlash | 8234 | HTTP |
79
-
|TiFlow | 8261 | HTTP |
80
-
|TiFlow | 8291 | HTTP |
81
-
|TiFlow | 8262| HTTP |
82
-
|TiFlow|8300 | HTTP |
79
+
|DM master| 8261 | HTTP|
80
+
|DM master| 8291 | HTTP|
81
+
|DM worker| 8262 | HTTP|
82
+
|TiCDC|8300| HTTP |
83
83
| TiDB Lightning | 8289 | HTTP |
84
84
| TiDB Operator | 6060 | HTTP |
85
85
| TiDB Dashboard | 2379 | HTTP |
@@ -98,7 +98,7 @@ By default, TiDB installation includes several privileged interfaces for inter-c
98
98
| AlertManager | 9093 | HTTP |
99
99
| AlertManager | 9094 | Protocol |
100
100
| Node Exporter | 9100 | HTTP |
101
-
| Blackbox Exporter | 9115 | HTTP |
101
+
| Blackbox Exporter | 9115 | HTTP |
102
102
| NG Monitoring | 12020 | HTTP |
103
103
104
104
It is recommended to only expose the `4000` port for the database and the `9000` port for the Grafana dashboard to ordinary users, while restricting access to other ports using network security policies or firewalls. The following is an example of using `iptables` to restrict port access:
0 commit comments