Skip to content

Commit e0d0671

Browse files
authored
security: remove mention of "TiFlow" (pingcap#21886) (pingcap#21890)
1 parent 459862c commit e0d0671

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

best-practices-for-security-configuration.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ By default, TiDB Dashboard is designed for trusted users. The default port inclu
5858

5959
By default, TiDB installation includes several privileged interfaces for inter-component communication. These ports typically do not need to be accessible to users, because they are primarily for internal communication. Exposing these ports on public networks increases the attack surface, violates the principle of least privilege, and raises the risk of security vulnerabilities. The following table lists the default listening ports in a TiDB cluster:
6060

61-
| Component | Default port | Protocol |
61+
| Component | Default port| Protocol |
6262
|-------------------|-------------|------------|
6363
| TiDB | 4000 | MySQL |
6464
| TiDB | 10080 | HTTP |
@@ -70,10 +70,10 @@ By default, TiDB installation includes several privileged interfaces for inter-c
7070
| TiFlash | 20170 | Protocol |
7171
| TiFlash | 20292 | HTTP |
7272
| TiFlash | 8234 | HTTP |
73-
| TiFlow | 8261 | HTTP |
74-
| TiFlow | 8291 | HTTP |
75-
| TiFlow | 8262 | HTTP |
76-
| TiFlow | 8300 | HTTP |
73+
| DM master | 8261 | HTTP |
74+
| DM master | 8291 | HTTP |
75+
| DM worker | 8262 | HTTP |
76+
| TiCDC | 8300 | HTTP |
7777
| TiDB Lightning | 8289 | HTTP |
7878
| TiDB Operator | 6060 | HTTP |
7979
| TiDB Dashboard | 2379 | HTTP |
@@ -92,7 +92,7 @@ By default, TiDB installation includes several privileged interfaces for inter-c
9292
| AlertManager | 9093 | HTTP |
9393
| AlertManager | 9094 | Protocol |
9494
| Node Exporter | 9100 | HTTP |
95-
| Blackbox Exporter | 9115 | HTTP |
95+
| Blackbox Exporter | 9115 | HTTP |
9696
| NG Monitoring | 12020 | HTTP |
9797

9898
It is recommended to only expose the `4000` port for the database and the `9000` port for the Grafana dashboard to ordinary users, while restricting access to other ports using network security policies or firewalls. The following is an example of using `iptables` to restrict port access:

0 commit comments

Comments
 (0)