This is an automated email from the ASF dual-hosted git repository.

weichiu pushed a commit to branch HDDS-9225-website-v2
in repository https://gitbox.apache.org/repos/asf/ozone-site.git


The following commit(s) were added to refs/heads/HDDS-9225-website-v2 by this 
push:
     new dda9145ab HDDS-14270. [Website v2] [Docs] [Administrator Guide] 
Configuring Hadoop RPC With SASL (#193)
dda9145ab is described below

commit dda9145ab24e3c4b944982344f643ea0836a3a04
Author: KUAN-HAO HUANG <[email protected]>
AuthorDate: Fri Jan 2 11:04:05 2026 +0800

    HDDS-14270. [Website v2] [Docs] [Administrator Guide] Configuring Hadoop 
RPC With SASL (#193)
---
 .../01-network-encryption/01-hadoop-rpc.md            | 19 ++++++++++++++++++-
 1 file changed, 18 insertions(+), 1 deletion(-)

diff --git 
a/docs/05-administrator-guide/02-configuration/03-security/05-encryption/01-network-encryption/01-hadoop-rpc.md
 
b/docs/05-administrator-guide/02-configuration/03-security/05-encryption/01-network-encryption/01-hadoop-rpc.md
index 918f5effe..95a1d7422 100644
--- 
a/docs/05-administrator-guide/02-configuration/03-security/05-encryption/01-network-encryption/01-hadoop-rpc.md
+++ 
b/docs/05-administrator-guide/02-configuration/03-security/05-encryption/01-network-encryption/01-hadoop-rpc.md
@@ -4,4 +4,21 @@ sidebar_label: Hadoop RPC
 
 # Configuring Hadoop RPC With SASL
 
-**TODO:** File a subtask under 
[HDDS-9859](https://issues.apache.org/jira/browse/HDDS-9859) and complete this 
page or section.
+Ozone traffic may be transferred via Hadoop RPC for client-to-OM (Ozone 
Manager) communication. To encrypt client-OM communication, configure 
`hadoop.rpc.protection` to `privacy` in your `core-site.xml`. This ensures that 
all data exchanged over Hadoop RPC is encrypted.
+
+Hadoop RPC is encrypted using the algorithm selected by the Java SASL, which 
is typically 3DES or RC4. Note that the Hadoop RPC throughput may drop due to 
encryption overhead.
+
+For more information, check out [Hadoop in Secure 
Mode](https://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-common/SecureMode.html).
+
+```xml
+<property>
+  <name>hadoop.rpc.protection</name>
+  <value>privacy</value>
+</property>
+```
+
+## OM Transport Class
+
+The default transport class for communication with the Ozone Manager (OM) is 
`org.apache.hadoop.ozone.om.protocolPB.Hadoop3OmTransportFactory`. However, 
users can configure the system to use a gRPC-based transport class for 
client-to-OM communication by setting the `ozone.om.transport.class` 
configuration property to 
`org.apache.hadoop.ozone.om.protocolPB.GrpcOmTransportFactory`.
+
+In this case, the Hadoop RPC encryption configuration is not applicable. Refer 
to the [Configuring gRPC With TLS](./02-grpc.md) page to encrypt gRPC-based 
communication.


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to