summaryrefslogtreecommitdiffstats
path: root/docs/sections/apis/ves-hv
diff options
context:
space:
mode:
authorTony Hansen <tony@att.com>2020-04-27 18:30:52 +0000
committerGerrit Code Review <gerrit@onap.org>2020-04-27 18:30:52 +0000
commit1d9549e5adf1feab7a5b269e3748b5027fec3746 (patch)
tree28f2ec8aa3a23b160fc025a3cc4380f1487a9ced /docs/sections/apis/ves-hv
parent119b02361f6eb3d9f34202d2ae4c2dab467dfadd (diff)
parent7cfaea2ee5e73a5a0a669da3b8c949000245cb83 (diff)
Merge "dcae r6 doc updates cont."
Diffstat (limited to 'docs/sections/apis/ves-hv')
-rw-r--r--docs/sections/apis/ves-hv/index.rst9
1 files changed, 5 insertions, 4 deletions
diff --git a/docs/sections/apis/ves-hv/index.rst b/docs/sections/apis/ves-hv/index.rst
index df91681c..c3ccfa0c 100644
--- a/docs/sections/apis/ves-hv/index.rst
+++ b/docs/sections/apis/ves-hv/index.rst
@@ -5,7 +5,6 @@
HV-VES (High Volume VES)
========================
-:Date: 2018-10-05
.. contents::
:depth: 4
@@ -25,9 +24,11 @@ TCP Endpoint
============
HV-VES is exposed as NodePort service on Kubernetes cluster on port 30222/tcp.
-It uses plain, insecure TCP connection without socket data encryption. In Dublin release,
-there is an experimental option to enable SSL/TLS (see :ref:`ssl_tls_authorization`).
-Without TLS client authentication/authorization is not possible.
+By default, as of the Frankfurt release, all TCP communications are secured using
+SSL/TLS. Plain, insecure TCP connections without socket data encryption can be enabled if needed.
+ (see ref:`ssl_tls_authorization`).
+
+Without TLS, client authentication/authorization is not possible.
Connections are stream-based (as opposed to request-based) and long-running.
Communication is wrapped with thin Wire Transfer Protocol, which mainly provides delimitation.