diff options
author | Tony Hansen <tony@att.com> | 2020-04-27 18:30:52 +0000 |
---|---|---|
committer | Gerrit Code Review <gerrit@onap.org> | 2020-04-27 18:30:52 +0000 |
commit | 1d9549e5adf1feab7a5b269e3748b5027fec3746 (patch) | |
tree | 28f2ec8aa3a23b160fc025a3cc4380f1487a9ced /docs/sections/apis/ves-hv | |
parent | 119b02361f6eb3d9f34202d2ae4c2dab467dfadd (diff) | |
parent | 7cfaea2ee5e73a5a0a669da3b8c949000245cb83 (diff) |
Merge "dcae r6 doc updates cont."
Diffstat (limited to 'docs/sections/apis/ves-hv')
-rw-r--r-- | docs/sections/apis/ves-hv/index.rst | 9 |
1 files changed, 5 insertions, 4 deletions
diff --git a/docs/sections/apis/ves-hv/index.rst b/docs/sections/apis/ves-hv/index.rst index df91681c..c3ccfa0c 100644 --- a/docs/sections/apis/ves-hv/index.rst +++ b/docs/sections/apis/ves-hv/index.rst @@ -5,7 +5,6 @@ HV-VES (High Volume VES) ======================== -:Date: 2018-10-05 .. contents:: :depth: 4 @@ -25,9 +24,11 @@ TCP Endpoint ============ HV-VES is exposed as NodePort service on Kubernetes cluster on port 30222/tcp. -It uses plain, insecure TCP connection without socket data encryption. In Dublin release, -there is an experimental option to enable SSL/TLS (see :ref:`ssl_tls_authorization`). -Without TLS client authentication/authorization is not possible. +By default, as of the Frankfurt release, all TCP communications are secured using +SSL/TLS. Plain, insecure TCP connections without socket data encryption can be enabled if needed. + (see ref:`ssl_tls_authorization`). + +Without TLS, client authentication/authorization is not possible. Connections are stream-based (as opposed to request-based) and long-running. Communication is wrapped with thin Wire Transfer Protocol, which mainly provides delimitation. |