Securing DataStax Enterprise Ports

All network security starts with strict and proper firewall rules on interfaces that are exposed to the internet, allowing only the absolute minimum traffic in or out of the internal network. Firewall security is especially important when running your infrastructure in a public cloud. Wherever you host your clusters, DataStax strongly recommends using a firewall on all nodes in your cluster.

Begin with a restrictive configuration that blocks all traffic except SSH. Then, open up the following ports in compliance with your security requirements to allow communication between the nodes. If these ports are not opened, the node acts as a standalone database server rather than joining the cluster when you start DataStax Enterprise (DSE) on a node.

If the cluster uses SSL only, close any non-SSL ports that have dedicated SSL ports. To ensure communication is not disabled to any non-SSL clients, DataStax recommends testing the configuration in a staging environment before enabling the firewall in production environments.

Make sure your firewall rules do not restrict traffic between DSE Analytics nodes. Traffic between DSE Analytics nodes must be unrestricted to allow communication between DSE Spark Master and Worker nodes.

Configuration Files
Filename Location dependent on the type of installation

cassandra-env.sh

Package installations: /etc/dse/cassandra/cassandra-env.sh

Tarball installations: <installation_location>/resources/cassandra/conf/cassandra-env.sh

cassandra.yaml

Package installations: /etc/dse/cassandra/cassandra.yaml

Tarball installations: <installation_location>/resources/cassandra/conf/cassandra.yaml

dse.yaml

Package installations: /etc/dse/dse.yaml

Tarball installations: <installation_location>/resources/dse/conf/dse.yaml

spark-defaults.conf

Package installations: /etc/dse/spark/spark-defaults.conf

Tarball installations: <installation_location>/resources/spark/conf/spark-defaults.conf

spark-env.sh

Package installations: /etc/dse/spark/spark-env.sh

Tarball installations: <installation_location>/resources/spark/conf/spark-env.sh

opscenterd.conf

Package installations: /etc/opscenter/opscenterd.conf

Tarball installations: <installation_location>/conf/opscenterd.conf

Procedure

Open the following ports:

Ports to Open for Configurable Services
Default port Service Configurable in

Public-facing ports

22

SSH (default)

See your OS documentation on sshd.

DataStax Enterprise public ports

(random)

Spark port for the driver to listen on. Used for communicating with the executors and the standalone Master. In client mode, this port is opened on the local node where the Spark application was started. In cluster mode, this port is opened on one of the Analytics nodes selected randomly. When used in cluster mode, the port is opened only on the network interface used for internode communication. To explicitly set the port, set the spark.driver.port property in the Spark driver. If an application is already using the designated port, it increments the port number up to the setting of the spark.port.maxRetries property. For example, if spark.driver.port is set to 11000 and spark.port.maxRetries is set to 10, it attempts to bind to port 11000. If that fails it increments the port number and retry, stopping at port 11010.

spark-defaults.conf and using the --conf option on the command line.

(random)

Spark port for all block managers to listen on. These ports exist on both the driver and the executors. To explicitly set the port, set the spark.blockManager.port property. If an application is already using the designated port, it increments the port number up to the setting of the spark.port.maxRetries property. For example, if spark.blockManager.port is set to 11000 and spark.port.maxRetries is set to 10, it attempts to bind to port 11000. If that fails it increments the port number and retries, stopping at port 11010.

spark-defaults.conf and using the --conf option on the command line.

(random)

spark.executor.port Spark port for the executor to listen on. This is used for communicating with the driver.

spark-defaults.conf and using the --conf option on the command line.

(random)

spark.shuffle.service.port Spark port on which the external shuffle service runs.

The SPARK_SHUFFLE_OPTS variable in spark-env.sh.

4040

Spark application web site port. If an application is already using the designated port, it increments the port number up to the setting of the spark.port.maxRetries property. For example, if spark.port.maxRetries is set to 10, it attempts to bind to port 4041, and repeats until it reaches port 4050.

spark-defaults.conf and using the --conf option on the command line.

5598, 5599

Public/internode ports for DSE File System (DSEFS) clients.

dse.yaml

7080

Spark Master web UI port.

spark-env.sh

7081

Spark Worker web UI port.

spark-env.sh

7437

spark.dseShuffle.noSasl.port

The port number on which a shuffle service for unsecured applications is started. Bound to the listen_address in cassandra.yaml.

7447

spark.dseShuffle.sasl.port

The port number on which a shuffle service for SASL secured applications is started. Bound to the listen_address in cassandra.yaml.

8182

The gremlin server port for DSE Graph.

8983

DSE Search (Solr) port and Demo applications web site port (Portfolio, Search, Search log, Weather Sensors)

8090

Spark Jobserver REST API port.

9042

DSE database native clients port. Enabling native transport encryption in client_encryption_options provides the option to use encryption for the standard port, or to use a dedicated port in addition to the unencrypted native_transport_port. When SSL is enabled, port 9142 is used by native clients instead.

cassandra.yaml

9091

The DataStax Studio server port.

See DataStax Studio documentation. Configure in <dse_studio_install_dir>/configuration.yaml.

9077

AlwaysOn SQL WebUI port.

9142

DSE client port when SSL is enabled. Enabling client encryption and keeping native_transport_port_ssl disabled uses encryption for native_transport_port. Setting native_transport_port_ssl to a different value from native_transport_port uses encryption for native_transport_port_ssl while keeping native_transport_port unencrypted.

9999

Spark Jobserver JMX port. Required only if Spark Jobserver is running and remote access to JMX is required.

18080

Spark application history server web site port. Only required if Spark application history server is running. Can be changed with the spark.history.ui.port setting.

OpsCenter public ports

8888

OpsCenter web site port. The opscenterd daemon listens on this port for HTTP requests coming directly from the browser. See OpsCenter ports reference.

opscenterd.conf

Internode ports

DSE database internode communication ports

5599

Private port for DSEFS internode communication port. Must not be visible outside of the cluster.

dse.yaml

7000

DSE internode cluster communication port.

cassandra.yaml

7001

DSE SSL internode cluster communication port.

cassandra.yaml

7199

DSE JMX metrics monitoring port. DataStax recommends allowing connections only from the local node. Configure Configuring SSL [SSL] and JMX authentication when allowing connections from other nodes.

cassandra-env.sh See JMX options in Tuning Java Virtual Machine.

DataStax Enterprise internode ports

7077

Spark Master internode communication port.

dse.yaml

8609

Port for internode messaging service.

dse.yaml

Spark SQL Thrift server

10000

Spark SQL Thrift server port. Only required if Spark SQL Thrift server is running.

Set with the `-p`option with the Spark SQL Thrift server.

Was this helpful?

Give Feedback

How can we improve the documentation?

© 2024 DataStax | Privacy policy | Terms of use

Apache, Apache Cassandra, Cassandra, Apache Tomcat, Tomcat, Apache Lucene, Apache Solr, Apache Hadoop, Hadoop, Apache Pulsar, Pulsar, Apache Spark, Spark, Apache TinkerPop, TinkerPop, Apache Kafka and Kafka are either registered trademarks or trademarks of the Apache Software Foundation or its subsidiaries in Canada, the United States and/or other countries. Kubernetes is the registered trademark of the Linux Foundation.

General Inquiries: +1 (650) 389-6000, info@datastax.com