After deploying with tiup and modifying the SSH port for compliance, is there anything else I need to do?

Note:
This topic has been translated from a Chinese forum by GPT and might contain errors.

Original topic: 使用tiup 部署完了,应等保修改了 ssh 端口,还需要我配合做什么吗?

| username: TiDBer_Latnok_Han

As the topic suggests, could you please provide some guidance?

| username: tidb菜鸟一只 | Original post link

tiup cluster edit-config
Then modify here and it will work.
image

| username: Fly-bird | Original post link

When installing, you shouldn’t use port 22, so you don’t need to modify it.

| username: 随缘天空 | Original post link

The cluster should be restarted after the modification, right?

| username: 像风一样的男子 | Original post link

After passing the security review, change it back to port 22.

| username: zhanggame1 | Original post link

If it’s not high-risk, there’s no need for rectification. I suggest you get someone who specializes in compliance. Changing ports is purely self-deception and doesn’t significantly improve security.

| username: tidb菜鸟一只 | Original post link

There’s no need. When you execute the command, it will execute the command through the new interface.

| username: Kongdom | Original post link

:astonished: Does this modification not require a reload? I thought all edit-config changes needed a reload to take effect~

| username: tidb菜鸟一只 | Original post link

Who should you reload for key configurations, the entire cluster? It seems like this mainly affects the tiup command…

| username: Kongdom | Original post link

:joy: That’s true, TiUP is used to manage the cluster, so it doesn’t need to reload itself.

| username: 随缘天空 | Original post link

You probably need the reload command. The edit-config is just like modifying the configuration; to make the configuration take effect, you still need to load the configuration.

Using tiup to maintain the cluster also mentions the need to reload: TiUP 常见运维操作 | PingCAP 文档中心

| username: 像风一样的男子 | Original post link

It is recommended to use a testing environment for classified protection evaluation (as clearly supported in the classified protection documents). Do not mess around in the production environment.

| username: tidb菜鸟一只 | Original post link

From this perspective, the entire cluster really needs to be reloaded because I found that all the components below are configured with the ssh_port parameter. Why is it that even though it’s configured globally, it still needs to be configured below…

| username: TiDBer_Latnok_Han | Original post link

After executing edit-config, it prompts reload.

| username: 随缘天空 | Original post link

Yes, it’s somewhat similar to nginx; you need to reload the configuration for the changes to take effect.

| username: 随缘天空 | Original post link

There is no conflict. If a node does not declare a configuration, the global configuration takes precedence. If both the node and the global configuration are declared, the node configuration takes precedence.

| username: TiDBer_小阿飞 | Original post link

What level of security protection is it? Messing around for nothing! If it’s internal, just handle it.

| username: TiDBer_Latnok_Han | Original post link

The compliance is something the customer handles themselves, so we can’t really comment on it.

| username: Jellybean | Original post link

This port is also used for password-free access between various components within the cluster (default tidb user, if you want to change the user, you need to adjust it in the same way). Therefore, after modification, you need to reload and distribute it to all components and update.

| username: come_true | Original post link

Test with multiple applications connected.