Hello,

I see from the documentation -
https://solr.apache.org/guide/solr/latest/deployment-guide/securing-solr.html
- there are a number of options to secure Solr.

Any recommendations for securing Solr in User-Managed mode?
Particularly how to handle these cases:

   - Security between leader and follower for replication calls.
   - Security between Solr nodes, when an aggregator node makes a query to
   another Solr node in the shards list to fulfill the original query.

Thanks,
Matt

Reply via email to