Steps to configure a non-secure data store
The interactive diagram below shows the steps that are required to configure a multi-node non-secure cluster. The cluster is deployed in a single region and consists of multiple storage nodes that are connected non-securely.
Choose a block in the below diagram to know more about the configuration step.