{"id":7341,"date":"2019-08-09T10:00:07","date_gmt":"2019-08-09T17:00:07","guid":{"rendered":"https:\/\/www.couchbase.com\/blog\/?p=7341"},"modified":"2025-06-13T19:26:15","modified_gmt":"2025-06-14T02:26:15","slug":"node-to-node-encryption-with-couchbase-server-6-5","status":"publish","type":"post","link":"https:\/\/www.couchbase.com\/blog\/pt\/node-to-node-encryption-with-couchbase-server-6-5\/","title":{"rendered":"Criptografia n\u00f3 a n\u00f3 com o Couchbase Server 6.5"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Com a seguran\u00e7a na mente de todos, as organiza\u00e7\u00f5es precisam executar cargas de trabalho confidenciais sob padr\u00f5es rigorosos de seguran\u00e7a e conformidade. A vers\u00e3o pr\u00e9via do Couchbase 6.5 traz v\u00e1rios novos recursos de seguran\u00e7a, e a criptografia n\u00f3 a n\u00f3 tem sido um dos principais itens da lista de desejos de muitos clientes. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Neste blog, forneceremos uma vis\u00e3o geral r\u00e1pida do novo recurso de criptografia n\u00f3 a n\u00f3, juntamente com etapas f\u00e1ceis de seguir para ajud\u00e1-lo a come\u00e7ar. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><strong>O que \u00e9 criptografia n\u00f3 a n\u00f3?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Em uma plataforma de dados distribu\u00edda, como o Couchbase Server, h\u00e1 basicamente dois tipos de informa\u00e7\u00f5es trocadas entre os n\u00f3s <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">1. Informa\u00e7\u00f5es de controle que incluem metadados de cluster, configura\u00e7\u00f5es, etc.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">2. Dados do usu\u00e1rio, incluindo documentos JSON<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Nas vers\u00f5es anteriores do Couchbase Server, a criptografia estava dispon\u00edvel entre o cliente e o servidor e para proteger o tr\u00e1fego XDCR entre os data centers. Na aus\u00eancia de um controle de seguran\u00e7a compensat\u00f3rio, como o IPSec em toda a rede, era poss\u00edvel que um invasor detectasse informa\u00e7\u00f5es no fio, desde que o acesso \u00e0 rede estivesse dispon\u00edvel. No entanto, alguns desses controles de compensa\u00e7\u00e3o eram dif\u00edceis de configurar ou implementar em escala.<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Com o novo recurso de criptografia n\u00f3 a n\u00f3 no Couchbase 6.5, as informa\u00e7\u00f5es que est\u00e3o fluindo entre os n\u00f3s s\u00e3o criptografadas nativamente pelo Couchbase, sem a necessidade de instalar nenhum software de terceiros. Os n\u00edveis de criptografia permitem criptografar apenas o tr\u00e1fego do plano de controle ou todos (controle e dados) entre os n\u00f3s. Isso proporciona flexibilidade aos clientes para que eles possam escolher o n\u00edvel de criptografia adequado ao seu caso de uso, mantendo o desempenho em mente. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Isso n\u00e3o significa que a criptografia n\u00f3 a n\u00f3 resolva tudo. A criptografia n\u00f3 a n\u00f3 ainda complementa os controles de seguran\u00e7a existentes, incluindo a criptografia cliente a servidor, a criptografia sobre XDCR, a criptografia em repouso e a seguran\u00e7a e o isolamento em n\u00edvel de rede baseados em nuvem privada virtual (VPC). Quanto mais camadas de prote\u00e7\u00e3o voc\u00ea adicionar ao seu sistema, mais dif\u00edcil ser\u00e1 para um invasor compromet\u00ea-lo.<\/span><\/p>\n<p><strong>De n\u00f3 para n\u00f3, n\u00e3o dentro de um n\u00f3<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Com base no feedback dos clientes, o recurso de criptografia n\u00f3 a n\u00f3 foi adicionado \u00e0 vers\u00e3o 6.5. Esse recurso levou v\u00e1rios meses para ser desenvolvido, embora possa parecer que ele aplica um TLS geral em todos os n\u00f3s do cluster. A imagem a seguir mostra algumas das altera\u00e7\u00f5es feitas no gerenciador de clusters do Couchbase - <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-7444\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2019\/08\/n2n-1-300x161.png\" alt=\"\" width=\"624\" height=\"335\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/n2n-1-300x161.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/n2n-1-1024x548.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/n2n-1-768x411.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/n2n-1-20x11.png 20w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/n2n-1.png 1282w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">A linha vermelha indica o <\/span><i><span style=\"font-weight: 400;\">local<\/span><\/i><span style=\"font-weight: 400;\"> intera\u00e7\u00f5es que existem entre os diferentes processos no mesmo n\u00f3 f\u00edsico - VMs ns_babysitter, ns_server e ns_couchdb. A linha azul indica a <\/span><i><span style=\"font-weight: 400;\">externo<\/span><\/i><span style=\"font-weight: 400;\"> intera\u00e7\u00f5es entre VMs ns_server em execu\u00e7\u00e3o em diferentes n\u00f3s do cluster. As intera\u00e7\u00f5es mostradas em vermelho sempre permaneceriam n\u00e3o criptografadas, independentemente de a criptografia do cluster estar ativada ou n\u00e3o. Isso ocorre porque n\u00e3o queremos sobrecarregar desnecessariamente os processos em execu\u00e7\u00e3o com criptografia. Por outro lado, as intera\u00e7\u00f5es externas (mostradas em azul) s\u00e3o criptografadas quando a criptografia de cluster est\u00e1 ativada.<\/span><\/p>\n<p><strong>Como configurar a criptografia n\u00f3 a n\u00f3?<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Configurar a criptografia n\u00f3 a n\u00f3 \u00e9 f\u00e1cil e, nesta se\u00e7\u00e3o, descreveremos as instru\u00e7\u00f5es passo a passo que voc\u00ea pode seguir para configur\u00e1-la.<\/span><\/p>\n<p><b>Etapa 1: <\/b><span style=\"font-weight: 400;\">Instalar o Couchbase Server 6.5 em<\/span><span style=\"font-weight: 400;\">\u00a02 n\u00f3s. Vamos chamar esses n\u00f3s de <\/span><b>n\u00f3-1 <\/b><span style=\"font-weight: 400;\">e <\/span><b>n\u00f3-2<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><b>Etapa 2: <\/b><span style=\"font-weight: 400;\">Se este for um cluster totalmente novo, durante a configura\u00e7\u00e3o gr\u00e1fica dos n\u00f3s, voc\u00ea ser\u00e1 solicitado a selecionar se a criptografia n\u00f3 a n\u00f3 est\u00e1 ativada ou n\u00e3o. Por padr\u00e3o, a criptografia de n\u00f3 n\u00e3o est\u00e1 ativada.\u00a0<\/span><\/p>\n<p><b>Marque a op\u00e7\u00e3o \"enable cluster encryption\" (ativar criptografia de cluster)<\/b><span style=\"font-weight: 400;\"> na caixa de di\u00e1logo e prossiga.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-7445\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2019\/08\/Screen-Shot-2019-08-06-at-3.18.48-PM-1-300x266.png\" alt=\"\" width=\"408\" height=\"362\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Screen-Shot-2019-08-06-at-3.18.48-PM-1-300x266.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Screen-Shot-2019-08-06-at-3.18.48-PM-1-1024x907.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Screen-Shot-2019-08-06-at-3.18.48-PM-1-768x681.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Screen-Shot-2019-08-06-at-3.18.48-PM-1-20x18.png 20w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Screen-Shot-2019-08-06-at-3.18.48-PM-1.png 1054w\" sizes=\"auto, (max-width: 408px) 100vw, 408px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Essa configura\u00e7\u00e3o s\u00f3 \u00e9 aplic\u00e1vel se todos os n\u00f3s do cluster forem da vers\u00e3o 6.5 ou superior. Se este for um novo cluster 6.5, todos os novos n\u00f3s que ingressarem no cluster herdar\u00e3o essa configura\u00e7\u00e3o.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">No caso de um cluster existente atualizado para a vers\u00e3o 6.5 ou de um novo cluster, essa opera\u00e7\u00e3o tamb\u00e9m pode ser feita usando o comando CLI, conforme mostrado abaixo -<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">$&gt; <\/span><span style=\"font-weight: 400;\">.\/couchbase-cli <\/span><b>criptografia de n\u00f3 para n\u00f3<\/b><span style=\"font-weight: 400;\"> -c localhost:8091 -u  -p <\/span><b>-habilitado<\/b><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><b>Etapa 3:<\/b><span style=\"font-weight: 400;\"> Verifique a configura\u00e7\u00e3o para garantir que a criptografia do cluster esteja ativada<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">.\/couchbase-cli <\/span><b>configura\u00e7\u00e3o de seguran\u00e7a<\/b><span style=\"font-weight: 400;\"> -get -c localhost:8091 -u  -p<\/span><\/p>\n<p><span style=\"font-weight: 400;\">{\"disableUIOverHttp\": false, \"disableUIOverHttps\": false, <\/span><span style=\"font-weight: 400;\">\"clusterEncryptionLevel\": \"control\"}<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">Observe que, por padr\u00e3o, o n\u00edvel de criptografia do cluster \u00e9 definido como <\/span><b>controle<\/b><span style=\"font-weight: 400;\">. Isso significa que os dados entre os n\u00f3s ainda n\u00e3o s\u00e3o criptografados, mas o plano de controle \u00e9 criptografado.<\/span><\/p>\n<p><b>Etapa 4:<\/b><span style=\"font-weight: 400;\"> Usando o netstat para verificar as portas abertas em <\/span><b>n\u00f3-1<\/b><span style=\"font-weight: 400;\"> de sa\u00edda para <\/span><b>n\u00f3-2. <\/b><span style=\"font-weight: 400;\">Quando h\u00e1 <\/span><b>sem criptografia em vigor, as portas 21100 a 21299 s\u00e3o usadas<\/b><span style=\"font-weight: 400;\"> para troca de dados. Para <\/span><b>Nas conex\u00f5es TLS entre os n\u00f3s, sempre usamos a porta 21150<\/b><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Voc\u00ea precisar\u00e1 usar o sudo como 'root' para executar esse comando -\u00a0<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">$&gt; <\/span><b>netstat<\/b><span style=\"font-weight: 400;\"> -atep -numeric-ports | <\/span><b>grep 'beam.smp' | grep 'node-2'<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>Sa\u00edda:\u00a0<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">tcp 0 0 node-1.us-central:59586 <\/span><b>n\u00f3-2<\/b><span style=\"font-weight: 400;\">.us-central:11209 ESTABLISHED couchbase 26650 3953\/beam.smp\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">tcp 0 0 node-1.us-central:<\/span><span style=\"font-weight: 400;\">21150<\/span> <b>n\u00f3-2<\/b><span style=\"font-weight: 400;\">.us-central:48498 ESTABLISHED couchbase 24960 3953\/beam.smp\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><\/p>\n<p><b>Etapa 5:<\/b><span style=\"font-weight: 400;\"> Se voc\u00ea for corajoso o suficiente, poder\u00e1 dar um passo adiante usando o pacote tshark (wireshark) e capturar pacotes TCP. Esta \u00e9 a apar\u00eancia da sa\u00edda<\/span><\/p>\n<table style=\"height: 123px;\" width=\"912\">\n<tbody>\n<tr>\n<td>$&gt; <b>tshark<\/b> -P -i <b>eth0<\/b> -f tcp -w \/<b>tmp\/eth0.pcap<\/b><\/p>\n<p>$&gt; tshark -x -r <b>\/tmp\/eth0.pcap<\/b> | Menos<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\"><strong>Sa\u00edda criptografada, como mostrado abaixo -<\/strong>\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-7446\" src=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2019\/08\/N2n-300x285.png\" alt=\"\" width=\"552\" height=\"524\" srcset=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/N2n-300x285.png 300w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/N2n-1024x974.png 1024w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/N2n-768x731.png 768w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/N2n-20x20.png 20w, https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/N2n.png 1280w\" sizes=\"auto, (max-width: 552px) 100vw, 552px\" \/><\/p>\n<p><strong>Certificados rotativos<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Como parte da higiene de seguran\u00e7a regular, espera-se que os certificados instalados sejam renovados periodicamente. Para garantir opera\u00e7\u00f5es cont\u00ednuas do cluster, o fluxo de trabalho compat\u00edvel seria desativar o modo de criptografia, carregar os certificados mais recentes em todos os n\u00f3s do cluster e ativar a criptografia novamente. A seguir, est\u00e3o os comandos que o administrador dever\u00e1 executar para alternar os certificados:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>1. Verifique o n\u00edvel de criptografia do cluster -\u00a0<\/b><\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">.\/couchbase-cli <\/span><b>configura\u00e7\u00e3o de seguran\u00e7a<\/b><span style=\"font-weight: 400;\"> -get -c localhost:8091 -u  -p<\/span><\/p>\n<p><span style=\"font-weight: 400;\">{\"disableUIOverHttp\": false, \"disableUIOverHttps\": false, <\/span><span style=\"font-weight: 400;\">\"clusterEncryptionLevel\": \"all\"}<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">Se o n\u00edvel for \"all\", conforme mostrado, ser\u00e1 necess\u00e1rio alter\u00e1-lo para \"control\" usando o comando couchbase-cli setting-security set.<\/span><\/p>\n<ol start=\"2\">\n<li><b> Desative a criptografia de cluster usando o comando \"change-cluster-encryption\" da CLI.<\/b><\/li>\n<\/ol>\n<table style=\"height: 288px;\" width=\"917\">\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">$&gt; couchbase-cli <\/span><b>node-to-node-encryptionchange-cluster-encryption<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0-c localhost:8091\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0-u\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0-p<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><b>-disable<\/b><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ol start=\"3\">\n<li><b>Copie todos os certificados de n\u00f3 mais recentes para o diret\u00f3rio <\/b><b><i>caixa de entrada<\/i><\/b><b> em todos os n\u00f3s do cluster e diga ao cluster para recarregar os certificados.<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Se tamb\u00e9m for necess\u00e1rio renovar o certificado raiz, carregue o novo certificado raiz no cluster usando o comando <\/span><i><span style=\"font-weight: 400;\">-upload-cluster-ca<\/span><\/i><span style=\"font-weight: 400;\"> Comando CLI.<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">$&gt; couchbase-cli <\/span><b>gerenciamento de ssl<\/b><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0-cluster :<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0-upload-cluster-ca<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">Em seguida, execute o <\/span><i><span style=\"font-weight: 400;\">-set-node-certificate<\/span><\/i><span style=\"font-weight: 400;\"> Comando CLI para recarregar os certificados de n\u00f3 mais recentes em todos os n\u00f3s do cluster<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><span style=\"font-weight: 400;\">$&gt; couchbase-cli <\/span><b>gerenciamento de ssl<\/b><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0-cluster :<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0-set-node-certificate<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<ol start=\"4\">\n<li><b>Ative a criptografia do cluster usando o comando da CLI \"change-cluster-encryption\"\u00a0<\/b><b>Recursos<\/b><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">$&gt; couchbase-cli <\/span><i><span style=\"font-weight: 400;\">criptografia de n\u00f3 para n\u00f3<\/span><\/i><b>alterar a criptografia do cluster<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0-c localhost:8091\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0-u\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0-p<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><b>-habilitado<\/b><\/p>\n<p><strong style=\"font-size: 19px;\">Conclus\u00e3o<\/strong><\/p>\n<p><span style=\"font-size: 19px;\">Estamos muito animados com os novos recursos de seguran\u00e7a do Couchbase Server 6.5, pois eles atender\u00e3o a muitas solicita\u00e7\u00f5es dos nossos clientes. Como sempre, aguardamos seu feedback sobre nossos novos recursos e esperamos que tenha a chance de experimentar a vers\u00e3o pr\u00e9via do Couchbase Server 6.5.<\/span><\/p>\n<p><strong>Recursos<\/strong><\/p>\n<p><i style=\"font-size: 19px;\">Baixar<\/i><\/p>\n<p><a href=\"https:\/\/www.couchbase.com\/blog\/pt\/downloads\/?family=server&amp;product=couchbase-server-developer\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\">Fa\u00e7a o download do Couchbase Server 6.5<\/a><\/p>\n<p><i>Documenta\u00e7\u00e3o<\/i><\/p>\n<p><a href=\"https:\/\/docs.couchbase.com\/server\/6.5\/release-notes\/relnotes.html\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\">Notas de vers\u00e3o do Couchbase Server 6.5<\/a><\/p>\n<p><a href=\"https:\/\/docs.couchbase.com\/server\/6.5\/introduction\/whats-new.html\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\">Couchbase Server 6.5 O que h\u00e1 de novo<\/a><\/p>\n<p><i>Blogs<\/i><\/p>\n<p><a href=\"https:\/\/www.couchbase.com\/blog\/pt\/announcing-couchbase-server-6-5-0-whats-new-and-improved\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\">Blog: Anunciando o Couchbase Server 6.5 - O que h\u00e1 de novo e aprimorado<\/a><\/p>\n<p><a href=\"https:\/\/www.couchbase.com\/blog\/pt\/couchbase-brings-distributed-multi-document-acid-transactions-to-nosql\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\">Blog: O Couchbase traz as transa\u00e7\u00f5es ACID multi-documento distribu\u00eddas para o NoSQL<\/a><\/p>\n<p><b><a href=\"https:\/\/www.couchbase.com\/blog\/pt\/tag\/6-5\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-auth=\"NotApplicable\">Todos os blogs 6.5<\/a><\/b><\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>With security on everyone\u2019s mind, organizations need to run sensitive workloads under stringent security and compliance standards. Couchbase 6.5 preview brings several new security capabilities, and node-to-node encryption has been a top wish list item for many customers. In this [&hellip;]<\/p>","protected":false},"author":6588,"featured_media":7448,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1816,1813],"tags":[2378,1666],"ppma_author":[9064],"class_list":["post-7341","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-couchbase-server","category-security","tag-6-5","tag-encryption"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.1 (Yoast SEO v26.1.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Node-to-Node Encryption with Couchbase Server 6.5 - The Couchbase Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.couchbase.com\/blog\/pt\/node-to-node-encryption-with-couchbase-server-6-5\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Node-to-Node Encryption with Couchbase Server 6.5\" \/>\n<meta property=\"og:description\" content=\"With security on everyone\u2019s mind, organizations need to run sensitive workloads under stringent security and compliance standards. Couchbase 6.5 preview brings several new security capabilities, and node-to-node encryption has been a top wish list item for many customers. In this [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.couchbase.com\/blog\/pt\/node-to-node-encryption-with-couchbase-server-6-5\/\" \/>\n<meta property=\"og:site_name\" content=\"The Couchbase Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-09T17:00:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-14T02:26:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Transactions-2-1-e1630708930818.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"553\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chaitra Ramarao, Sr. Product Manager, Couchbase Inc.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chaitra Ramarao, Sr. Product Manager, Couchbase Inc.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/\"},\"author\":{\"name\":\"Chaitra Ramarao, Sr. Product Manager, Couchbase Inc.\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/852cd95d6c8aa5ea6d4128643cc3c2b6\"},\"headline\":\"Node-to-Node Encryption with Couchbase Server 6.5\",\"datePublished\":\"2019-08-09T17:00:07+00:00\",\"dateModified\":\"2025-06-14T02:26:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/\"},\"wordCount\":1150,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Transactions-2-1-e1630708930818.jpg\",\"keywords\":[\"6.5\",\"Encryption\"],\"articleSection\":[\"Couchbase Server\",\"Security\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/\",\"name\":\"Node-to-Node Encryption with Couchbase Server 6.5 - The Couchbase Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Transactions-2-1-e1630708930818.jpg\",\"datePublished\":\"2019-08-09T17:00:07+00:00\",\"dateModified\":\"2025-06-14T02:26:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/#primaryimage\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Transactions-2-1-e1630708930818.jpg\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Transactions-2-1-e1630708930818.jpg\",\"width\":1400,\"height\":553},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.couchbase.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Node-to-Node Encryption with Couchbase Server 6.5\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#website\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"name\":\"The Couchbase Blog\",\"description\":\"Couchbase, the NoSQL Database\",\"publisher\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#organization\",\"name\":\"The Couchbase Blog\",\"url\":\"https:\/\/www.couchbase.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"contentUrl\":\"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png\",\"width\":218,\"height\":34,\"caption\":\"The Couchbase Blog\"},\"image\":{\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/852cd95d6c8aa5ea6d4128643cc3c2b6\",\"name\":\"Chaitra Ramarao, Sr. Product Manager, Couchbase Inc.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/459272ec41e39279e1f7784a97a6b106\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3ce5e2ac49271390c080a82e055d92096b80f63a8f2ca4db5a52af1ace0b06f5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3ce5e2ac49271390c080a82e055d92096b80f63a8f2ca4db5a52af1ace0b06f5?s=96&d=mm&r=g\",\"caption\":\"Chaitra Ramarao, Sr. Product Manager, Couchbase Inc.\"},\"description\":\"Chaitra Ramarao is a Senior Product Manager at Couchbase, NoSQL database company, leading databases tooling, cross datacenter replication and partner integrations. Her prior gigs include data analytics product management for Kaiser Permanente and software development for Hewlett Packard. She has a Bachelors degree in ECE and a Masters from Carnegie Mellon in Engineering &amp; Technology Innovation Management.\",\"url\":\"https:\/\/www.couchbase.com\/blog\/pt\/author\/chaitra\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Node-to-Node Encryption with Couchbase Server 6.5 - The Couchbase Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.couchbase.com\/blog\/pt\/node-to-node-encryption-with-couchbase-server-6-5\/","og_locale":"pt_BR","og_type":"article","og_title":"Node-to-Node Encryption with Couchbase Server 6.5","og_description":"With security on everyone\u2019s mind, organizations need to run sensitive workloads under stringent security and compliance standards. Couchbase 6.5 preview brings several new security capabilities, and node-to-node encryption has been a top wish list item for many customers. In this [&hellip;]","og_url":"https:\/\/www.couchbase.com\/blog\/pt\/node-to-node-encryption-with-couchbase-server-6-5\/","og_site_name":"The Couchbase Blog","article_published_time":"2019-08-09T17:00:07+00:00","article_modified_time":"2025-06-14T02:26:15+00:00","og_image":[{"width":1400,"height":553,"url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Transactions-2-1-e1630708930818.jpg","type":"image\/jpeg"}],"author":"Chaitra Ramarao, Sr. Product Manager, Couchbase Inc.","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Chaitra Ramarao, Sr. Product Manager, Couchbase Inc.","Est. reading time":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/#article","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/"},"author":{"name":"Chaitra Ramarao, Sr. Product Manager, Couchbase Inc.","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/852cd95d6c8aa5ea6d4128643cc3c2b6"},"headline":"Node-to-Node Encryption with Couchbase Server 6.5","datePublished":"2019-08-09T17:00:07+00:00","dateModified":"2025-06-14T02:26:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/"},"wordCount":1150,"commentCount":0,"publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Transactions-2-1-e1630708930818.jpg","keywords":["6.5","Encryption"],"articleSection":["Couchbase Server","Security"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/","url":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/","name":"Node-to-Node Encryption with Couchbase Server 6.5 - The Couchbase Blog","isPartOf":{"@id":"https:\/\/www.couchbase.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/#primaryimage"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/#primaryimage"},"thumbnailUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Transactions-2-1-e1630708930818.jpg","datePublished":"2019-08-09T17:00:07+00:00","dateModified":"2025-06-14T02:26:15+00:00","breadcrumb":{"@id":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/#primaryimage","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Transactions-2-1-e1630708930818.jpg","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/sites\/1\/2019\/08\/Transactions-2-1-e1630708930818.jpg","width":1400,"height":553},{"@type":"BreadcrumbList","@id":"https:\/\/www.couchbase.com\/blog\/node-to-node-encryption-with-couchbase-server-6-5\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.couchbase.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Node-to-Node Encryption with Couchbase Server 6.5"}]},{"@type":"WebSite","@id":"https:\/\/www.couchbase.com\/blog\/#website","url":"https:\/\/www.couchbase.com\/blog\/","name":"Blog do Couchbase","description":"Couchbase, o banco de dados NoSQL","publisher":{"@id":"https:\/\/www.couchbase.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.couchbase.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.couchbase.com\/blog\/#organization","name":"Blog do Couchbase","url":"https:\/\/www.couchbase.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","contentUrl":"https:\/\/www.couchbase.com\/blog\/wp-content\/uploads\/2023\/04\/admin-logo.png","width":218,"height":34,"caption":"The Couchbase Blog"},"image":{"@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/852cd95d6c8aa5ea6d4128643cc3c2b6","name":"Chaitra Ramarao, gerente s\u00eanior de produtos da Couchbase Inc. Gerente de produtos, Couchbase Inc.","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.couchbase.com\/blog\/#\/schema\/person\/image\/459272ec41e39279e1f7784a97a6b106","url":"https:\/\/secure.gravatar.com\/avatar\/3ce5e2ac49271390c080a82e055d92096b80f63a8f2ca4db5a52af1ace0b06f5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3ce5e2ac49271390c080a82e055d92096b80f63a8f2ca4db5a52af1ace0b06f5?s=96&d=mm&r=g","caption":"Chaitra Ramarao, Sr. Product Manager, Couchbase Inc."},"description":"Chaitra Ramarao \u00e9 gerente de produto s\u00eanior da Couchbase, empresa de banco de dados NoSQL, liderando ferramentas de bancos de dados, replica\u00e7\u00e3o entre datacenters e integra\u00e7\u00f5es de parceiros. Seus trabalhos anteriores incluem gerenciamento de produtos de an\u00e1lise de dados para a Kaiser Permanente e desenvolvimento de software para a Hewlett Packard. Ela \u00e9 bacharel em ECE e tem mestrado pela Carnegie Mellon em Gest\u00e3o de Inova\u00e7\u00e3o em Engenharia e Tecnologia.","url":"https:\/\/www.couchbase.com\/blog\/pt\/author\/chaitra\/"}]}},"authors":[{"term_id":9064,"user_id":6588,"is_guest":0,"slug":"chaitra","display_name":"Chaitra Ramarao, Sr. Product Manager, Couchbase Inc.","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/3ce5e2ac49271390c080a82e055d92096b80f63a8f2ca4db5a52af1ace0b06f5?s=96&d=mm&r=g","author_category":"","last_name":"Ramarao, Sr. Product Manager, Couchbase Inc.","first_name":"Chaitra","job_title":"","user_url":"","description":"Chaitra Ramarao \u00e9 gerente de produto s\u00eanior da Couchbase, empresa de banco de dados NoSQL, liderando ferramentas de bancos de dados, replica\u00e7\u00e3o entre datacenters e integra\u00e7\u00f5es de parceiros. Seus trabalhos anteriores incluem gerenciamento de produtos de an\u00e1lise de dados para a Kaiser Permanente e desenvolvimento de software para a Hewlett Packard. Ela \u00e9 bacharel em ECE e tem mestrado pela Carnegie Mellon em Gest\u00e3o de Inova\u00e7\u00e3o em Engenharia e Tecnologia."}],"_links":{"self":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/posts\/7341","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/users\/6588"}],"replies":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/comments?post=7341"}],"version-history":[{"count":0,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/posts\/7341\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/media\/7448"}],"wp:attachment":[{"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/media?parent=7341"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/categories?post=7341"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/tags?post=7341"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.couchbase.com\/blog\/pt\/wp-json\/wp\/v2\/ppma_author?post=7341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}