Skip to content

Commit 017952a

Browse files
Merge pull request #232843 from TheovanKraay/patch-34
client ssl related changes
2 parents 285ebd1 + da8a88a commit 017952a

File tree

3 files changed

+37
-1
lines changed

3 files changed

+37
-1
lines changed

articles/managed-instance-apache-cassandra/configure-hybrid-cluster.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ This quickstart demonstrates how to use the Azure CLI commands to configure a hy
5959

6060
1. Certs signed by a CA. This can be a self-signed CA or even a public one. In this case we need the root CA certificate (refer to instructions on [preparing SSL certificates for production](https://docs.datastax.com/en/cassandra-oss/3.x/cassandra/configuration/secureSSLCertWithCA.html)), and all intermediaries (if applicable).
6161

62-
Optionally, if you have also implemented client-to-node certificates (see [here](https://docs.datastax.com/en/cassandra-oss/3.x/cassandra/configuration/secureSSLClientToNode.html)), you also need to provide them in the same format when creating the hybrid cluster. See sample below.
62+
Optionally, if you want to implement client-to-node certificate authentication as well, you need to provide the certificates in the same format when creating the hybrid cluster. See Azure CLI sample below - the certificates are provided in the `--client-certificates` parameter. This will upload and apply your client certificates to the truststore for your Cassandra Managed Instance cluster (i.e. you do not need to edit cassandra.yaml settings).
6363

6464
> [!NOTE]
6565
> The value of the `delegatedManagementSubnetId` variable you will supply below is exactly the same as the value of `--scope` that you supplied in the command above:

articles/managed-instance-apache-cassandra/create-cluster-cli.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -177,6 +177,25 @@ As with CQLSH, connecting from an application using one of the supported [Apache
177177

178178
Disabling certificate verification is recommended because certificate verification will not work unless you map I.P addresses of your cluster nodes to the appropriate domain. If you have an internal policy which mandates that you do SSL certificate verification for any application, you can facilitate this by adding entries like `10.0.1.5 host1.managedcassandra.cosmos.azure.com` in your hosts file for each node. If taking this approach, you would also need to add new entries whenever scaling up nodes.
179179

180+
### Configuring client certificates
181+
182+
Configuring client certificates is optional. In general, there are two ways of creating certificates:
183+
184+
- Self signed certs. This means a private and public (no CA) certificate for each node - in this case we need all public certificates.
185+
- Certs signed by a CA. This can be a self-signed CA or even a public one. In this case we need the root CA certificate (refer to [instructions on preparing SSL certificates](https://docs.datastax.com/en/cassandra-oss/3.x/cassandra/configuration/secureSSLCertWithCA.html) for production), and all intermediaries (if applicable).
186+
187+
If you want to implement client-to-node certificate authentication, you need to provide the certificates via Azure CLI. The below command will upload and apply your client certificates to the truststore for your Cassandra Managed Instance cluster (i.e. you do not need to edit `cassandra.yaml` settings).
188+
189+
```azurecli-interactive
190+
resourceGroupName='<Resource_Group_Name>'
191+
clusterName='<Cluster Name>'
192+
193+
az managed-cassandra cluster update \
194+
--resource-group $resourceGroupName \
195+
--cluster-name $clusterName \
196+
--client-certificates /usr/csuser/clouddrive/rootCert.pem /usr/csuser/clouddrive/intermediateCert.pem
197+
```
198+
180199

181200
## Troubleshooting
182201

articles/managed-instance-apache-cassandra/create-cluster-portal.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -218,7 +218,24 @@ As with CQLSH, connecting from an application using one of the supported [Apache
218218

219219
Disabling certificate verification is recommended because certificate verification will not work unless you map I.P addresses of your cluster nodes to the appropriate domain. If you have an internal policy which mandates that you do SSL certificate verification for any application, you can facilitate this by adding entries like `10.0.1.5 host1.managedcassandra.cosmos.azure.com` in your hosts file for each node. If taking this approach, you would also need to add new entries whenever scaling up nodes.
220220

221+
### Configuring client certificates
221222

223+
Configuring client certificates is optional. In general, there are two ways of creating certificates:
224+
225+
- Self signed certs. This means a private and public (no CA) certificate for each node - in this case we need all public certificates.
226+
- Certs signed by a CA. This can be a self-signed CA or even a public one. In this case we need the root CA certificate (refer to [instructions on preparing SSL certificates](https://docs.datastax.com/en/cassandra-oss/3.x/cassandra/configuration/secureSSLCertWithCA.html) for production), and all intermediaries (if applicable).
227+
228+
If you want to implement client-to-node certificate authentication, you need to provide the certificates via Azure CLI. The below command will upload and apply your client certificates to the truststore for your Cassandra Managed Instance cluster (i.e. you do not need to edit `cassandra.yaml` settings).
229+
230+
```azurecli-interactive
231+
resourceGroupName='<Resource_Group_Name>'
232+
clusterName='<Cluster Name>'
233+
234+
az managed-cassandra cluster update \
235+
--resource-group $resourceGroupName \
236+
--cluster-name $clusterName \
237+
--client-certificates /usr/csuser/clouddrive/rootCert.pem /usr/csuser/clouddrive/intermediateCert.pem
238+
```
222239

223240

224241
## Clean up resources

0 commit comments

Comments
 (0)