You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/iot-operations/manage-mqtt-broker/howto-broker-mqtt-client-options.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,7 @@ To learn more, see [Azure CLI support for advanced MQTT broker configuration](ht
52
52
53
53
## Subscriber queue limit
54
54
55
-
The MQTT broker keeps a queue for each subscriber with QoS 1 messages waiting to be delivered. Messages are added to this queue when they're received from the publisher. They're removed after they're delivered and acknowledged by the subscriber with a `PUBACK`. If messages arrive faster than the subscriber can acknowledge them, or if the subscriber is offline with a persistent session, the queue can grow large.
55
+
The MQTT broker keeps a queue for each subscriber with QoS 1 messages waiting to be delivered. Messages are added to this queue when they're received from the publisher. They're removed after they're delivered and acknowledged by the subscriber with a PUBACK message. If messages arrive faster than the subscriber can acknowledge them, or if the subscriber is offline with a persistent session, the queue can grow large.
56
56
57
57
The MQTT broker can [buffer these messages to disk](./howto-disk-backed-message-buffer.md) to save memory, but this tactic might not always be enough. The disk buffer might not be set up, or it could be full because of other subscribers. Therefore, the subscriber queue limit helps prevent the broker from using too much memory for a single subscriber.
Copy file name to clipboardExpand all lines: articles/iot-operations/manage-mqtt-broker/howto-test-connection.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,11 +27,11 @@ By default, an MQTT broker:
27
27
> [!CAUTION]
28
28
> For production scenarios, use TLS and service accounts authentication to secure your IoT solution. For more information, see:
29
29
>
30
-
> -[Configure TLS with automatic certificate management to secure MQTT communication in MQTT broker](./howto-configure-tls-auto.md).
31
-
> -[Configure authentication in MQTT broker](./howto-configure-authentication.md).
30
+
> -[Configure TLS with automatic certificate management to secure MQTT communication in the MQTT broker](./howto-configure-tls-auto.md).
31
+
> -[Configure authentication in the MQTT broker](./howto-configure-authentication.md).
32
32
> -[Expose Kubernetes services to external devices](/azure/aks/hybrid/aks-edge-howto-expose-service) by using port forwarding or a virtual switch with Azure Kubernetes Services (AKS) Edge Essentials.
33
33
34
-
Before you begin, [install or configure Azure IoT Operations](../get-started-end-to-end-sample/quickstart-deploy.md). Use the following options to test connectivity to an MQTT broker with MQTT clients in a nonproduction environment.
34
+
Before you begin, [install or configure Azure IoT Operations](../get-started-end-to-end-sample/quickstart-deploy.md). Use the following options to test connectivity to the MQTT broker with MQTT clients in a nonproduction environment.
35
35
36
36
## Connect to the default listener inside the cluster
The mosquitto client uses the service account token mounted at `/var/run/secrets/tokens/broker-sat` to authenticate with the broker. The token is valid for 24 hours. The client also uses the default root CA certificate mounted at `/var/run/certs/ca.crt` to verify the broker's TLS certificate chain.
83
83
84
84
> [!TIP]
85
-
> You can use `kubectl` to download the default root CA certificate to use with other clients. For example, to download the default root CA certificate to a file named `ca.crt`:
85
+
> You can use kubectl to download the default root CA certificate to use with other clients. For example, to download the default root CA certificate to a file named `ca.crt`:
86
86
>
87
87
> ```bash
88
88
> kubectl get configmap azure-iot-operations-aio-ca-trust-bundle -n azure-iot-operations -o jsonpath='{.data.ca\.crt}'> ca.crt
@@ -221,7 +221,7 @@ spec:
221
221
# Omitting section turns off TLS for testing only
222
222
```
223
223
224
-
Then, use `kubectl` to deploy the configuration:
224
+
Then, use kubectl to deploy the configuration:
225
225
226
226
```bash
227
227
kubectl apply -f broker-nodeport.yaml
@@ -381,7 +381,7 @@ spec:
381
381
# Omitting section turns off TLS for testing only
382
382
```
383
383
384
-
Use `kubectl` to deploy the configuration:
384
+
Use kubectl to deploy the configuration:
385
385
386
386
```bash
387
387
kubectl apply -f broker-loadbalancer.yaml
@@ -462,7 +462,7 @@ For more information about port forwarding, see [Expose Kubernetes services to e
462
462
463
463
#### Access through localhost
464
464
465
-
Some Kubernetes distributions can [expose](https://k3d.io/v5.1.0/usage/exposing_services/) MQTT broker to a port on the host system (`localhost`) as part of cluster configuration. Use this approach to make it easier for clients on the same host to access the MQTT broker.
465
+
Some Kubernetes distributions can [expose](https://k3d.io/v5.1.0/usage/exposing_services/) the MQTT broker to a port on the host system (`localhost`) as part of cluster configuration. Use this approach to make it easier for clients on the same host to access the MQTT broker.
466
466
467
467
For example, to create a k3d cluster that maps the MQTT broker's default MQTT port 1883 to `localhost:1883`:
## Only turn off TLS and authentication for testing
486
486
487
-
The reason that an MQTT broker uses TLS and service accounts authentication by default is to provide a secure-by-default experience that minimizes inadvertent exposure of your IoT solution to attackers. You shouldn't turn off TLS and authentication in production. Exposing an MQTT broker to the internet without authentication and TLS can lead to unauthorized access and even distributed denial-of-service attacks.
487
+
The reason that the MQTT broker uses TLS and service accounts authentication by default is to provide a secure-by-default experience that minimizes inadvertent exposure of your IoT solution to attackers. You shouldn't turn off TLS and authentication in production. Exposing the MQTT broker to the internet without authentication and TLS can lead to unauthorized access and even distributed denial-of-service attacks.
488
488
489
489
> [!WARNING]
490
490
> If you understand the risks and need to use an insecure port in a well-controlled environment, you can turn off TLS and authentication for testing purposes by removing the `tls` and `authenticationRef` settings from the listener configuration.
0 commit comments