Skip to content

Commit 4cffd13

Browse files
committed
edit pass: mqtt-broker-batch4
1 parent d45d7a0 commit 4cffd13

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

articles/iot-operations/manage-mqtt-broker/howto-broker-mqtt-client-options.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ To learn more, see [Azure CLI support for advanced MQTT broker configuration](ht
5252

5353
## Subscriber queue limit
5454

55-
The MQTT broker keeps a queue for each subscriber with QoS 1 messages waiting to be delivered. Messages are added to this queue when they're received from the publisher. They're removed after they're delivered and acknowledged by the subscriber with a `PUBACK`. If messages arrive faster than the subscriber can acknowledge them, or if the subscriber is offline with a persistent session, the queue can grow large.
55+
The MQTT broker keeps a queue for each subscriber with QoS 1 messages waiting to be delivered. Messages are added to this queue when they're received from the publisher. They're removed after they're delivered and acknowledged by the subscriber with a PUBACK message. If messages arrive faster than the subscriber can acknowledge them, or if the subscriber is offline with a persistent session, the queue can grow large.
5656

5757
The MQTT broker can [buffer these messages to disk](./howto-disk-backed-message-buffer.md) to save memory, but this tactic might not always be enough. The disk buffer might not be set up, or it could be full because of other subscribers. Therefore, the subscriber queue limit helps prevent the broker from using too much memory for a single subscriber.
5858

articles/iot-operations/manage-mqtt-broker/howto-test-connection.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -27,11 +27,11 @@ By default, an MQTT broker:
2727
> [!CAUTION]
2828
> For production scenarios, use TLS and service accounts authentication to secure your IoT solution. For more information, see:
2929
>
30-
> - [Configure TLS with automatic certificate management to secure MQTT communication in MQTT broker](./howto-configure-tls-auto.md).
31-
> - [Configure authentication in MQTT broker](./howto-configure-authentication.md).
30+
> - [Configure TLS with automatic certificate management to secure MQTT communication in the MQTT broker](./howto-configure-tls-auto.md).
31+
> - [Configure authentication in the MQTT broker](./howto-configure-authentication.md).
3232
> - [Expose Kubernetes services to external devices](/azure/aks/hybrid/aks-edge-howto-expose-service) by using port forwarding or a virtual switch with Azure Kubernetes Services (AKS) Edge Essentials.
3333
34-
Before you begin, [install or configure Azure IoT Operations](../get-started-end-to-end-sample/quickstart-deploy.md). Use the following options to test connectivity to an MQTT broker with MQTT clients in a nonproduction environment.
34+
Before you begin, [install or configure Azure IoT Operations](../get-started-end-to-end-sample/quickstart-deploy.md). Use the following options to test connectivity to the MQTT broker with MQTT clients in a nonproduction environment.
3535

3636
## Connect to the default listener inside the cluster
3737

@@ -82,7 +82,7 @@ Client (null) sending DISCONNECT
8282
The mosquitto client uses the service account token mounted at `/var/run/secrets/tokens/broker-sat` to authenticate with the broker. The token is valid for 24 hours. The client also uses the default root CA certificate mounted at `/var/run/certs/ca.crt` to verify the broker's TLS certificate chain.
8383

8484
> [!TIP]
85-
> You can use `kubectl` to download the default root CA certificate to use with other clients. For example, to download the default root CA certificate to a file named `ca.crt`:
85+
> You can use kubectl to download the default root CA certificate to use with other clients. For example, to download the default root CA certificate to a file named `ca.crt`:
8686
>
8787
> ```bash
8888
> kubectl get configmap azure-iot-operations-aio-ca-trust-bundle -n azure-iot-operations -o jsonpath='{.data.ca\.crt}' > ca.crt
@@ -221,7 +221,7 @@ spec:
221221
# Omitting section turns off TLS for testing only
222222
```
223223

224-
Then, use `kubectl` to deploy the configuration:
224+
Then, use kubectl to deploy the configuration:
225225

226226
```bash
227227
kubectl apply -f broker-nodeport.yaml
@@ -381,7 +381,7 @@ spec:
381381
# Omitting section turns off TLS for testing only
382382
```
383383

384-
Use `kubectl` to deploy the configuration:
384+
Use kubectl to deploy the configuration:
385385

386386
```bash
387387
kubectl apply -f broker-loadbalancer.yaml
@@ -462,7 +462,7 @@ For more information about port forwarding, see [Expose Kubernetes services to e
462462

463463
#### Access through localhost
464464

465-
Some Kubernetes distributions can [expose](https://k3d.io/v5.1.0/usage/exposing_services/) MQTT broker to a port on the host system (`localhost`) as part of cluster configuration. Use this approach to make it easier for clients on the same host to access the MQTT broker.
465+
Some Kubernetes distributions can [expose](https://k3d.io/v5.1.0/usage/exposing_services/) the MQTT broker to a port on the host system (`localhost`) as part of cluster configuration. Use this approach to make it easier for clients on the same host to access the MQTT broker.
466466

467467
For example, to create a k3d cluster that maps the MQTT broker's default MQTT port 1883 to `localhost:1883`:
468468
@@ -484,7 +484,7 @@ mosquitto_pub --host localhost --port 1883 --message "hello" --topic "world" --d
484484
485485
## Only turn off TLS and authentication for testing
486486
487-
The reason that an MQTT broker uses TLS and service accounts authentication by default is to provide a secure-by-default experience that minimizes inadvertent exposure of your IoT solution to attackers. You shouldn't turn off TLS and authentication in production. Exposing an MQTT broker to the internet without authentication and TLS can lead to unauthorized access and even distributed denial-of-service attacks.
487+
The reason that the MQTT broker uses TLS and service accounts authentication by default is to provide a secure-by-default experience that minimizes inadvertent exposure of your IoT solution to attackers. You shouldn't turn off TLS and authentication in production. Exposing the MQTT broker to the internet without authentication and TLS can lead to unauthorized access and even distributed denial-of-service attacks.
488488

489489
> [!WARNING]
490490
> If you understand the risks and need to use an insecure port in a well-controlled environment, you can turn off TLS and authentication for testing purposes by removing the `tls` and `authenticationRef` settings from the listener configuration.

0 commit comments

Comments
 (0)