You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/hdinsight/kafka/apache-esp-kafka-ssl-encryption-authentication.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,13 +16,13 @@ This article shows you how to set up Transport Layer Security (TLS) encryption,
16
16
17
17
## Apache Kafka broker setup
18
18
19
-
The Kafka TLS broker setup will use four HDInsight cluster VMs in the following way:
19
+
The Kafka TLS broker setup uses four HDInsight cluster VMs in the following way:
20
20
21
21
* headnode 0 - Certificate Authority (CA)
22
22
* worker node 0, 1, and 2 - brokers
23
23
24
24
> [!Note]
25
-
> This guide will use self-signed certificates, but the most secure solution is to use certificates issued by trusted CAs.
25
+
> This guide uses self-signed certificates, but the most secure solution is to use certificates issued by trusted CAs.
26
26
27
27
The summary of the broker setup process is as follows:
28
28
@@ -42,7 +42,7 @@ Use the following detailed instructions to complete the broker setup:
42
42
> [!Important]
43
43
> In the following code snippets wnX is an abbreviation for one of the three worker nodes and should be substituted with `wn0`, `wn1` or `wn2` as appropriate. `WorkerNode0_Name` and `HeadNode0_Name` should be substituted with the names of the respective machines.
44
44
45
-
1. Perform initial setup on head node 0, which for HDInsight will fill the role of the Certificate Authority (CA).
45
+
1. Perform initial setup on head node 0, which for HDInsight fills the role of the Certificate Authority (CA).
46
46
47
47
```bash
48
48
# Create a new directory 'ssl' and change into it
@@ -76,7 +76,7 @@ Use the following detailed instructions to complete the broker setup:
1. On the CA machine, run the following command to create ca-cert and ca-key files:
82
82
@@ -134,7 +134,7 @@ To complete the configuration modification, do the following steps:
134
134
135
135
136
136
> [!Note]
137
-
> This step is only required if you are setting up authentication and encryption.
137
+
> This step is only required if you're setting up authentication and encryption.
138
138
139
139
:::image type="content" source="./media/apache-esp-kafka-ssl-encryption-authentication/editing-configuration-ambari2.png" alt-text="Screenshot showing how to edit Kafka ssl configuration properties in Ambari." border="true":::
140
140
@@ -147,11 +147,11 @@ To complete the configuration modification, do the following steps:
147
147
148
148
For HDI version 4.0 or 5.0
149
149
150
-
a. If you are setting up authentication and encryption, then the screenshot will look like
150
+
a. If you're setting up authentication and encryption, then the screenshot looks like
151
151
152
152
:::image type="content" source="./media/apache-esp-kafka-ssl-encryption-authentication/properties-file-authentication-as-required.png" alt-text="Screenshot showing how to edit Kafka-env template property in Ambari authentication as required." border="true":::
153
153
154
-
b. If you are setting up encryption only, then the screenshot will look like
154
+
b. If you are setting up encryption only, then the screenshot looks like
155
155
156
156
:::image type="content" source="./media/apache-esp-kafka-ssl-encryption-authentication/properties-file-authentication-as-none.png" alt-text="Screenshot showing how to edit Kafka-env template property in Ambari authentication as none." border="true":::
157
157
@@ -282,7 +282,7 @@ The details of each step are given.
282
282
cd ssl
283
283
```
284
284
285
-
1. Create client store with signed cert, and import ca cert into the keystore and truststore on client machine (hn1):
285
+
1. Create client store with signed cert, and import CA certificate into the keystore and truststore on client machine (hn1):
0 commit comments