Skip to content

Commit 6be84b3

Browse files
authored
Improved Acrolinx Score
Improved Acrolinx Score
1 parent dd92640 commit 6be84b3

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/hdinsight/kafka/apache-kafka-ssl-encryption-authentication.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Apache Kafka TLS encryption & authentication - Azure HDInsight
3-
description: Set up TLS encryption for communication between Kafka clients and Kafka brokers as well as between Kafka brokers. Set up SSL authentication of clients.
3+
description: Set up TLS encryption for communication between Kafka clients and Kafka brokers, Set up SSL authentication of clients.
44
ms.service: hdinsight
55
ms.topic: how-to
66
ms.custom: hdinsightactive
@@ -61,7 +61,7 @@ Use the following detailed instructions to complete the broker setup:
6161
cd ssl
6262
```
6363

64-
1. On each of the worker nodes, execute the following steps using the code snippet below.
64+
1. On each of the worker nodes, execute the following steps using the code snippet.
6565
1. Create a keystore and populate it with a new private certificate.
6666
1. Create a certificate signing request.
6767
1. SCP the certificate signing request to the CA (headnode0)
@@ -81,7 +81,7 @@ Use the following detailed instructions to complete the broker setup:
8181
```
8282
:::image type="content" source="./media/apache-kafka-ssl-encryption-authentication/etc-hosts.png" alt-text="Screenshot showing etc hosts output" border="true":::
8383

84-
1. On the CA machine run the following command to create ca-cert and ca-key files:
84+
1. On the CA machine, run the following command to create ca-cert and ca-key files:
8585

8686
```bash
8787
openssl req -new -newkey rsa:4096 -days 365 -x509 -subj "/CN=Kafka-Security-CA" -keyout ca-key -out ca-cert -nodes
@@ -141,9 +141,9 @@ To complete the configuration modification, do the following steps:
141141
142142
:::image type="content" source="./media/apache-kafka-ssl-encryption-authentication/editing-configuration-ambari2.png" alt-text="Editing kafka ssl configuration properties in Ambari" border="true":::
143143
144-
1. Here is the screenshot that shows Ambari configuration UI with these changes.
144+
1. Here's the screenshot that shows Ambari configuration UI with these changes.
145145

146-
For HDI version 4.0:
146+
For HDI version 4.0 or 5.0
147147

148148
:::image type="content" source="./media/apache-kafka-ssl-encryption-authentication/editing-configuration-kafka-env-four.png" alt-text="Editing kafka-env template property in Ambari four" border="true":::
149149

@@ -201,7 +201,7 @@ These steps are detailed in the following code snippets.
201201
ssl.truststore.password=MyClientPassword123
202202
```
203203
204-
1. Start the admin client with producer and consumer options to verify that both producers and consumers are working on port 9093. Please refer to [Verification](apache-kafka-ssl-encryption-authentication.md#verification) section below for steps needed to verify the setup using console producer/consumer.
204+
1. Start the admin client with producer and consumer options to verify that both producers and consumers are working on port 9093. Refer to [Verification](apache-kafka-ssl-encryption-authentication.md#verification) section for steps needed to verify the setup using console producer/consumer.
205205
206206
## Client setup (with authentication)
207207
@@ -215,7 +215,7 @@ The following four steps summarize the tasks needed to complete the client setup
215215
1. Switch to the CA machine (active head node) to sign the client certificate.
216216
1. Go to the client machine (standby head node) and navigate to the `~/ssl` folder. Copy the signed cert to client machine.
217217
218-
The details of each step are given below.
218+
The details of each step are given.
219219
220220
1. Sign in to the client machine (standby head node).
221221

0 commit comments

Comments
 (0)