Skip to content

Commit a3edd59

Browse files
authored
Merge pull request #109000 from TimShererWithAquent/us1679050at
Change SSL to TLS per 1679050
2 parents 1767f3d + 4777980 commit a3edd59

8 files changed

+18
-18
lines changed

articles/hdinsight/domain-joined/apache-domain-joined-create-configure-enterprise-security-cluster.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -311,7 +311,7 @@ New-SelfSignedCertificate -Subject hdifabrikam.com `
311311
```
312312

313313
> [!NOTE]
314-
> Any utility or application that creates a valid Public Key Cryptography Standards (PKCS) \#10 request can be used to form the SSL certificate request.
314+
> Any utility or application that creates a valid Public Key Cryptography Standards (PKCS) \#10 request can be used to form the TLS/SSL certificate request.
315315
316316
Verify that the certificate is installed in the computer's **Personal** store:
317317

articles/hdinsight/hadoop/apache-hadoop-connect-hive-jdbc-driver.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ For more information on the Hive JDBC Interface, see [HiveJDBCInterface](https:/
2626

2727
## JDBC connection string
2828

29-
JDBC connections to an HDInsight cluster on Azure are made over port 443, and the traffic is secured using SSL. The public gateway that the clusters sit behind redirects the traffic to the port that HiveServer2 is actually listening on. The following connection string shows the format to use for HDInsight:
29+
JDBC connections to an HDInsight cluster on Azure are made over port 443, and the traffic is secured using TLS/SSL. The public gateway that the clusters sit behind redirects the traffic to the port that HiveServer2 is actually listening on. The following connection string shows the format to use for HDInsight:
3030

3131
jdbc:hive2://CLUSTERNAME.azurehdinsight.net:443/default;transportMode=http;ssl=true;httpPath=/hive2
3232

articles/hdinsight/hadoop/apache-hadoop-on-premises-migration-best-practices-storage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ You can create [blob snapshots](https://docs.microsoft.com/rest/api/storageservi
4747
4848
The following methods can be used to import certificates into the Java trust store:
4949

50-
Download the Azure Blob SSL cert to a file
50+
Download the Azure Blob TLS/SSL cert to a file
5151

5252
```bash
5353
echo -n | openssl s_client -connect <storage-account>.blob.core.windows.net:443 | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' > Azure_Storage.cer

articles/hdinsight/hadoop/apache-hadoop-use-hive-beeline.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ To find the JDBC URL from Ambari:
6060

6161
### Over public or private endpoints
6262

63-
When connecting to a cluster using the public or private endpoints, you must provide the cluster login account name (default `admin`) and password. For example, using Beeline from a client system to connect to the `clustername.azurehdinsight.net` address. This connection is made over port `443`, and is encrypted using SSL.
63+
When connecting to a cluster using the public or private endpoints, you must provide the cluster login account name (default `admin`) and password. For example, using Beeline from a client system to connect to the `clustername.azurehdinsight.net` address. This connection is made over port `443`, and is encrypted using TLS/SSL.
6464

6565
Replace `clustername` with the name of your HDInsight cluster. Replace `admin` with the cluster login account for your cluster. For ESP clusters, use the full UPN (for example, [email protected]). Replace `password` with the password for the cluster login account.
6666

articles/hdinsight/hdinsight-hadoop-use-blob-storage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Sharing one blob container as the default file system for multiple clusters isn'
3535
3636
## Access files from within cluster
3737

38-
There are several ways you can access the files in Data Lake Storage from an HDInsight cluster. The URI scheme provides unencrypted access (with the *wasb:* prefix) and SSL encrypted access (with *wasbs*). We recommend using *wasbs* wherever possible, even when accessing data that lives inside the same region in Azure.
38+
There are several ways you can access the files in Data Lake Storage from an HDInsight cluster. The URI scheme provides unencrypted access (with the *wasb:* prefix) and TLS encrypted access (with *wasbs*). We recommend using *wasbs* wherever possible, even when accessing data that lives inside the same region in Azure.
3939

4040
* **Using the fully qualified name**. With this approach, you provide the full path to the file that you want to access.
4141

articles/hdinsight/kafka/apache-kafka-ssl-encryption-authentication.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Apache Kafka SSL encryption & authentication - Azure HDInsight
3-
description: Set up SSL encryption for communication between Kafka clients and Kafka brokers as well as between Kafka brokers. Set up SSL authentication of clients.
2+
title: Apache Kafka TLS encryption & authentication - Azure HDInsight
3+
description: Set up TLS encryption for communication between Kafka clients and Kafka brokers as well as between Kafka brokers. Set up SSL authentication of clients.
44
author: hrasheed-msft
55
ms.reviewer: jasonh
66
ms.service: hdinsight
@@ -9,18 +9,18 @@ ms.topic: conceptual
99
ms.date: 05/01/2019
1010
ms.author: hrasheed
1111
---
12-
# Set up Secure Sockets Layer (SSL) encryption and authentication for Apache Kafka in Azure HDInsight
12+
# Set up TLS encryption and authentication for Apache Kafka in Azure HDInsight
1313

14-
This article shows you how to set up SSL encryption between Apache Kafka clients and Apache Kafka brokers. It also shows you how to set up authentication of clients (sometimes referred to as two-way SSL).
14+
This article shows you how to set up Transport Layer Security (TLS) encryption, previously known as Secure Sockets Layer (SSL) encryption, between Apache Kafka clients and Apache Kafka brokers. It also shows you how to set up authentication of clients (sometimes referred to as two-way TLS).
1515

1616
> [!Important]
17-
> There are two clients which you can use for Kafka applications: a Java client and a console client. Only the Java client `ProducerConsumer.java` can use SSL for both producing and consuming. The console producer client `console-producer.sh` does not work with SSL.
17+
> There are two clients which you can use for Kafka applications: a Java client and a console client. Only the Java client `ProducerConsumer.java` can use TLS for both producing and consuming. The console producer client `console-producer.sh` does not work with TLS.
1818
1919
> [!Note]
2020
> HDInsight Kafka console producer with version 1.1 does not support SSL.
2121
## Apache Kafka broker setup
2222

23-
The Kafka SSL broker setup will use four HDInsight cluster VMs in the following way:
23+
The Kafka TLS broker setup will use four HDInsight cluster VMs in the following way:
2424

2525
* headnode 0 - Certificate Authority (CA)
2626
* worker node 0, 1, and 2 - brokers
@@ -113,7 +113,7 @@ Use the following detailed instructions to complete the broker setup:
113113
114114
```
115115
116-
## Update Kafka configuration to use SSL and restart brokers
116+
## Update Kafka configuration to use TLS and restart brokers
117117
118118
You have now set up each Kafka broker with a keystore and truststore, and imported the correct certificates. Next, modify related Kafka configuration properties using Ambari and then restart the Kafka brokers.
119119
@@ -160,7 +160,7 @@ To complete the configuration modification, do the following steps:
160160
161161
## Client setup (without authentication)
162162
163-
If you don't need authentication, the summary of the steps to set up only SSL encryption are:
163+
If you don't need authentication, the summary of the steps to set up only TLS encryption are:
164164

165165
1. Sign in to the CA (active head node).
166166
1. Copy the CA cert to client machine from the CA machine (wn0).
@@ -213,7 +213,7 @@ These steps are detailed in the following code snippets.
213213
## Client setup (with authentication)
214214

215215
> [!Note]
216-
> The following steps are required only if you are setting up both SSL encryption **and** authentication. If you are only setting up encryption, then see [Client setup without authentication](apache-kafka-ssl-encryption-authentication.md#client-setup-without-authentication).
216+
> The following steps are required only if you are setting up both TLS encryption **and** authentication. If you are only setting up encryption, then see [Client setup without authentication](apache-kafka-ssl-encryption-authentication.md#client-setup-without-authentication).
217217

218218
The following four steps summarize the tasks needed to complete the client setup:
219219

@@ -296,7 +296,7 @@ The details of each step are given below.
296296
## Verification
297297

298298
> [!Note]
299-
> If HDInsight 4.0 and Kafka 2.1 is installed, you can use the console producer/consumers to verify your setup. If not, run the Kafka producer on port 9092 and send messages to the topic, and then use the Kafka consumer on port 9093 which uses SSL.
299+
> If HDInsight 4.0 and Kafka 2.1 is installed, you can use the console producer/consumers to verify your setup. If not, run the Kafka producer on port 9092 and send messages to the topic, and then use the Kafka consumer on port 9093 which uses TLS.
300300

301301
### Kafka 2.1 or above
302302

articles/hdinsight/kafka/kafka-faq.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Using [Enterprise Security Package (ESP)](../domain-joined/apache-domain-joined-
4444

4545
## Is my data encrypted? Can I use my own keys?
4646

47-
All Kafka messages on the managed disks are encrypted with [Azure Storage Service Encryption (SSE)](../../storage/common/storage-service-encryption.md). Data-in-transit (for example, data being transmitted from clients to brokers and the other way around) isn't encrypted by default. It's possible to encrypt such traffic by [setting up SSL on your own](./apache-kafka-ssl-encryption-authentication.md). Additionally, HDInsight allows you to manage their own keys to encrypt the data at rest. See [Customer-managed key disk encryption](../disk-encryption.md), for more information.
47+
All Kafka messages on the managed disks are encrypted with [Azure Storage Service Encryption (SSE)](../../storage/common/storage-service-encryption.md). Data-in-transit (for example, data being transmitted from clients to brokers and the other way around) isn't encrypted by default. It's possible to encrypt such traffic by [setting up TLS on your own](./apache-kafka-ssl-encryption-authentication.md). Additionally, HDInsight allows you to manage their own keys to encrypt the data at rest. See [Customer-managed key disk encryption](../disk-encryption.md), for more information.
4848

4949
## How do I connect clients to my cluster?
5050

@@ -90,5 +90,5 @@ Use Azure monitor to analyze your [Kafka logs](./apache-kafka-log-analytics-oper
9090

9191
## Next steps
9292

93-
* [Set up Secure Sockets Layer (SSL) encryption and authentication for Apache Kafka in Azure HDInsight](./apache-kafka-ssl-encryption-authentication.md)
93+
* [Set up TLS encryption and authentication for Apache Kafka in Azure HDInsight](./apache-kafka-ssl-encryption-authentication.md)
9494
* [Use MirrorMaker to replicate Apache Kafka topics with Kafka on HDInsight](./apache-kafka-mirroring.md)

articles/hdinsight/kafka/migrate-versions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ The following migration guidance assumes an Apache Kafka 1.0.0 or 1.1.0 cluster
6363

6464
To complete the migration, do the following steps:
6565

66-
1. **Deploy a new HDInsight 4.0 cluster and clients for test.** Deploy a new HDInsight 4.0 Kafka cluster. If multiple Kafka cluster versions can be selected, it's recommended to select the latest version. After deployment, set some parameters as needed and create a topic with the same name as your existing environment. Also, set SSL and bring-your-own-key (BYOK) encryption as needed. Then check if it works correctly with the new cluster.
66+
1. **Deploy a new HDInsight 4.0 cluster and clients for test.** Deploy a new HDInsight 4.0 Kafka cluster. If multiple Kafka cluster versions can be selected, it's recommended to select the latest version. After deployment, set some parameters as needed and create a topic with the same name as your existing environment. Also, set TLS and bring-your-own-key (BYOK) encryption as needed. Then check if it works correctly with the new cluster.
6767

6868
![Deploy new HDInsight 4.0 clusters](./media/upgrade-threesix-to-four/deploy-new-hdinsight-clusters.png)
6969

0 commit comments

Comments
 (0)