Skip to content

Commit abdd8d6

Browse files
authored
Improved Acrolinx Score
Improved Acrolinx Score
1 parent ee61f49 commit abdd8d6

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/hdinsight/kafka/apache-kafka-ssl-encryption-authentication.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -16,13 +16,13 @@ This article shows you how to set up Transport Layer Security (TLS) encryption,
1616
1717
## Apache Kafka broker setup
1818

19-
The Kafka TLS broker setup will use four HDInsight cluster VMs in the following way:
19+
The Kafka TLS broker setup uses four HDInsight cluster VMs in the following way:
2020

2121
* headnode 0 - Certificate Authority (CA)
2222
* worker node 0, 1, and 2 - brokers
2323

2424
> [!Note]
25-
> This guide will use self-signed certificates, but the most secure solution is to use certificates issued by trusted CAs.
25+
> This guide uses self-signed certificates, but the most secure solution is to use certificates issued by trusted CAs.
2626
2727
The summary of the broker setup process is as follows:
2828

@@ -42,7 +42,7 @@ Use the following detailed instructions to complete the broker setup:
4242
> [!Important]
4343
> In the following code snippets wnX is an abbreviation for one of the three worker nodes and should be substituted with `wn0`, `wn1` or `wn2` as appropriate. `WorkerNode0_Name` and `HeadNode0_Name` should be substituted with the names of the respective machines.
4444
45-
1. Perform initial setup on head node 0, which for HDInsight will fill the role of the Certificate Authority (CA).
45+
1. Perform initial setup on head node 0, which for HDInsight fills the role of the Certificate Authority (CA).
4646

4747
```bash
4848
# Create a new directory 'ssl' and change into it
@@ -76,7 +76,7 @@ Use the following detailed instructions to complete the broker setup:
7676
wn0-espkaf.securehadooprc.onmicrosoft.com
7777
wn0-kafka2.zbxwnwsmpcsuvbjqbmespcm1zg.bx.internal.cloudapp.net
7878
```
79-
:::image type="content" source="./media/apache-kafka-ssl-encryption-authentication/etc-hosts.png" alt-text="Screenshot showing etc hosts output." border="true":::
79+
:::image type="content" source="./media/apache-kafka-ssl-encryption-authentication/etc-hosts.png" alt-text="Screenshot showing hosts file output." border="true":::
8080

8181
1. On the CA machine, run the following command to create ca-cert and ca-key files:
8282

@@ -134,7 +134,7 @@ To complete the configuration modification, do the following steps:
134134
135135
136136
> [!Note]
137-
> Note: This step is only required if you are setting up authentication and encryption.
137+
> Note: This step is only required if you're setting up authentication and encryption.
138138

139139
:::image type="content" source="./media/apache-kafka-ssl-encryption-authentication/editing-configuration-ambari2.png" alt-text="Editing kafka ssl configuration properties in Ambari" border="true":::
140140

@@ -148,11 +148,11 @@ To complete the configuration modification, do the following steps:
148148
149149
For HDI version 4.0 or 5.0
150150
151-
1. If you are setting up authentication and encryption, then the screenshot will look like
151+
1. If you're setting up authentication and encryption, then the screenshot looks like
152152

153153
:::image type="content" source="./media/apache-kafka-ssl-encryption-authentication/editing-configuration-kafka-env-four.png" alt-text="Editing kafka-env template property in Ambari four" border="true":::
154154

155-
1. If you are setting up encryption only, then the screenshot will look like
155+
1. If you are setting up encryption only, then the screenshot looks like
156156

157157
:::image type="content" source="./media/apache-kafka-ssl-encryption-authentication/editing-configuration-kafka-env-four-encryption-only.png" alt-text="Screenshot showing how to edit kafka-env template property field in Ambari for encryption only" border="true":::
158158

@@ -164,10 +164,10 @@ To complete the configuration modification, do the following steps:
164164
If you don't need authentication, the summary of the steps to set up only TLS encryption are:
165165
166166
1. Sign in to the CA (active head node).
167-
1. Copy the CA cert to client machine from the CA machine (wn0).
167+
1. Copy the CA certificate to client machine from the CA machine (wn0).
168168
1. Sign in to the client machine (hn1) and navigate to the `~/ssl` folder.
169-
1. Import the CA cert to the truststore.
170-
1. Import the CA cert to the keystore.
169+
1. Import the CA certificate to the truststore.
170+
1. Import the CA certificate to the keystore.
171171
172172
These steps are detailed in the following code snippets.
173173
@@ -197,7 +197,7 @@ These steps are detailed in the following code snippets.
197197
keytool -keystore kafka.client.truststore.jks -alias CARoot -import -file ca-cert -storepass "MyClientPassword123" -keypass "MyClientPassword123" -noprompt
198198
```
199199
200-
1. Import the CA cert to keystore.
200+
1. Import the CA certificate to keystore.
201201
202202
```bash
203203
keytool -keystore kafka.client.keystore.jks -alias CARoot -import -file ca-cert -storepass "MyClientPassword123" -keypass "MyClientPassword123" -noprompt

0 commit comments

Comments
 (0)