Skip to content

Commit bf7a21b

Browse files
authored
Removed 3.6 related content
Removed 3.6 related content
1 parent 8907f60 commit bf7a21b

File tree

1 file changed

+6
-44
lines changed

1 file changed

+6
-44
lines changed

articles/hdinsight/kafka/apache-kafka-ssl-encryption-authentication.md

Lines changed: 6 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Set up TLS encryption for communication between Kafka clients and K
44
ms.service: hdinsight
55
ms.topic: how-to
66
ms.custom: hdinsightactive
7-
ms.date: 03/31/2022
7+
ms.date: 02/03/2023
88
---
99

1010
# Set up TLS encryption and authentication for Apache Kafka in Azure HDInsight
@@ -14,9 +14,6 @@ This article shows you how to set up Transport Layer Security (TLS) encryption,
1414
> [!Important]
1515
> There are two clients which you can use for Kafka applications: a Java client and a console client. Only the Java client `ProducerConsumer.java` can use TLS for both producing and consuming. The console producer client `console-producer.sh` does not work with TLS.
1616
17-
> [!Note]
18-
> HDInsight Kafka console producer with version 1.1 does not support SSL.
19-
2017
## Apache Kafka broker setup
2118

2219
The Kafka TLS broker setup will use four HDInsight cluster VMs in the following way:
@@ -125,31 +122,16 @@ To complete the configuration modification, do the following steps:
125122
126123
:::image type="content" source="./media/apache-kafka-ssl-encryption-authentication/editing-configuration-ambari.png" alt-text="Editing Kafka ssl configuration properties in Ambari" border="true":::
127124
128-
1. Under **Custom kafka-broker** set the **ssl.client.auth** property to `required`. This step is only required if you are setting up authentication and encryption.
125+
1. Under **Custom kafka-broker** set the **ssl.client.auth** property to `required`.
129126
127+
128+
> [!Note]
129+
> Note: This step is only required if you are setting up authentication and encryption.
130+
130131
:::image type="content" source="./media/apache-kafka-ssl-encryption-authentication/editing-configuration-ambari2.png" alt-text="Editing kafka ssl configuration properties in Ambari" border="true":::
131132
132-
1. For HDI version 3.6, go to Ambari UI and add the following configurations under **Advanced kafka-env** and the **kafka-env template** property.
133-
134-
```bash
135-
# Configure Kafka to advertise IP addresses instead of FQDN
136-
IP_ADDRESS=$(hostname -i)
137-
echo advertised.listeners=$IP_ADDRESS
138-
sed -i.bak -e '/advertised/{/advertised@/!d;}' /usr/hdp/current/kafka-broker/conf/server.properties
139-
echo "advertised.listeners=PLAINTEXT://$IP_ADDRESS:9092,SSL://$IP_ADDRESS:9093" >> /usr/hdp/current/kafka-broker/conf/server.properties
140-
echo "ssl.keystore.location=/home/sshuser/ssl/kafka.server.keystore.jks" >> /usr/hdp/current/kafka-broker/conf/server.properties
141-
echo "ssl.keystore.password=MyServerPassword123" >> /usr/hdp/current/kafka-broker/conf/server.properties
142-
echo "ssl.key.password=MyServerPassword123" >> /usr/hdp/current/kafka-broker/conf/server.properties
143-
echo "ssl.truststore.location=/home/sshuser/ssl/kafka.server.truststore.jks" >> /usr/hdp/current/kafka-broker/conf/server.properties
144-
echo "ssl.truststore.password=MyServerPassword123" >> /usr/hdp/current/kafka-broker/conf/server.properties
145-
```
146-
147133
1. Here is the screenshot that shows Ambari configuration UI with these changes.
148134
149-
For HDI version 3.6:
150-
151-
:::image type="content" source="./media/apache-kafka-ssl-encryption-authentication/editing-configuration-kafka-env.png" alt-text="Editing kafka-env template property in Ambari" border="true":::
152-
153135
For HDI version 4.0:
154136
155137
:::image type="content" source="./media/apache-kafka-ssl-encryption-authentication/editing-configuration-kafka-env-four.png" alt-text="Editing kafka-env template property in Ambari four" border="true":::
@@ -327,26 +309,6 @@ Run these steps on the client machine.
327309
/usr/hdp/current/kafka-broker/bin/kafka-console-consumer.sh --bootstrap-server <FQDN_WORKER_NODE>:9093 --topic topic1 --consumer.config ~/ssl/client-ssl-auth.properties --from-beginning
328310
```
329311
330-
### Kafka 1.1
331-
332-
1. Create a topic if it doesn't exist already.
333-
334-
```bash
335-
/usr/hdp/current/kafka-broker/bin/kafka-topics.sh --zookeeper <ZOOKEEPER_NODE_0>:2181 --create --topic topic1 --partitions 2 --replication-factor 2
336-
```
337-
338-
1. Start console producer and provide the path to client-ssl-auth.properties as a configuration file for the producer.
339-
340-
```bash
341-
/usr/hdp/current/kafka-broker/bin/kafka-console-producer.sh --broker-list <FQDN_WORKER_NODE>:9092 --topic topic1
342-
```
343-
344-
1. Open another ssh connection to client machine and start console consumer and provide the path to `client-ssl-auth.properties` as a configuration file for the consumer.
345-
346-
```bash
347-
$ /usr/hdp/current/kafka-broker/bin/kafka-console-consumer.sh --bootstrap-server <FQDN_WORKER_NODE>:9093 --topic topic1 --consumer.config ~/ssl/client-ssl-auth.properties --from-beginning
348-
```
349-
350312
## Next steps
351313
352314
* [What is Apache Kafka on HDInsight?](apache-kafka-introduction.md)

0 commit comments

Comments
 (0)