Skip to content

Commit ca704f1

Browse files
committed
kafka6
1 parent 5464fb6 commit ca704f1

File tree

1 file changed

+8
-6
lines changed

1 file changed

+8
-6
lines changed

articles/hdinsight/kafka/apache-kafka-ssl-encryption-authentication.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -203,7 +203,7 @@ These steps are detailed in the following code snippets.
203203
keytool -keystore kafka.client.keystore.jks -alias CARoot -import -file ca-cert -storepass "MyClientPassword123" -keypass "MyClientPassword123" -noprompt
204204
```
205205

206-
1. Create the file `client-ssl-auth.properties`. It should have the following lines:
206+
1. Create the file `client-ssl-auth.properties` on client machine (hn1) . It should have the following lines:
207207

208208
```config
209209
security.protocol=SSL
@@ -282,17 +282,17 @@ The details of each step are given below.
282282
cd ssl
283283
```
284284

285-
1. Create client store with signed cert, and import ca cert into the keystore and truststore:
285+
1. Create client store with signed cert, and import ca cert into the keystore and truststore on client machine (hn1):
286286

287287
```bash
288-
keytool -keystore kafka.client.keystore.jks -import -file client-cert-signed -storepass MyClientPassword123 -keypass MyClientPassword123 -noprompt
288+
keytool -keystore kafka.client.truststore.jks -alias CARoot -import -file ca-cert -storepass "MyClientPassword123" -keypass "MyClientPassword123" -noprompt
289289
290-
keytool -keystore kafka.client.keystore.jks -alias CARoot -import -file ca-cert -storepass MyClientPassword123 -keypass MyClientPassword123 -noprompt
290+
keytool -keystore kafka.client.keystore.jks -alias CARoot -import -file ca-cert -storepass "MyClientPassword123" -keypass "MyClientPassword123" -noprompt
291291
292-
keytool -keystore kafka.client.truststore.jks -alias CARoot -import -file ca-cert -storepass MyClientPassword123 -keypass MyClientPassword123 -noprompt
292+
keytool -keystore kafka.client.keystore.jks -import -file client-cert-signed -storepass "MyClientPassword123" -keypass "MyClientPassword123" -noprompt
293293
```
294294

295-
1. Create a file `client-ssl-auth.properties`. It should have the following lines:
295+
1. Create a file `client-ssl-auth.properties` on client machine (hn1) . It should have the following lines:
296296

297297
```bash
298298
security.protocol=SSL
@@ -305,6 +305,8 @@ The details of each step are given below.
305305

306306
## Verification
307307

308+
Run these steps on the client machine.
309+
308310
> [!Note]
309311
> If HDInsight 4.0 and Kafka 2.1 is installed, you can use the console producer/consumers to verify your setup. If not, run the Kafka producer on port 9092 and send messages to the topic, and then use the Kafka consumer on port 9093 which uses TLS.
310312

0 commit comments

Comments
 (0)