Skip to content

Commit cef1d4b

Browse files
Merge pull request #266700 from v-akarnase/patch-35
Update apache-kafka-ssl-encryption-authentication.md
2 parents a61cfe1 + 2315682 commit cef1d4b

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/hdinsight/kafka/apache-kafka-ssl-encryption-authentication.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Set up TLS encryption for communication between Kafka clients and K
44
ms.service: hdinsight
55
ms.topic: how-to
66
ms.custom: hdinsightactive
7-
ms.date: 02/16/2023
7+
ms.date: 02/20/2024
88
---
99

1010
# Set up TLS encryption and authentication for Non ESP Apache Kafka cluster in Azure HDInsight
@@ -203,7 +203,7 @@ These steps are detailed in the following code snippets.
203203
keytool -keystore kafka.client.keystore.jks -alias CARoot -import -file ca-cert -storepass "MyClientPassword123" -keypass "MyClientPassword123" -noprompt
204204
```
205205
206-
1. Create the file `client-ssl-auth.properties` on client machine (hn1) . It should have the following lines:
206+
1. Create the file `client-ssl-auth.properties` on client machine (hn1). It should have the following lines:
207207
208208
```config
209209
security.protocol=SSL
@@ -292,7 +292,7 @@ The details of each step are given.
292292
keytool -keystore kafka.client.keystore.jks -import -file client-signed-cert -storepass "MyClientPassword123" -keypass "MyClientPassword123" -noprompt
293293
```
294294
295-
1. Create a file `client-ssl-auth.properties` on client machine (hn1) . It should have the following lines:
295+
1. Create a file `client-ssl-auth.properties` on client machine (hn1). It should have the following lines:
296296
297297
```bash
298298
security.protocol=SSL

0 commit comments

Comments
 (0)