Skip to content

Commit e2b129d

Browse files
k-wallPaulRMellor
andcommitted
Apply suggestions from code review
Co-authored-by: PaulRMellor <[email protected]> Signed-off-by: Keith Wall <[email protected]>
1 parent c1a4728 commit e2b129d

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

kroxylicious-docs/docs/_assemblies/record-encryption/assembly-kms-key-creation.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77

88
[role="_abstract"]
99
This section assumes that you already have a supported KMS instance up and running and have configured the Record Encryption filter.
10-
It describes how to create the keys in the KMS that will be used to encrypt records sent to the topics.
10+
It describes how to create KMS keys for encrypting records sent to topics.
1111

1212
include::hashicorp-vault/assembly-key-creation-hashicorp-vault.adoc[leveloffset=+1]
1313
include::aws-kms/assembly-key-creation-aws-kms.adoc[leveloffset=+1]

kroxylicious-docs/docs/_assemblies/record-encryption/aws-kms/assembly-preparing-aws-kms.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
To prepare {aws}/kms/latest/developerguide/overview.html[AWS Key Management Service] for use with the Record Encryption filter, use the following setup:
1212

1313
* Establish an AWS KMS aliasing convention for keys
14-
* Create a policies giving permissions to the key aliases
14+
* Create a policies giving permissions to the key aliases.
1515
* Create a user for use by the filter and attach the policies to it.
1616

1717
You'll need a privileged AWS user that is capable of creating users and policies to perform the set-up.

0 commit comments

Comments
 (0)