Skip to content

Commit 1cc742f

Browse files
Updating deprecated options
Signed-off-by: Landon Lengyel <[email protected]>
1 parent 05a486f commit 1cc742f

File tree

2 files changed

+1
-2
lines changed

2 files changed

+1
-2
lines changed

_security/configuration/generate-certificates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -256,7 +256,7 @@ On one node, the security configuration portion of `opensearch.yml` might look l
256256
plugins.security.ssl.transport.pemcert_filepath: node1.pem
257257
plugins.security.ssl.transport.pemkey_filepath: node1-key.pem
258258
plugins.security.ssl.transport.pemtrustedcas_filepath: root-ca.pem
259-
plugins.security.ssl.transport.enforce_hostname_verification: false
259+
transport.ssl.enforce_hostname_verification: false
260260
plugins.security.ssl.http.enabled: true
261261
plugins.security.ssl.http.pemcert_filepath: node1.pem
262262
plugins.security.ssl.http.pemkey_filepath: node1-key.pem

_security/configuration/tls.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,6 @@ Name | Description
161161
`transport.ssl.resolve_hostname` | Whether to resolve hostnames using DNS on the transport layer. Optional. Default is `true`. Only works if hostname verification is enabled.
162162
`plugins.security.ssl.transport.resolve_hostname` (Deprecated) | This setting has been deprecated. Use `transport.ssl.resolve_hostname` instead.
163163

164-
165164
## (Advanced) Client authentication
166165

167166
With TLS client authentication enabled, REST clients can send a TLS certificate with the HTTP request to provide identity information to the Security plugin. There are three main usage scenarios for TLS client authentication:

0 commit comments

Comments
 (0)