@@ -18,16 +18,16 @@ To enable SSL/TLS for Presto internal communication, do the following:
1818
19191. Disable HTTP endpoint.
2020
21- .. code-block :: none
21+ .. code-block :: none
2222
23- http-server.http.enabled=false
23+ http-server.http.enabled=false
2424
25- .. warning ::
25+ .. warning ::
2626
27- You can enable HTTPS while leaving HTTP enabled. In most cases this is a
28- security hole. If you are certain you want to use this configuration, you
29- should consider using an firewall to limit access to the HTTP endpoint to
30- only those hosts that should be allowed to use it.
27+ You can enable HTTPS while leaving HTTP enabled. In most cases this is a
28+ security hole. If you are certain you want to use this configuration, you
29+ should consider using an firewall to limit access to the HTTP endpoint to
30+ only those hosts that should be allowed to use it.
3131
32322. Configure the cluster to communicate using the fully qualified domain name (fqdn)
3333 of the cluster nodes. This can be done in either of the following ways:
@@ -57,62 +57,62 @@ To enable SSL/TLS for Presto internal communication, do the following:
5757 and specify it for the client (see step #8 below). In most cases it will be
5858 simpler to use a wildcard in the certificate as shown below.
5959
60- .. code-block :: none
61-
62- keytool -genkeypair -alias example.com -keyalg RSA -keystore keystore.jks
63- Enter keystore password:
64- Re-enter new password:
65- What is your first and last name?
66- [Unknown]: *.example.com
67- What is the name of your organizational unit?
68- [Unknown]:
69- What is the name of your organization?
70- [Unknown]:
71- What is the name of your City or Locality?
72- [Unknown]:
73- What is the name of your State or Province?
74- [Unknown]:
75- What is the two-letter country code for this unit?
76- [Unknown]:
77- Is CN=*.example.com, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, C=Unknown correct?
78- [no]: yes
79-
80- Enter key password for <presto>
81- (RETURN if same as keystore password):
82-
83- .. Note: Replace `example.com` with the appropriate domain.
60+ .. code-block :: none
61+
62+ keytool -genkeypair -alias example.com -keyalg RSA -keystore keystore.jks
63+ Enter keystore password:
64+ Re-enter new password:
65+ What is your first and last name?
66+ [Unknown]: *.example.com
67+ What is the name of your organizational unit?
68+ [Unknown]:
69+ What is the name of your organization?
70+ [Unknown]:
71+ What is the name of your City or Locality?
72+ [Unknown]:
73+ What is the name of your State or Province?
74+ [Unknown]:
75+ What is the two-letter country code for this unit?
76+ [Unknown]:
77+ Is CN=*.example.com, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, C=Unknown correct?
78+ [no]: yes
79+
80+ Enter key password for <presto>
81+ (RETURN if same as keystore password):
82+
83+ .. Note: Replace `example.com` with the appropriate domain.
8484
8585 4. Distribute the Java Keystore File across the Presto cluster.
8686
87875. Enable the HTTPS endpoint.
8888
89- .. code-block :: none
89+ .. code-block :: none
9090
91- http-server.https.enabled=true
92- http-server.https.port=<https port>
93- http-server.https.keystore.path=<keystore path>
94- http-server.https.keystore.key=<keystore password>
91+ http-server.https.enabled=true
92+ http-server.https.port=<https port>
93+ http-server.https.keystore.path=<keystore path>
94+ http-server.https.keystore.key=<keystore password>
9595
96- Note: setting the ``http-server.https.port `` to ``0 `` results in the use of an ephemeral port.
96+ Note: setting the ``http-server.https.port `` to ``0 `` results in the use of an ephemeral port.
9797
98986. Change the discovery uri to HTTPS.
9999
100- .. code-block :: none
100+ .. code-block :: none
101101
102- discovery.uri=https://<coordinator fqdn>:<https port>
102+ discovery.uri=https://<coordinator fqdn>:<https port>
103103
104104 7. Configure the internal communication to require HTTPS.
105105
106- .. code-block :: none
106+ .. code-block :: none
107107
108- internal-communication.https.required=true
108+ internal-communication.https.required=true
109109
110110 8. Configure the internal communication to use the Java keystore file.
111111
112- .. code-block :: none
112+ .. code-block :: none
113113
114- internal-communication.https.keystore.path=<keystore path>
115- internal-communication.https.keystore.key=<keystore password>
114+ internal-communication.https.keystore.path=<keystore path>
115+ internal-communication.https.keystore.key=<keystore password>
116116
117117 Internal Authentication
118118-----------------------
@@ -125,7 +125,7 @@ It is
125125 between clients and the coordinator
126126* Mandatory when configuring both the above i.e internal TLS along with external authentication.
127127
128- There are multiple ways to enable internal authentication described in below sections
128+ There are multiple ways to enable internal authentication:
129129
1301301. JWT
131131~~~~~~
@@ -166,9 +166,9 @@ will be used for certificate authentication.
166166If :doc: `Kerberos</security/server> ` authentication is enabled, specify valid Kerberos
167167credentials for the internal communication, in addition to the SSL/TLS properties.
168168
169- .. code-block :: none
169+ .. code-block :: none
170170
171- internal-communication.kerberos.enabled=true
171+ internal-communication.kerberos.enabled=true
172172
173173 .. note ::
174174
@@ -208,15 +208,15 @@ to switch the random number generator algorithm to ``SHA1PRNG``, by setting it v
208208``http-server.https.secure-random-algorithm `` property in ``config.properties `` on the coordinator
209209and all of the workers:
210210
211- .. code-block :: none
211+ .. code-block :: none
212212
213- http-server.https.secure-random-algorithm=SHA1PRNG
213+ http-server.https.secure-random-algorithm=SHA1PRNG
214214
215215 Be aware that this algorithm takes the initial seed from
216216the blocking ``/dev/random `` device. For environments that do not have enough entropy to seed
217217the ``SHAPRNG `` algorithm, the source can be changed to ``/dev/urandom ``
218218by adding the ``java.security.egd `` property to ``jvm.config ``:
219219
220- .. code-block :: none
220+ .. code-block :: none
221221
222- -Djava.security.egd=file:/dev/urandom
222+ -Djava.security.egd=file:/dev/urandom
0 commit comments