Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[docs] Fix formatting issues #3651

Closed
wants to merge 2 commits into from
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
2 changes: 2 additions & 0 deletions docs/content/latest/secure/tls-encryption/client-to-server.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,6 +21,8 @@ YugabyteDB can be configured to provide client-server encryption, using Transpor

Before you can enable and use server-server encryption, you need to create and configure server certificates for each node of your YugabyteDB cluster. For information, see [Create server certificates](../server-certificates).

To use client-server encryption, you alo need to use client certificates to communicate to YugabyteDB. For details, see [Create client certificates](../client-certificates).

## Configure YB-TServer nodes

To enable client-server encryption (using TLS) for YSQL and YCQL, start your YB-TServer services with the required options described below. Your YB-Master services do not require additional configuration.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,9 @@ To connect CLIs, tools, and APIs to a remote YugabyteDB cluster when client-serv

## Prerequisites

Before you can enable and use server-server encryption, you need to create and configure server certificates for each node of your YugabyteDB cluster. For information, see [Create client certificates](../client-certificates).
Before you can enable and use server-server encryption, you need to create and configure server certificates for each node of your YugabyteDB cluster. For information, see [Create server certificates](../server-certificates).

Before you can enable and use client-server encryption, you need to create and configure server certificates for each node of your YugabyteDB cluster. For information, see [Create client certificates](../client-certificates).

For each client that will connect to a YugabyteDB cluster, you need the following three files to be accessible on the client computer.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ Before you can enable server-server and client-server encryptions using Transpor

### Create a secure data directory

To generate and store the secure information, such as the root certificate, create a directory, `secure-data`, in your root directory. After completing the preparation, you will copy this data inti a secure location and then delete this directory.
To generate and store the secure information, such as the root certificate, create a directory, `secure-data`, in the root directory of the laptop or machine you want to use to create certificates. After completing the preparation, you will have loaded the certificate files to your YugabyteDB cluster nodes. You copy this data into a secure location and then delete this directory.

```sh
$ mkdir secure-data
Expand Down Expand Up @@ -212,7 +212,7 @@ Certificate:
2a:e7:7f:97
```

## Copy the root certificate to eacg node directory
## Copy the root certificate to each node directory

Copy the generated root certificate file (`root.crt`) to all three node directories.

Expand Down Expand Up @@ -258,7 +258,7 @@ distinguished_name = my_distinguished_name
organizationName = Yugabyte
# Required value for commonName, do not change.
commonName = <node-ip-address>
```
```

3. After pasting the content in step 2 and replacing `<node-ip-address>` with the node IP address, save and close the file by entering `Ctl+D`.

Expand Down