From 106651046e9524abdf032d28ab3a2ec4538e0e22 Mon Sep 17 00:00:00 2001 From: Manfred Moser Date: Wed, 16 Oct 2024 14:40:37 -0700 Subject: [PATCH] Correct docs about key format For TLS to OpenSearch and Elastisearch only P12 (PKCS) is supported. Not PEM as for the TLS setup. --- docs/src/main/sphinx/connector/elasticsearch.md | 6 +++--- docs/src/main/sphinx/connector/opensearch.md | 6 +++--- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/docs/src/main/sphinx/connector/elasticsearch.md b/docs/src/main/sphinx/connector/elasticsearch.md index 02e4931b86052..80e6026156ad6 100644 --- a/docs/src/main/sphinx/connector/elasticsearch.md +++ b/docs/src/main/sphinx/connector/elasticsearch.md @@ -138,7 +138,7 @@ clusters with TLS enabled. If your cluster has globally-trusted certificates, you should only need to enable TLS. If you require custom configuration for certificates, the connector -supports key stores and trust stores in PEM or Java Key Store (JKS) format. +supports key stores and trust stores in P12 (PKCS) or Java Key Store (JKS) format. The available configuration values are listed in the following table: @@ -151,10 +151,10 @@ The available configuration values are listed in the following table: * - `elasticsearch.tls.enabled` - Enables TLS security. * - `elasticsearch.tls.keystore-path` - - The path to the [PEM](/security/inspect-pem) or [JKS](/security/inspect-jks) + - The path to the P12 (PKCS) or [JKS](/security/inspect-jks) key store. * - `elasticsearch.tls.truststore-path` - - The path to [PEM](/security/inspect-pem) or [JKS](/security/inspect-jks) + - The path to P12 (PKCS) or [JKS](/security/inspect-jks) trust store. * - `elasticsearch.tls.keystore-password` - The key password for the key store specified by diff --git a/docs/src/main/sphinx/connector/opensearch.md b/docs/src/main/sphinx/connector/opensearch.md index 133746917206c..7a7a898359bf6 100644 --- a/docs/src/main/sphinx/connector/opensearch.md +++ b/docs/src/main/sphinx/connector/opensearch.md @@ -141,7 +141,7 @@ clusters with TLS enabled. If your cluster uses globally-trusted certificates, you only need to enable TLS. If you require custom configuration for certificates, the connector -supports key stores and trust stores in PEM or Java Key Store (JKS) format. +supports key stores and trust stores in P12 (PKCS) or Java Key Store (JKS) format. The available configuration values are listed in the following table: @@ -154,10 +154,10 @@ The available configuration values are listed in the following table: * - `opensearch.tls.enabled` - Enable TLS security. Defaults to `false`. * - `opensearch.tls.keystore-path` - - The path to the [PEM](/security/inspect-pem) or [JKS](/security/inspect-jks) + - The path to the P12 (PKCS) or [JKS](/security/inspect-jks) key store. * - `opensearch.tls.truststore-path` - - The path to [PEM](/security/inspect-pem) or [JKS](/security/inspect-jks) + - The path to P12 (PKCS) or [JKS](/security/inspect-jks) trust store. * - `opensearch.tls.keystore-password` - The password for the key store specified by