Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Correct docs about key format #23811

Merged
merged 1 commit into from
Oct 16, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions docs/src/main/sphinx/connector/elasticsearch.md
Original file line number Diff line number Diff line change
Expand Up @@ -138,7 +138,7 @@ clusters with TLS enabled.

If your cluster has globally-trusted certificates, you should only need to
enable TLS. If you require custom configuration for certificates, the connector
supports key stores and trust stores in PEM or Java Key Store (JKS) format.
supports key stores and trust stores in P12 (PKCS) or Java Key Store (JKS) format.

The available configuration values are listed in the following table:

Expand All @@ -151,10 +151,10 @@ The available configuration values are listed in the following table:
* - `elasticsearch.tls.enabled`
- Enables TLS security.
* - `elasticsearch.tls.keystore-path`
- The path to the [PEM](/security/inspect-pem) or [JKS](/security/inspect-jks)
- The path to the P12 (PKCS) or [JKS](/security/inspect-jks)
key store.
* - `elasticsearch.tls.truststore-path`
- The path to [PEM](/security/inspect-pem) or [JKS](/security/inspect-jks)
- The path to P12 (PKCS) or [JKS](/security/inspect-jks)
trust store.
* - `elasticsearch.tls.keystore-password`
- The key password for the key store specified by
Expand Down
6 changes: 3 additions & 3 deletions docs/src/main/sphinx/connector/opensearch.md
Original file line number Diff line number Diff line change
Expand Up @@ -141,7 +141,7 @@ clusters with TLS enabled.

If your cluster uses globally-trusted certificates, you only need to
enable TLS. If you require custom configuration for certificates, the connector
supports key stores and trust stores in PEM or Java Key Store (JKS) format.
supports key stores and trust stores in P12 (PKCS) or Java Key Store (JKS) format.

The available configuration values are listed in the following table:

Expand All @@ -154,10 +154,10 @@ The available configuration values are listed in the following table:
* - `opensearch.tls.enabled`
- Enable TLS security. Defaults to `false`.
* - `opensearch.tls.keystore-path`
- The path to the [PEM](/security/inspect-pem) or [JKS](/security/inspect-jks)
- The path to the P12 (PKCS) or [JKS](/security/inspect-jks)
key store.
* - `opensearch.tls.truststore-path`
- The path to [PEM](/security/inspect-pem) or [JKS](/security/inspect-jks)
- The path to P12 (PKCS) or [JKS](/security/inspect-jks)
trust store.
* - `opensearch.tls.keystore-password`
- The password for the key store specified by
Expand Down