Addressed comments
Signed-off-by: keithhc2 <keithhc2@users.noreply.github.com>
This commit is contained in:
parent
8d1dfa5040
commit
44711700ad
|
@ -24,34 +24,22 @@ You can now start your OpenSearch cluster. The OpenSearch 1.x high-level REST cl
|
|||
|
||||
## Security
|
||||
|
||||
This code example uses basic credentials that come with the default OpenSearch configuration. If you’re using the OpenSearch Java high-level REST client with your own OpenSearch cluster, be sure to change the code to use your own credentials.
|
||||
{: .note}
|
||||
Before using the REST client in your Java application, you need to configure the application's truststore to connect to the security plugin. If you are using self-signed certificates or demo configurations, you can use the following command to create a custom truststore and add in root authority certificates.
|
||||
|
||||
Before you can securely connect to an OpenSearch cluster, you must first add your root certificates to a truststore. If you don't already have a custom truststore, the following command creates a truststore and adds in a certificate.
|
||||
If you're using certificates from a trusted Certificate Authority (CA), you don't need to configure the truststore.
|
||||
|
||||
```bash
|
||||
keytool -import <path-to-cert> -alias <alias-to-call-cert> -keystore <truststore-name>
|
||||
```
|
||||
|
||||
You can now point your Java client to the truststore and set basic authentication credentials that can access a secure cluster.
|
||||
|
||||
```java
|
||||
//Point to keystore with appropriate certificates for security.
|
||||
System.setProperty("javax.net.ssl.trustStore", "/full/path/to/keystore");
|
||||
System.setProperty("javax.net.ssl.trustStorePassword", "password-to-keystore");
|
||||
|
||||
//Establish credentials to use basic authentication.
|
||||
//Only for demo purposes. Don't specify your credentials in code.
|
||||
final CredentialsProvider credentialsProvider = new BasicCredentialsProvider();
|
||||
credentialsProvider.setCredentials(AuthScope.ANY,
|
||||
new UsernamePasswordCredentials("admin", "admin"));
|
||||
```
|
||||
You can now point your Java client to the truststore and set basic authentication credentials that can access a secure cluster (refer to the sample code below on how to do so).
|
||||
|
||||
If you run into issues when configuring security, see [common issues]({{site.url}}{{site.baseurl}}/troubleshoot/index) and [troubleshoot TLS]({{site.url}}{{site.baseurl}}/troubleshoot/tls).
|
||||
|
||||
|
||||
## Sample code
|
||||
|
||||
This code example uses basic credentials that come with the default OpenSearch configuration. If you’re using the OpenSearch Java high-level REST client with your own OpenSearch cluster, be sure to change the code to use your own credentials.
|
||||
|
||||
```java
|
||||
import org.apache.http.HttpHost;
|
||||
import org.apache.http.auth.AuthScope;
|
||||
|
|
|
@ -43,26 +43,15 @@ You can now start your OpenSearch cluster.
|
|||
|
||||
## Security
|
||||
|
||||
This code example uses basic credentials that come with the default OpenSearch configuration. If you’re using the OpenSearch Java client with your own OpenSearch cluster, be sure to change the code to use your own credentials.
|
||||
{: .note}
|
||||
Before using the REST client in your Java application, you need to configure the application's truststore to connect to the security plugin. If you are using self-signed certificates or demo configurations, you can use the following command to create a custom truststore and add in root authority certificates.
|
||||
|
||||
Before you can securely connect to an OpenSearch cluster, you must first add your root certificates to a truststore. If you don't already have a custom truststore, the following command creates a truststore and adds in a certificate.
|
||||
If you're using certificates from a trusted Certificate Authority (CA), you don't need to configure the truststore.
|
||||
|
||||
```bash
|
||||
keytool -import <path-to-cert> -alias <alias-to-call-cert> -keystore <truststore-name>
|
||||
```
|
||||
|
||||
You can now point your Java client to the truststore and set basic authentication credentials that can access a secure cluster.
|
||||
|
||||
```java
|
||||
System.setProperty("javax.net.ssl.trustStore", "/full/path/to/keystore");
|
||||
System.setProperty("javax.net.ssl.trustStorePassword", "password-to-keystore");
|
||||
|
||||
//Only for demo purposes. Don't specify your credentials in code.
|
||||
final CredentialsProvider credentialsProvider = new BasicCredentialsProvider();
|
||||
credentialsProvider.setCredentials(AuthScope.ANY,
|
||||
new UsernamePasswordCredentials("admin", "admin"));
|
||||
```
|
||||
You can now point your Java client to the truststore and set basic authentication credentials that can access a secure cluster (refer to the sample code below on how to do so).
|
||||
|
||||
If you run into issues when configuring security, see [common issues]({{site.url}}{{site.baseurl}}/troubleshoot/index) and [troubleshoot TLS]({{site.url}}{{site.baseurl}}/troubleshoot/tls).
|
||||
|
||||
|
@ -107,6 +96,8 @@ static class IndexData {
|
|||
|
||||
## Initialize the client with SSL and TLS enabled
|
||||
|
||||
This code example uses basic credentials that come with the default OpenSearch configuration. If you’re using the Java client with your own OpenSearch cluster, be sure to change the code to use your own credentials.
|
||||
|
||||
The following sample code initializes a client with SSL and TLS enabled:
|
||||
|
||||
```java
|
||||
|
|
Loading…
Reference in New Issue