Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

In the IAM > User > Summary section, find the ARN for the tomcat user, which identifies your specific AWS account and IAM user identity. It will look something like this: arn:aws:iam::9876543210:user/yourHospital-Shrine.

At the top level of the IAM console, far right column, find your account ID. It will be a long number.
Send both of these Send this to your hub admins so that they can add your node to the network. Neither It is not secret; , so sending them in the clear is fine. TODO

Run shrineDownstream setMomUserPolicy

...

In order to secure traffic through the internet with TLS/SSL, Kafka requires clients to authenticate servers via public key infrastructure (PKI). Each client needs a client truststore, in PKCS12 format, containing a list of individual server certificates signed by a Certificate Authority (CA), or alternatively the CA's cert itself.  Ask the hub admin for the certificate(s), and import them each with Java keytool:

...

Code Block
languagejs
themeRDark
titleshrine.conf
shrine {
...
  kafka {
  ...
    ssl.truststore.location = "/path/to/your/kafka_client/_truststore.pkcs12"
  }
...
}}//shrine
Code Block
languagejs
themeRDark
titlepassword.conf
shrine.kafka.ssl.truststore.password = "yourClientTruststorePassword"