yabinmeng edited a comment on issue #11548:
URL: https://github.com/apache/pulsar/issues/11548#issuecomment-901565041


   @lhotari Thanks for looking into this.
   
   In my testing, I only have one node. So I don't think 
`brokerClientTlsEnabled=true` and`brokerClientTlsEnabledWithKeyStore=true` 
matter because they're used for inter-broker communication.  Technically 
speaking, if I want to only expose TLS ports on a broker, then I should set 
`brokerClientTlsEnabledWithKeyStore=true`. But in my testing it really doesn't 
matter.
   
   My previous testing exposed 2 issues which I believed you confirmed in 
#11681. 
   1. When TLS is enabled, both non-TLS and TLS ports are all listening
   2. Broker won't start If I only set TLS ports (brokerServicePortTls and 
webServicePortTls), but leave non-TLS ports (brokerServicePort and 
webServicePort) empty.
   
   Anyway, I retested with `brokerClientTlsEnabled=true`  and 
`brokerClientTrustCertsFilePath=</path/to/root/ca/ceritificate>` (and other 
required TLS configuration as before), it is the same behavior:
   * I have to explicitly set all four ports (6650, 6651, 8080, 8843) in order 
to start borker when TLS is enabled
   * When borker is up, all 4 ports are in listening mode.
   
   Also I don't think `brokerClientTlsEnabledWithKeyStore=true` really matters 
if I use `brokerClientTrustCertsFilePath=</path/to/root/ca/ceritificate>` 
parameter. It is about using Java keystore to store the public certificate. It 
just adds one wrapper layer around the public certificate. 


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


Reply via email to