security.ssl.algorithms |
"TLS_RSA_WITH_AES_128_CBC_SHA" |
The comma separated list of standard SSL algorithms to be supported. Read more <a href="http://docs.oracle.com/javase/8/docs/technotes/guides/security/StandardNames.html#ciphersuites">here</a>. |
security.ssl.close-notify-flush-timeout |
-1 |
The timeout (in ms) for flushing the `close_notify` that was triggered by closing a channel. If the `close_notify` was not flushed in the given timeout the channel will be closed forcibly. (-1 = use system default) |
security.ssl.enabled |
false |
Turns on SSL for internal network communication. This can be optionally overridden by flags defined in different transport modules. |
security.ssl.handshake-timeout |
-1 |
The timeout (in ms) during SSL handshake. (-1 = use system default) |
security.ssl.key-password |
(none) |
The secret to decrypt the server key in the keystore. |
security.ssl.keystore |
(none) |
The Java keystore file to be used by the flink endpoint for its SSL Key and Certificate. |
security.ssl.keystore-password |
(none) |
The secret to decrypt the keystore file. |
security.ssl.protocol |
"TLSv1.2" |
The SSL protocol version to be supported for the ssl transport. Note that it doesn’t support comma separated list. |
security.ssl.session-cache-size |
-1 |
The size of the cache used for storing SSL session objects. According to https://github.com/netty/netty/issues/832, you should always set this to an appropriate number to not run into a bug with stalling IO threads during garbage collection. (-1 = use system default). |
security.ssl.session-timeout |
-1 |
The timeout (in ms) for the cached SSL session objects. (-1 = use system default) |
security.ssl.truststore |
(none) |
The truststore file containing the public CA certificates to be used by flink endpoints to verify the peer’s certificate. |
security.ssl.truststore-password |
(none) |
The secret to decrypt the truststore. |
security.ssl.verify-hostname |
true |
Flag to enable peer’s hostname verification during ssl handshake. |