@@ -1553,7 +1553,7 @@ crypto_provider:
1553
1553
# **NOTE** this default configuration is an insecure configuration. If you need to
1554
1554
# enable server-to-server encryption generate server keystores (and truststores for mutual
1555
1555
# authentication) per:
1556
- # http ://download.oracle.com/javase/8/docs/technotes/guides/security/jsse/JSSERefGuide.html#CreateKeystore
1556
+ # https ://download.oracle.com/javase/8/docs/technotes/guides/security/jsse/JSSERefGuide.html#CreateKeystore
1557
1557
# Then perform the following configuration changes:
1558
1558
#
1559
1559
# Step 1: Set internode_encryption=<dc|rack|all> and explicitly set optional=true. Restart all nodes
@@ -1611,7 +1611,7 @@ server_encryption_options:
1611
1611
# **NOTE** this default configuration is an insecure configuration. If you need to
1612
1612
# enable client-to-server encryption generate server keystores (and truststores for mutual
1613
1613
# authentication) per:
1614
- # http ://download.oracle.com/javase/8/docs/technotes/guides/security/jsse/JSSERefGuide.html#CreateKeystore
1614
+ # https ://download.oracle.com/javase/8/docs/technotes/guides/security/jsse/JSSERefGuide.html#CreateKeystore
1615
1615
# Then perform the following configuration changes:
1616
1616
#
1617
1617
# Step 1: Set enabled=true and explicitly set optional=true. Restart all nodes
@@ -1689,7 +1689,7 @@ user_defined_functions_enabled: false
1689
1689
#
1690
1690
# It is strongly recommended to download and install Java Cryptography Extension (JCE)
1691
1691
# Unlimited Strength Jurisdiction Policy Files for your version of the JDK.
1692
- # (current link: http ://www.oracle.com/technetwork/java/javase/downloads/jce8-download-2133166.html)
1692
+ # (current link: https ://www.oracle.com/technetwork/java/javase/downloads/jce8-download-2133166.html)
1693
1693
#
1694
1694
# Currently, only the following file types are supported for transparent data encryption, although
1695
1695
# more are coming in future cassandra releases: commitlog, hints
@@ -1724,7 +1724,7 @@ transparent_data_encryption_options:
1724
1724
# will use them to make sure other replicas also know about the deleted rows.
1725
1725
# With workloads that generate a lot of tombstones, this can cause performance
1726
1726
# problems and even exaust the server heap.
1727
- # (http ://www.datastax.com/dev/blog/cassandra-anti-patterns-queues-and-queue-like-datasets)
1727
+ # (https ://www.datastax.com/dev/blog/cassandra-anti-patterns-queues-and-queue-like-datasets)
1728
1728
# Adjust the thresholds here if you understand the dangers and want to
1729
1729
# scan more tombstones anyway. These thresholds may also be adjusted at runtime
1730
1730
# using the StorageService mbean.
0 commit comments