diff --git a/docs/content/preview/drivers-orms/go/yb-pgx-reference.md b/docs/content/preview/drivers-orms/go/yb-pgx-reference.md index 78d0134eff6a..861532d433bc 100644 --- a/docs/content/preview/drivers-orms/go/yb-pgx-reference.md +++ b/docs/content/preview/drivers-orms/go/yb-pgx-reference.md @@ -239,7 +239,7 @@ For more details, see the [pgxpool package](https://pkg.go.dev/github.com/jackc/ To build a Go application that communicates securely over SSL with YugabyteDB database, you need the root certificate (`ca.crt`) of the YugabyteDB cluster. To generate these certificates and install them while launching the cluster, follow the instructions in [Create server certificates](../../../secure/tls-encryption/server-certificates/). -Because a YugabyteDB Aeon cluster is always configured with SSL/TLS, you don't have to generate any certificate but only set the client-side SSL configuration. To fetch your root certificate, refer to [CA certificate](../../../yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). +Because a YugabyteDB Aeon cluster is always configured with SSL/TLS, you don't have to generate any certificate but only set the client-side SSL configuration. To fetch your root certificate, refer to [CA certificate](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). For a YugabyteDB Aeon cluster, or a YugabyteDB cluster with SSL/TLS enabled, set the SSL-related environment variables as follows at the client side. diff --git a/docs/content/preview/drivers-orms/java/postgres-jdbc.md b/docs/content/preview/drivers-orms/java/postgres-jdbc.md index 668175720ec7..07c69ca6e906 100644 --- a/docs/content/preview/drivers-orms/java/postgres-jdbc.md +++ b/docs/content/preview/drivers-orms/java/postgres-jdbc.md @@ -146,7 +146,7 @@ String yburl = "jdbc:postgresql://hostname:port/database?user=yugabyte&password= Connection conn = DriverManager.getConnection(yburl); ``` -If you created a cluster on YugabyteDB Aeon, use the cluster credentials and [download the SSL Root certificate](../../../yugabyte-cloud/cloud-connect/connect-applications/). +If you created a cluster on YugabyteDB Aeon, use the cluster credentials and [download the SSL Root certificate](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). ### Step 3: Write your application diff --git a/docs/content/preview/drivers-orms/java/yugabyte-jdbc.md b/docs/content/preview/drivers-orms/java/yugabyte-jdbc.md index 8609236a5d87..56e2063312f8 100644 --- a/docs/content/preview/drivers-orms/java/yugabyte-jdbc.md +++ b/docs/content/preview/drivers-orms/java/yugabyte-jdbc.md @@ -176,7 +176,7 @@ jdbc:yugabytedb://hostname:port/database?user=yugabyte&password=yugabyte&load-ba ssl=true&sslmode=verify-full&sslrootcert=~/.postgresql/root.crt ``` -If you created a cluster on YugabyteDB Aeon, use the cluster credentials and [download the SSL Root certificate](../../../yugabyte-cloud/cloud-connect/connect-applications/). +If you created a cluster on YugabyteDB Aeon, use the cluster credentials and [download the SSL Root certificate](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). To use load balancing and SSL mode verify-full with a cluster in YugabyteDB Aeon, you need to provide the additional `sslhostnameverifier` parameter, set to `com.yugabyte.ysql.YBManagedHostnameVerifier`. (Available in driver version 42.3.5-yb-2 or later. For previous versions of the driver, use `verify-ca`.) diff --git a/docs/content/preview/drivers-orms/nodejs/postgres-node-driver.md b/docs/content/preview/drivers-orms/nodejs/postgres-node-driver.md index c3e43bb6d3c0..75d7d0298cd4 100644 --- a/docs/content/preview/drivers-orms/nodejs/postgres-node-driver.md +++ b/docs/content/preview/drivers-orms/nodejs/postgres-node-driver.md @@ -115,7 +115,7 @@ const config = { } ``` -If you created a cluster on YugabyteDB Aeon, use the cluster credentials and [download the SSL Root certificate](../../../yugabyte-cloud/cloud-connect/connect-applications/). +If you created a cluster on YugabyteDB Aeon, use the cluster credentials and [download the SSL Root certificate](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). Refer to [Configure SSL/TLS](../postgres-pg-reference/#configure-ssl-tls) for more information on node-postgresql default and supported SSL modes, and other examples for setting up your connection strings when using SSL. diff --git a/docs/content/preview/drivers-orms/nodejs/postgres-pg-reference.md b/docs/content/preview/drivers-orms/nodejs/postgres-pg-reference.md index 3b2ea4c49645..4be60715f735 100644 --- a/docs/content/preview/drivers-orms/nodejs/postgres-pg-reference.md +++ b/docs/content/preview/drivers-orms/nodejs/postgres-pg-reference.md @@ -144,7 +144,7 @@ client To build a Node.js application that communicates securely over SSL, get the root certificate (`ca.crt`) of the YugabyteDB Cluster. If certificates are not generated yet, follow the instructions in [Create server certificates](../../../secure/tls-encryption/server-certificates/). -Because a YugabyteDB Aeon cluster is always configured with SSL/TLS, you don't have to generate any certificate but only set the client-side SSL configuration. To fetch your root certificate, refer to [Download your cluster certificate](../../../yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). +Because a YugabyteDB Aeon cluster is always configured with SSL/TLS, you don't have to generate any certificate but only set the client-side SSL configuration. To fetch your root certificate, refer to [Download your cluster certificate](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). The node-postgres driver allows you to avoid including the parameters like `sslcert`, `sslkey`, `sslrootcert`, or `sslmode` in the connection string. You can pass the object which includes `connectionString` and `ssl` object which has various fields including the following: diff --git a/docs/content/preview/drivers-orms/nodejs/yugabyte-node-driver.md b/docs/content/preview/drivers-orms/nodejs/yugabyte-node-driver.md index 6e3735fce3d4..c2be085c550d 100644 --- a/docs/content/preview/drivers-orms/nodejs/yugabyte-node-driver.md +++ b/docs/content/preview/drivers-orms/nodejs/yugabyte-node-driver.md @@ -109,7 +109,7 @@ Refer to [Configure SSL/TLS](../postgres-pg-reference/#configure-ssl-tls) for mo #### Use SSL with YugabyteDB Aeon -If you created a cluster on YugabyteDB Aeon, use the cluster credentials and [download the SSL Root certificate](../../../yugabyte-cloud/cloud-secure-clusters/cloud-authentication/). +If you created a cluster on YugabyteDB Aeon, use the cluster credentials and [download the SSL Root certificate](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). With clusters in YugabyteDB Aeon, you can't use SSL mode verify-full; other SSL modes are supported. To use the equivalent of verify-full, don't set the `sslmode` or `sslrootcert` parameters in your connection string; instead, use the `ssl` object with the following parameters: diff --git a/docs/content/preview/drivers-orms/orms/nodejs/ysql-prisma.md b/docs/content/preview/drivers-orms/orms/nodejs/ysql-prisma.md index f9e875a9b140..a5c911cd17b7 100644 --- a/docs/content/preview/drivers-orms/orms/nodejs/ysql-prisma.md +++ b/docs/content/preview/drivers-orms/orms/nodejs/ysql-prisma.md @@ -93,7 +93,7 @@ DATABASE_URL="postgresql://:@:/" If you have a YugabyteDB Aeon cluster, do the following: -1. Download your [cluster certificate](../../../../yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). +1. Download your [cluster certificate](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). 1. Install OpenSSL, if not present. diff --git a/docs/content/preview/drivers-orms/python/postgres-psycopg2.md b/docs/content/preview/drivers-orms/python/postgres-psycopg2.md index 6bc4c8d56cb8..a63c677694e5 100644 --- a/docs/content/preview/drivers-orms/python/postgres-psycopg2.md +++ b/docs/content/preview/drivers-orms/python/postgres-psycopg2.md @@ -129,7 +129,7 @@ The following is an example for connecting to YugabyteDB with SSL encryption ena conn = psycopg2.connect("host= port=5433 dbname=yugabyte user= password= sslmode=verify-full sslrootcert=/Users/my-user/Downloads/root.crt") ``` -If you have created a cluster on YugabyteDB Aeon, use the cluster credentials and [download the SSL Root certificate](../../../yugabyte-cloud/cloud-connect/connect-applications/). +If you have created a cluster on YugabyteDB Aeon, use the cluster credentials and [download the SSL Root certificate](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). ### Step 3: Write your application diff --git a/docs/content/preview/drivers-orms/python/yugabyte-psycopg2.md b/docs/content/preview/drivers-orms/python/yugabyte-psycopg2.md index 5a5d78258665..c4a79123097b 100644 --- a/docs/content/preview/drivers-orms/python/yugabyte-psycopg2.md +++ b/docs/content/preview/drivers-orms/python/yugabyte-psycopg2.md @@ -184,7 +184,7 @@ The following is an example for connecting to a YugabyteDB cluster with SSL enab conn = psycopg2.connect("host= port=5433 dbname=yugabyte user= password= load_balance=true sslmode=verify-full sslrootcert=/path/to/root.crt") ``` -The Yugabyte Psycopg2 smart driver does not support SSL mode verify-full for clusters in YugabyteDB Aeon. Use verify-ca or the upstream psycopg2 driver. If your cluster is on YugabyteDB Aeon, use the cluster credentials for user and password, and [download the SSL Root certificate](../../../yugabyte-cloud/cloud-connect/connect-applications/). +The Yugabyte Psycopg2 smart driver does not support SSL mode verify-full for clusters in YugabyteDB Aeon. Use verify-ca or the upstream psycopg2 driver. If your cluster is on YugabyteDB Aeon, use the cluster credentials for user and password, and [download the SSL Root certificate](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). ### Step 3: Write your application diff --git a/docs/content/preview/drivers-orms/rust/rust-postgres-reference.md b/docs/content/preview/drivers-orms/rust/rust-postgres-reference.md index 0af175540a58..4a0c210531d4 100644 --- a/docs/content/preview/drivers-orms/rust/rust-postgres-reference.md +++ b/docs/content/preview/drivers-orms/rust/rust-postgres-reference.md @@ -355,7 +355,7 @@ The following is an example connection URL for connecting to a YugabyteDB cluste "postgresql://127.0.0.1:5434/yugabyte?user=yugabyte&password=yugabyte&load_balance=true&sslmode=require" ``` -If you created a cluster on [YugabyteDB Aeon](../../../yugabyte-cloud/), use the cluster credentials and download the [SSL Root certificate](../../../yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). +If you created a cluster on YugabyteDB Aeon, use the cluster credentials and download the [SSL Root certificate](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). The following is an example application for connecting to a YugabyteDB cluster with SSL enabled: diff --git a/docs/content/preview/explore/change-data-capture/using-yugabytedb-grpc-replication/debezium-connector-yugabytedb.md b/docs/content/preview/explore/change-data-capture/using-yugabytedb-grpc-replication/debezium-connector-yugabytedb.md index 9ac9510622fc..95a2426f74df 100644 --- a/docs/content/preview/explore/change-data-capture/using-yugabytedb-grpc-replication/debezium-connector-yugabytedb.md +++ b/docs/content/preview/explore/change-data-capture/using-yugabytedb-grpc-replication/debezium-connector-yugabytedb.md @@ -1053,7 +1053,7 @@ If you have a YugabyteDB cluster with SSL enabled, you need to obtain the root c * [Local deployments](../../../../secure/tls-encryption/) * [YugabyteDB Anywhere](../../../../yugabyte-platform/security/enable-encryption-in-transit/#enable-encryption-in-transit) -* [YugabyteDB Aeon](../../../../yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate) +* [YugabyteDB Aeon](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate) {{< /note >}} diff --git a/docs/content/preview/integrations/hashicorp-vault.md b/docs/content/preview/integrations/hashicorp-vault.md index 5538a1368fb2..16fe7e87fcd2 100644 --- a/docs/content/preview/integrations/hashicorp-vault.md +++ b/docs/content/preview/integrations/hashicorp-vault.md @@ -164,7 +164,7 @@ vault lease revoke To allow YSQL Hashicorp Vault plugin to communicate securely over SSL with YugabyteDB database, you need the root certificate (`ca.crt`) of the YugabyteDB cluster. To generate these certificates and install them while launching the cluster, follow the instructions in [Create server certificates](../../secure/tls-encryption/server-certificates/). -Because a YugabyteDB Aeon cluster is always configured with SSL/TLS, you don't have to generate any certificate but only set the client-side SSL configuration. To fetch your root certificate, refer to [CA certificate](../../yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). +Because a YugabyteDB Aeon cluster is always configured with SSL/TLS, you don't have to generate any certificate but only set the client-side SSL configuration. To fetch your root certificate, refer to [CA certificate](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). To start a secure local YugabyteDB cluster using `yugabyted`, refer to [Create a local multi-node cluster](../../reference/configuration/yugabyted/#create-a-local-multi-node-cluster). diff --git a/docs/content/preview/tutorials/azure/azure-api-management.md b/docs/content/preview/tutorials/azure/azure-api-management.md index 9e8894bf1a8d..28edb1a14d86 100644 --- a/docs/content/preview/tutorials/azure/azure-api-management.md +++ b/docs/content/preview/tutorials/azure/azure-api-management.md @@ -37,20 +37,20 @@ Begin by deploying a multi-region, [geo-partitioned cluster](../../../yugabyte-c ![Geo-partitioned YugabyteDB deployment on Azure](/images/tutorials/azure/azure-private-link/yb-deployment.png "Geo-partitioned YugabyteDB deployment on Azure") -1. Enable public access on the cluster and add 0.0.0.0/0 to the cluster [IP Allow List](../../../yugabyte-cloud/cloud-secure-clusters/add-connections/). This setup allows connections to the cluster from all IP addresses. +1. Enable public access on the cluster and add 0.0.0.0/0 to the cluster [IP Allow List](/preview/yugabyte-cloud/cloud-secure-clusters/add-connections/). This setup allows connections to the cluster from all IP addresses. {{< note title="Note" >}} -In a production application, [Azure Private Link](../../../yugabyte-cloud/cloud-basics/cloud-vpcs/managed-endpoint-azure/) can be used with [private service endpoints](../../../yugabyte-cloud/cloud-basics/cloud-vpcs/managed-endpoint-azure/#create-a-pse-in-yugabytedb-managed) to create a secure connection between your application and database VPCs. +In a production application, [Azure Private Link](/preview/yugabyte-cloud/cloud-basics/cloud-vpcs/managed-endpoint-azure/) can be used with [private service endpoints](/preview/yugabyte-cloud/cloud-basics/cloud-vpcs/managed-endpoint-azure/#create-a-pse-in-yugabytedb-managed) to create a secure connection between your application and database VPCs. {{< /note >}} -1. Upon creation, save the credentials and [download the CA certificate](../../../tutorials/build-apps/cloud-add-ip/#download-your-cluster-certificate) once everything is up and running. This is essential for secure connections using the Node.js Smart Client. +1. Upon creation, save the credentials and [download the CA certificate](../../build-apps/cloud-add-ip/#download-your-cluster-certificate) once everything is up and running. This is essential for secure connections using the Node.js Smart Client. ## Create tables and insert records -Connect to your YugabyteDB cluster running on Azure via the [Cloud Shell](../../../yugabyte-cloud/cloud-connect/connect-cloud-shell/) and execute the following commands: +Connect to your YugabyteDB cluster running on Azure via the [Cloud Shell](/preview/yugabyte-cloud/cloud-connect/connect-cloud-shell/) and execute the following commands: 1. Create the _orders_ table and partition it by region. -1. Create partition tables using the automatically created [regional tablespaces](../../../yugabyte-cloud/cloud-basics/create-clusters/create-clusters-geopartition/#tablespaces). +1. Create partition tables using the automatically created [regional tablespaces](/preview/yugabyte-cloud/cloud-basics/create-clusters/create-clusters-geopartition/#tablespaces). 1. Seed the database with some orders. These records will be stored in the appropriate cluster node according to the supplied region. ## Develop an Azure function diff --git a/docs/content/preview/tutorials/azure/azure-private-link.md b/docs/content/preview/tutorials/azure/azure-private-link.md index 4fbe9ee44a15..06bea0ec277a 100644 --- a/docs/content/preview/tutorials/azure/azure-private-link.md +++ b/docs/content/preview/tutorials/azure/azure-private-link.md @@ -35,7 +35,7 @@ In the following sections, you will: ![3-node YugabyteDB deployment in uswest3](/images/tutorials/azure/azure-private-link/yb-deployment.png "3-node YugabyteDB deployment in uswest3") -Remember to save the credentials after creation and [download the CA certificate](../../../tutorials/build-apps/cloud-add-ip/#download-your-cluster-certificate) once operational, ensuring a secure connection through the Node.js Smart Client. +Remember to save the credentials after creation and [download the CA certificate](../../build-apps/cloud-add-ip/#download-your-cluster-certificate) once operational, ensuring a secure connection through the Node.js Smart Client. ## Get started with Azure diff --git a/docs/content/stable/drivers-orms/go/yb-pgx-reference.md b/docs/content/stable/drivers-orms/go/yb-pgx-reference.md index 6d95304540b1..b78b4f93d00a 100644 --- a/docs/content/stable/drivers-orms/go/yb-pgx-reference.md +++ b/docs/content/stable/drivers-orms/go/yb-pgx-reference.md @@ -236,13 +236,13 @@ For more details, see the [pgxpool package](https://pkg.go.dev/github.com/jackc/ To build a Go application that communicates securely over SSL with YugabyteDB database, you need the root certificate (`ca.crt`) of the YugabyteDB cluster. To generate these certificates and install them while launching the cluster, follow the instructions in [Create server certificates](../../../secure/tls-encryption/server-certificates/). -Because a YugabyteDB Aeon cluster is always configured with SSL/TLS, you don't have to generate any certificate but only set the client-side SSL configuration. To fetch your root certificate, refer to [CA certificate](../../../yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). +Because a YugabyteDB Aeon cluster is always configured with SSL/TLS, you don't have to generate any certificate but only set the client-side SSL configuration. To fetch your root certificate, refer to [CA certificate](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). For a YugabyteDB Aeon cluster, or a YugabyteDB cluster with SSL/TLS enabled, set the SSL-related environment variables as follows at the client side. ```sh $ export PGSSLMODE=verify-ca -$ export PGSSLROOTCERT=~/root.crt # Here, the CA certificate file is downloaded as `root.crt` under home directory. Modify your path accordingly. +$ export PGSSLROOTCERT=~/root.crt # CA certificate file is downloaded as `root.crt` under home directory. Modify your path accordingly. ``` | Environment Variable | Description | diff --git a/docs/content/stable/drivers-orms/java/postgres-jdbc.md b/docs/content/stable/drivers-orms/java/postgres-jdbc.md index d82a6f8bc424..800e6744336f 100644 --- a/docs/content/stable/drivers-orms/java/postgres-jdbc.md +++ b/docs/content/stable/drivers-orms/java/postgres-jdbc.md @@ -146,7 +146,7 @@ String yburl = "jdbc:postgresql://hostname:port/database?user=yugabyte&password= Connection conn = DriverManager.getConnection(yburl); ``` -If you created a cluster on YugabyteDB Aeon, use the cluster credentials and [download the SSL Root certificate](../../../yugabyte-cloud/cloud-connect/connect-applications/). +If you created a cluster on YugabyteDB Aeon, use the cluster credentials and [download the SSL Root certificate](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). ### Step 3: Write your application diff --git a/docs/content/stable/drivers-orms/java/yugabyte-jdbc.md b/docs/content/stable/drivers-orms/java/yugabyte-jdbc.md index 6714cb9d2b2c..2751e8649e2e 100644 --- a/docs/content/stable/drivers-orms/java/yugabyte-jdbc.md +++ b/docs/content/stable/drivers-orms/java/yugabyte-jdbc.md @@ -169,7 +169,7 @@ jdbc:yugabytedb://hostname:port/database?user=yugabyte&password=yugabyte&load-ba ssl=true&sslmode=verify-full&sslrootcert=~/.postgresql/root.crt ``` -If you created a cluster on YugabyteDB Aeon, use the cluster credentials and [download the SSL Root certificate](../../../yugabyte-cloud/cloud-connect/connect-applications/). +If you created a cluster on YugabyteDB Aeon, use the cluster credentials and [download the SSL Root certificate](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). To use load balancing and SSL mode verify-full with a cluster in YugabyteDB Aeon, you need to provide the additional `sslhostnameverifier` parameter, set to `com.yugabyte.ysql.YBManagedHostnameVerifier`. (Available in driver version 42.3.5-yb-2 or later. For previous versions of the driver, use `verify-ca`.) diff --git a/docs/content/stable/drivers-orms/nodejs/postgres-node-driver.md b/docs/content/stable/drivers-orms/nodejs/postgres-node-driver.md index 882123bc2178..c0bf091dbee6 100644 --- a/docs/content/stable/drivers-orms/nodejs/postgres-node-driver.md +++ b/docs/content/stable/drivers-orms/nodejs/postgres-node-driver.md @@ -115,7 +115,7 @@ const config = { } ``` -If you created a cluster on YugabyteDB Aeon, use the cluster credentials and [download the SSL Root certificate](../../../yugabyte-cloud/cloud-connect/connect-applications/). +If you created a cluster on YugabyteDB Aeon, use the cluster credentials and [download the SSL Root certificate](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). Refer to [Configure SSL/TLS](../postgres-pg-reference/#configure-ssl-tls) for more information on node-postgresql default and supported SSL modes, and other examples for setting up your connection strings when using SSL. diff --git a/docs/content/stable/drivers-orms/nodejs/postgres-pg-reference.md b/docs/content/stable/drivers-orms/nodejs/postgres-pg-reference.md index 6bc51af72cb5..5e26a9319af5 100644 --- a/docs/content/stable/drivers-orms/nodejs/postgres-pg-reference.md +++ b/docs/content/stable/drivers-orms/nodejs/postgres-pg-reference.md @@ -142,7 +142,7 @@ client To build a Node.js application that communicates securely over SSL, get the root certificate (`ca.crt`) of the YugabyteDB Cluster. If certificates are not generated yet, follow the instructions in [Create server certificates](../../../secure/tls-encryption/server-certificates/). -Because a YugabyteDB Aeon cluster is always configured with SSL/TLS, you don't have to generate any certificate but only set the client-side SSL configuration. To fetch your root certificate, refer to [Download your cluster certificate](../../../yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). +Because a YugabyteDB Aeon cluster is always configured with SSL/TLS, you don't have to generate any certificate but only set the client-side SSL configuration. To fetch your root certificate, refer to [Download your cluster certificate](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). The node-postgres driver allows you to avoid including the parameters like `sslcert`, `sslkey`, `sslrootcert`, or `sslmode` in the connection string. You can pass the object which includes `connectionString` and `ssl` object which has various fields including the following: diff --git a/docs/content/stable/drivers-orms/nodejs/yugabyte-node-driver.md b/docs/content/stable/drivers-orms/nodejs/yugabyte-node-driver.md index ae630204082c..87e3d2a1e4a2 100644 --- a/docs/content/stable/drivers-orms/nodejs/yugabyte-node-driver.md +++ b/docs/content/stable/drivers-orms/nodejs/yugabyte-node-driver.md @@ -109,7 +109,7 @@ Refer to [Configure SSL/TLS](../postgres-pg-reference/#configure-ssl-tls) for mo #### Use SSL with YugabyteDB Aeon -If you created a cluster on YugabyteDB Aeon, use the cluster credentials and [download the SSL Root certificate](../../../yugabyte-cloud/cloud-secure-clusters/cloud-authentication/). +If you created a cluster on YugabyteDB Aeon, use the cluster credentials and [download the SSL Root certificate](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). With clusters in YugabyteDB Aeon, you can't use SSL mode verify-full; other SSL modes are supported. To use the equivalent of verify-full, don't set the `sslmode` or `sslrootcert` parameters in your connection string; instead, use the `ssl` object with the following parameters: diff --git a/docs/content/stable/drivers-orms/orms/nodejs/ysql-prisma.md b/docs/content/stable/drivers-orms/orms/nodejs/ysql-prisma.md index e2ef5b9be434..d9bb5d4d0d1f 100644 --- a/docs/content/stable/drivers-orms/orms/nodejs/ysql-prisma.md +++ b/docs/content/stable/drivers-orms/orms/nodejs/ysql-prisma.md @@ -93,7 +93,7 @@ DATABASE_URL="postgresql://:@:/" If you have a YugabyteDB Aeon cluster, do the following: -1. Download your [cluster certificate](../../../../yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). +1. Download your [cluster certificate](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). 1. Install OpenSSL, if not present. diff --git a/docs/content/stable/drivers-orms/python/postgres-psycopg2.md b/docs/content/stable/drivers-orms/python/postgres-psycopg2.md index 030d474b2e0b..bb53f953b49e 100644 --- a/docs/content/stable/drivers-orms/python/postgres-psycopg2.md +++ b/docs/content/stable/drivers-orms/python/postgres-psycopg2.md @@ -129,7 +129,7 @@ The following is an example for connecting to YugabyteDB with SSL encryption ena conn = psycopg2.connect("host= port=5433 dbname=yugabyte user= password= sslmode=verify-full sslrootcert=/Users/my-user/Downloads/root.crt") ``` -If you have created a cluster on YugabyteDB Aeon, use the cluster credentials and [download the SSL Root certificate](../../../yugabyte-cloud/cloud-connect/connect-applications/). +If you have created a cluster on YugabyteDB Aeon, use the cluster credentials and [download the SSL Root certificate](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). ### Step 3: Write your application diff --git a/docs/content/stable/drivers-orms/python/yugabyte-psycopg2.md b/docs/content/stable/drivers-orms/python/yugabyte-psycopg2.md index 09d6068a2109..34732234add6 100644 --- a/docs/content/stable/drivers-orms/python/yugabyte-psycopg2.md +++ b/docs/content/stable/drivers-orms/python/yugabyte-psycopg2.md @@ -184,7 +184,7 @@ The following is an example for connecting to a YugabyteDB cluster with SSL enab conn = psycopg2.connect("host= port=5433 dbname=yugabyte user= password= load_balance=true sslmode=verify-full sslrootcert=/path/to/root.crt") ``` -The Yugabyte Psycopg2 smart driver does not support SSL mode verify-full for clusters in YugabyteDB Aeon. Use verify-ca or the upstream psycopg2 driver. If your cluster is on YugabyteDB Aeon, use the cluster credentials for user and password, and [download the SSL Root certificate](../../../yugabyte-cloud/cloud-connect/connect-applications/). +The Yugabyte Psycopg2 smart driver does not support SSL mode verify-full for clusters in YugabyteDB Aeon. Use verify-ca or the upstream psycopg2 driver. If your cluster is on YugabyteDB Aeon, use the cluster credentials for user and password, and [download the SSL Root certificate](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). ### Step 3: Write your application diff --git a/docs/content/stable/drivers-orms/rust/rust-postgres-reference.md b/docs/content/stable/drivers-orms/rust/rust-postgres-reference.md index c0709579435e..1ee05a6277f3 100644 --- a/docs/content/stable/drivers-orms/rust/rust-postgres-reference.md +++ b/docs/content/stable/drivers-orms/rust/rust-postgres-reference.md @@ -353,7 +353,7 @@ The following is an example connection URL for connecting to a YugabyteDB cluste "postgresql://127.0.0.1:5434/yugabyte?user=yugabyte&password=yugabyte&load_balance=true&sslmode=require" ``` -If you created a cluster on [YugabyteDB Aeon](../../../yugabyte-cloud/), use the cluster credentials and download the [SSL Root certificate](../../../yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). +If you created a cluster on YugabyteDB Aeon, use the cluster credentials and download the [SSL Root certificate](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate). The following is an example application for connecting to a YugabyteDB cluster with SSL enabled: diff --git a/docs/content/stable/explore/change-data-capture/using-yugabytedb-grpc-replication/debezium-connector-yugabytedb.md b/docs/content/stable/explore/change-data-capture/using-yugabytedb-grpc-replication/debezium-connector-yugabytedb.md index e5485909a2e3..3ce9c225fa24 100644 --- a/docs/content/stable/explore/change-data-capture/using-yugabytedb-grpc-replication/debezium-connector-yugabytedb.md +++ b/docs/content/stable/explore/change-data-capture/using-yugabytedb-grpc-replication/debezium-connector-yugabytedb.md @@ -1053,7 +1053,7 @@ If you have a YugabyteDB cluster with SSL enabled, you need to obtain the root c * [Local deployments](../../../../secure/tls-encryption/) * [YugabyteDB Anywhere](../../../../yugabyte-platform/security/enable-encryption-in-transit/#connect-to-a-ysql-endpoint-with-tls) -* [YugabyteDB Aeon](../../../../yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate) +* [YugabyteDB Aeon](/preview/yugabyte-cloud/cloud-secure-clusters/cloud-authentication/#download-your-cluster-certificate) {{< /note >}}