-
Notifications
You must be signed in to change notification settings - Fork 292
feat: migration guides #3248
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: release-6.0
Are you sure you want to change the base?
feat: migration guides #3248
Conversation
2da27e5 to
83e3912
Compare
acba3ad to
560f759
Compare
|
|
||
| Regardless of the method, the certificate hierarchy is the same: your devices are always signed by your own CA. For migration to EMQX, you must obtain this CA certificate so EMQX can verify your devices. | ||
|
|
||
| ### Identify the CA That Issued Your Device Certificates |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@id, I added this section to show exactly users can locate the CA. Please help to review.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@Meggielqk I cannot formally approve the PR because I created it. If you think it looks good, let's merge it.
| | **Device Certificate** | `device-001.cert.pem` | `device-001.cert.pem` | No change. The device continues using its existing certificate signed by your CA. | | ||
| | **Device Private Key** | `device-001.key.pem` | `device-001.key.pem` | No change. The device continues using its existing private key. | | ||
| | **Server Verification** (Device trusts Server) | Device client uses `AmazonRootCA1.pem` | Device client must be updated to use `emqx-server-ca.pem` | The client must trust the CA that issued the EMQX server's certificate. | | ||
| | **Client Verification** (Server trusts Device) | AWS IoT Core trusts your registered CA | EMQX listener's `cacertfile` must be set to `your-ca.pem` | EMQX must be configured to trust the same CA you registered with AWS IoT Core.| |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it's worth mentioning that verify = verify_peer must be set in addition to configuring the CA cert file.
|
|
||
| | **Parameter** | **AWS IoT Core (Example)** | **EMQX (Example)** | **Notes** | | ||
| | ------------- | -------------------------- | ------------------ | --------- | | ||
| | **Endpoint Hostname** | `agwba84cbf2pn-ats.iot.eu-west-1.amazonaws.com` | `mqtt.example.com` | Update device client code/firmware | |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Probably they'll need to specify the port as well. IIRC, AWS IoT SDK defaults to 443 when using WSS, at least.
It does seem to default to 8883 when not using websockets, indeed.
No description provided.