confluent secret master-key generate¶
Description¶
This command generates a master key. This key is used for encryption and decryption of configuration values.
confluent secret master-key generate [flags]
Tip
For examples, see Secrets Usage Examples.
Flags¶
--local-secrets-file string REQUIRED: Path to the local encrypted configuration properties file.
--passphrase string The key passphrase.
-o, --output string Specify the output format as "human", "json", or "yaml". (default "human")
Global Flags¶
-h, --help Show help for this command.
--unsafe-trace Equivalent to -vvvv, but also log HTTP requests and responses which might contain plaintext secrets.
-v, --verbose count Increase verbosity (-v for warn, -vv for info, -vvv for debug, -vvvv for trace).
Examples¶
Pipe the passphrase from stdin:
confluent secret master-key generate --local-secrets-file /path/to/secrets.txt --passphrase -
Read the passphrase from the file “/User/bob/secret.properties”:
confluent secret master-key generate --local-secrets-file /path/to/secrets.txt --passphrase @/User/bob/secret.properties
See Also¶
- confluent secret master-key - Manage the master key for Confluent Platform.