com.atlassian.confluence.content.render.xhtml.migration.exceptions.UnknownMacroMigrationException: The macro 'next_previous_links' is unknown.
Enable TLS between Hector and Cassandra
TLS protocol can be enabled to secure the client-server communication between a Hector-based client and a Cassandra server.
Pre-requisitesÂ
- Download and install appropriate JCE libs intoÂ
<JAVA_HOME>/lib/security/
 folder. - Ensure that the required keystores are configured.
Configure the Cassandra server
The steps given below explains how you can enable TLS security for Cassandra, which received messages from the Hector-based client.
- Open theÂ
cassandra.yaml
 file from theÂ<PRODUCT_HOME>/repository/conf/etc
 folder. Enable client_encryption_options as shown below.
enabled: false keystore: conf/.keystore keystore_password: cassandra # require_client_auth: false # truststore: conf/.truststore # truststore_password: cassandra # More advanced defaults below: # protocol: TLS # algorithm: SunX509 # store_type: JKS # cipher_suites: [TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA]
- Start the server.Â
Configure the client
The steps given below explains how you can configure the server with the Hector-based client, which sends messages to Cassandra.
- Open the server startup script fromÂ
<PRODUCT_HOME>/bin
 folder. For example, for Linux, openÂwso2server.sh
. Add the following system properties.
-Dssl.protocol=TLS -Dssl.cipher.suites=TLS_RSA_WITH_AES_256_CBC_SHA -Dssl.store.type=JKS -Dssl.truststore=[Trust store path] -Dssl.truststore.password=[Trust store password]
- Start the server.Â
com.atlassian.confluence.content.render.xhtml.migration.exceptions.UnknownMacroMigrationException: The macro 'next_previous_links2' is unknown.