Auto-TLS Requirements and Limitations
Reference information for Auto-TLS requirements, limitations, and component support.
Requirements
- You must install the Cloudera Manager Agent software on the Cloudera Manager Server host.
- You can enable auto-TLS using certificates created and managed by a Cloudera
Manager certificate authority (CA), or certificates signed by a trusted
public CA or your own internal CA. If you want to use a trusted public CA or
your own internal CA, you must obtain all of the host certificates before
enabling auto-TLS. For instructions on obtaining certificates from a CA, see
Manually Configuring TLS Encryption for Cloudera Manager
>On Each Cluster Host
.
Component support for Auto-TLS
The following CDP services support auto-TLS:
- Atlas
- Cloudera Manager Host Monitor Debug Interface
- Cloudera Manager Service Monitor Debug Interface
- Cruise Control
- HBase
- HDFS Client Configuration
- HDFS NameNode Web UI
- Hive-on-Tez
- HiveServer2
- HttpFS
- Hue Client
- Hue Load Balancer
- Hue Server
- Impala Catalog Server
- Impala Server
- Impala StateStore
- Java Keystore Key Management Server (KMS)
- Kafka Broker Server
- Kafka Mirrormaker
- Knox
- Kudu
- Livy
- Oozie
- Ozone
- Phoenix
- Ranger
- Safenet Luna Hardware Security Modules (HSM) KMS
- Schema Registry
- Solr
- Spark History Server
- Streams Messaging Manager
- Streams Replication Manager
- Thales HSM KMS
- YARN Web UI
- Zeppelin
- ZooKeeper
For unlisted CDP services, you must enable TLS manually. See the applicable component guide for more information.
Limitations
- It is not possible to rename hostnames of cluster nodes in an Auto-TLS setup.