Known Issues in ZooKeeper

Learn about the known issues in ZooKeeper, the impact or changes to the functionality, and the workaround.

Zookeeper-client does not use ZooKeeper TLS/SSL automatically
The command-line tool ‘zookeeper-client’ is installed on all Cloudera nodes and it can be used to start the default Java command line ZooKeeper client. However even when ZooKeeper TLS/SSL is enabled, the zookeeper-client command connects to localhost:2181, without using TLS/SSL.
Manually configure the 2182 port, when zookeeper-client connects to a ZooKeeper cluster.The following is an example of connecting to a specific three-node ZooKeeper cluster using TLS/SSL:
CLIENT_JVMFLAGS="-Dzookeeper.clientCnxnSocket=org.apache.zookeeper.ClientCnxnSocketNetty -Dzookeeper.ssl.keyStore.location=[***PATH TO YOUR CONFIGURED KEYSTORE***] -Dzookeeper.ssl.keyStore.password=[***PASSWORD YOU CONFIGURED FOR KEYSTORE***]  -Dzookeeper.ssl.trustStore.location=[***path to your configured truststore***] -Dzookeeper.ssl.trustStore.password=[***the password you configured for the truststore***] -Dzookeeper.client.secure=true" zookeeper-client -server [***your.zookeeper.server-1***]:2182,[***your.zookeeper.server-2***]:2182,[***your.zookeeper.server-3***]:2182
TLS v1.3 Support for CDP in Zookeeper
ZooKeeper does not support TLS v1.3.
To configure TLS v1.3, add the following properties in the Server Advanced Configuration Snippet (Safety Valve) for zoo.cfg file.
ssl.protocol=TLSv1.3
ssl.enabledProtocols=TLSv1.3,TLSv1.2
ssl.ciphersuites=TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_E
CDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,TLS_DHE_RSA_WITH_
AES_128_GCM_SHA256,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256