Configure TLS encryption manually for Phoenix Query Server
You can encrypt communication between clients and the Phoenix Query Server using Transport Layer Security (TLS) formerly known as Secure Socket Layer (SSL). You must follow these steps to manually configure TLS for Phoenix Query Server.
- Keystores containing certificates bound to the appropriate domain names must be accessible on all hosts running the Phoenix Query Server role of the Phoenix service.
- Keystores for Phoenix must be owned by the phoenix group, and have 0440 file permissions (that is, the file must be readable by the owner and group).
- Absolute paths to the keystore and truststore files must be specified. These settings apply to all hosts on which daemon roles of the Phoenix service run. Therefore, the paths you choose must be valid on all hosts.
- The Cloudera Manager version must support the TLS/SSL configuration for Phoenix
at the service level. Ensure you specify absolute paths to the keystore and
truststore files. These settings apply to all hosts on which daemon roles of the
service in question run. Therefore, the paths you choose must be valid on all
hosts.
An implication of this is that the keystore file names for a given service must be the same on all hosts. If, for example, you have obtained separate certificates for Phoenix daemons on hosts
node1.example.com
andnode2.example.com
, you might have chosen to store these certificates in files calledphoenix-node1.keystore
andphoenix-node2.keystore
(respectively). When deploying these keystores, you must give them both the same name on the target host — for example,phoenix.keystore
.