Transparent Encryption Recommendations for Cloudera Data Explorer (Hue)

Make /user/hue an encryption zone because Oozie workflows and other Data Explorer-specific data are stored there by default. When you create the encryption zone, name the key hue-key to take advantage of auto-generated KMS ACLs.

Steps

On a cluster without Data Explorer currently installed, create the /user/hue directory and make it an encryption zone.

On a cluster with Data Explorer already installed:

  1. Create an empty /user/hue-tmp directory.
  2. Make /user/hue-tmp an encryption zone.
  3. DistCp all data from /user/hue into /user/hue-tmp.
  4. Remove /user/hue and rename /user/hue-tmp to /user/hue.

KMS ACL Configuration for Cloudera Data Explorer (Hue)

In the KMS ACLs, grant the hue and oozie users and groups DECRYPT_EEK permission for the Data Explorer key:

<property>
  <name>key.acl.hue-key.DECRYPT_EEK</name>
  <value>oozie,hue oozie,hue</value>
</property>