You must create the Hue Truststore by consolidating certificates of all SSL-enabled
servers (or a single CA Certificate chain) that Hue communicates with into one file. This
generally includes certificates of all the Oozie, HDFS, MapReduce, and YARN daemons, and any
other SSL-enabled services.
Server certificates are stored in Java KeyStore (JKS) format. The Hue Truststore must be in
the Privacy Enhanced Mail (PEM) format whereas other services use the JKS format by default.
To create the Hue truststore, extract each certificate from Hadoop's Java Keystore with the
Java keytool, convert the certificate to PEM format with the OpenSSL.org
openssl tool, and then add it to the Hue truststore:
-
Extract the certificate from the keystore of each TLS/SSL-enabled server with
which Hue communicates. For example, if you have
hadoop-server.keystore that contains a server certificate,
foo-1.example.com with a password of
example123, you would use the following keytool
command:
keytool -exportcert -keystore hadoop-server.keystore -alias foo-1.example.com -storepass example123 -file foo-1.cert
-
Convert each certificate into a PEM file. Here is what the
openssl
tool command looks like for the foo-1.cert file that was extracted in
Step 1:
openssl x509 -inform der -in foo-1.cert > foo-1.pem
-
Concatenate all the PEM certificates you extracted and converted from the server
truststore into one PEM file:
cat foo-1.pem foo-2.pem foo-n.pem ... > hue_truststore.pem
Concatenate the certificate files in the following order: SSL certificate followed by
intermediate certificate, followed by the root CA certificate.
-
Log in to Cloudera Manager as an Administrator.
-
Go to and add the following line in the Hue Service Environment
Advanced Configuration Snippet (Safety Valve) field:
REQUESTS_CA_BUNDLE=[***PATH-TO-HUETRUST.PEM-FIL E***]
-
Click Save Changes.
-
Restart the Hue service.