What's new in Cloudera Data Services on premises 1.5.5 SP2
Learn about the new functionalities and feature improvements in Cloudera Data Services on premises 1.5.5 SP2.
Certificate Management support for OpenShift Container Platform (OCP)
Cert-manager is an open-source tool for Kubernetes that automates the provisioning, management, and renewal of TLS certificates. Its documentation at Certificate Management provides comprehensive guidance on installing, configuring, and using cert-manager to secure workloads with trusted X.509 certificates. Cloudera provides out-of-the-box support for Venafi Trust Protection Platform (TPP) as part of the Cloudera Embedded Container Service and OCP installation. By integrating cert-manager, the Data services achieve secure communication, reduced manual overhead, and compliance with security standards, leveraging its robust automation and flexibility. For more information on setting Cert-manager using Venafi TPP, see Setting up Certification Manager using Venafi TPP.
Custom Annotation Support in Certificate Manager
When Venafi TPP (Trust Protection Platform) requires a custom mandatory field to be
included in all certificate issuance API requests, Custom Annotation
Support in Certificate Manager feature enables support for custom
annotation fields defined in the Venafi ClusterIssuer with their
specified values. It automatically injects the required Venafi custom field
annotations (venafi.cert-manager.io/custom-fields) into
CertificateRequest objects at creation, ensuring they are
included in all Venafi certificate issuance API calls. Annotations with dynamic
values—such as those generated from environment variables or the cluster name—are
not supported.
NBKID with the
value ADFS:1234554321 to the ClusterIssuer named
tpp-issuer-e2e-lbd60c, use the following
command:kubectl patch clusterissuer tpp-issuer-e2e-lbd60c --type='merge' -p
'{"metadata":{"annotations":{"venafi.cert-manager.io/custom-fields":"[{\"name\":\"NBKID\",\"value\":\"ADFS:1234554321\"}]"}}}'For
more information, see Setting up Certification Manager using Venafi
TPPAdded Dedicated CDE Node and Dedicated CAI Infra Node to run on the dedicated Cloudera Embedded Container Service node
Under the node_taint property on the Cloudera Embedded Container Service
Host Configuration page, the following options are added in
1.5.5 SP2:
- Dedicated CDE Node for Data Engineering services (available only if Cloudera Embedded Container Service version is 1.5.5 SP2 or later). If selected, the host is reserved exclusively for all CDE-related services and workloads.
- Dedicated CAI Infra Node for CAI infrastructure services (available only if Cloudera Embedded Container Service version is 1.5.5 SP2 or later). If selected, the host is allocated exclusively for CAI infrastructure services.
For more information, see Adding Dedicated CDE and CAI node.
Added reflector to continuously mirror secrets from openshift-ingress to istio-ingress namespace
In the Ingress Certificate Secret Synchronization section, enter the name of the TLS secret located in the openshift-ingress namespace into the OpenShift Ingress Secret Name field. This is the default certificate used by the OpenShift cluster, and it will be used by the Istio ingress for TLS termination.
For more information, see Ingress Certificate Secret Synchronization
