Learn about installing Navigator Encrypt, setting up TLS certificates on a Navigator
Encrypt client, entropy requirements , and uninstalling and reinstalling NavEncrypt.
You must create an internal repository to install or upgrade Navigator Encrypt. For
instructions on creating internal repositories (including Cloudera Manager,
CDH, and Cloudera Navigator encryption components), see Configuring a Local Package Repository.
Installing Navigator Encrypt (RHEL-Compatible)🔗
Learn how to install RHEL compatible Navigator Encrypt. The steps below show an
example of how to install NavEncrypt on a cluster running Red Hat Linux.
Install the EPEL Repository.
Dependent packages are available through the Extra Packages for Enterprise Linux
(EPEL) repository. To install the EPEL repository, install the
epel-release package. The EPEL repository for each release of RHEL
is different ,so confirm the host is set up correctly.
Install the NavEncrypt Repository.
mkdir -p /root/navencrypt-repo
Fetch the NavEncrypt repository from the Cloudera
download site, for example: wget
https://archive.cloudera.com/p/navencrypt7/7.1.9.1000/rhel8/navigator-encrypt-7.1.9.1000-el8.tar.gz
tar -zxvf navigator-encrypt-7.1.9.1000-el8.tar.gz --directory
/root/navencrypt-repo
Create and edit file /etc/yum.repos.d/navencrypt-repo:
For Navigator Encrypt to run as a kernel module, you must download and install the
kernel development headers. Each kernel module is compiled specifically for the
underlying kernel version. Running as a kernel module allows Navigator Encrypt to
provide high performance and complete transparency to user-space applications.
To determine your current kernel version, run uname -r.
To install the development headers for your current kernel version,
run:
With some versions of RHEL and CentOS, because of a broken dependency, you must
manually install the dkms package. To do this ,you must locate a repo
that has a version of dkms that is compatible with the version of RHEL the host is
running.
Install the Navigator Encrypt client using the yum package
manager:
sudo yum install navencrypt
If you attempt to install navencrypt-kernel-module with incorrect or missing kernel
headers, you see a message like the
following:
Building navencryptfs 3.8.0 DKMS kernel module...
#################### BUILDING ERROR ####################
Creating symlink /var/lib/dkms/navencryptfs/3.8.0/source ->
/usr/src/navencryptfs-3.8.0
DKMS: add completed.
Error! echo
Your kernel headers for kernel 3.10.0-229.4.2.el7.x86_64 cannot be found at
/lib/modules/3.10.0-229.4.2.el7.x86_64/build or /lib/modules/3.10.0-229.4.2.el7.x86_64/source.
#################### BUILDING ERROR ####################
Failed installation of navencryptfs 3.8.0 DKMS kernel module !
Learn how to install SLES 12 compatible Navigator Encrypt . The steps below show an
example of installing SLES 12 compatible NavEncrypt, assuming the user is root.
Install the NavEncrypt Repository.
mkdir -p /root/navencrypt-repo
Fetch the NavEncrypt repository from the Cloudera
download site, for example: wget
https://archive.cloudera.com/p/navencrypt7/7.1.9.1000/sles15/navigator-encrypt-7.1.9.1000_sles15.4-0.tar.gz
tar -zxvf navigator-encrypt-7.1.9.1000_sles15.4-0.tar.gz --directory
/root/navencrypt-repo
Create and edit file /etc/zypp/repos.d/navencrypt.repo:
Learn how to install SLES 15 compatible Navigator Encrypt. The following steps show
an example of installing SLES 15 compatible Navigator Encrypt, assuming the user is root.
Install the Navigator Encrypt repository.
Run the following command:
mkdir -p /root/navencrypt-repo
Fetch the Navigator Encrypt repository from the Cloudera download site.
Learn how to install Ubuntu compatible Navigator Encrypt . The steps below show an
example of installing Ubuntu compatible NavEncrypt, assuming the user is root.
Install the NavEncrypt Repository.
mkdir -p /root/navencrypt-repo
Fetch the NavEncrypt repository from the Cloudera
download site, for example: wget
https://archive.cloudera.com/p/navencrypt7/7.1.9.1000/ubuntu/navigator-encrypt-7.1.9.1000-61-ubuntu20.tar.gz
tar -zxvf navigator-encrypt-7.1.9.1000-61-ubuntu20.tar.gz --directory
/root/navencrypt-repo
apt-key add /root/navencrypt-repo/nepub.asc
Install Kernel Headers.
Determine your kernel version by running uname -r, and install the
appropriate
headers:
sudo apt-get install linux-headers-$(uname -r)
apt-get install libkeytrustee4
apt-get install navencrypt-kernel-module
Install the Navigator Encrypt Client.
Install Navigator
Encrypt:
sudo apt-get install navencrypt
Confirm if NavEncrypt is installed.
apt-cache search . | egrep "naven|keytrust"
Installing for Ranger KMS🔗
If you are using Ranger KMS as your Key Management server you need to do the
following:
Generate a valid Kerberos ticket.
There is a utility called navencrypt-gen-keytab that works with Cloudera Manager to create a valid Kerberos ticket.
Start the navencrypt-krb5 service after the keytab file is
generated.
Setting Up TLS for Navigator Encrypt Clients🔗
Transport Layer Security (TLS) certificates are used to secure communication with
Navigator Encrypt. Cloudera recommends using certificates
signed by a trusted Certificate Authority (CA).
If the TLS certificate is signed by an unrecognized CA, such as an internal CA, then you
must add the root certificate to the host certificate truststore of each Navigator Encrypt
client. Be aware that Navigator Encrypt uses the operating system's truststore, which is
distinct from the JDK truststore used by Cloudera Manager.
To set up TLS certificates on a Navigator Encrypt client:
If not already installed, install the CA-certificates:
yum install ca-certificates
Enable the dynamic CA configuration feature:
update-ca-trust enable
Copy the root certificate into the host certificate truststore:
Many cryptographic operations, such as those used with TLS or HDFS encryption, require a
sufficient level of system entropy to ensure randomness; likewise, Navigator
Encrypt needs a source of random numbers to ensure good performance.
Hence, you need to ensure that the hosts running Navigator Encrypt have sufficient
entropy to perform cryptographic operations.
You can check the available entropy on a Linux system by running the following
command:
cat /proc/sys/kernel/random/entropy_avail
The output displays the entropy currently available. Check the entropy several times to
determine the state of the entropy pool on the system. On hosts running a Linux kernel version less than 5.10.119, if the entropy is consistently low (500 or less), you must increase it by installing rng-tools version 4 or higher, and starting the rngd service. On hosts running a Linux kernel version of 5.10.119 or higher the entropy version will be stable at 256, unless there are special entropy requirements in place, no further action is required.
Install rng_tools Using Package Manager🔗
Learn how to install rng_tools using Package Manager.
If version 4 or higher of the rng-tools package is available from the
local package manager (yum), then install it directly from the package
manager. If the appropriate version of rng-tools is unavailable, see
Building rng-tools From Source.
After you have installed rng-tools, start the rngd
daemon by running the following command as
root:
sudo rngd --no-tpm=1 -o /dev/random
For improved performance, Cloudera recommends
configuring Navigator Encrypt to read directly from /dev/random instead
of /dev/urandom.
To configure Navigator Encrypt to use /dev/random as an entropy
source, add --use-random to the navencrypt-prepare
command when you are setting up Navigator Encrypt.
Uninstalling and Reinstalling Navigator Encrypt🔗
Learn how to uninstall and reinstall Navigator Encrypt.
These commands remove the software itself. On RHEL-compatible OSes, the
/etc/navencrypt directory is not removed as part of the uninstallation.
Remove it manually if required.
Reinstalling Navigator Encrypt
After uninstalling Navigator Encrypt, repeat the preceding installation instructions for
your distribution.
When Navigator Encrypt is uninstalled, the configuration files and directories located in
/etc/navencrypt are not removed. Consequently, you do not need to use
the navencrypt register command during reinstallation. If you no longer
require the previous installation configuration information in the directory
/etc/navencrypt, you can remove its contents.
This site uses cookies and related technologies, as described in our privacy policy, for purposes that may include site operation, analytics, enhanced user experience, or advertising. You may choose to consent to our use of these technologies, or