Rotating database certificates when SSL enforcement is disabled
If the Data Lake for your environment or your Cloudera Data Hub cluster is using an RDS where SSL enforcement is disabled, no action is required on your side. You can simply let the root certificate expire and be replaced by AWS upon expiry.
It is recommended to check SSL enforcement setting on the Data Lake of your environment and separately for each Cloudera Data Hub cluster.
A Data Lake or a Cloudera Data Hub using an RDS that is shown as SSL Disabled are essentially immune to the validity of the RDS root certificate. This is because DB connections made from Cloudera cluster services do not explicitly validate the certificate chain received from the RDS instance in such cases. The AWS RDS instance may, therefore, be left as is safely, letting its root certificate expire and be replaced automatically by AWS upon the expiry date.
Alternatively, you can instead opt to change the RDS root certificate manually using standard AWS tools like the AWS RDS Console or the AWS CLI, as described in Updating your CA certificate by modifying your DB instance or cluster in the AWS documentation.
rds-ca-rsa2048-g1
, which is valid for 40 yearsrds-ca-rsa4096-g1
, which is valid for 100 yearsrds-ca-ecc384-g1
, which is valid for 100 years
Cloudera does not provide automation for the rotation of the RDS root certificate for databases where SSL enforcement is disabled.