Using Custom DNS with Auto-TLS on AWS

When you use Cloudera Director to deploy Cloudera Manager and launch CDH clusters in AWS, Amazon assigns private IP addresses and generates private DNS names for the EC2 instances. Cloudera Director uses these to communicate with the EC2 instances in the cluster. Depending on the needs and policies of your organization, you can configure the following custom DNS settings:
  • Custom private DNS names for your EC2 instances. Use of custom private DNS names requires also configuring a custom DNS server (or Amazon Route 53).
  • A custom DNS server, instead of the Amazon-provided DNS server on the VPC.

Cloudera Director 2.6 and above supports auto-TLS, as described in Enabling TLS with Cloudera Director, including auto-TLS with custom configurations for hostnames and DNS servers. The following sections describe how to use custom DNS settings with auto-TLS.

How Cloudera Director and Cloudera Manager Communicate with Cluster Instances

When working with the AWS DNS settings for EC2 instances created and managed by Cloudera Director, it is useful to understand how Cloudera Director and Cloudera Manager access the instances in a cluster on AWS. Whether or not you are using auto-TLS affects the way Cloudera Director configures Cloudera Manager to communicate among the instances.

How Cloudera Manager Communicates with Cluster Instances

  • When auto-TLS is not used, Cloudera Manager accesses cluster instances through their private IP address.
  • When auto-TLS is used, Cloudera Manager uses private hostnames, as well as IP addresses, to access the instances. Specifically, Cloudera Manager uses private hostnames to configure the Cloudera Manager agents on the EC2 instances. This is because TLS certificates will be generated using the hostname, and then used for secure communications between Cloudera Manager and the cluster.

How Cloudera Director Communicates with Cluster Instances

  • Regardless of whether or not auto-TLS is used, Cloudera Director uses the IP addresses and hostnames provided by the AWS metadata service to connect via SSH into the cluster instances. When custom hostnames have been configured on the instances, the hostname will not match the name provided by the AWS metadata service.
  • In a cross-region, cross-VPC, or cross-cloud-provider configuration, Cloudera Director will use the private IP address if it is available, and will fall back on the private hostname, public IP address or hostname, in that order, if it is not. For more information on these configurations, see Running Cloudera Director and Cloudera Manager in Different Regions or Clouds

Using Custom DNS Names and Auto-TLS

When users configure their own custom hostnames, the AWS metadata service does not update its record of cluster hostnames, so the hostname on the instance level is different from the hostname on the cloud provider level.

There are two parts to configuring a custom DNS name in AWS:
  • Configuring a custom domain name
  • Configuring a custom hostname

Configuring a Custom Domain Name in AWS

The domain name is the second part of a DNS name. In the example, the domain name is To specify a value for the domain name to be used in the VPC, follow these steps:
  1. Create a new DHCP options set.
  2. Set the domain name in the DHCP options set for the VPC.
  3. Set the IP address of the DNS server in the Domain name servers field of the DHCP option set for the VPC.
  4. Set enableDnsSupport to false so that the Amazon-provided DNS server in the VPC is not enabled.
  5. Set up your own DNS server (or Amazon Route 53).
  6. Add a record for your domain name to your custom DNS server (or Amazon Route 53).
You can use the Amazon-provided hostname with your custom domain name, for example,

Configuring a Custom Hostname in AWS

The hostname is the first part of a DNS name. In the example, the hostname is ip-10-1-2-3.
  1. Set up the hostname. There are many ways to do this, for example, through your AMI, user data, orchestration framework (such as Chef or Ansible), or bootstrap scripts.
  2. Add a record for your hostname to your custom DNS (or Route 53).

Using a Custom DNS Server and Auto-TLS

You can configure a custom DNS server by entering its IP address in the DHCP options set for the VPC. If you use your own DNS server, ensure that the server can resolve hostnames in the Amazon standard format, ip-x-x-x-x, or change the name on the host to a name that the DNS server can resolve. You can either pre-populate your DNS server with the expected names, or use a tool like nsupdate to register the hosts in the DNS server as they come up.

To specify a custom DNS server, follow these steps::
  1. In the AWS Admin Console, choose VPC.
  2. Disable the Amazon-provided DNS server in the VPC by setting enableDnsSupport to false.
    1. In the VPC dashboard, select the VPC you are using.
    2. In the Actions dropdown, click Edit DNS Resolution.
    3. Set the value to No.
  3. In the left hand pane, click DHCP Options sets.
  4. Click Create DHCP options set.
  5. Enter the IP address of your domain name server in the Domain Name Servers field.
  6. Optionally, configure other fields in the DHCP options set and click Create DHCP options set.
  7. In the VPC settings, specify the new DHCP options set for your VPC.
  8. Configure your DNS server to accept updates, if possible. If you do not want your DNS server to accept updates (for example, because of your organization's security policies), configure the DNS server with hostnames before launching the cluster. Work with your infrastructure team to ensure that the hostnames you will use are added to your DNS server.

Whether your domain names use the auto-generated format used by AWS or you create a custom hostname in a format unique to your instances, you need to ensure that your custom DNS server can resolve the cluster hostnames. There are a number of ways to do this: by using a script, by adapting the scripts on the Cloudera GitHub site that were created for Microsoft Azure, or by manual configuration, or by using an orchestration framework, such as Chef or Ansible.

Using a Custom DNS Server on Cloudera Director 2.6 or 2.7.0

With Cloudera Director 2.6 or 2.7.0, you can use your own DNS server as long as your private hostnames use exactly the same format as the Amazon-generated DNS names use, so that there is no difference in DNS names retrieved from the AWS metadata and the DNS names stored in your DNS server. You must register these DNS names in your DNS server.
  • The format of an AWS-generated private hostname is ip- followed by digits derived from the private IP address of the instance, with dashes in place of the periods, for example:
  • The domain name part of an AWS-generated private DNS name depends on the enableDnsHostnames and enableDnsSupport settings in the VPC.
    • If either of those are set to false, the domain name will be whatever is specified in the DHCP options set. The default domain name value in the DHCP options set is ec2.internal in region us-east-1, and region.compute.internal in all other regions. If you enter a domain name value in the DHCP options set (typically something like, the value you enter will be used, instead.
    • If the enableDnsHostnames and enableDnsSupport settings in the VPC both are true, then the domain name will be the default value, either ec2.internal in region us-east-1 or region.compute.internal in all other regions.
    Using the hostname example above, a typical DNS name would be: