Configuring TLS/SSL for Solr
Minimum Required Role: Configurator (also provided by Cluster Administrator, Full Administrator)
Before You Begin
- The Solr service must be running.
- Keystores for Solr must be readable by the solr user. This could be a copy of the Hadoop services' keystore with permissions 0440 and owned by the solr group.
- Truststores must have permissions 0444 (that is, readable by all).
- Specify absolute paths to the keystore and truststore files. These settings apply to all hosts on which daemon roles of the Solr service run. Therefore, the paths you choose must be valid on all hosts.
- In case there is a DataNode and a Solr server running on the same host, they can use the same certificate.
Additional Considerations when Configuring TLS/SSL for Solr HA
To allow clients to talk to Solr servers (the target servers) through the load balancer using TLS/SSL, Configure the load balancer for TLS/SSL pass-through, which means the load balancer does not perform encryption/decryption but simply passes traffic from clients and servers to the appropriate target host. See documentation for your load balancer for details.
Configuring TLS/SSL for Solr Using Cloudera Manager
The steps for configuring and enabling Hadoop TLS/SSL for Search are as follows:
- Open the Cloudera Manager Admin Console and go to the Solr service.
- Click the Configuration tab.
- Select .
- Select .
- In the Search field, type TLS/SSL to show the Solr TLS/SSL properties.
- Edit the following properties according to your cluster configuration.
Solr TLS/SSL Properties Property Description Enable TLS/SSL for Solr Check this field to enable SSL for Solr. Solr TLS/SSL Server Keystore File Location The path to the TLS/SSL keystore file containing the server certificate and private key used for TLS/SSL. Used when Solr is acting as a TLS/SSL server. The keystore must be in JKS format. Solr TLS/SSL Server JKS Keystore File Password Password for the Solr JKS keystore. Solr TLS/SSL Certificate Trust Store File Required in case of self-signed or internal CA signed certificates. The location on disk of the truststore, in .jks format, used to confirm the authenticity of TLS/SSL servers that Solr might connect to. This is used when Solr is the client in a TLS/SSL connection. This truststore must contain the certificate(s) used to sign the service(s) being connected to. If this parameter is not provided, the default list of well-known certificate authorities is used instead. Solr TLS/SSL Certificate Trust Store Password The password for the Solr TLS/SSL Certificate Trust Store File. This password is not required to access the truststore: this field can be left blank. This password provides optional integrity checking of the file. The contents of truststores are certificates, and certificates are public information. - Enter a Reason for change, and then click Save Changes to commit the changes.
- Restart the service.
Additional Considerations When Using a Load Balancer TLS/SSL for Solr HA
To configure a load balancer:
- Go to the Solr service.
- Click the Configuration tab.
- Select .
- Enter the hostname and port number of the load balancer in the Solr Load Balancer property in the format hostname:port number.
- Enter a Reason for change, and then click Save Changes to commit the changes.
- Restart Solr and any dependent services or restart the entire cluster for this configuration to take effect.
Configuring TLS/SSL for the Key-Value Store Indexer Using Cloudera Manager
The steps for configuring and enabling Hadoop TLS/SSL for the Keystore Indexer are as follows:
- Open the Cloudera Manager Admin Console and go to the Key-Value Store Indexer.
- Click the Configuration tab.
- Select .
- Select .
- In the Search field, type TLS/SSL to show the Solr TLS/SSL properties.
- Edit the following TLS/SSL properties according to your cluster configuration.
Key-Value Store TLS/SSL Properties Property Description HBase Indexer TLS/SSL Certificate Trust Store File The location on disk of the truststore, in .jks format, used to confirm the authenticity of TLS/SSL servers that HBase Indexer might connect to. This is used when HBase Indexer is the client in a TLS/SSL connection. This truststore must contain the certificate(s) used to sign the service(s) being connected to. If this parameter is not provided, the default list of well-known certificate authorities is used instead. HBase Indexer TLS/SSL Certificate Trust Store Password (Optional) The password for the HBase Indexer TLS/SSL Certificate Trust Store File. This password is not required to access the truststore: this field can be left blank. This password provides optional integrity checking of the file. The contents of truststores are certificates, and certificates are public information. - Restart the service.
Configuring TLS/SSL for Flume Using Cloudera Manager
The steps for configuring and enabling Hadoop TLS/SSL for Flume are as follows:
- Open the Cloudera Manager Admin Console and go to Flume.
- Click the Configuration tab.
- Select .
- Select .
- In the Search field, type TLS/SSL to show the properties.
- Edit the following SSL properties according to your cluster configuration.
Key-Value Store SSL Properties Property Description Flume TLS/SSL Certificate Trust Store File The location on disk of the truststore, in .jks format, used to confirm the authenticity of TLS/SSL servers that Flume might connect to. This is used when Flume is the client in a TLS/SSL connection. This truststore must contain the certificate(s) used to sign the service(s) being connected to. If this parameter is not provided, the default list of well-known certificate authorities is used instead. Flume TLS/SSL Certificate Trust Store Password (Optional) The password for the Flume TLS/SSL Certificate Trust Store File. This password is not required to access the truststore: this field can be left blank. This password provides optional integrity checking of the file. The contents of truststores are certificates, and certificates are public information. - Enter a Reason for change, and then click Save Changes to commit the changes.
- Restart the service.