Configuring SSL/TLS certificate exchange between two Cloudera Manager
instances
The Replication Manager configures replication peers between two clusters before
running the replication job. You can manually set up an SSL/TLS certificate exchange between
two Cloudera Manager instances that manage source and target cluster
respectively. Replication Manager uses this information to set up the peers for secure data
replication.
Replication Manager supports Cloudera Manager high availability
functionality only after you manually configure the SSL/TLS certificate exchange.
When
the source Cloudera Manager is configured for high availability
and is Auto-TLS enabled, the certificate exchange is initiated from the source
cluster to the target cluster where the certificate is exported from the load
balancer node of the source cluster.
Go to the truststore location in source
Cloudera Manager, and perform the following steps:
List the contents of the keystore file and password using the
[***keytool path***] -list
-keystore [***truststore JKS file location ***]
-storepass [***truststore
password***] command.
For example, /usr/lib/jvm/java-openjdk-11/bin/keytool -
list -keystore
/var/lib/cloudera-scm-agent/agent-cert/cm-auto-global_truststore.jks
-storepass [***truststore
password***]
Export the certificate contents in the host to a file using the
[***keytool***] -exportcert
-keystore [***truststore JKS file location
***] -alias
[***cm_alias_on_src_cm***] -file
./[***TXT file, for example:
source-cert.txt***] -storepass
[***truststore_password***]
command.
Copy the text file to all the hosts of the target cluster
Cloudera Manager securely using the scp
-i [***PEM file***][***TXT file - source-cert.txt***]
root@[***host_ip***]:/home/
command.
The PEM file that you use in the scp command is the
PEM file that you use to ssh login to the target cluster. Ensure that
you add the PEM file in the source Cloudera Manager host before you run
the scp command to copy the certificate from the
source Cloudera Manager to all the target hosts in TXT format.
Import the certificate into the keystore file on all the hosts of the
target cluster Cloudera Manager using
the [***keytool***] -importcert -noprompt
-v -trustcacerts -keystore [***truststore JKS file location
***] -alias
[***cm_alias_on_dest_cm***] -file
./[***TXT file - source-cert.txt***]
--storepass
[***truststore_password***]
command.
For example, /usr/java/default/bin/keytool -importcert
-noprompt -v -trustcacerts -keystore
/var/lib/cloudera-scm-agent/agent-cert/cm-auto-global_truststore.jks
-alias cmrootca-1 -file ./source-cert.txt --storepass
[***truststore_password***]
Go to the truststore location in target
Cloudera Manager, and perform the following steps:
List the contents of the keystore file and password using the
[***keytool path***] -list
-keystore [***truststore JKS file location ***]
-storepass [***truststore
password***] command.
Export the certificate contents in the host to a file using the
[***keytool***] -exportcert
-keystore [***truststore JKS file location ***]
-alias [***cm_alias_on_dest_cm***] -file
./[***TXT file, for example:
dest-cert.txt***] -storepass
[***truststore_password***]
command.
Copy the text file to all the hosts of the source cluster
Cloudera Manager securely using the scp
-i [***PEM file***][***TXT file - dest-cert.txt***]
root@[***host_ip***]:/home/
command.
Import the certificate into the keystore file on all the hosts of the
source
Cloudera Manager using the
[***keytool***] -importcert
-noprompt -v -trustcacerts -keystore [***truststore JKS
file location ***] -alias
[***cm_alias_on_src_cm***] -file
./[***TXT file - dest-cert.txt***]
--storepass
[***truststore_password***]
command.
Import the S3G CA certificate from the cluster to the local JDK path using the
following commands:
Run the keytool -importkeystore -destkeystore
[***jdk_cacerts_location***] -srckeystore
[***cm-auto-global_truststore.jks
location***] -srcalias
[***cm_alias_on_src_cm***]
command on all the hosts of the source
Cloudera Manager.
For example, keytool -importkeystore -destkeystore
/usr/java/default/lib/security/cacerts -srckeystore
/var/lib/cloudera-scm-agent/agent-cert/cm-auto-global_truststore.jks
-srcalias cmrootca-0
Run the following commands on all the hosts of the targetCloudera Manager: