barbaravaldez d4b6445a97 add cu14 3 years ago
..
cer001-create-root-ca.ipynb d4b6445a97 add cu14 3 years ago
cer002-download-existing-root-ca.ipynb d4b6445a97 add cu14 3 years ago
cer003-upload-existing-root-ca.ipynb d4b6445a97 add cu14 3 years ago
cer004-download-upload-existing-root-ca.ipynb d4b6445a97 add cu14 3 years ago
cer005-install-existing-root-ca.ipynb d4b6445a97 add cu14 3 years ago
cer010-install-generated-root-ca-locally.ipynb d4b6445a97 add cu14 3 years ago
cer020-create-management-service-proxy-cert.ipynb d4b6445a97 add cu14 3 years ago
cer021-create-knox-cert.ipynb d4b6445a97 add cu14 3 years ago
cer022-create-app-proxy-cert.ipynb d4b6445a97 add cu14 3 years ago
cer023-create-master-certs.ipynb d4b6445a97 add cu14 3 years ago
cer024-create-controller-cert.ipynb d4b6445a97 add cu14 3 years ago
cer025-upload-management-service-proxy-cert.ipynb d4b6445a97 add cu14 3 years ago
cer026-upload-knox-cert.ipynb d4b6445a97 add cu14 3 years ago
cer027-upload-app-proxy-cert.ipynb d4b6445a97 add cu14 3 years ago
cer028-upload-master-certs.ipynb d4b6445a97 add cu14 3 years ago
cer029-upload-controller-cert.ipynb d4b6445a97 add cu14 3 years ago
cer030-sign-service-proxy-generated-cert.ipynb d4b6445a97 add cu14 3 years ago
cer031-sign-knox-generated-cert.ipynb d4b6445a97 add cu14 3 years ago
cer032-sign-app-proxy-generated-cert.ipynb d4b6445a97 add cu14 3 years ago
cer033-sign-master-generated-certs.ipynb d4b6445a97 add cu14 3 years ago
cer034-sign-controller-generated-cert.ipynb d4b6445a97 add cu14 3 years ago
cer040-install-service-proxy-cert.ipynb d4b6445a97 add cu14 3 years ago
cer041-install-knox-cert.ipynb d4b6445a97 add cu14 3 years ago
cer042-install-app-proxy-cert.ipynb d4b6445a97 add cu14 3 years ago
cer043-install-master-certs.ipynb d4b6445a97 add cu14 3 years ago
cer044-install-controller-cert.ipynb d4b6445a97 add cu14 3 years ago
cer050-wait-cluster-healthy.ipynb d4b6445a97 add cu14 3 years ago
cer100-create-root-ca-install-certs.ipynb d4b6445a97 add cu14 3 years ago
cer101-use-root-ca-install-certs.ipynb d4b6445a97 add cu14 3 years ago
cer102-use-bdc-ca-install-certs.ipynb d4b6445a97 add cu14 3 years ago
cer103-upload-install-certs.ipynb d4b6445a97 add cu14 3 years ago
readme.md d4b6445a97 add cu14 3 years ago

readme.md

A set of notebooks used for Certificate Management

The notebooks in this chapter can be used to create a self-signed root certificate authority (or allow for one to be uploaded), and then use that root CA to create and sign certificates for each external endpoint in a Big Data Cluster.

After running the notebook in this chapter, and installing the Root CA certificate locally, all connections to the Big Data Cluster can be made securely (i.e. the internet browser will indicate "This Connection is Secure"). The following notebook can be used to install the Root CA certificate locally on this machine.

  • CER010 - Install generated Root CA locally

Run the notebooks in a sequence

These two notebooks run the required notebooks in this chapter in a sequence in a single 'run all cells' button press.

  • CER100 - Configure Cluster with Self Signed Certificates
  • CER101 - Configure Cluster with Self Signed Certificates using existing Root CA

The first notebook (CER100) will first generate a Root CA certificate. The 2nd notebook (CER101) will use an already existing Root CA downloaded and upload using:

  • CER002 - Download existing Root CA certificate
  • CER003 - Upload existing Root CA certificate

Details

  • By default, the Big Data Cluster cluster generates its own Root CA certificate and all the certificates used inside the cluster are signed with this Root CA certificate. External clients connecting to cluster endpoints will not have this internal Root CA installed and this leads to the certificate verification related warnings on clients (internet browsers etc.) and the need to use the --insecure option with tools like CURL.

  • It is better if the certificates for the external endpoints in the Big Data Cluster can be provided and installed in the containers hosting the endpoint services, most preferably using your own trusted CA to sign these certificates and then install the CA chain inside the cluster. The notebooks in this chapter aid in this process by creating a self-signed Root CA certificate and then creating certificates for each external endpoint signed by the self-signed Root CA certificate.

  • The openssl certificate tracking database is created in the controller in the /var/opt/secrets/test-certificates folder. Here a record is maintained of each certificate that has been issued for tracking purposes.

Home

Notebooks in this Chapter