Generating Certificates After Initial Installation

Describes how to generate a ssl_keystore file during or after initial installation.

When you run the configure.sh script at initial installation, but do not specify the -genkeys option, the script generates a ssl_keystore file for use by the web server for the MapR Control system. When the configure.sh script is run with the -genkeys option after initial installation, the system detects the existing ssl_keystore file and exits with an error to prevent inadvertent deletion or reuse of the ssl_keystore file. The error message will look similar to the following example:

/opt/mapr/server/configure.sh
-secure -genkeys -C $CLDB_GRP -Z $ZK_GRP -RM $RM -HS
$HISTORYSERVER
<hostname1>: Configuring Hadoop-2.x at
/opt/mapr/hadoop/hadoop-2.x
<hostname1>: Done configuring Hadoop
<hostname1>: CLDB node list:
<hostname1>:7222,<hostname2>:7222,<hostname3>:7222

<hostname1>: Zookeeper node
list: <hostname1>:5181,<hostname2>:5181,<hostname3>:5181

<hostname1>: Node setup configuration: cldb fileserver
historyserver nfs nodemanager resourcemanager webserver
zookeeper
<hostname1>: Log can be found at:
/opt/mapr/logs/configure.log
<hostname1>: /opt/mapr/conf/ssl_keystore already exists
<hostname1>: ERROR: could not generate ssl keys. See log file
for more details
clush: <hostname1>: exited with exit code 1

On clusters without security features enabled, the contents of the ssl_keystore file are unique to each node. In this case, manually delete the ssl_keystore file on each node, then run the command configure.sh -genkeys.

On clusters where you have customized the contents of the ssl_keystore file, run the command configure.sh -genkeys -nocerts to preserve your customizations.

For general information on security tickets and certificates, see Tickets and Certificates.