Categories

Versions

Configuring Radoop Proxy Security

Radoop makes it possible to connect to the Hadoop cluster via the Radoop Proxy service. This guide explains how to establish secured connections between Altair AI Studio and Radoop Proxy.

Creating a secure Radoop Proxy Connection

If you aim to establish an SSL-encrypted Radoop Proxy connection, please take the following steps:

On a secured Cloudera cluster (default) Radoop Proxy install will enable ssl. The installation automatically issues a certificate for the Proxy. This certificate is signed by the cluster root CA.

Make sure to place the cluster root CA inside your Altair AI Studio home following this guide.

To create a secure proxy connection, create a new Radoop Proxy Connection from Altair AI Studio.

../img/radoop-proxy-connection-sslempty.png

Provide the location of Radoop Proxy server and Altair AI Hub credentials, check Use SSL and leave the Keystore file and Keystore password fields empty.

Click test Test connection to check whether the Radoop Proxy connection was configured correctly.

  1. Find and open the proxy configuration file, which is located at radoop-proxy/proxy.properties in the Radoop Proxy installation directory by default.

  2. To enable SSL connections, sslEnabled=true property setting is required. Furthermore, you have to define the private key by uncommenting (remove # character) and setting the following lines, like:

    • keystorePath=<keystore_file>
    • keystorePassword=<private_keypass>
  3. Create a new Radoop Proxy Connection from Altair AI Studio.

    ../img/radoop-proxy-connection-sslempty.png

    Provide the location of Radoop Proxy server and Altair AI Hub credentials, check Use SSL and leave the Keystore file and Keystore password fields empty.

Click test Test connection to check whether the Radoop Proxy connection was configured correctly.

  1. Generate the keystores. Run the following commands (for further customization parameters, see Oracle documentation).

    keytool -genkeypair -alias server -keyalg RSA -keypass <private_keypass> -storepass <private_keypass> -keystore server-keystore.jks
        
    keytool -exportcert -alias server -storepass <private_keypass> -file server.cer -keystore server-keystore.jks
        
    keytool -importcert -v -trustcacerts -alias server -file server.cer -keystore client-trust-keystore.jks -keypass <public_keypass> -storepass <public_keypass>
        
    rm server.cer
    

    Note down all passwords, as they will be needed in the following steps.

  2. Find and open the proxy configuration file, which is located at radoop-proxy/proxy.properties in the Radoop Proxy installation directory by default.

  3. To enable SSL connections, sslEnabled=true property setting is required. Furthermore, you have to define the generated private key of Radoop Proxy by uncommenting (remove # character) and setting the following lines, like:

    • keystorePath=keystore.jks
    • keystorePassword=<private_keypass>

    Use the same password (<private_keypass>) that you provided in Step 1.

  4. Create a new Radoop Proxy Connection from Altair AI Studio.

    ../img/radoop-proxy-connection.png

    Provide the location of Radoop Proxy server and Altair AI Hub credentials. Check Use SSL, and fill in the required fields:

    • Keystore file: Insert the private keystore file (client-trust-keystore.jks) location here.
    • Keystore password: Type in the <public_keypass> used in Step 1.

Click test Test connection to check whether the Radoop Proxy connection was configured correctly.