<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Use Knox proxy Secure Hadoop cluster has some question(doesn't match any of the subject alternative names) in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Use-Knox-proxy-Secure-Hadoop-cluster-has-some-question-doesn/m-p/376037#M242743</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/94989"&gt;@Meepoljd&lt;/a&gt;&lt;/P&gt;&lt;P&gt;It seems like the issue is with the certificate. Make sure the certificate is created with fqdn.&lt;/P&gt;&lt;P&gt;The curl command is working because, as you passing --insecure, it ignores invalid and self-signed certificate errors.&lt;/P&gt;</description>
    <pubDate>Wed, 06 Sep 2023 09:12:38 GMT</pubDate>
    <dc:creator>Scharan</dc:creator>
    <dc:date>2023-09-06T09:12:38Z</dc:date>
    <item>
      <title>Use Knox proxy Secure Hadoop cluster has some question(doesn't match any of the subject alternative names)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Use-Knox-proxy-Secure-Hadoop-cluster-has-some-question-doesn/m-p/375013#M242247</link>
      <description>&lt;P&gt;I have a secure hadoop cluster with HDP3.1，&lt;SPAN class="tgt color_text_0"&gt;I recently tried to interconnect this cluster with the Knox component to implement a secure proxy. &lt;SPAN&gt;This cluster has kerberos, Ldap, and https enabled, I create one config like this:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;&amp;lt;topology&amp;gt;
    &amp;lt;gateway&amp;gt;
        &amp;lt;provider&amp;gt;
            &amp;lt;role&amp;gt;authentication&amp;lt;/role&amp;gt;
            &amp;lt;name&amp;gt;ShiroProvider&amp;lt;/name&amp;gt;
            &amp;lt;enabled&amp;gt;true&amp;lt;/enabled&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;main.ldapRealm&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;org.apache.knox.gateway.shirorealm.KnoxLdapRealm&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;main.ldapContextFactory&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;org.apache.knox.gateway.shirorealm.KnoxLdapContextFactory&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;main.ldapRealm.contextFactory&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;$ldapContextFactory&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;main.ldapRealm.userDnTemplate&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;cn=admin,dc=datasw,dc=com&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;main.ldapRealm.contextFactory.url&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;ldap://hdp001.datasw.com:389&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;main.ldapRealm.contextFactory.authenticationMechanism&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;simple&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;urls./**&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;authcBasic&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
        &amp;lt;/provider&amp;gt;
        &amp;lt;provider&amp;gt;
            &amp;lt;role&amp;gt;authentication&amp;lt;/role&amp;gt;
            &amp;lt;name&amp;gt;HadoopAuth&amp;lt;/name&amp;gt;
            &amp;lt;enabled&amp;gt;true&amp;lt;/enabled&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;config.prefix&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;hadoop.auth.config&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;hadoop.auth.config.type&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;kerberos&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;hadoop.auth.config.simple.anonymous.allowed&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;false&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;hadoop.auth.config.token.validity&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;1800&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;hadoop.auth.config.cookie.domain&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;datasw.com&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;hadoop.auth.config.cookie.path&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;gateway/default&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;hadoop.auth.config.kerberos.principal&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;HTTP/hdp003.datasw@DATASW.COM&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;hadoop.auth.config.kerberos.keytab&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;/etc/security/keytabs/spnego.service.keytab&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;hadoop.auth.config.kerberos.name.rules&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;DEFAULT&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;fs.defaultFS&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;hdfs://hdfsCluster&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;dfs.internal.nameservices&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;hdfsCluster&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;dfs.ha.namenodes.hdfsCluster&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;nn1,nn2&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;dfs.nameservices&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;hdfsCluster&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;dfs.namenode.https-address&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;hdp001.datasw:50470&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;dfs.namenode.https-address.hdfsCluster.nn1&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;hdp001.datasw:50470&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
            &amp;lt;param&amp;gt;
                &amp;lt;name&amp;gt;dfs.namenode.https-address.hdfsCluster.nn2&amp;lt;/name&amp;gt;
                &amp;lt;value&amp;gt;hdp002.datasw:50470&amp;lt;/value&amp;gt;
            &amp;lt;/param&amp;gt;
        &amp;lt;/provider&amp;gt;
    &amp;lt;/gateway&amp;gt;
    &amp;lt;service&amp;gt;
        &amp;lt;role&amp;gt;HDFSUI&amp;lt;/role&amp;gt;
        &amp;lt;url&amp;gt;https://hdp002.datasw.com:50470&amp;lt;/url&amp;gt;
    &amp;lt;/service&amp;gt;
&amp;lt;/topology&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;and I copy the hadoop cluster's&amp;nbsp;truststore.jks file to the $GATEWAY_HOME/data/security/keystores/ and set&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;gateway.httpclient.truststore.path param in gateway-stie.xml:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;    &amp;lt;property&amp;gt;
        &amp;lt;name&amp;gt;gateway.httpclient.truststore.path&amp;lt;/name&amp;gt;
        &amp;lt;value&amp;gt;/usr/local/knox/data/security/keystores/truststore.jks&amp;lt;/value&amp;gt;
    &amp;lt;/property&amp;gt;
    &amp;lt;property&amp;gt;
        &amp;lt;name&amp;gt;gateway.httpclient.truststore.type&amp;lt;/name&amp;gt;
        &amp;lt;value&amp;gt;JKS&amp;lt;/value&amp;gt;
    &amp;lt;/property&amp;gt;
    &amp;lt;property&amp;gt;
        &amp;lt;name&amp;gt;gateway.httpclient.truststore.password.alias&amp;lt;/name&amp;gt;
        &amp;lt;value&amp;gt;pthdp&amp;lt;/value&amp;gt;
    &amp;lt;/property&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then I restart the Knox gateway，but w&lt;SPAN class="tgt color_text_0"&gt;hen I access the NameNode webUi, I receive the following error message:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="c"&gt;2023-08-08 11:14:38,050 58fc3dbf-4c6e-4684-860d-0a4e443f85d2 WARN  knox.gateway (DefaultDispatch.java:executeOutboundRequest(183)) - Connection exception dispatching request: https://hdp002.datasw.com:50470/?user.name=admin javax.net.ssl.SSLPeerUnverifiedException: Certificate for &amp;lt;hdp002.datasw.com&amp;gt; doesn't match any of the subject alternative names: []
javax.net.ssl.SSLPeerUnverifiedException: Certificate for &amp;lt;hdp002.datasw.com&amp;gt; doesn't match any of the subject alternative names: []
        at org.apache.http.conn.ssl.SSLConnectionSocketFactory.verifyHostname(SSLConnectionSocketFactory.java:507) ~[httpclient-4.5.13.jar:4.5.13]
        at org.apache.http.conn.ssl.SSLConnectionSocketFactory.createLayeredSocket(SSLConnectionSocketFactory.java:437) ~[httpclient-4.5.13.jar:4.5.13]
        at org.apache.http.conn.ssl.SSLConnectionSocketFactory.connectSocket(SSLConnectionSocketFactory.java:384) ~[httpclient-4.5.13.jar:4.5.13]
        at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142) ~[httpclient-4.5.13.jar:4.5.13]
        at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:376) ~[httpclient-4.5.13.jar:4.5.13]
        at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:393) ~[httpclient-4.5.13.jar:4.5.13]
        at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:236) ~[httpclient-4.5.13.jar:4.5.13]
        at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:186) ~[httpclient-4.5.13.jar:4.5.13]
        at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89) ~[httpclient-4.5.13.jar:4.5.13]
        at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110) ~[httpclient-4.5.13.jar:4.5.13]
        at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185) ~[httpclient-4.5.13.jar:4.5.13]
        at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83) ~[httpclient-4.5.13.jar:4.5.13]
        at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108) ~[httpclient-4.5.13.jar:4.5.13]
        at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:56) ~[httpclient-4.5.13.jar:4.5.13]
        at org.apache.knox.gateway.dispatch.DefaultDispatch.executeOutboundRequest(DefaultDispatch.java:166) ~[gateway-spi-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.dispatch.DefaultDispatch.executeRequest(DefaultDispatch.java:152) ~[gateway-spi-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.dispatch.DefaultDispatch.executeRequestWrapper(DefaultDispatch.java:135) ~[gateway-spi-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.dispatch.DefaultDispatch.doGet(DefaultDispatch.java:300) ~[gateway-spi-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.dispatch.GatewayDispatchFilter$GetAdapter.doMethod(GatewayDispatchFilter.java:183) ~[gateway-spi-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.dispatch.GatewayDispatchFilter.doFilter(GatewayDispatchFilter.java:127) ~[gateway-spi-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.filter.AbstractGatewayFilter.doFilter(AbstractGatewayFilter.java:58) ~[gateway-spi-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.GatewayFilter$Holder.doFilter(GatewayFilter.java:377) ~[gateway-server-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.GatewayFilter$Chain.doFilter(GatewayFilter.java:291) ~[gateway-server-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.identityasserter.common.filter.AbstractIdentityAssertionFilter.doFilterInternal(AbstractIdentityAssertionFilter.java:193) ~[gateway-provider-identity-assertion-common-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.identityasserter.common.filter.AbstractIdentityAssertionFilter.access$000(AbstractIdentityAssertionFilter.java:55) ~[gateway-provider-identity-assertion-common-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.identityasserter.common.filter.AbstractIdentityAssertionFilter$1.run(AbstractIdentityAssertionFilter.java:161) ~[gateway-provider-identity-assertion-common-2.0.0.jar:2.0.0]
        at java.security.AccessController.doPrivileged(Native Method) ~[?:1.8.0_291]
        at javax.security.auth.Subject.doAs(Subject.java:422) ~[?:1.8.0_291]
        at org.apache.knox.gateway.identityasserter.common.filter.AbstractIdentityAssertionFilter.doAs(AbstractIdentityAssertionFilter.java:156) ~[gateway-provider-identity-assertion-common-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.identityasserter.common.filter.AbstractIdentityAssertionFilter.continueChainAsPrincipal(AbstractIdentityAssertionFilter.java:146) ~[gateway-provider-identity-assertion-common-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.identityasserter.common.filter.CommonIdentityAssertionFilter.doFilter(CommonIdentityAssertionFilter.java:241) ~[gateway-provider-identity-assertion-common-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.GatewayFilter$Holder.doFilter(GatewayFilter.java:377) ~[gateway-server-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.GatewayFilter$Chain.doFilter(GatewayFilter.java:291) ~[gateway-server-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.filter.rewrite.api.UrlRewriteServletFilter.doFilter(UrlRewriteServletFilter.java:57) ~[gateway-provider-rewrite-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.filter.AbstractGatewayFilter.doFilter(AbstractGatewayFilter.java:58) ~[gateway-spi-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.GatewayFilter$Holder.doFilter(GatewayFilter.java:377) ~[gateway-server-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.GatewayFilter$Chain.doFilter(GatewayFilter.java:291) ~[gateway-server-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.filter.ShiroSubjectIdentityAdapter$CallableChain$1.run(ShiroSubjectIdentityAdapter.java:93) ~[gateway-provider-security-shiro-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.filter.ShiroSubjectIdentityAdapter$CallableChain$1.run(ShiroSubjectIdentityAdapter.java:90) ~[gateway-provider-security-shiro-2.0.0.jar:2.0.0]
        at java.security.AccessController.doPrivileged(Native Method) ~[?:1.8.0_291]
        at javax.security.auth.Subject.doAs(Subject.java:422) ~[?:1.8.0_291]
        at org.apache.knox.gateway.filter.ShiroSubjectIdentityAdapter$CallableChain.call(ShiroSubjectIdentityAdapter.java:146) ~[gateway-provider-security-shiro-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.filter.ShiroSubjectIdentityAdapter$CallableChain.call(ShiroSubjectIdentityAdapter.java:76) ~[gateway-provider-security-shiro-2.0.0.jar:2.0.0]
        at org.apache.shiro.subject.support.SubjectCallable.doCall(SubjectCallable.java:90) ~[shiro-core-1.10.0.jar:1.10.0]
        at org.apache.shiro.subject.support.SubjectCallable.call(SubjectCallable.java:83) ~[shiro-core-1.10.0.jar:1.10.0]
        at org.apache.shiro.subject.support.DelegatingSubject.execute(DelegatingSubject.java:387) ~[shiro-core-1.10.0.jar:1.10.0]
        at org.apache.knox.gateway.filter.ShiroSubjectIdentityAdapter.doFilter(ShiroSubjectIdentityAdapter.java:73) ~[gateway-provider-security-shiro-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.GatewayFilter$Holder.doFilter(GatewayFilter.java:377) ~[gateway-server-2.0.0.jar:2.0.0]
        at org.apache.knox.gateway.GatewayFilter$Chain.doFilter(GatewayFilter.java:291) ~[gateway-server-2.0.0.jar:2.0.0]
        at org.apache.shiro.web.servlet.ProxiedFilterChain.doFilter(ProxiedFilterChain.java:61) ~[shiro-web-1.10.0.jar:1.10.0]
        at org.apache.shiro.web.servlet.AdviceFilter.executeChain(AdviceFilter.java:108) ~[shiro-web-1.10.0.jar:1.10.0]
        at org.apache.shiro.web.servlet.AdviceFilter.doFilterInternal(AdviceFilter.java:137) ~[shiro-web-1.10.0.jar:1.10.0]
        at org.apache.shiro.web.servlet.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:154) ~[shiro-web-1.10.0.jar:1.10.0]
        at org.apache.shiro.web.servlet.ProxiedFilterChain.doFilter(ProxiedFilterChain.java:66) ~[shiro-web-1.10.0.jar:1.10.0]
        at org.apache.shiro.web.servlet.AdviceFilter.executeChain(AdviceFilter.java:108) ~[shiro-web-1.10.0.jar:1.10.0]
        at org.apache.shiro.web.servlet.AdviceFilter.doFilterInternal(AdviceFilter.java:137) ~[shiro-web-1.10.0.jar:1.10.0]
        at org.apache.shiro.web.servlet.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:154) ~[shiro-web-1.10.0.jar:1.10.0]
        at org.apache.shiro.web.servlet.ProxiedFilterChain.doFilter(ProxiedFilterChain.java:66) ~[shiro-web-1.10.0.jar:1.10.0]
        at org.apache.shiro.web.servlet.AbstractShiroFilter.executeChain(AbstractShiroFilter.java:458) ~[shiro-web-1.10.0.jar:1.10.0]
        at org.apache.shiro.web.servlet.AbstractShiroFilter$1.call(AbstractShiroFilter.java:373) ~[shiro-web-1.10.0.jar:1.10.0]&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="tgt color_text_0 un-step-trans"&gt;&lt;SPAN class="tgt color_text_0"&gt;In order to achieve Knox proxy,&amp;nbsp;&lt;SPAN&gt;What else do I need to do?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Aug 2023 03:18:10 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Use-Knox-proxy-Secure-Hadoop-cluster-has-some-question-doesn/m-p/375013#M242247</guid>
      <dc:creator>Meepoljd</dc:creator>
      <dc:date>2023-08-08T03:18:10Z</dc:date>
    </item>
    <item>
      <title>Re: Use Knox proxy Secure Hadoop cluster has some question(doesn't match any of the subject alternative names)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Use-Knox-proxy-Secure-Hadoop-cluster-has-some-question-doesn/m-p/375129#M242300</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/94989"&gt;@Meepoljd&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you able to access the Namnode UI without a Knox proxy?&lt;/P&gt;&lt;P&gt;Can you check the output of the below command to verify the hostname in the certificate?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# openssl s_client -connect hdp002.datasw.com:50470 -showcerts&lt;/P&gt;</description>
      <pubDate>Fri, 11 Aug 2023 05:35:01 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Use-Knox-proxy-Secure-Hadoop-cluster-has-some-question-doesn/m-p/375129#M242300</guid>
      <dc:creator>Scharan</dc:creator>
      <dc:date>2023-08-11T05:35:01Z</dc:date>
    </item>
    <item>
      <title>Re: Use Knox proxy Secure Hadoop cluster has some question(doesn't match any of the subject alternative names)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Use-Knox-proxy-Secure-Hadoop-cluster-has-some-question-doesn/m-p/375132#M242301</link>
      <description>&lt;P&gt;Hi, Scharan, thisi is the command's return:&lt;/P&gt;&lt;LI-CODE lang="c"&gt;[root@hdp002 ~]# openssl s_client -connect hdp002.datasw.com:50470 -showcerts
CONNECTED(00000003)
depth=1 C = CN, ST = ShenZhen, L = GuangDong, O = DATASW, OU = PlatformTeam, CN = datsw
verify error:num=19:self signed certificate in certificate chain
---
Certificate chain
 0 s:/C=CN/ST=GuangDong/L=ShenZhen/O=DATASW/OU=PlatformTeam/CN=hdp002.datasw
   i:/C=CN/ST=ShenZhen/L=GuangDong/O=DATASW/OU=PlatformTeam/CN=datsw
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
 1 s:/C=CN/ST=ShenZhen/L=GuangDong/O=DATASW/OU=PlatformTeam/CN=datsw
   i:/C=CN/ST=ShenZhen/L=GuangDong/O=DATASW/OU=PlatformTeam/CN=datsw
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
---
Server certificate
subject=/C=CN/ST=GuangDong/L=ShenZhen/O=DATASW/OU=PlatformTeam/CN=hdp002.datasw
issuer=/C=CN/ST=ShenZhen/L=GuangDong/O=DATASW/OU=PlatformTeam/CN=datsw
---
No client certificate CA names sent
Peer signing digest: SHA512
Server Temp Key: ECDH, P-256, 256 bits
---
SSL handshake has read 2350 bytes and written 483 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES256-SHA384
    Session-ID: 64D5CE575ACD383C1B9BED92D5F2FDC1C63308098FD241173411E62C2E5E0395
    Session-ID-ctx: 
    Master-Key: D73511C7D981C1A2F7813E02F102BD23057A5A79C5E9E75C3BCE870AA40D7CE4F02E41115F28510CE7AF85C6F6675BE6
    Key-Arg   : None
    Krb5 Principal: None
    PSK identity: None
    PSK identity hint: None
    Start Time: 1691733590
    Timeout   : 300 (sec)
    Verify return code: 19 (self signed certificate in certificate chain)
---&lt;/LI-CODE&gt;&lt;P&gt;&lt;SPAN&gt;KIT is not installed on my Windows machine, so I use curl on the Linux server to access the http request of the namenode:&lt;/SPAN&gt;&lt;/P&gt;&lt;LI-CODE lang="c"&gt;curl -i --insecure --negotiate -u: "https://hdp002.datasw.com:50470/jmx?qry=Hadoop:service=NameNode,name=RpcActivityForPort8020" &lt;/LI-CODE&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Meepoljd_0-1691733912433.png" style="width: 400px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/38222i571747214CDB743F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Meepoljd_0-1691733912433.png" alt="Meepoljd_0-1691733912433.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Aug 2023 06:05:24 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Use-Knox-proxy-Secure-Hadoop-cluster-has-some-question-doesn/m-p/375132#M242301</guid>
      <dc:creator>Meepoljd</dc:creator>
      <dc:date>2023-08-11T06:05:24Z</dc:date>
    </item>
    <item>
      <title>Re: Use Knox proxy Secure Hadoop cluster has some question(doesn't match any of the subject alternative names)</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Use-Knox-proxy-Secure-Hadoop-cluster-has-some-question-doesn/m-p/376037#M242743</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/94989"&gt;@Meepoljd&lt;/a&gt;&lt;/P&gt;&lt;P&gt;It seems like the issue is with the certificate. Make sure the certificate is created with fqdn.&lt;/P&gt;&lt;P&gt;The curl command is working because, as you passing --insecure, it ignores invalid and self-signed certificate errors.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2023 09:12:38 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Use-Knox-proxy-Secure-Hadoop-cluster-has-some-question-doesn/m-p/376037#M242743</guid>
      <dc:creator>Scharan</dc:creator>
      <dc:date>2023-09-06T09:12:38Z</dc:date>
    </item>
  </channel>
</rss>

