<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Hardening Security on cloudera Cluster in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Hardening-Security-on-cloudera-Cluster/m-p/412920#M253773</link>
    <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/124165"&gt;@Raufshaikh&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/126125"&gt;@teo123&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/127014"&gt;@dimi_yu&lt;/a&gt;&amp;nbsp;-&lt;/P&gt;&lt;P&gt;Starting with &lt;SPAN class="acronym-highlight"&gt;CDP&lt;/SPAN&gt; 7.1.9, Cloudera rebased ZooKeeper to version 3.8 (3.8.1.7.1.9.0-387). Beginning with ZooKeeper version 3.6.0, a new a new monitoring feature (New Metrics System ) was introduced where you can enable the Prometheus MetricsProvider [0]. By default, the Port is set to the default port number of 7000 (which is configurable by setting "metricsProvider.httpPort"). While Prometheus itself does not require the HTTP TRACE method for normal operation, this behaviour is a result of the upstream ZooKeeper implementation ZOOKEEPER-3731.&lt;/P&gt;&lt;P&gt;We at Cloudera, actively working internally to disable HTTP TRACE in the Prometheus MetricsProvider endpoint in an upcoming CDP release as part of our continued focus on security hardening.&lt;/P&gt;&lt;P&gt;Which will be fixed in CDP 7.3.2, released in early 2026.&lt;/P&gt;&lt;P&gt;As a workaround for now, you can just uncheck the "Enable the Prometheus MetricsProvider" option to disable the port for Prometheus metrics.&lt;/P&gt;&lt;P&gt;[0] =&amp;nbsp;&lt;A href="https://zookeeper.apache.org/doc/r3.9.3/zookeeperAdmin.html#:~:text=metricsProvider.httpPort" target="_blank" rel="noopener"&gt;https://zookeeper.apache.org/doc/r3.9.3/zookeeperAdmin.html#:~:text=metricsProvider.httpPort&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 24 Nov 2025 11:50:49 GMT</pubDate>
    <dc:creator>soychago</dc:creator>
    <dc:date>2025-11-24T11:50:49Z</dc:date>
    <item>
      <title>Hardening Security on cloudera Cluster</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Hardening-Security-on-cloudera-Cluster/m-p/407990#M252643</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;During a security scan, two issues have been discovered in my Cloudera cluster (Cloudera Manager version&amp;nbsp;&lt;SPAN&gt;7.13.1, Cloudera Runtime 7.3.1).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Zookeeper issue (Zookeeper version 3.8.1.7.3.1.0-197):&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;On the nodes where zookeeper runs, I have the bellow issue:&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;HTTP TRACE / TRACK Methods Allowed - Debugging functions are enabled on the remote web server - port 7000&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;Mapreduce HSTS header:&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;HSTS Missing From HTTPS Server / port 13562&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Can you please assist on how to mitigate these issues?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 06:19:37 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Hardening-Security-on-cloudera-Cluster/m-p/407990#M252643</guid>
      <dc:creator>teo123</dc:creator>
      <dc:date>2026-04-21T06:19:37Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening Security on cloudera Cluster</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Hardening-Security-on-cloudera-Cluster/m-p/408002#M252647</link>
      <description>&lt;P&gt;&lt;SPAN&gt;1.&amp;nbsp;We can see the PORT 7000 is not used by any service from cloudera&lt;BR /&gt;&lt;A href="https://docs.cloudera.com/cdp-private-cloud-base/7.1.9/installation/topics/cdpdc-ports-used-by-runtime.html" target="_blank" rel="noopener"&gt;https://docs.cloudera.com/cdp-private-cloud-base/7.1.9/installation/topics/cdpdc-ports-used-by-runtime.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Please confirm and update&lt;BR /&gt;for disallow or disable HTTP TRACE please follow the below link&amp;nbsp;&lt;A href="https://access.redhat.com/solutions/198813" target="_blank" rel="noopener"&gt;https://access.redhat.com/solutions/198813&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;2. The&amp;nbsp; Port&amp;nbsp;13562 is part of&amp;nbsp;MapReduce Shuffle Port. This port is listening on all Yarn nodeManager nodes.&amp;nbsp; If SSL is enabled for MapReduce , this port shall operate with SSL. You can set&amp;nbsp;the HSTS credentials in configurations.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 May 2025 17:23:10 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Hardening-Security-on-cloudera-Cluster/m-p/408002#M252647</guid>
      <dc:creator>jzumbado</dc:creator>
      <dc:date>2025-05-05T17:23:10Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening Security on cloudera Cluster</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Hardening-Security-on-cloudera-Cluster/m-p/408024#M252648</link>
      <description>&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your answer.&lt;/P&gt;&lt;P&gt;1. port 7000&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;here:&amp;nbsp;&lt;A href="https://access.redhat.com/solutions/198813" target="_blank"&gt;https://access.redhat.com/solutions/198813&lt;/A&gt;&amp;nbsp;it says to modify 'echo TraceEnable off &amp;gt;&amp;gt;/etc/httpd/conf/httpd.conf' &amp;amp; and restart 'service httpd reload' apache server. The problem is that on none of my servers in the cluster, the httpd service is not actually running.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Do you have any other suggestions?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. For MapReduce -&amp;gt; I enabled HTTS on MapReduce Shuffle with:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="teo123_0-1746509405244.png" style="width: 400px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/45354i1192FC1F50A881F0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="teo123_0-1746509405244.png" alt="teo123_0-1746509405244.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but I still don't understand where I should add the HSTS header configuration. In ssl-server.xml? How would the config look like? Like in the image bellow?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="teo123_1-1746509527718.png" style="width: 400px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/45355i4552C9303C1DBD6C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="teo123_1-1746509527718.png" alt="teo123_1-1746509527718.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tested with what I stated in the images above and HSTS header is not present.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 06 May 2025 05:39:20 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Hardening-Security-on-cloudera-Cluster/m-p/408024#M252648</guid>
      <dc:creator>teo123</dc:creator>
      <dc:date>2025-05-06T05:39:20Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening Security on cloudera Cluster</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Hardening-Security-on-cloudera-Cluster/m-p/408029#M252649</link>
      <description>&lt;P&gt;Sorry, just an update regarding port 7000. From my debug on the server, this port is opened by a java process running the&amp;nbsp;zookeeper-server process. This is why I mentioned it here.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, the configuration in the zookeeper service -&amp;gt; Server -&amp;gt; metrics&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="teo123_1-1746512286978.png" style="width: 400px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/45358i253A31B03F885BB0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="teo123_1-1746512286978.png" alt="teo123_1-1746512286978.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 06 May 2025 06:18:53 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Hardening-Security-on-cloudera-Cluster/m-p/408029#M252649</guid>
      <dc:creator>teo123</dc:creator>
      <dc:date>2025-05-06T06:18:53Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening Security on cloudera Cluster</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Hardening-Security-on-cloudera-Cluster/m-p/412379#M253417</link>
      <description>&lt;P&gt;I ran into the same findings in a Cloudera 7.x setup. For the Zookeeper TRACE/TRACK warning on port 7000, you can mitigate it by disabling these methods in the embedded Jetty config or, more commonly, by placing a reverse proxy (Apache/Nginx) in front of ZooKeeper and blocking TRACE/TRACK.&lt;/P&gt;&lt;P&gt;For the MapReduce &lt;A href="https://cheapsslweb.com/resources/how-to-fix-the-hsts-missing-from-https-server-error" target="_self"&gt;HSTS&lt;/A&gt; warning (port 13562), HSTS isn’t enabled by default. The fix is to add the Strict Transport Security&amp;nbsp;header either through the service’s HTTPS response configuration or again via a reverse proxy. This enforces HTTPS and clears the scan finding.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Sep 2025 05:10:16 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Hardening-Security-on-cloudera-Cluster/m-p/412379#M253417</guid>
      <dc:creator>dimi_yu</dc:creator>
      <dc:date>2025-09-18T05:10:16Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening Security on cloudera Cluster</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Hardening-Security-on-cloudera-Cluster/m-p/412616#M253570</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/127014"&gt;@dimi_yu&lt;/a&gt;&lt;/P&gt;&lt;P&gt;I am also facing same issue could you please let me know where can I get this jeety confi file and what parameters need to add in this config file ? From CM is there any way or from backend only needs to do this?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2025 11:56:06 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Hardening-Security-on-cloudera-Cluster/m-p/412616#M253570</guid>
      <dc:creator>Raufshaikh</dc:creator>
      <dc:date>2025-10-08T11:56:06Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening Security on cloudera Cluster</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Hardening-Security-on-cloudera-Cluster/m-p/412617#M253571</link>
      <description>&lt;P&gt;For zookeeper on port 7000 security team observer the same http trace/track vulnerability&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2025 11:57:35 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Hardening-Security-on-cloudera-Cluster/m-p/412617#M253571</guid>
      <dc:creator>Raufshaikh</dc:creator>
      <dc:date>2025-10-08T11:57:35Z</dc:date>
    </item>
    <item>
      <title>Re: Hardening Security on cloudera Cluster</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Hardening-Security-on-cloudera-Cluster/m-p/412920#M253773</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/124165"&gt;@Raufshaikh&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/126125"&gt;@teo123&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/127014"&gt;@dimi_yu&lt;/a&gt;&amp;nbsp;-&lt;/P&gt;&lt;P&gt;Starting with &lt;SPAN class="acronym-highlight"&gt;CDP&lt;/SPAN&gt; 7.1.9, Cloudera rebased ZooKeeper to version 3.8 (3.8.1.7.1.9.0-387). Beginning with ZooKeeper version 3.6.0, a new a new monitoring feature (New Metrics System ) was introduced where you can enable the Prometheus MetricsProvider [0]. By default, the Port is set to the default port number of 7000 (which is configurable by setting "metricsProvider.httpPort"). While Prometheus itself does not require the HTTP TRACE method for normal operation, this behaviour is a result of the upstream ZooKeeper implementation ZOOKEEPER-3731.&lt;/P&gt;&lt;P&gt;We at Cloudera, actively working internally to disable HTTP TRACE in the Prometheus MetricsProvider endpoint in an upcoming CDP release as part of our continued focus on security hardening.&lt;/P&gt;&lt;P&gt;Which will be fixed in CDP 7.3.2, released in early 2026.&lt;/P&gt;&lt;P&gt;As a workaround for now, you can just uncheck the "Enable the Prometheus MetricsProvider" option to disable the port for Prometheus metrics.&lt;/P&gt;&lt;P&gt;[0] =&amp;nbsp;&lt;A href="https://zookeeper.apache.org/doc/r3.9.3/zookeeperAdmin.html#:~:text=metricsProvider.httpPort" target="_blank" rel="noopener"&gt;https://zookeeper.apache.org/doc/r3.9.3/zookeeperAdmin.html#:~:text=metricsProvider.httpPort&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Nov 2025 11:50:49 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Hardening-Security-on-cloudera-Cluster/m-p/412920#M253773</guid>
      <dc:creator>soychago</dc:creator>
      <dc:date>2025-11-24T11:50:49Z</dc:date>
    </item>
  </channel>
</rss>

