<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Auto tls in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Auto-tls/m-p/413670#M254186</link>
    <description>&lt;P&gt;Still having doubts in addcustomcertapi and&amp;nbsp;&lt;EM&gt;generatecmcaapi can you please help me on this. I have generated csi by using existing private and get the certa signed from client and prepare plan so what I need to us add or generate&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 09 Mar 2026 19:45:32 GMT</pubDate>
    <dc:creator>mohammad_shamim</dc:creator>
    <dc:date>2026-03-09T19:45:32Z</dc:date>
    <item>
      <title>Auto tls</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Auto-tls/m-p/413638#M254169</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;i have plan to renew the tls certificates for my prod cluster. I have already generated csr for all hosts and got the signed from my clients. Could you please share the steps for renewing. I gone through cloudera documentation but still having doubts. Can someone help. It would be much appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 06:10:29 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Auto-tls/m-p/413638#M254169</guid>
      <dc:creator>mohammad_shamim</dc:creator>
      <dc:date>2026-04-21T06:10:29Z</dc:date>
    </item>
    <item>
      <title>Re: Auto tls</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Auto-tls/m-p/413639#M254170</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/59086"&gt;@mohammad_shamim&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Thank you for reaching out to the Cloudera community.&lt;BR /&gt;&lt;BR /&gt;Since you mentioned you have&amp;nbsp;generated csr for all hosts, I am assuming you are using auto-tls use-case:3 (CA signed certificates)&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You can renew the certificates using 2 methods.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1.&amp;nbsp;generateCmca API&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2.&amp;nbsp;&lt;SPAN class="keyword apiname"&gt;addCustomCerts&lt;/SPAN&gt;&amp;nbsp;API&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;Below is the documentation for renewing both the methods.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;1.&amp;nbsp;&lt;A href="https://docs.cloudera.com/cdp-private-cloud-base/7.1.7/security-encrypting-data-in-transit/topics/cm-security-use-case-3.html#:~:text=Refer%20the%20example%20API%20given%20below.%20Customize%20this%20API%20to%20match%20the%20deployment%20that%20has%20been%20set%20up%20and%20then%20run%20the%20API" target="_blank"&gt;https://docs.cloudera.com/cdp-private-cloud-base/7.1.7/security-encrypting-data-in-transit/topics/cm-security-use-case-3.html#:~:text=Refer%20the%20example%20API%20given%20below.%20Customize%20this%20API%20to%20match%20the%20deployment%20that%20has%20been%20set%20up%20and%20then%20run%20the%20API&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;2.&amp;nbsp;&lt;A href="https://docs.cloudera.com/cdp-private-cloud-base/7.1.7/security-encryption-reference/topics/security-rotate-auto-tls-ca-and-host-certificates.html#pnavId2" target="_blank"&gt;https://docs.cloudera.com/cdp-private-cloud-base/7.1.7/security-encryption-reference/topics/security-rotate-auto-tls-ca-and-host-certificates.html#pnavId2&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Please let me what doubts you have in the documentation.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;JP&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2026 03:12:31 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Auto-tls/m-p/413639#M254170</guid>
      <dc:creator>ymprakash</dc:creator>
      <dc:date>2026-03-04T03:12:31Z</dc:date>
    </item>
    <item>
      <title>Re: Auto tls</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Auto-tls/m-p/413670#M254186</link>
      <description>&lt;P&gt;Still having doubts in addcustomcertapi and&amp;nbsp;&lt;EM&gt;generatecmcaapi can you please help me on this. I have generated csi by using existing private and get the certa signed from client and prepare plan so what I need to us add or generate&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2026 19:45:32 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Auto-tls/m-p/413670#M254186</guid>
      <dc:creator>mohammad_shamim</dc:creator>
      <dc:date>2026-03-09T19:45:32Z</dc:date>
    </item>
    <item>
      <title>Re: Auto tls</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Auto-tls/m-p/413721#M254204</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/59086"&gt;@mohammad_shamim&lt;/a&gt;&amp;nbsp;Please use below sample curl command to renew the certs.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;PRE class="pre codeblock"&gt;curl -i -v -uadmin:admin -X POST --header 'Content-Type: application/json' --header 'Accept: application/json' -d '{
"location" : "/opt/cloudera/AutoTLS",
"customCA" : true,
"interpretAsFilenames" : true,
"cmHostCert" : "/tmp/auto-tls/certs/ccycloud-7.vcdp71.root.hwx.site.pem",
"cmHostKey" : "/tmp/auto-tls/keys/ccycloud-7.vcdp71.root.hwx.site-key.pem",
"caCert" : "/tmp/auto-tls/ca-certs/cfssl-chain-truststore.pem",
"keystorePasswd" : "/tmp/auto-tls/keys/key.pwd",
"truststorePasswd" : "/tmp/auto-tls/ca-certs/truststore.pwd",
"trustedCaCerts" : "/tmp/auto-tls/ca-certs.pem", //This is a path to a PEM file on the Cloudera Manager host which contains 
a list of CA certificates that should be imported into the truststores of all hosts. This is an optional field.
"hostCerts" : [ {
"hostname" : "ccycloud-7.vcdp71.root.hwx.site",
"certificate" : "/tmp/auto-tls/certs/ccycloud-7.vcdp71.root.hwx.site.pem",
"key" : "/tmp/auto-tls/keys/ccycloud-7.vcdp71.root.hwx.site-key.pem"
}, {
"hostname" : "ccycloud-3.vcdp71.root.hwx.site",
"certificate" : "/tmp/auto-tls/certs/ccycloud-3.vcdp71.root.hwx.site.pem",
"key" : "/tmp/auto-tls/keys/ccycloud-3.vcdp71.root.hwx.site-key.pem"
}, {
"hostname" : "ccycloud-2.vcdp71.root.hwx.site",
"certificate" : "/tmp/auto-tls/certs/ccycloud-3.vcdp71.root.hwx.site.pem",
"key" : "/tmp/auto-tls/keys/ccycloud-3.vcdp71.root.hwx.site-key.pem"
}, {
"hostname" : "ccycloud-1.vcdp71.root.hwx.site",
"certificate" : "/tmp/auto-tls/certs/ccycloud-1.vcdp71.root.hwx.site.pem",
"key" : "/tmp/auto-tls/keys/ccycloud-1.vcdp71.root.hwx.site-key.pem"
} ],
"configureAllServices" : "true",
"sshPort" : 22,
"userName" : "root",
"password" : "cloudera"
}' 'http://ccycloud-7.vcdp71.root.hwx.site:7180/api/v41/cm/commands/generateCmca' ////This link is valid if you have 
not enabled TLS in the Cloudera Manager UI. If you enable TLS for the same deployment in the Cloudera Manager UI later, 
the port number and the protocol changes for the API calls and for accessing the link from a browser. In such a scenario, 
the correct API call is as follows: https://ccycloud-7.vcdp71.root.hwx.site:7183/api/v41/cm/commands/generateCmca.&lt;/PRE&gt;</description>
      <pubDate>Sat, 14 Mar 2026 06:56:12 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Auto-tls/m-p/413721#M254204</guid>
      <dc:creator>ymprakash</dc:creator>
      <dc:date>2026-03-14T06:56:12Z</dc:date>
    </item>
  </channel>
</rss>

