Support Questions
Find answers, ask questions, and share your expertise
Alert: Welcome to the Unified Cloudera Community. Former HCC members be sure to read and learn how to activate your account here.

Complex TLS Encryption Processes on the Cloudera Documentation


Complex TLS Encryption Processes on the Cloudera Documentation

New Contributor

Dear All;


When we start to Cloudera Management Service, there is an error occured. The errors are the same for Reports Manager, Service Monitor, Event Server, Activity Monitor, Host Monitor etc.


Here is the error:


"Exception in thread "main" Keystore was tampered with, or password was incorrect at at$JKS.engineLoad( at at com.cloudera.enterprise.ssl.ReloadingX509TrustManager.loadTrustManager( at com.cloudera.enterprise.ssl.ReloadingX509TrustManager.<init>( at com.cloudera.enterprise.ssl.FileBasedKeyStoresFactory.init( at com.cloudera.enterprise.ssl.SSLFactory.init( at com.cloudera.enterprise.ssl.SSLFactory.getHttpConnectionConfigurator( at com.cloudera.cmon.firehose.Main.main( Caused by: Password verification failed at ... 8 more"



I know the message show me that keystore password is incorrect. However, When I change the password on the Cloudera Manager Config Interface the same error is appeared at the top of page. According to this situation the first password is correct. But I cannot start Cloudera Management Service.


Can anybody help to me?


Thank you 




Re: Complex TLS Encryption Processes on the Cloudera Documentation

Cloudera Employee

Hello Tayfun,


The keystore password is wrong.

Manually test the password by printing out the keystore certificates using the following CLI command:


keytool -list -v -keystore <keystore.jks>


If this fails, you know the password is wrong.


If you want to change the keystore password, use the following command:


keytool -storepasswd -keytool <keystore.jks>


Tip and Example:

If keytool is not in your PATH you will need to type out the whole path.

Here's an example I used on our test cluster:


/usr/java/jdk1.7.0_67/bin/keytool -list -v -keystore /etc/cdep-ssl-conf/CA_STANDARD/truststore.jks


Re: Complex TLS Encryption Processes on the Cloudera Documentation

Super Guru



Since the issue you are having is that the services cannot access the truststore specified that the Management Service roles use to trust the signer of Cloudera Manager's certificate, Make sure you are changing the right password.


Cloudera Manager --> Clusters --> Cloudera Management Service --> Configuration

Search for Cloudera Manager Server TLS/SSL Certificate Trust Store Password


If you can't figure out the password, it is also OK to leave the password field blank.  If the password is specified, it is required to be correct, but the services don't need to know the password to get what they need from the file.


Click the blue arrow next to Cloudera Manager Server TLS/SSL Certificate Trust Store Password to revert to the default 'null' value.  Save and restart the Management Service.



Don't have an account?
Coming from Hortonworks? Activate your account here