Creating a truststore for ZooKeeper

For the servers to trust each other, they must have the certificate of every other server in their truststore. The same truststore can be used for client-to-node encryption and for node-to-node encryption. When the truststore for each server is created, the server public certificate is exported to a file.

Before you begin

Complete the following tasks:
  1. Installing a Zoo Keeper node
  2. Generating a self-signed certificate

About this task

To create a truststore:

Procedure

  1. Log in to the ZooKeeper server as the user who installed Sterling B2B Integrator and Global Mailbox.
  2. Use the Java™ keytool utility with the following input:

    -importcert -alias <name> -file <path to cert file>.cer -keystore <path to truststore> -storepass <password> -storetype JKS

    -alias <name>

    Alias can be any value. This might be the same alias from the keystore, or a descriptive label like self.

    -file <path to cert file>

    Specifies the fully-qualified path to the file where the server public certificate is exported when its personal certificate was created in Generating a self-signed personal certificate.

    -keystore <path to truststore>

    Specifies the fully-qualified path of the server truststore file that is created (for example: /etc/cassandra/conf/truststore.jks).

    -storepass <password>

    The truststore password can be any value. It is used to generate a key to encrypt the truststore file.

    -storetype JKS

    The keystore type must be JKS.

  3. When prompted, enter y to add the certificate into the truststore:
    Trust this certificate? [no]:  y 
    Certificate was added to keystore
  4. Create a trust store for each ZooKeeper server in all data centers.