- System Requirements
- What's New
Warning: As of August 2015, Filesystem-level encryption using eCryptfs is deprecated.
Operating System Requirements
- Linux kernel 2.6.19 or higher (RHEL and CentOS can use 2.6.18-92 or higher)
- RHEL and CentOS: 5.7, 5.10, 6.4, 6.5, 6.6, 6.7, 7.1, 7.2
- Oracle Enterprise Linux: 6.4, 6.5, 6.6, 6.7, 7.1
- SLES: 11 SP2, 11 SP3, 11 SP4
Note: SLES 11 does not support the ext4 filesystem.
- Debian: 7.1, 7.8
- Ubuntu: 12.04, 14.04, 14.04.3
Important: With the exception of Cloudera Navigator Encrypt, Cloudera Enterprise is supported on platforms with Security-Enhanced Linux (SELinux) enabled. However, policies need to be provided by other parties or created by the administrator of the cluster deployment. Cloudera is not responsible for policy support nor policy enforcement, nor for any issues with them. If you experience issues with SELinux, contact your OS support provider.
Supported command-line interpreters:
- sh (Bourne)
- bash (Bash)
- dash (Debian)
Note: Navigator Encrypt does not support installation or use in chroot environments.
SELinux must be disabled for Key Trustee installation and operation. Modify /etc/selinux/config to set SELINUX=disabled and reboot the system for the change to take effect.
For new Navigator Key Trustee Server (5.4.0 and higher) installations, Navigator Encrypt initiates TCP traffic over port 11371 (HTTPS) to the Key Trustee Server.
For upgrades and Key Trustee Server versions lower than 5.4.0, Navigator Encrypt initiates TCP traffic over ports 80 (HTTP) and 443 (HTTPS) to the Navigator Key Trustee Server.
You must have an active connection to the Internet to download many package dependencies, unless you have internal repositories or mirrors containing the dependent packages.
Data is not accessible during the encryption process. Plan for system downtime during installation and configuration.
To enforce a high level of security, all Navigator Encrypt commands require administrative (root) access (including installation and configuration). If you do not have administrative privileges on your server, contact your system administrator before proceeding.
Navigator Encrypt requires these packages, which are resolved by your distribution package manager during installation:
These packages may have other dependencies that are also resolved by your package manager. Installation works with gcc, gcc3, and gcc4.
- Several new commands have been added:
- navencrypt-collect displays environment information for troubleshooting. For more information, see Collecting Navigator Encrypt Environment Information.
- navencrypt-move --list-categories lists existing categories. For more information, see Listing Categories.
- navencrypt restore-control-file restores the /etc/navencrypt/control file from Key Trustee Server. For more information, see Restoring Mount Encryption Keys (MEKs) and Control File.
- navencrypt status --integrity validates the Navigator Encrypt configuration. For more information, see Validating Navigator Encrypt Configuration.
- Access control list (ACL) policy files now support comments. For more information, see Adding ACL Rules.
Want to Get Involved or Learn More?
Check out our other resources
Receive expert Hadoop training through Cloudera University, the industry's only truly dynamic Hadoop training curriculum that’s updated regularly to reflect the state of the art in big data.