Taylor,
I hit the same issue with the current release version of KairosDB 1.1.3. My solution probably does not apply to the new beta that uses the native protocol. Hope it will support SSL too and mention example of how to set that up.
Anyway here's what worked for me:
- Grabbed the X.509 CA cert via OpsCenter via LCM link in the Cluster Details for your cluster definition and copied it to my KairosDB machine
- On the KairosDB machine I created a Java Keystore using this cert like this:
/opt/jdk1.8.0_141/bin/keytool -import -alias cacert -file ~/.cassandra/cacert.crt -keystore truststore.jks
- pick a password (exa: foopass)... well maybe pick a 'good' password 8)
- enter 'yes' to Trust this certificate?
- Alternative to 1&2 is to grab the existing JKS client truststore file from a DSE node (exa: /etc/dse/keystores/client.keystore) and share the password the admin used to make this for cassandra. Either way you should now have a JKS truststore file specific to the target cluster you want to connect to on your KairosDB machine.
- Edit the /opt/kairosdb/bin/kairosdb-env.sh file and add the following -D switches to JAVA_OPTS:
JAVA_OPTS="-Dssl.truststore=/opt/kairosdb/ssl/truststore.jks -Dssl.truststore.password=foopass"
I also got tripped up a bit on some confusing reference to the auth key name "user" and "password" in the docs, but the actual settings that worked for the authorization for Cassandra were like this:
kairosdb.datastore.cassandra.auth.username=cassandra
kairosdb.datastore.cassandra.auth.password=randomgibberishdsnfadfsa
Hope this helps.
-Matt