Learn about the known issues in ZooKeeper, the impact or changes to the functionality,
    and the workaround.
    
      
        - OPSAPS-61188: Zookeeper start fails with custom user as contents
          inside /var/lib/zookeeper have "zookeeper" as owner instead of the custom user 
 
        - In Cloudera Manager the Process Username
          for ZooKeeper can be changed from the default 
zookeeper value to any
          custom value. This configuration change in Cloudera Manager automatically changes the
          owner of the var/lib/zookeeper folder but keeps
            zookeeper as the owner of any folders or files inside
            var/lib/zookeeper, such as myid and
            version-2. As a result ZooKeeper fails to start because it needs to
          read the snapshots and txnlogs from the var/lib/zookeeper/version-2
          folder when starting.  
        - 
          
            - Ensure that you changed the Process Username to a username
              that exists on the OS.
 
            - Manually change the owner.
                - Log in to the node.
 
                - Recursively change the owner of 
var/lib/zookeeper using the
                    chown -R command. 
              
 
          
         
       
      
        - Zookeeper-client does not use ZooKeeper TLS/SSL automatically
 
        - The command-line tool ‘zookeeper-client’ is installed to all Cloudera Nodes and it can
            be used to start the default Java command line ZooKeeper client. However even when
            ZooKeeper TLS/SSL is enabled, the zookeeper-client command connects to localhost:2181,
            without using TLS/SSL.
 
        - Manually configure the 2182 port, when zookeeper-client connects to a ZooKeeper
            cluster.The following is an example of connecting to a specific three-node ZooKeeper
            cluster using TLS/SSL:
            
CLIENT_JVMFLAGS="-Dzookeeper.clientCnxnSocket=org.apache.zookeeper.ClientCnxnSocketNetty -Dzookeeper.ssl.keyStore.location=<path to your configured keystore> -Dzookeeper.ssl.keyStore.password=<the password you configured for the keystore>  -Dzookeeper.ssl.trustStore.location=<path to your configured truststore> -Dzookeeper.ssl.trustStore.password=<the password you configured for the truststore> -Dzookeeper.client.secure=true" zookeeper-client -server <your.zookeeper.server-1>:2182,<your.zookeeper.server-2>:2182,<your.zookeeper.server-3>:2182
 
       
      
        - TLS v1.3 Support for CDP in Zookeeper
 
        - ZooKeeper does not support TLS v1.3.
 
        - To configure TLS v1.3, add the following properties in the
            Server Advanced Configuration Snippet (Safety Valve) for zoo.cfg
          file.
ssl.protocol=TLSv1.3
ssl.enabledProtocols=TLSv1.3,TLSv1.2
ssl.ciphersuites=TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_E
CDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,TLS_DHE_RSA_WITH_
AES_128_GCM_SHA256,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256