This topic describes known issues and workarounds for using ZooKeeper in this release
    of Cloudera Runtime. 
    
      
        - Zookeeper-client does not use ZooKeeper TLS/SSL automatically
 
        - 
          
The command-line tool ‘zookeeper-client’ is installed to all Cloudera Nodes and it can
            be used to start the default Java command line ZooKeeper client. However even when
            ZooKeeper TLS/SSL is enabled, the zookeeper-client command connects to localhost:2181,
            without using TLS/SSL. 
         
        - Workaround:
          
Manually configure the 2182 port, when zookeeper-client connects to a ZooKeeper
            cluster.The following is an example of connecting to a specific three-node ZooKeeper
            cluster using TLS/SSL:
            
CLIENT_JVMFLAGS="-Dzookeeper.clientCnxnSocket=org.apache.zookeeper.ClientCnxnSocketNetty -Dzookeeper.ssl.keyStore.location=<path to your configured keystore> -Dzookeeper.ssl.keyStore.password=<the password you configured for the keystore>  -Dzookeeper.ssl.trustStore.location=<path to your configured truststore> -Dzookeeper.ssl.trustStore.password=<the password you configured for the truststore> -Dzookeeper.client.secure=true" zookeeper-client -server <your.zookeeper.server-1>:2182,<your.zookeeper.server-2>:2182,<your.zookeeper.server-3>:2182