Yes ,that's correct . I did that and  the exception is gone. 

But I see bel.ow exception , not sure what is the reason for this NPE.

2020-07-15 10:28:14.453 INFO  (MetricsHistoryHandler-12-thread-1) [   ] 
o.a.s.c.s.i.SolrClientNodeStateProvider Error on getting remote info, trying 
again: IOException occurred when talking to server at: 
http://10-169-50-16.search-solrcloud-solrcloud.service:8983/solr
2020-07-15 10:28:14.956 INFO  (MetricsHistoryHandler-12-thread-1) [   ] 
o.a.s.c.s.i.SolrClientNodeStateProvider Error on getting remote info, trying 
again: IOException occurred when talking to server at: 
http://10-169-50-16.search-solrcloud-solrcloud.service:8983/solr
2020-07-15 10:28:15.459 INFO  (MetricsHistoryHandler-12-thread-1) [   ] 
o.a.s.c.s.i.SolrClientNodeStateProvider Error on getting remote info, trying 
again: IOException occurred when talking to server at: 
http://10-169-50-16.search-solrcloud-solrcloud.service:8983/solr
2020-07-15 10:28:15.960 WARN  (MetricsHistoryHandler-12-thread-1) [   ] 
o.a.s.c.s.i.SolrClientNodeStateProvider could not get tags from node 
10-169-50-16.search-solrcloud-solrcloud.service:8983_solr => 
java.lang.NullPointerException
        at 
org.apache.solr.client.solrj.impl.SolrClientNodeStateProvider.lambda$fetchReplicaMetrics$7(SolrClientNodeStateProvider.java:226)
java.lang.NullPointerException: null
        at 
org.apache.solr.client.solrj.impl.SolrClientNodeStateProvider.lambda$fetchReplicaMetrics$7(SolrClientNodeStateProvider.java:226)
 ~[solr-solrj-8.5.1.jar:8.5.1 edb9fc409398f2c3446883f9f80595c884d245d0 - ivera 
- 2020-04-08 09:01:44]
        at java.util.HashMap.forEach(HashMap.java:1289) ~[?:1.8.0_211]
        at 
org.apache.solr.client.solrj.impl.SolrClientNodeStateProvider.fetchReplicaMetrics(SolrClientNodeStateProvider.java:225)
 ~[solr-solrj-8.5.1.jar:8.5.1 edb9fc409398f2c3446883f9f80595c884d245d0 - ivera 
- 2020-04-08 09:01:44]
        at 
org.apache.solr.client.solrj.impl.SolrClientNodeStateProvider$AutoScalingSnitch.getRemoteInfo(SolrClientNodeStateProvider.java:271)
 ~[solr-solrj-8.5.1.jar:8.5.1 edb9fc409398f2c3446883f9f80595c884d245d0 - ivera 
- 2020-04-08 09:01:44]
        at 
org.apache.solr.common.cloud.rule.ImplicitSnitch.getTags(ImplicitSnitch.java:76)
 ~[solr-solrj-8.5.1.jar:8.5.1 edb9fc409398f2c3446883f9f80595c884d245d0 - ivera 
- 2020-04-08 09:01:44]
        at 
org.apache.solr.client.solrj.impl.SolrClientNodeStateProvider.fetchTagValues(SolrClientNodeStateProvider.java:139)
 ~[solr-solrj-8.5.1.jar:8.5.1 edb9fc409398f2c3446883f9f80595c884d245d0 - ivera 
- 2020-04-08 09:01:44]
        at 
org.apache.solr.client.solrj.impl.SolrClientNodeStateProvider.getNodeValues(SolrClientNodeStateProvider.java:128)
 ~[solr-solrj-8.5.1.jar:8.5.1 edb9fc409398f2c3446883f9f80595c884d245d0 - ivera 
- 2020-04-08 09:01:44]
        at 
org.apache.solr.handler.admin.MetricsHistoryHandler.collectGlobalMetrics(MetricsHistoryHandler.java:506)
 ~[solr-core-8.5.1.jar:8.5.1 edb9fc409398f2c3446883f9f80595c884d245d0 - ivera - 
2020-04-08 09:01:41]
        at 
org.apache.solr.handler.admin.MetricsHistoryHandler.collectMetrics(MetricsHistoryHandler.java:378)
 ~[solr-core-8.5.1.jar:8.5.1 edb9fc409398f2c3446883f9f80595c884d245d0 - ivera - 
2020-04-08 09:01:41]
        at 
org.apache.solr.handler.admin.MetricsHistoryHandler.lambda$new$0(MetricsHistoryHandler.java:235)
 ~[solr-core-8.5.1.jar:8.5.1 edb9fc409398f2c3446883f9f80595c884d245d0 - ivera - 
2020-04-08 09:01:41]
        at 
java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511) 
~[?:1.8.0_211]
        at java.util.concurrent.FutureTask.runAndReset(FutureTask.java:308) 
~[?:1.8.0_211]
        at 
java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.access$301(ScheduledThreadPoolExecutor.java:180)
 ~[?:1.8.0_211]
        at 
java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:294)
 ~[?:1.8.0_211]
        at 
java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) 
~[?:1.8.0_211]
        at 
java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) 
~[?:1.8.0_211]
        at java.lang.Thread.run(Thread.java:748) [?:1.8.0_211]

Thanks,
Rajeswari
On 7/15/20, 6:29 AM, "Kevin Risden" <kris...@apache.org> wrote:

    You need to remove the references from bin/solr or bin/solr.cmd to
    SOLR_SSL_CLIENT_KEY_STORE and "-Djavax.net.ssl.keyStore". This is different
    from solr.in.sh.

    The way the bin/solr script is written it is falling back to whatever is
    provided as SOLR_SSL_KEY_STORE for the client keystore which is causing
    issues.

    Kevin Risden



    On Wed, Jul 15, 2020 at 3:45 AM Natarajan, Rajeswari <
    rajeswari.natara...@sap.com> wrote:

    > Thank you for your reply. I looked at solr.in.sh I see that
    > SOLR_SSL_CLIENT_KEY_STORE  is already commented out by default. But you 
are
    > right I looked at the running solr,  I see the option
    > -Djavax.net.ssl.keyStore pointing to solr-ssl.keystore.p12 , not sure how
    > it is getting that value. Let me dig more. Thanks for the pointer. Also if
    > you have a pointer how it get's populated  other than
    > SOLR_SSL_CLIENT_KEY_STORE config in solr.in.sh , please let me know
    >
    > #SOLR_SSL_CLIENT_KEY_STORE=
    > #SOLR_SSL_CLIENT_KEY_STORE_PASSWORD=
    > #SOLR_SSL_CLIENT_KEY_STORE_TYPE=
    > #SOLR_SSL_CLIENT_TRUST_STORE=
    > #SOLR_SSL_CLIENT_TRUST_STORE_PASSWORD=
    > #SOLR_SSL_CLIENT_TRUST_STORE_TYPE=
    >
    > Yes we are not using Solr client auth.
    >
    > Thanks,
    > Rajeswari
    >
    > On 7/14/20, 5:55 PM, "Kevin Risden" <kris...@apache.org> wrote:
    >
    >     Hmmm so I looked closer - it looks like a side effect of the default
    >     passthrough of the keystore being passed to the client keystore.
    >
    >     https://github.com/apache/lucene-solr/blob/master/solr/bin/solr#L229
    >
    >     Can you remove or commout the entire SOLR_SSL_CLIENT_KEY_STORE section
    > from
    >     bin/solr or bin/solr.cmd depending on which version you are using? The
    > key
    >     being to make sure to not set "-Djavax.net.ssl.keyStore".
    >
    >     This assumes that you aren't using Solr client auth (which based on
    > your
    >     config you aren't) and you aren't trying to use Solr to connect to
    > anything
    >     that is secured via clientAuth (most likely you aren't).
    >
    >     If you can try this and report back that would be awesome. I think 
this
    >     will fix the issue and it would be possible to make client auth opt in
    >     instead of default fall back.
    >     Kevin Risden
    >
    >
    >
    >     On Tue, Jul 14, 2020 at 1:46 AM Natarajan, Rajeswari <
    >     rajeswari.natara...@sap.com> wrote:
    >
    >     > Thank you so much for the response.  Below are the configs I have in
    >     > solr.in.sh and I followed
    >     > https://lucene.apache.org/solr/guide/8_5/enabling-ssl.html
    > documentation
    >     >
    >     > # Enables HTTPS. It is implicitly true if you set
    > SOLR_SSL_KEY_STORE. Use
    >     > this config
    >     > # to enable https module with custom jetty configuration.
    >     > SOLR_SSL_ENABLED=true
    >     > # Uncomment to set SSL-related system properties
    >     > # Be sure to update the paths to the correct keystore for your
    > environment
    >     > SOLR_SSL_KEY_STORE=etc/solr-ssl.keystore.p12
    >     > SOLR_SSL_KEY_STORE_PASSWORD=secret
    >     > SOLR_SSL_TRUST_STORE=etc/solr-ssl.keystore.p12
    >     > SOLR_SSL_TRUST_STORE_PASSWORD=secret
    >     > # Require clients to authenticate
    >     > SOLR_SSL_NEED_CLIENT_AUTH=false
    >     > # Enable clients to authenticate (but not require)
    >     > SOLR_SSL_WANT_CLIENT_AUTH=false
    >     > # SSL Certificates contain host/ip "peer name" information that is
    >     > validated by default. Setting
    >     > # this to false can be useful to disable these checks when re-using 
a
    >     > certificate on many hosts
    >     > SOLR_SSL_CHECK_PEER_NAME=true
    >     >
    >     > In local , with the below certificate it works
    >     > ---------------------------------------
    >     >
    >     > keytool -list -keystore solr-ssl.keystore.p12
    >     > Enter keystore password:
    >     > Keystore type: PKCS12
    >     > Keystore provider: SUN
    >     >
    >     > Your keystore contains 1 entry
    >     >
    >     > solr-18, Jun 26, 2020, PrivateKeyEntry,
    >     > Certificate fingerprint (SHA1):
    >     > AB:F2:C8:84:E8:E7:A2:BF:2D:0D:2F:D3:95:4A:98:5B:2A:88:81:50
    >     > C02W48C6HTD6:solr-8.5.1 i843100$ keytool -list -v -keystore
    >     > solr-ssl.keystore.p12
    >     > Enter keystore password:
    >     > Keystore type: PKCS12
    >     > Keystore provider: SUN
    >     >
    >     > Your keystore contains 1 entry
    >     >
    >     > Alias name: solr-18
    >     > Creation date: Jun 26, 2020
    >     > Entry type: PrivateKeyEntry
    >     > Certificate chain length: 1
    >     > Certificate[1]:
    >     > Owner: CN=localhost, OU=Organizational Unit, O=Organization,
    > L=Location,
    >     > ST=State, C=Country
    >     > Issuer: CN=localhost, OU=Organizational Unit, O=Organization,
    > L=Location,
    >     > ST=State, C=Country
    >     > Serial number: 45a822c8
    >     > Valid from: Fri Jun 26 00:13:03 PDT 2020 until: Sun Nov 10 23:13:03
    > PST
    >     > 2047
    >     > Certificate fingerprints:
    >     >          MD5:  0B:80:54:89:44:65:93:07:1F:81:88:8D:EC:BD:38:41
    >     >          SHA1:
    > AB:F2:C8:84:E8:E7:A2:BF:2D:0D:2F:D3:95:4A:98:5B:2A:88:81:50
    >     >          SHA256:
    >     >
    > 
9D:65:A6:55:D7:22:B2:72:C2:20:55:66:F8:0C:9C:48:B1:F6:48:40:A4:FB:CB:26:77:DE:C4:97:34:69:25:42
    >     > Signature algorithm name: SHA256withRSA
    >     > Subject Public Key Algorithm: 2048-bit RSA key
    >     > Version: 3
    >     >
    >     > Extensions:
    >     >
    >     > #1: ObjectId: 2.5.29.17 Criticality=false
    >     > SubjectAlternativeName [
    >     >   DNSName: localhost
    >     >   IPAddress: 172.20.10.4
    >     >   IPAddress: 127.0.0.1
    >     > ]
    >     >
    >     > #2: ObjectId: 2.5.29.14 Criticality=false
    >     > SubjectKeyIdentifier [
    >     > KeyIdentifier [
    >     > 0000: 1B 6F BB 65 A4 3C 6A F4   C9 05 08 89 88 0E 9E 76
    > .o.e.<j........v
    >     > 0010: A1 B7 28 BE                                        ..(.
    >     > ]
    >     >
    >     > /////////////////////////////////////////////////////////////////
    >     > In a cluster env , where the deployment  , keystore everything is
    >     > automated  (used by  multiple teams) keystore generated is as below.
    > As you
    >     > can see the  keystore has 2 certificates , in which case I get the
    >     > exception  below.
    >     >
    >     > java.lang.UnsupportedOperationException: X509ExtendedKeyManager only
    >     >     > supported on Server
    >     >     >               at
    >     >     >
    >     >
    > 
org.apache.solr.client.solrj.impl.Http2SolrClient.createHttpClient(Http2SolrClient.java:223)
    >     >     >
    >     >
    >     > In both cases , the config is same except the keystore certificates
    > . In
    >     > the JIRA (https://issues.apache.org/jira/browse/SOLR-14105) , I see
    > the
    >     > fix says it supports multiple DNS and multiple certificates. So I
    > thought
    >     > it should be ok. Please let me know .
    >     >
    >     > keytool -list -keystore  /etc/nginx/certs/sidecar.p12
    >     > Picked up JAVA_TOOL_OPTIONS: -Dfile.encoding=UTF8
    >     > Enter keystore password:
    >     > Keystore type: PKCS12
    >     > Keystore provider: SUN
    >     >
    >     > Your keystore contains 1 entry
    >     >
    >     > 1, Jul 7, 2020, PrivateKeyEntry,
    >     > Certificate fingerprint (SHA1):
    >     > E2:3B:4B:4A:0E:05:CF:DA:59:09:55:8D:4E:6D:8A:1D:4E:DD:D4:62
    >     > bash-5.0#
    >     > ————————-
    >     >
    >     > bash-5.0#  keytool -list -v -keystore /etc/nginx/certs/sidecar.p12
    >     > Picked up JAVA_TOOL_OPTIONS: -Dfile.encoding=UTF8
    >     > Enter keystore password:
    >     > Keystore type: PKCS12
    >     > Keystore provider: SUN
    >     >
    >     > Your keystore contains 1 entry
    >     >
    >     > Alias name: 1
    >     > Creation date: Jul 7, 2020
    >     > Entry type: PrivateKeyEntry
    >     > Certificate chain length: 2
    >     > Certificate[1]:
    >     > Owner: OU=Cobalt, O=SAP, L=Walldorf, ST=Walldorf, C=DE
    >     > Issuer: CN=SAP Ariba Cobalt Sidecar Intermediate CA, OU=COBALT, 
O=SAP
    >     > Ariba, ST=CA, C=US
    >     > Serial number: 1000
    >     > Valid from: Tue Jul 07 05:14:37 GMT 2020 until: Thu Jul 07 05:14:37
    > GMT
    >     > 2022
    >     > Certificate fingerprints:
    >     >          MD5:  C0:13:87:37:96:C2:E2:DD:B9:D7:B4:E3:6B:73:A0:EC
    >     >          SHA1:
    > E2:3B:4B:4A:0E:05:CF:DA:59:09:55:8D:4E:6D:8A:1D:4E:DD:D4:62
    >     >          SHA256:
    >     >
    > 
89:AB:8E:3B:D4:EC:A6:D0:0E:D7:CB:65:8C:92:13:32:F2:FD:7E:41:C9:39:F5:66:D5:7D:F1:04:13:8A:4E:92
    >     > Signature algorithm name: SHA256withRSA
    >     > Subject Public Key Algorithm: 2048-bit RSA key
    >     > Version: 3
    >     >
    >     > Extensions:
    >     >
    >     > #1: ObjectId: 2.16.840.1.113730.1.13 Criticality=false
    >     > 0000: 16 24 4F 70 65 6E 53 53   4C 20 47 65 6E 65 72 61  .$OpenSSL
    > Genera
    >     > 0010: 74 65 64 20 53 65 72 76   65 72 20 43 65 72 74 69  ted Server
    > Certi
    >     > 0020: 66 69 63 61 74 65                                  ficate
    >     >
    >     >
    >     > #2: ObjectId: 2.5.29.35 Criticality=false
    >     > AuthorityKeyIdentifier [
    >     > KeyIdentifier [
    >     > 0000: E9 5C 42 72 5E 70 D9 02   05 AA 11 BA 0D 4D 8D 0D
    > .\Br^p.......M..
    >     > 0010: F3 37 2C 95                                        .7,.
    >     > ]
    >     > [CN=SAP Ariba Cobalt CA, OU=ES, O=SAP Ariba, L=Palo Alto, ST=CA,
    > C=US]
    >     > SerialNumber: [    1001]
    >     > ]
    >     >
    >     > #3: ObjectId: 2.5.29.19 Criticality=false
    >     > BasicConstraints:[
    >     >   CA:false
    >     >   PathLen: undefined
    >     > ]
    >     >
    >     > #4: ObjectId: 2.5.29.37 Criticality=false
    >     > ExtendedKeyUsages [
    >     >   serverAuth
    >     > ]
    >     >
    >     > #5: ObjectId: 2.5.29.15 Criticality=true
    >     > KeyUsage [
    >     >   DigitalSignature
    >     >   Key_Encipherment
    >     > ]
    >     >
    >     > #6: ObjectId: 2.16.840.1.113730.1.1 Criticality=false
    >     > NetscapeCertType [
    >     >    SSL server
    >     > ]
    >     >
    >     > #7: ObjectId: 2.5.29.17 Criticality=false
    >     > SubjectAlternativeName [
    >     >   DNSName: search-solrcloud-solrcloud.service
    >     >   DNSName: search-solrcloud-solrcloud.service.mu.aws.ariba.com
    >     >   DNSName: *.query.mu.aws.ariba.com
    >     >   DNSName: *.query
    >     >   DNSName: *.service
    >     >   DNSName:
    >     >
    > 
e046469b-1bb0-55f6-913f-bd6d52b238a8.search-solrcloud-solrcloud.service.mu.aws.ariba.com
    >     >   DNSName:
    >     >
    > e046469b-1bb0-55f6-913f-bd6d52b238a8.search-solrcloud-solrcloud.service
    >     >   DNSName: *.service.mu.aws.ariba.com
    >     >   DNSName: 1.search-solrcloud-solrcloud.service.mu.aws.ariba.com
    >     >   DNSName: 1.search-solrcloud-solrcloud.service
    >     >   DNSName: localhost
    >     >   IPAddress: 10.1.56.9
    >     >   IPAddress: 10.169.50.16
    >     >   IPAddress: 127.0.0.1
    >     > ]
    >     >
    >     > #8: ObjectId: 2.5.29.14 Criticality=false
    >     > SubjectKeyIdentifier [
    >     > KeyIdentifier [
    >     > 0000: 3F 9D 3D 24 48 1E 61 3C   BD C0 A4 07 8B 64 51 0D
    > ?.=$H.a<.....dQ.
    >     > 0010: A2 B2 FE 89                                        ....
    >     > ]
    >     > ]
    >     >
    >     > Certificate[2]:
    >     > Owner: CN=SAP Ariba Cobalt Sidecar Intermediate CA, OU=COBALT, O=SAP
    >     > Ariba, ST=CA, C=US
    >     > Issuer: CN=SAP Ariba Cobalt CA, OU=ES, O=SAP Ariba, L=Palo Alto,
    > ST=CA,
    >     > C=US
    >     > Serial number: 1001
    >     > Valid from: Thu Apr 16 07:18:55 GMT 2020 until: Sun Apr 14 07:18:55
    > GMT
    >     > 2030
    >     > Certificate fingerprints:
    >     >          MD5:  FA:70:2F:DB:63:36:66:71:A6:7B:0F:46:F3:52:0B:3C
    >     >          SHA1:
    > 4F:27:D3:E3:12:24:64:18:B5:97:D0:BF:94:37:2D:5C:33:EA:1E:40
    >     >          SHA256:
    >     >
    > 
15:28:F4:DB:B3:D5:2E:21:6A:2E:56:47:E3:6B:D3:16:96:18:06:96:DA:5D:28:6B:34:CB:6D:FA:E8:FA:85:13
    >     > Signature algorithm name: SHA256withRSA
    >     > Subject Public Key Algorithm: 4096-bit RSA key
    >     > Version: 3
    >     >
    >     > Extensions:
    >     >
    >     > #1: ObjectId: 2.5.29.35 Criticality=false
    >     > AuthorityKeyIdentifier [
    >     > KeyIdentifier [
    >     > 0000: D8 A1 D1 11 50 8C 1C 2A   67 69 82 40 DF B5 68 6A  
....P..*gi.@
    > ..hj
    >     > 0010: E4 97 6E 32                                        ..n2
    >     > ]
    >     > ]
    >     >
    >     > #2: ObjectId: 2.5.29.19 Criticality=true
    >     > BasicConstraints:[
    >     >   CA:true
    >     >   PathLen:0
    >     > ]
    >     >
    >     > #3: ObjectId: 2.5.29.15 Criticality=true
    >     > KeyUsage [
    >     >   DigitalSignature
    >     >   Key_CertSign
    >     >   Crl_Sign
    >     > ]
    >     >
    >     > #4: ObjectId: 2.5.29.14 Criticality=false
    >     > SubjectKeyIdentifier [
    >     > KeyIdentifier [
    >     > 0000: E9 5C 42 72 5E 70 D9 02   05 AA 11 BA 0D 4D 8D 0D
    > .\Br^p.......M..
    >     > 0010: F3 37 2C 95                                        .7,.
    >     > ]
    >     > ]
    >     >
    >     >
    >     > Thanks,
    >     > Rajeswari
    >     >
    >     > On 7/13/20, 2:16 PM, "Kevin Risden" <kris...@apache.org> wrote:
    >     >
    >     >     >
    >     >     > In local with just certificate and one domain name  the SSL
    >     > communication
    >     >     > worked. With multiple DNS and 2 certificates SSL fails with
    > below
    >     > exception.
    >     >     >
    >     >
    >     >     A client keystore by definition can only have a single
    > certificate. A
    >     >     server keystore can have multiple certificates. The reason being
    > is
    >     > that a
    >     >     client can only be identified by a single certificate.
    >     >
    >     >     Can you share more details about specifically what your
    > solr.in.sh
    >     > configs
    >     >     look like related to keystore/truststore and which files?
    > Specifically
    >     >     highlight which files have multiple certificates in them.
    >     >
    >     >     It looks like for the Solr internal http client, the client
    > keystore
    >     > has
    >     >     more than one certificate in it and the error is correct. This
    > is more
    >     >     strict with recent versions of Jetty 9.4.x. Previously this 
would
    >     > silently
    >     >     fail, but was still incorrect. Now the error is bubbled up so
    > that
    >     > there is
    >     >     no silent misconfigurations.
    >     >
    >     >     Kevin Risden
    >     >
    >     >
    >     >     On Mon, Jul 13, 2020 at 4:54 PM Natarajan, Rajeswari <
    >     >     rajeswari.natara...@sap.com> wrote:
    >     >
    >     >     > I looked at the patch mentioned in the JIRA
    >     >     > https://issues.apache.org/jira/browse/SOLR-14105  reporting
    > the
    >     > below
    >     >     > issue. I looked at the solr 8.5.1 code base , I see the patch
    > is
    >     > applied.
    >     >     > But still seeing the same  exception with different stack
    > trace. The
    >     >     > initial excsption stacktrace was at
    >     >     >
    >     >     > at
    >     >     >
    >     >
    > 
org.eclipse.jetty.util.ssl.SslContextFactory.doStart(SslContextFactory.java:245)
    >     >     >
    >     >     >
    >     >     > Now the exception we encounter is at httpsolrclient creation
    >     >     >
    >     >     >
    >     >     >         Caused by: java.lang.RuntimeException:
    >     >     > java.lang.UnsupportedOperationException:
    > X509ExtendedKeyManager only
    >     >     > supported on Server
    >     >     >               at
    >     >     >
    >     >
    > 
org.apache.solr.client.solrj.impl.Http2SolrClient.createHttpClient(Http2SolrClient.java:223)
    >     >     >
    >     >     > I commented the JIRA also. Let me know if this is still an
    > issue.
    >     >     >
    >     >     > Thanks,
    >     >     > Rajeswari
    >     >     >
    >     >     > On 7/13/20, 2:03 AM, "Natarajan, Rajeswari" <
    >     > rajeswari.natara...@sap.com>
    >     >     > wrote:
    >     >     >
    >     >     >     Re-sending to see if anyone encountered  had this
    > combination and
    >     >     > encountered this issue. In local with just certificate and one
    >     > domain name
    >     >     > the SSL communication worked. With multiple DNS and 2
    > certificates
    >     > SSL
    >     >     > fails with below exception.  Below JIRA says it is fixed for
    >     >     > Http2SolrClient , wondering if this is fixed for http1 solr
    > client
    >     > as we
    >     >     > pass -Dsolr.http1=true .
    >     >     >
    >     >     >     Thanks,
    >     >     >     Rajeswari
    >     >     >
    >     >     >     https://issues.apache.org/jira/browse/SOLR-14105
    >     >     >
    >     >     >     On 7/6/20, 10:02 PM, "Natarajan, Rajeswari" <
    >     >     > rajeswari.natara...@sap.com> wrote:
    >     >     >
    >     >     >         Hi,
    >     >     >
    >     >     >         We are using Solr 8.5.1 in cloud mode  with Java 8. We
    > are
    >     >     > enabling  TLS  with http1  (as we get a warning java 8 + solr
    > 8.5
    >     > SSL can’t
    >     >     > be enabled) and we get below exception
    >     >     >
    >     >     >
    >     >     >
    >     >     >         2020-07-07 03:58:53.078 ERROR (main) [   ]
    > o.a.s.c.SolrCore
    >     >     > null:org.apache.solr.common.SolrException: Error instantiating
    >     >     > shardHandlerFactory class [HttpShardHandlerFactory]:
    >     >     > java.lang.UnsupportedOperationException:
    > X509ExtendedKeyManager only
    >     >     > supported on Server
    >     >     >               at
    >     >     >
    >     >
    > 
org.apache.solr.handler.component.ShardHandlerFactory.newInstance(ShardHandlerFactory.java:56)
    >     >     >               at
    >     >     > 
org.apache.solr.core.CoreContainer.load(CoreContainer.java:647)
    >     >     >               at
    >     >     >
    >     >
    > 
org.apache.solr.servlet.SolrDispatchFilter.createCoreContainer(SolrDispatchFilter.java:263)
    >     >     >               at
    >     >     >
    >     >
    > 
org.apache.solr.servlet.SolrDispatchFilter.init(SolrDispatchFilter.java:183)
    >     >     >               at
    >     >     >
    >     >
    > org.eclipse.jetty.servlet.FilterHolder.initialize(FilterHolder.java:134)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.servlet.ServletHandler.lambda$initialize$0(ServletHandler.java:751)
    >     >     >               at
    >     >     >
    >     >
    > 
java.util.Spliterators$ArraySpliterator.forEachRemaining(Spliterators.java:948)
    >     >     >               at
    >     >     >
    >     >
    > 
java.util.stream.Streams$ConcatSpliterator.forEachRemaining(Streams.java:742)
    >     >     >               at
    >     >     >
    >     >
    > 
java.util.stream.Streams$ConcatSpliterator.forEachRemaining(Streams.java:742)
    >     >     >               at
    >     >     >
    >     >
    > 
java.util.stream.ReferencePipeline$Head.forEach(ReferencePipeline.java:580)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.servlet.ServletHandler.initialize(ServletHandler.java:744)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.servlet.ServletContextHandler.startContext(ServletContextHandler.java:360)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.webapp.WebAppContext.startWebapp(WebAppContext.java:1445)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.webapp.WebAppContext.startContext(WebAppContext.java:1409)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.server.handler.ContextHandler.doStart(ContextHandler.java:822)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.servlet.ServletContextHandler.doStart(ServletContextHandler.java:275)
    >     >     >               at
    >     >     >
    >     >
    > org.eclipse.jetty.webapp.WebAppContext.doStart(WebAppContext.java:524)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:72)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.deploy.bindings.StandardStarter.processBinding(StandardStarter.java:46)
    >     >     >               at
    >     >     >
    >     >
    > org.eclipse.jetty.deploy.AppLifeCycle.runBindings(AppLifeCycle.java:188)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.deploy.DeploymentManager.requestAppGoal(DeploymentManager.java:513)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.deploy.DeploymentManager.addApp(DeploymentManager.java:154)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.deploy.providers.ScanningAppProvider.fileAdded(ScanningAppProvider.java:173)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.deploy.providers.WebAppProvider.fileAdded(WebAppProvider.java:447)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.deploy.providers.ScanningAppProvider$1.fileAdded(ScanningAppProvider.java:66)
    >     >     >               at
    >     >     > 
org.eclipse.jetty.util.Scanner.reportAddition(Scanner.java:784)
    >     >     >               at
    >     >     >
    > org.eclipse.jetty.util.Scanner.reportDifferences(Scanner.java:753)
    >     >     >               at
    >     > org.eclipse.jetty.util.Scanner.scan(Scanner.java:641)
    >     >     >               at
    >     > org.eclipse.jetty.util.Scanner.doStart(Scanner.java:540)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:72)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.deploy.providers.ScanningAppProvider.doStart(ScanningAppProvider.java:146)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:72)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.deploy.DeploymentManager.startAppProvider(DeploymentManager.java:599)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.deploy.DeploymentManager.doStart(DeploymentManager.java:249)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:72)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:169)
    >     >     >               at
    >     > org.eclipse.jetty.server.Server.start(Server.java:407)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:117)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.server.handler.AbstractHandler.doStart(AbstractHandler.java:100)
    >     >     >               at
    >     > org.eclipse.jetty.server.Server.doStart(Server.java:371)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:72)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.xml.XmlConfiguration.lambda$main$0(XmlConfiguration.java:1888)
    >     >     >               at
    > java.security.AccessController.doPrivileged(Native
    >     > Method)
    >     >     >               at
    >     >     >
    >     >
    > org.eclipse.jetty.xml.XmlConfiguration.main(XmlConfiguration.java:1837)
    >     >     >               at
    > sun.reflect.NativeMethodAccessorImpl.invoke0(Native
    >     >     > Method)
    >     >     >               at
    >     >     >
    >     >
    > 
sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
    >     >     >               at
    >     >     >
    >     >
    > 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
    >     >     >               at
    > java.lang.reflect.Method.invoke(Method.java:498)
    >     >     >               at
    >     > org.eclipse.jetty.start.Main.invokeMain(Main.java:218)
    >     >     >               at
    > org.eclipse.jetty.start.Main.start(Main.java:491)
    >     >     >               at
    > org.eclipse.jetty.start.Main.main(Main.java:77)
    >     >     >         Caused by: java.lang.RuntimeException:
    >     >     > java.lang.UnsupportedOperationException:
    > X509ExtendedKeyManager only
    >     >     > supported on Server
    >     >     >               at
    >     >     >
    >     >
    > 
org.apache.solr.client.solrj.impl.Http2SolrClient.createHttpClient(Http2SolrClient.java:223)
    >     >     >               at
    >     >     >
    >     >
    > 
org.apache.solr.client.solrj.impl.Http2SolrClient.<init>(Http2SolrClient.java:153)
    >     >     >               at
    >     >     >
    >     >
    > 
org.apache.solr.client.solrj.impl.Http2SolrClient$Builder.build(Http2SolrClient.java:832)
    >     >     >               at
    >     >     >
    >     >
    > 
org.apache.solr.handler.component.HttpShardHandlerFactory.init(HttpShardHandlerFactory.java:321)
    >     >     >               at
    >     >     >
    >     >
    > 
org.apache.solr.handler.component.ShardHandlerFactory.newInstance(ShardHandlerFactory.java:51)
    >     >     >               ... 50 more
    >     >     >         Caused by: java.lang.UnsupportedOperationException:
    >     >     > X509ExtendedKeyManager only supported on Server
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.util.ssl.SslContextFactory.newSniX509ExtendedKeyManager(SslContextFactory.java:1273)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.util.ssl.SslContextFactory.getKeyManagers(SslContextFactory.java:1255)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.util.ssl.SslContextFactory.load(SslContextFactory.java:374)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.util.ssl.SslContextFactory.doStart(SslContextFactory.java:245)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:72)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:169)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:117)
    >     >     >               at
    >     >     >
    > org.eclipse.jetty.client.HttpClient.doStart(HttpClient.java:244)
    >     >     >               at
    >     >     >
    >     >
    > 
org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:72)
    >     >     >               at
    >     >     >
    >     >
    > 
org.apache.solr.client.solrj.impl.Http2SolrClient.createHttpClient(Http2SolrClient.java:221)
    >     >     >               ... 54 more
    >     >     >
    >     >     >
    >     >     >         I see that there is a  below bug for this issue and is
    >     > resolved.
    >     >     > So I am not sure what will the cause of the issue.
    >     >     >
    >     >     >         https://issues.apache.org/jira/browse/SOLR-14105
    >     >     >
    >     >     >
    >     >     >         Thanks,
    >     >     >         Rajeswari
    >     >     >
    >     >     >
    >     >     >
    >     >
    >     >
    >
    >

Reply via email to