Skip to content

Commit 5ab22db

Browse files
authored
FMEPRD-278 (#11491)
1 parent 08a6959 commit 5ab22db

File tree

1 file changed

+33
-3
lines changed
  • docs/feature-management-experimentation/20-sdks-and-infrastructure/server-side-sdks

1 file changed

+33
-3
lines changed

docs/feature-management-experimentation/20-sdks-and-infrastructure/server-side-sdks/java-sdk.md

Lines changed: 33 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1748,7 +1748,7 @@ To fix this issue, you have two options:
17481748
1. Upgrade your JDK to version 1.7 or above. These versions include support for the stronger ciphers by default.
17491749
1. If upgrading is not an option, install the Java Cryptography Extension (JCE) provided by your JVM vendor for Java 6 to enable support for high-strength ciphers.
17501750

1751-
### Exception: PKIX path building failed — unable to find valid certification path to requested target
1751+
### Exception: PKIX path building failed
17521752

17531753
When initializing the Java SDK `SplitFactory` object, you may see the following error:
17541754

@@ -1763,7 +1763,7 @@ unable to find valid certification path to requested target
17631763

17641764
This indicates that Java could not verify the SSL certificate from Split.io, preventing a secure connection between the SDK and Harness FME servers.
17651765

1766-
Manually install the Split.io certificates into your JVM’s trust store:
1766+
Manually install Split.io's certificates into your JVM’s trust store:
17671767

17681768
1. Download the certificates for both `sdk.split.io` and `events.split.io`:
17691769

@@ -1772,11 +1772,41 @@ Manually install the Split.io certificates into your JVM’s trust store:
17721772
openssl s_client -showcerts -connect events.split.io:443 </dev/null 2>/dev/null | openssl x509 -outform PEM > spliteventscert.pem
17731773
```
17741774

1775-
1. Import the certificates into the Java cacerts keystore (replace [JAVA_HOME] with your Java installation path):
1775+
1. Import the certificates into the Java `cacerts` keystore (replace `[JAVA_HOME]` with your Java installation path):
17761776

17771777
```bash
17781778
keytool -importcert -file splitsdkcert.pem -keystore [JAVA_HOME]/lib/security/cacerts -alias "splitsdkcert"
17791779
keytool -importcert -file spliteventscert.pem -keystore [JAVA_HOME]/lib/security/cacerts -alias "spliteventscert"
17801780
```
17811781

17821782
1. Restart your Java application.
1783+
1784+
#### Certificate renewals
1785+
1786+
Harness FME relies on Split.io's managed certificates for secure SDK communication. When Split.io rotates or renews its certificates, your application should continue working if:
1787+
1788+
* Your JVM's default trust store already contains the required certificate authorities (most modern JDKs do).
1789+
* Or, you've installed the intermediate/root certificates instead of the short-lived leaf certificates.
1790+
1791+
However, if you manually imported specific leaf certificates, you'll need to repeat the steps above when Split.io updates them. To avoid manual updates, consider updating your JDK to the latest version so its default trust store includes up-to-date CAs.
1792+
1793+
#### Check certificate expiry proactively
1794+
1795+
To see when Split.io's certificates expire, run:
1796+
1797+
```bash
1798+
echo | openssl s_client -connect sdk.split.io:443 -servername sdk.split.io 2>/dev/null \
1799+
| openssl x509 -noout -dates
1800+
1801+
echo | openssl s_client -connect events.split.io:443 -servername events.split.io 2>/dev/null \
1802+
| openssl x509 -noout -dates
1803+
```
1804+
1805+
This outputs something like the following:
1806+
1807+
```
1808+
notBefore=Mar 1 00:00:00 2025 GMT
1809+
notAfter=May 30 23:59:59 2025 GMT
1810+
```
1811+
1812+
If the `notAfter` date is approaching and you manually imported certificates, repeat the installation steps above.

0 commit comments

Comments
 (0)