<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cluster Issue in Data Engineering</title>
    <link>https://community.databricks.com/t5/data-engineering/cluster-issue/m-p/148065#M52821</link>
    <description>&lt;P&gt;Nishant, Please note that towards the end of Feb 7.3 will stop working as it's reaching EoL not just EoS. It's been EoS since 2023. We've been emailing customers for several months now about EoL.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please review this table carefully. You have to move to at least 10.4 LTS.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.databricks.com/aws/en/archive/runtime-release-notes/#end-of-support-history" target="_blank"&gt;https://docs.databricks.com/aws/en/archive/runtime-release-notes/#end-of-support-history&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 11 Feb 2026 16:19:40 GMT</pubDate>
    <dc:creator>MoJaMa</dc:creator>
    <dc:date>2026-02-11T16:19:40Z</dc:date>
    <item>
      <title>Cluster Issue</title>
      <link>https://community.databricks.com/t5/data-engineering/cluster-issue/m-p/147993#M52806</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Driver: c5.4xlarge · Workers: c5.4xlarge · 8 workers · On-demand and Spot · fall back to On-demand · DBR: 7.3 LTS (includes Apache Spark 3.0.1, Scala 2.12) · us-east-1c&lt;BR /&gt;&lt;/SPAN&gt;In my databricks job there is a step NDS download which we used to download files from 3rd party portal. And the cluster which support this step is getting deprecated now. (Cluster details are mentioned above).&lt;BR /&gt;I have tried every possible solution to resolve this. But still at square one and mainly 2 types of error are coming up -&amp;nbsp;&lt;BR /&gt;1.&amp;nbsp;&lt;SPAN&gt;(SSLError(398, '[SSL: CA_MD_TOO_WEAK] ca md too weak (_ssl.c:3900)')))&lt;/SPAN&gt;&lt;BR /&gt;2.&amp;nbsp;&lt;SPAN&gt; SSLError(SSLError(399, '[SSL: EE_KEY_TOO_SMALL] ee key too small (_ssl.c:3900)')))&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;Looking for solution, please help!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2026 06:57:32 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/cluster-issue/m-p/147993#M52806</guid>
      <dc:creator>NishantTiwari</dc:creator>
      <dc:date>2026-02-11T06:57:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cluster Issue</title>
      <link>https://community.databricks.com/t5/data-engineering/cluster-issue/m-p/148029#M52811</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/215647"&gt;@NishantTiwari&lt;/a&gt;&amp;nbsp;SSL handhsake is failing when try to download files from 3rd party portal because you are using dbr 7.3 which is deprecated and also supports weaker TLS defaults, you cannot either upgrade TLS settings inside DBR 7.3&lt;/P&gt;&lt;P&gt;upgrade your cluster runtime to 13.3 LTS or +&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2026 11:07:12 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/cluster-issue/m-p/148029#M52811</guid>
      <dc:creator>saurabh18cs</dc:creator>
      <dc:date>2026-02-11T11:07:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cluster Issue</title>
      <link>https://community.databricks.com/t5/data-engineering/cluster-issue/m-p/148065#M52821</link>
      <description>&lt;P&gt;Nishant, Please note that towards the end of Feb 7.3 will stop working as it's reaching EoL not just EoS. It's been EoS since 2023. We've been emailing customers for several months now about EoL.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please review this table carefully. You have to move to at least 10.4 LTS.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.databricks.com/aws/en/archive/runtime-release-notes/#end-of-support-history" target="_blank"&gt;https://docs.databricks.com/aws/en/archive/runtime-release-notes/#end-of-support-history&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2026 16:19:40 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/cluster-issue/m-p/148065#M52821</guid>
      <dc:creator>MoJaMa</dc:creator>
      <dc:date>2026-02-11T16:19:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cluster Issue</title>
      <link>https://community.databricks.com/t5/data-engineering/cluster-issue/m-p/148068#M52823</link>
      <description>&lt;P&gt;Thanks! &lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/22314"&gt;@saurabh18cs&lt;/a&gt;&amp;nbsp;&amp;amp; &lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/425"&gt;@MoJaMa&lt;/a&gt; I know its EoL. Now I'm looking for solution. Mojama can you please me to add init script in cluster workspace (source) that gonna work. Also I'm tryin any runtime version 14.3 or + facing the same issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2026 16:29:49 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/cluster-issue/m-p/148068#M52823</guid>
      <dc:creator>NishantTiwari</dc:creator>
      <dc:date>2026-02-11T16:29:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cluster Issue</title>
      <link>https://community.databricks.com/t5/data-engineering/cluster-issue/m-p/148165#M52837</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/215647"&gt;@NishantTiwari&lt;/a&gt;&amp;nbsp;then what i see is problem not client side but server side . they need to updte their TLS certificate. Ask them to use a modern TLS 1.2 or higher&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 11:07:10 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/cluster-issue/m-p/148165#M52837</guid>
      <dc:creator>saurabh18cs</dc:creator>
      <dc:date>2026-02-12T11:07:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cluster Issue</title>
      <link>https://community.databricks.com/t5/data-engineering/cluster-issue/m-p/150124#M53255</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.databricks.com/t5/user/viewprofilepage/user-id/215647"&gt;@NishantTiwari&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;I see you have already upgraded to DBR 14.3+ but are still hitting the same SSL errors. That makes sense, and here is why: the two errors you are seeing point to the 3rd party server using weak or outdated SSL certificates, not an issue on your Databricks cluster itself.&lt;/P&gt;
&lt;P&gt;CA_MD_TOO_WEAK - The server's CA certificate uses a weak message digest (e.g., MD5 or short SHA-1)&lt;BR /&gt;EE_KEY_TOO_SMALL - The server's end-entity certificate uses a key that is too short (e.g., 1024-bit RSA)&lt;/P&gt;
&lt;P&gt;Newer Databricks Runtimes ship with updated versions of OpenSSL that enforce stricter security defaults. So upgrading the runtime actually makes OpenSSL MORE strict, which is why you continue to see these errors even on 14.3+.&lt;/P&gt;
&lt;P&gt;THE RECOMMENDED LONG-TERM FIX&lt;/P&gt;
&lt;P&gt;The best solution is to ask the 3rd party portal to update their TLS certificates to use modern standards (at minimum TLS 1.2 with 2048-bit RSA keys and SHA-256 or stronger). This is the correct fix because their certificates do not meet current security standards.&lt;/P&gt;
&lt;P&gt;A WORKAROUND USING AN INIT SCRIPT&lt;/P&gt;
&lt;P&gt;If you cannot get the 3rd party to update their certificates right away, you can temporarily lower the OpenSSL security level on your cluster using an init script. This allows the connection to succeed while the 3rd party works on upgrading their certificates.&lt;/P&gt;
&lt;P&gt;Step 1: Create the init script file. In your Databricks workspace, create a new file (for example at /Workspace/Users/your-email/init-scripts/lower-ssl-security.sh) with this content:&lt;/P&gt;
&lt;P&gt;#!/bin/bash&lt;BR /&gt;# Temporarily lower OpenSSL security level to allow weak certificates&lt;BR /&gt;# from legacy third-party servers.&lt;BR /&gt;&lt;BR /&gt;OPENSSL_CONF_FILE="/etc/ssl/openssl_custom.cnf"&lt;BR /&gt;&lt;BR /&gt;cat &amp;gt; "$OPENSSL_CONF_FILE" &amp;lt;&amp;lt; 'EOF'&lt;BR /&gt;openssl_conf = default_conf&lt;BR /&gt;&lt;BR /&gt;[default_conf]&lt;BR /&gt;ssl_conf = ssl_sect&lt;BR /&gt;&lt;BR /&gt;[ssl_sect]&lt;BR /&gt;system_default = system_default_sect&lt;BR /&gt;&lt;BR /&gt;[system_default_sect]&lt;BR /&gt;CipherString = DEFAULT:@SECLEVEL=1&lt;BR /&gt;EOF&lt;BR /&gt;&lt;BR /&gt;echo "export OPENSSL_CONF=$OPENSSL_CONF_FILE" &amp;gt;&amp;gt; /etc/environment&lt;BR /&gt;echo "export OPENSSL_CONF=$OPENSSL_CONF_FILE" &amp;gt;&amp;gt; /databricks/spark/conf/spark-env.sh&lt;/P&gt;
&lt;P&gt;Step 2: Attach the init script to your cluster.&lt;BR /&gt;1. Go to your cluster configuration page&lt;BR /&gt;2. Enable the Advanced toggle&lt;BR /&gt;3. Click the Init Scripts tab&lt;BR /&gt;4. Select "Workspace" as the source&lt;BR /&gt;5. Enter the path to your script (e.g., /Workspace/Users/your-email/init-scripts/lower-ssl-security.sh)&lt;BR /&gt;6. Click Add, then restart the cluster&lt;/P&gt;
&lt;P&gt;AN ALTERNATIVE PYTHON-LEVEL WORKAROUND&lt;/P&gt;
&lt;P&gt;If you only need this for a specific notebook or job step rather than the whole cluster, you can also set the environment variable directly in your Python code before making the HTTPS call:&lt;/P&gt;
&lt;P&gt;import os&lt;BR /&gt;import ssl&lt;BR /&gt;import urllib3&lt;BR /&gt;&lt;BR /&gt;# Lower the security level for this session only&lt;BR /&gt;os.environ['OPENSSL_CONF'] = '/dev/null'&lt;BR /&gt;&lt;BR /&gt;# Create a custom SSL context with lower security&lt;BR /&gt;ctx = ssl.create_default_context()&lt;BR /&gt;ctx.set_ciphers('DEFAULT:@SECLEVEL=1')&lt;BR /&gt;&lt;BR /&gt;# If using requests library:&lt;BR /&gt;import requests&lt;BR /&gt;from requests.adapters import HTTPAdapter&lt;BR /&gt;&lt;BR /&gt;class SSLAdapter(HTTPAdapter):&lt;BR /&gt;def init_poolmanager(self, *args, kwargs):&lt;BR /&gt;ctx = ssl.create_default_context()&lt;BR /&gt;ctx.set_ciphers('DEFAULT:@SECLEVEL=1')&lt;BR /&gt;kwargs['ssl_context'] = ctx&lt;BR /&gt;return super().init_poolmanager(*args, kwargs)&lt;BR /&gt;&lt;BR /&gt;session = requests.Session()&lt;BR /&gt;session.mount('https://', SSLAdapter())&lt;BR /&gt;response = session.get('&lt;A href="https://your-third-party-url.com/download" target="_blank"&gt;https://your-third-party-url.com/download&lt;/A&gt;')&lt;/P&gt;
&lt;P&gt;IMPORTANT NOTES&lt;/P&gt;
&lt;P&gt;- Lowering the SSL security level does reduce the security of those connections, so only apply this to the specific cluster or session that needs it.&lt;BR /&gt;- This should be treated as a temporary measure while the 3rd party upgrades their certificates.&lt;BR /&gt;- Make sure you are running DBR 13.3 LTS or later since DBR 7.3 has reached end-of-life as of February 2026 and will no longer launch clusters.&lt;/P&gt;
&lt;P&gt;For reference on configuring init scripts:&lt;BR /&gt;&lt;A href="https://docs.databricks.com/aws/en/init-scripts/cluster-scoped.html" target="_blank"&gt;https://docs.databricks.com/aws/en/init-scripts/cluster-scoped.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;For the Databricks Runtime support schedule:&lt;BR /&gt;&lt;A href="https://docs.databricks.com/aws/en/archive/runtime-release-notes/" target="_blank"&gt;https://docs.databricks.com/aws/en/archive/runtime-release-notes/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Hope this helps get your NDS download step working again!&lt;/P&gt;
&lt;P&gt;* This reply used an agent system I built to research and draft this response based on the wide set of documentation I have available and previous memory. I personally review the draft for any obvious issues and for monitoring system reliability and update it when I detect any drift, but there is still a small chance that something is inaccurate, especially if you are experimenting with brand new features.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Mar 2026 04:38:30 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-engineering/cluster-issue/m-p/150124#M53255</guid>
      <dc:creator>SteveOstrowski</dc:creator>
      <dc:date>2026-03-08T04:38:30Z</dc:date>
    </item>
  </channel>
</rss>

