<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Nifi secured cluster can't send heartbeat betweennodes in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Nifi-secured-cluster-can-t-send-heartbeat-betweennodes/m-p/330302#M230635</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/89789"&gt;@emmanuel&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you updated the truststore as well on the master node and distributed the same across different nifi nodes?&lt;/P&gt;</description>
    <pubDate>Tue, 16 Nov 2021 11:01:27 GMT</pubDate>
    <dc:creator>Azhar_Shaikh</dc:creator>
    <dc:date>2021-11-16T11:01:27Z</dc:date>
    <item>
      <title>Nifi secured cluster can't send heartbeat betweennodes</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-secured-cluster-can-t-send-heartbeat-betweennodes/m-p/330285#M230631</link>
      <description>&lt;P&gt;Hi list,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I’m facing a weird problem I can’t resolve or even understand with my secured nifi cluster. Below is the situation.&lt;/P&gt;&lt;P&gt;We have setup a secured nifi cluster with 3 nodes, say node1,node2 and node3.&lt;/P&gt;&lt;P&gt;For each of theses nodes, we’ve manually created a SSL certificate signing request (CSR) (using a password protected private key) to be signed by our internal CA.&lt;/P&gt;&lt;P&gt;Once we’ve get the certificates signed, I’ve installed each node certificates following this procedure:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Add the full certificate chain (root + intermediate certificates) into the signed certificate.&lt;BR /&gt;cat nifi-nodeX.pem cert_chain.pem &amp;nbsp;&amp;gt; full-nifi-nodeX.pem&lt;/LI&gt;&lt;LI&gt;Create a PKCS12 certificate using private key (.key) and full signed certificate (.pem)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;openssl pkcs12 -export &amp;nbsp;-in full-nifi-nodeX.pem &amp;nbsp;-inkey nifi-nodeX.key &amp;nbsp;-out nifi-nodeX.p12 \&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -name nifi-nodeX -passin pass:"XXXXXX" -passout pass:YYYYY;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Import nifi-nodeX.p12 into the nifi-nodeX keystore&lt;BR /&gt;keytool –omportkeystore –deststorepass xxxxxx –destkeystore keystore.jks –srckeystore nifi-nodeX.p12 –srcstoretype PKCS12&lt;/LI&gt;&lt;LI&gt;Then added each other nifi-node certificates (.pem) into nifi-truststore&lt;BR /&gt;node1: add full-nifi-node2 + full-nifi-node3 into truststore&lt;BR /&gt;node2: add full-nifi-node1 + full-nifi-node3 into truststore&lt;BR /&gt;node3: add full-nifi-node2 + full-nifi-node1 into truststore&lt;/LI&gt;&lt;LI&gt;Restarted each node&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once each node are restarted, I can connect to the web UI, but I’ve got an error message saying:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For info, web UI is reachable on port 8443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Invalid State:&lt;/P&gt;&lt;P&gt;The Flow Controller is initializing the Data Flow.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking at node logs (nifi-app.log) I can see that each node cannot talk to each other and to the Coordinator to send heartbeat messages:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nifi-node1:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;INFO [main] o.a.n.c.c.n.LeaderElectionNodeProtocolSender Determined that Cluster Coordinator is located at nifi-node2:11443; will use this address for sending heartbeat messages&lt;/P&gt;&lt;P&gt;INFO [main] o.a.n.c.p.AbstractNodeProtocolSender Cluster Coordinator is located at nifi-node2:11443. Will send Cluster Connection Request to this address&lt;/P&gt;&lt;P&gt;WARN [main] o.a.nifi.controller.StandardFlowService Failed to connect to cluster due to: org.apache.nifi.cluster.protocol.ProtocolException: Failed unmarshalling 'CONNECTION_RESPONSE' protocol message from nifi-node2.rd1.rf1/10.108.70.39:11443 due to: javax.net.ssl.SSLHandshakeException: Received fatal alert: bad_certificate&lt;/P&gt;&lt;P&gt;…&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nifi-node2:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;WARN [Process Cluster Protocol Request-1] o.a.n.c.p.impl.SocketProtocolListener Failed processing protocol message from nifi-node3 due to Empty client certificate chain&lt;/P&gt;&lt;P&gt;INFO [main] o.a.n.c.c.n.LeaderElectionNodeProtocolSender Determined that Cluster Coordinator is located at nifi-node2:11443; will use this address for sending heartbeat messages&lt;/P&gt;&lt;P&gt;INFO [main] o.a.n.c.p.AbstractNodeProtocolSender Cluster Coordinator is located at nifi-node2:11443. Will send Cluster Connection Request to this address&lt;/P&gt;&lt;P&gt;WARN [main] o.a.nifi.controller.StandardFlowService Failed to connect to cluster due to: org.apache.nifi.cluster.protocol.ProtocolException: Failed marshalling 'CONNECTION_REQUEST' protocol message due to: java.net.SocketException: Connection reset by peer (Write failed)&lt;/P&gt;&lt;P&gt;…&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nifi-node3:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;INFO [main] o.a.n.c.c.n.LeaderElectionNodeProtocolSender Determined that Cluster Coordinator is located at nifi-node2:11443; will use this address for sending heartbeat messages&lt;/P&gt;&lt;P&gt;INFO [main] o.a.n.c.p.AbstractNodeProtocolSender Cluster Coordinator is located at nifi-node2:11443. Will send Cluster Connection Request to this address&lt;/P&gt;&lt;P&gt;WARN [main] o.a.nifi.controller.StandardFlowService Failed to connect to cluster due to: org.apache.nifi.cluster.protocol.ProtocolException: Failed unmarshalling 'CONNECTION_RESPONSE' protocol message from nifi-node2/10.108.70.39:11443 due to: javax.net.ssl.SSLHandshakeException: Received fatal alert: bad_certificate&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It looks like the signed certificates are not ok regarding the logs errors.&lt;/P&gt;&lt;P&gt;However, trying these certificates using openssl s_client command works as expected:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;openssl s_client -connect nifi-node3:11443 -cert full-nifi-node3.pem -key nifi-node3.key -pass pass:'XXXXXXX’&lt;/P&gt;&lt;P&gt;CONNECTED(00000003)&lt;/P&gt;&lt;P&gt;depth=3 C = FR, O = SAFRAN, OU = 0002 562082909, CN = SAFRAN Root CA 1&lt;/P&gt;&lt;P&gt;verify return:1&lt;/P&gt;&lt;P&gt;depth=2 C = FR, O = SAFRAN, OU = 0002 562082909, CN = SAFRAN Corporate CA 1&lt;/P&gt;&lt;P&gt;verify return:1&lt;/P&gt;&lt;P&gt;depth=1 C = FR, O = SAFRAN, OU = 0002 562082909, CN = SAFRAN Corporate Service CA 2&lt;/P&gt;&lt;P&gt;verify return:1&lt;/P&gt;&lt;P&gt;depth=0 C = FR, O = SAFRAN, OU = SAFRAN SA, OU = 0002 562082909, CN = nifi-node3&lt;/P&gt;&lt;P&gt;verify return:1&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;Certificate chain&lt;/P&gt;&lt;P&gt;0 s:/C=FR/O=SAFRAN/OU=SAFRAN SA/OU=0002 562082909/CN=nifi-node3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; i:/C=FR/O=SAFRAN/OU=0002 562082909/CN=SAFRAN Corporate Service CA 2&lt;/P&gt;&lt;P&gt;1 s:/C=FR/O=SAFRAN/OU=0002 562082909/CN=SAFRAN Corporate Service CA 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; i:/C=FR/O=SAFRAN/OU=0002 562082909/CN=SAFRAN Corporate CA 1&lt;/P&gt;&lt;P&gt;2 s:/C=FR/O=SAFRAN/OU=0002 562082909/CN=SAFRAN Corporate CA 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; i:/C=FR/O=SAFRAN/OU=0002 562082909/CN=SAFRAN Root CA 1&lt;/P&gt;&lt;P&gt;3 s:/C=FR/O=SAFRAN/OU=0002 562082909/CN=SAFRAN Root CA 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; i:/C=FR/O=SAFRAN/OU=0002 562082909/CN=SAFRAN Root CA 1&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;Server certificate&lt;/P&gt;&lt;P&gt;-----BEGIN CERTIFICATE-----&lt;/P&gt;&lt;P&gt;….&lt;/P&gt;&lt;P&gt;-----END CERTIFICATE-----&lt;/P&gt;&lt;P&gt;subject=/C=FR/O=SAFRAN/OU=SAFRAN SA/OU=0002 562082909/CN=nifi-node3&lt;/P&gt;&lt;P&gt;issuer=/C=FR/O=SAFRAN/OU=0002 562082909/CN=SAFRAN Corporate Service CA 2&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;Acceptable client certificate CA names&lt;/P&gt;&lt;P&gt;/C=FR/O=SAFRAN/OU=SAFRAN SA/OU=0002 562082909/CN=nifi-node3&lt;/P&gt;&lt;P&gt;/C=FR/O=SAFRAN/OU=SAFRAN SA/OU=0002 562082909/CN=niif-node2&lt;/P&gt;&lt;P&gt;/C=FR/O=SAFRAN/OU=SAFRAN SA/OU=0002 562082909/CN=nifi-node1&lt;/P&gt;&lt;P&gt;/C=FR/OU=SAFRAN SA/OU=0002 562082909/O=SAFRAN/CN=Safran Nifi Admin&lt;/P&gt;&lt;P&gt;/C=FR/OU=SAFRAN SA/OU=0002 562082909/O=SAFRAN/CN=localhost&lt;/P&gt;&lt;P&gt;Client Certificate Types: ECDSA sign, RSA sign, DSA sign&lt;/P&gt;&lt;P&gt;Requested Signature Algorithms: 0x07+0x08:0x08+0x08:ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:0x04+0x08:0x05+0x08:0x06+0x08:0x09+0x08:0x0A+0x08:0x0B+0x08:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:ECDSA+SHA1:RSA+SHA1&lt;/P&gt;&lt;P&gt;Shared Requested Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:RSA+SHA224:ECDSA+SHA1:RSA+SHA1&lt;/P&gt;&lt;P&gt;Peer signing digest: SHA512&lt;/P&gt;&lt;P&gt;Server Temp Key: ECDH, P-256, 256 bits&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;SSL handshake has read 8911 bytes and written 8534 bytes&lt;/P&gt;&lt;P&gt;New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;Server public key is 4096 bit&lt;/P&gt;&lt;P&gt;Secure Renegotiation IS supported&lt;/P&gt;&lt;P&gt;Compression: NONE&lt;/P&gt;&lt;P&gt;Expansion: NONE&lt;/P&gt;&lt;P&gt;No ALPN negotiated&lt;/P&gt;&lt;P&gt;SSL-Session:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol&amp;nbsp; : TLSv1.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cipher&amp;nbsp;&amp;nbsp;&amp;nbsp; : ECDHE-RSA-AES256-GCM-SHA384&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session-ID: 68686A816F510BED151FEBB80604862B799CD0D5DFCEA9602A9E204E9EC5741E&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session-ID-ctx:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Master-Key: CB4E24EDCAA3518494C04762965452CDC9CE993FCCAF3DBCCF76755376B808667342AF327DE5B8DE6B3B981F55B3CB90&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Key-Arg&amp;nbsp;&amp;nbsp; : None&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Krb5 Principal: None&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; PSK identity: None&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; PSK identity hint: None&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Start Time: 1635340626&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Timeout&amp;nbsp;&amp;nbsp; : 300 (sec)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Verify return code: 0 (ok)&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;closed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is something I don’t get!&lt;/P&gt;&lt;P&gt;I’ve tried all the above procedure without adding the full cert chain, same errors.&lt;/P&gt;&lt;P&gt;I’ve tried with autogenerated self-signed certificates using nifi-toolkit, and it works as expected, so I think there is definitely something wrong with the signed certificates but I’ve no clue at all what it could be.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please could someone light my lantern, I’ve no more idea or way to explore.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Emmanuel&lt;/P&gt;</description>
      <pubDate>Tue, 16 Nov 2021 09:18:19 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-secured-cluster-can-t-send-heartbeat-betweennodes/m-p/330285#M230631</guid>
      <dc:creator>emmanuel</dc:creator>
      <dc:date>2021-11-16T09:18:19Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi secured cluster can't send heartbeat betweennodes</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-secured-cluster-can-t-send-heartbeat-betweennodes/m-p/330302#M230635</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/89789"&gt;@emmanuel&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you updated the truststore as well on the master node and distributed the same across different nifi nodes?&lt;/P&gt;</description>
      <pubDate>Tue, 16 Nov 2021 11:01:27 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-secured-cluster-can-t-send-heartbeat-betweennodes/m-p/330302#M230635</guid>
      <dc:creator>Azhar_Shaikh</dc:creator>
      <dc:date>2021-11-16T11:01:27Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi secured cluster can't send heartbeat betweennodes</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-secured-cluster-can-t-send-heartbeat-betweennodes/m-p/330309#M230640</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;Each cluster node's truststore contains pem cerificate from other cluster nodes. For example, truststore from node1 contains pem certs from node2 and node3, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it the question you're asking ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Nov 2021 13:00:57 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-secured-cluster-can-t-send-heartbeat-betweennodes/m-p/330309#M230640</guid>
      <dc:creator>emmanuel</dc:creator>
      <dc:date>2021-11-16T13:00:57Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi secured cluster can't send heartbeat betweennodes</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-secured-cluster-can-t-send-heartbeat-betweennodes/m-p/330320#M230642</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/89789"&gt;@emmanuel&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Can you share the verbose output for your NiFi keystore:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;keytool -v -list -keystore &amp;lt;nifi keystore&amp;gt;&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does that output align with the certificate requirements for NiFi?&lt;BR /&gt;&lt;STRONG&gt;&lt;A href="https://docs.cloudera.com/cfm/2.1.2/cfm-security/topics/cfm-security-tls-certificate-requirements-recommendations.html" target="_blank"&gt;https://docs.cloudera.com/cfm/2.1.2/cfm-security/topics/cfm-security-tls-certificate-requirements-recommendations.html&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What version of NiFi are your running?&lt;/P&gt;&lt;P&gt;What version of Java is your NiFi using?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;If you found this response assisted with your query, please take a moment to login and click on "&lt;STRONG&gt;Accept as Solution&lt;/STRONG&gt;" below this post.&lt;BR /&gt;&lt;BR /&gt;Thank you,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Nov 2021 13:56:10 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-secured-cluster-can-t-send-heartbeat-betweennodes/m-p/330320#M230642</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2021-11-16T13:56:10Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi secured cluster can't send heartbeat betweennodes</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-secured-cluster-can-t-send-heartbeat-betweennodes/m-p/330402#M230666</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the&lt;/P&gt;&lt;PRE&gt;keystore.jks&lt;/PRE&gt;&lt;P&gt;output from&lt;/P&gt;&lt;PRE&gt;nifi-node1&lt;/PRE&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;Keystore type: JKS
Keystore provider: SUN

Your keystore contains 1 entry

Alias name: nifi-node1
Creation date: Nov 17, 2021
Entry type: PrivateKeyEntry
Certificate chain length: 4
Certificate[1]:
Owner: CN=nifi-node1, ..... C=FR
Issuer: CN=Corporate Service CA 2, ... C=FR
Serial number: xxx
Valid from: Tue Oct 19 13:04:45 CEST 2021 until: Mon Jan 22 12:05:15 CET 2024
Certificate fingerprints:
         SHA1: XXXXXX
         SHA256: XXXXXX
Signature algorithm name: SHA256withRSA
Subject Public Key Algorithm: 4096-bit RSA key
Version: 3

Extensions:

#1: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
.....
#2: ObjectId: 2.5.29.35 Criticality=false
...
#3: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
....
]

#4: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
  [CertificatePolicyId: [xxxxxx]
[]  ]
]

#5: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
  clientAuth
  serverAuth
]

#6: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  DigitalSignature
  Key_Encipherment
]

#7: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
  DNSName: nifi-node1
  DNSName: nifi-node2
  DNSName: nifi-node3
  DNSName: load-balancer-fqdn (modified)
  DNSName: load-balancer-hostname (modified)
]

#8: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: xxxxx
0010: xxxxxx
]
]

Certificate[2]:
Owner: CN=Corporate Service CA 2, ...., C=FR
Issuer: CN=Corporate CA 1, ...., C=FR
Serial number: xxxxx
Valid from: Fri May 23 02:00:00 CEST 2014 until: Sat May 23 02:00:00 CEST 2026
Certificate fingerprints:
         SHA1: XXXXX
         SHA256: XXXXX
Signature algorithm name: SHA256withRSA
Subject Public Key Algorithm: 4096-bit RSA key
Version: 3

Extensions:

#1: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
  [
XXXX]
]

#2: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
XXXX
]
]

#3: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
  CA:true
  PathLen:0
]

#4: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
 XXX
]

#5: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
  [CertificatePolicyId: [XXXXXXX]
[]  ]
  [CertificatePolicyId: [XXXXXXX]
[]  ]
  [CertificatePolicyId: [XXXXXXX]
[]  ]
  [CertificatePolicyId: [XXXXXXX]
[]  ]
]

#6: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  Key_CertSign
  Crl_Sign
]

#7: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
XXXXx
]
]

Certificate[3]:
Owner: CN=Corporate CA 1, ..., C=FR
Issuer: CN=Root CA 1, ...., C=FR
Serial number: XXXX
Valid from: Thu Jun 09 02:00:00 CEST 2011 until: Mon Jun 09 02:00:00 CEST 2036
Certificate fingerprints:
         SHA1: XXXX
         SHA256: XXXX
Signature algorithm name: SHA256withRSA
Subject Public Key Algorithm: 4096-bit RSA key
Version: 3

Extensions:

#1: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
  [
XXX]
]

#2: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
XXXX
]
]

#3: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

#4: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
XXXXX
]

#5: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
  [CertificatePolicyId: [XXXX]
[]  ]
]

#6: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  Key_CertSign
  Crl_Sign
]

#7: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
XXXX
]
]

Certificate[4]:
Owner: CN=Root CA 1, ..., C=FR
Issuer: CN=Root CA 1, .... C=FR
Serial number: XXXXX
Valid from: Thu Jun 09 02:00:00 CEST 2011 until: Mon Jun 09 02:00:00 CEST 2036
Certificate fingerprints:
         SHA1: XXXXXX
         SHA256: XXXX
Signature algorithm name: SHA256withRSA
Subject Public Key Algorithm: 4096-bit RSA key
Version: 3

Extensions:

#1: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
XXXX
]
]

#2: ObjectId: 2.5.29.19 Criticality=true
BasicConstraints:[
  CA:true
  PathLen:2147483647
]

#3: ObjectId: 2.5.29.15 Criticality=true
KeyUsage [
  Key_CertSign
  Crl_Sign
]

#4: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
XXX
]
]&lt;/PRE&gt;&lt;PRE&gt;Nifi version: 1.13.2&lt;BR /&gt;&lt;BR /&gt;Java version:&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;openjdk version "1.8.0_302"&lt;BR /&gt;OpenJDK Runtime Environment (build 1.8.0_302-b08)&lt;BR /&gt;OpenJDK 64-Bit Server VM (build 25.302-b08, mixed mode)&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding certificates/keystore requirements from&amp;nbsp;&lt;STRONG&gt;&lt;A href="https://docs.cloudera.com/cfm/2.1.2/cfm-security/topics/cfm-security-tls-certificate-requirements-recommendations.html" target="_blank" rel="noopener noreferrer"&gt;https://docs.cloudera.com/cfm/2.1.2/cfm-security/topics/cfm-security-tls-certificate-requirements-re...&lt;/A&gt;&amp;nbsp;&lt;/STRONG&gt;all are verified.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Nov 2021 11:03:26 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-secured-cluster-can-t-send-heartbeat-betweennodes/m-p/330402#M230666</guid>
      <dc:creator>emmanuel</dc:creator>
      <dc:date>2021-11-17T11:03:26Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi secured cluster can't send heartbeat betweennodes</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-secured-cluster-can-t-send-heartbeat-betweennodes/m-p/330755#M230745</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/89789"&gt;@emmanuel&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Does your truststore on each NiFi host contains a separate TrustedCertEntry for each of your three CA certificates in your trust chain?&lt;/P&gt;&lt;P&gt;Your openssl command output does not list your root or intermediate CAs:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Acceptable client certificate CA names

/C=FR/O=SAFRAN/OU=SAFRAN SA/OU=0002 562082909/CN=nifi-node3

/C=FR/O=SAFRAN/OU=SAFRAN SA/OU=0002 562082909/CN=niif-node2

/C=FR/O=SAFRAN/OU=SAFRAN SA/OU=0002 562082909/CN=nifi-node1

/C=FR/OU=SAFRAN SA/OU=0002 562082909/O=SAFRAN/CN=Safran Nifi Admin

/C=FR/OU=SAFRAN SA/OU=0002 562082909/O=SAFRAN/CN=localhost&lt;/LI-CODE&gt;&lt;P&gt;&lt;BR /&gt;Have you tried converting your PKCS12 keystore to a JKS keystore?&lt;BR /&gt;&lt;BR /&gt;Matt&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Nov 2021 17:19:05 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-secured-cluster-can-t-send-heartbeat-betweennodes/m-p/330755#M230745</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2021-11-22T17:19:05Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi secured cluster can't send heartbeat betweennodes</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-secured-cluster-can-t-send-heartbeat-betweennodes/m-p/330795#M230763</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Each nifi node's truststore does not conaints a separate TrustedCertEntry for each of the three CA certificates of the trust chain.&lt;/P&gt;&lt;P&gt;The TrustedCertEntry of node2 and node3 in node1'truststore contain the full chain certification.&lt;/P&gt;&lt;P&gt;Also, these three CA certificates are also present and trusted certificates in the JVM truststore (/etc/pki/java/cacert).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) The acceptable client certificates do need to include CA certificates as well? Even if node certificates already contain rootCA in their full chain?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) I'll try to convert PKCS12 to JKS, but Nifi support PKCS12 format no?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Emmanuel&lt;/P&gt;</description>
      <pubDate>Tue, 23 Nov 2021 09:03:46 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-secured-cluster-can-t-send-heartbeat-betweennodes/m-p/330795#M230763</guid>
      <dc:creator>emmanuel</dc:creator>
      <dc:date>2021-11-23T09:03:46Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi secured cluster can't send heartbeat betweennodes</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-secured-cluster-can-t-send-heartbeat-betweennodes/m-p/330821#M230766</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/89789"&gt;@emmanuel&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Yes, Apache NiFi support PKCS12 keystores; howevere, JKS is more commonly used format and was making a suggestion to test using JKS to rule out an issue there.&lt;BR /&gt;&lt;BR /&gt;Something else you may want to do is enable debug logging for TLS in NiFi-Registry.&lt;BR /&gt;You can accomplish this by adding an additional line to the bootstrap.conf file:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;java.arg.&amp;lt;unique num&amp;gt;=-Djavax.net.debug=ssl,handshake&lt;/LI-CODE&gt;&lt;P&gt;Maybe you are having a cipher compatibility issue?&amp;nbsp; Maybe connection is trying to use TLS 1.3 and that needs to be disabled so 1.2 is negotiated?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Java's default cacerts file is not used by the NiFi core during Mutual TLS negotiation.&amp;nbsp; Only the configured truststore configured in the nifi.properties and nifi-registry.properties file is used.&lt;BR /&gt;&lt;BR /&gt;Hope this helps in your investigation,&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Tue, 23 Nov 2021 13:14:25 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-secured-cluster-can-t-send-heartbeat-betweennodes/m-p/330821#M230766</guid>
      <dc:creator>MattWho</dc:creator>
      <dc:date>2021-11-23T13:14:25Z</dc:date>
    </item>
    <item>
      <title>Re: Nifi secured cluster can't send heartbeat betweennodes</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Nifi-secured-cluster-can-t-send-heartbeat-betweennodes/m-p/330852#M230772</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You were right, the missing rootCA and intermediate certificates missed in the nifi nodes truststore were the cause of the problem(s)!&lt;/P&gt;&lt;P&gt;As soon as I added them in each nifi node truststore, it solved my problem and the node were able to communicate and transmit heartbeat through port 11443!&lt;/P&gt;&lt;P&gt;Thanks a lot for your time and your help!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Emmanuel&lt;/P&gt;</description>
      <pubDate>Tue, 23 Nov 2021 15:25:50 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Nifi-secured-cluster-can-t-send-heartbeat-betweennodes/m-p/330852#M230772</guid>
      <dc:creator>emmanuel</dc:creator>
      <dc:date>2021-11-23T15:25:50Z</dc:date>
    </item>
  </channel>
</rss>

