<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Tried other resolutions but no luck for Unable to locate node to seed policies in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Tried-other-resolutions-but-no-luck-for-Unable-to-locate/m-p/339131#M233051</link>
    <description>&lt;DIV&gt;We are building a two server secure cluster.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;To get here:&lt;/DIV&gt;&lt;DIV&gt;[1] Setup first server as secure and configured for SAML and successfully tested&lt;/DIV&gt;&lt;DIV&gt;[2] Tested single server and worked fine&lt;/DIV&gt;&lt;DIV&gt;[3]Configured ZooKeeper and StateManagement on both servers&lt;/DIV&gt;&lt;DIV&gt;[4]Opened firewall ports&lt;/DIV&gt;&lt;DIV&gt;[5]Tried deleting authorizers and users but server will not start and says unable to locate node to seed policies.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;# Licensed to the Apache Software Foundation (ASF) under one or more&lt;BR /&gt;# contributor license agreements.&amp;nbsp; See the NOTICE file distributed with&lt;BR /&gt;# this work for additional information regarding copyright ownership.&lt;BR /&gt;# The ASF licenses this file to You under the Apache License, Version 2.0&lt;BR /&gt;# (the "License"); you may not use this file except in compliance with&lt;BR /&gt;# the License.&amp;nbsp; You may obtain a copy of the License at&lt;BR /&gt;#&lt;BR /&gt;# &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://www.apache.org/licenses/LICENSE-2.0" target="_blank" rel="noopener"&gt;http://www.apache.org/licenses/LICENSE-2.0&lt;/A&gt;&lt;BR /&gt;#&lt;BR /&gt;# Unless required by applicable law or agreed to in writing, software&lt;BR /&gt;# distributed under the License is distributed on an "AS IS" BASIS,&lt;BR /&gt;# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.&lt;BR /&gt;# See the License for the specific language governing permissions and&lt;BR /&gt;# limitations under the License.&lt;BR /&gt;&lt;BR /&gt;# Core Properties #&lt;BR /&gt;nifi.flow.configuration.file=./conf/flow.xml.gz&lt;BR /&gt;nifi.flow.configuration.archive.enabled=true&lt;BR /&gt;nifi.flow.configuration.archive.dir=./conf/archive/&lt;BR /&gt;nifi.flow.configuration.archive.max.time=30 days&lt;BR /&gt;nifi.flow.configuration.archive.max.storage=500 MB&lt;BR /&gt;nifi.flow.configuration.archive.max.count=&lt;BR /&gt;nifi.flowcontroller.autoResumeState=true&lt;BR /&gt;nifi.flowcontroller.graceful.shutdown.period=10 sec&lt;BR /&gt;nifi.flowservice.writedelay.interval=500 ms&lt;BR /&gt;nifi.administrative.yield.duration=30 sec&lt;BR /&gt;# If a component has no work to do (is "bored"), how long should we wait before checking again for work?&lt;BR /&gt;nifi.bored.yield.duration=10 millis&lt;BR /&gt;nifi.queue.backpressure.count=10000&lt;BR /&gt;nifi.queue.backpressure.size=1 GB&lt;BR /&gt;&lt;BR /&gt;nifi.authorizer.configuration.file=./conf/authorizers.xml&lt;BR /&gt;#nifi.login.identity.provider.configuration.file=./conf/login-identity-providers.xml&lt;BR /&gt;nifi.templates.directory=./conf/templates&lt;BR /&gt;nifi.ui.banner.text=&lt;BR /&gt;nifi.ui.autorefresh.interval=30 sec&lt;BR /&gt;nifi.nar.library.directory=./lib&lt;BR /&gt;nifi.nar.library.autoload.directory=./extensions&lt;BR /&gt;nifi.nar.working.directory=./work/nar/&lt;BR /&gt;nifi.documentation.working.directory=./work/docs/components&lt;BR /&gt;&lt;BR /&gt;####################&lt;BR /&gt;# State Management #&lt;BR /&gt;####################&lt;BR /&gt;nifi.state.management.configuration.file=./conf/state-management.xml&lt;BR /&gt;# The ID of the local state provider&lt;BR /&gt;nifi.state.management.provider.local=local-provider&lt;BR /&gt;# The ID of the cluster-wide state provider. This will be ignored if NiFi is not clustered but must be populated if running in a cluster.&lt;BR /&gt;nifi.state.management.provider.cluster=zk-provider&lt;BR /&gt;# Specifies whether or not this instance of NiFi should run an embedded ZooKeeper server&lt;BR /&gt;nifi.state.management.embedded.zookeeper.start=true&lt;BR /&gt;# Properties file that provides the ZooKeeper properties to use if &amp;lt;nifi.state.management.embedded.zookeeper.start&amp;gt; is set to true&lt;BR /&gt;nifi.state.management.embedded.zookeeper.properties=./conf/zookeeper.properties&lt;BR /&gt;&lt;BR /&gt;# H2 Settings&lt;BR /&gt;nifi.database.directory=./database_repository&lt;BR /&gt;nifi.h2.url.append=;LOCK_TIMEOUT=25000;WRITE_DELAY=0;AUTO_SERVER=FALSE&lt;BR /&gt;&lt;BR /&gt;# Repository Encryption properties override individual repository implementation properties&lt;BR /&gt;nifi.repository.encryption.protocol.version=&lt;BR /&gt;&lt;A href="http://nifi.repository.encryption.key.id/" target="_blank" rel="noopener"&gt;nifi.repository.encryption.key.id&lt;/A&gt;=&lt;BR /&gt;nifi.repository.encryption.key.provider=&lt;BR /&gt;nifi.repository.encryption.key.provider.keystore.location=&lt;BR /&gt;nifi.repository.encryption.key.provider.keystore.password=&lt;BR /&gt;&lt;BR /&gt;# FlowFile Repository&lt;BR /&gt;nifi.flowfile.repository.implementation=org.apache.nifi.controller.repository.WriteAheadFlowFileRepository&lt;BR /&gt;nifi.flowfile.repository.wal.implementation=org.apache.nifi.wali.SequentialAccessWriteAheadLog&lt;BR /&gt;nifi.flowfile.repository.directory=./flowfile_repository&lt;BR /&gt;nifi.flowfile.repository.checkpoint.interval=20 secs&lt;BR /&gt;nifi.flowfile.repository.always.sync=false&lt;BR /&gt;nifi.flowfile.repository.retain.orphaned.flowfiles=true&lt;BR /&gt;&lt;BR /&gt;nifi.swap.manager.implementation=org.apache.nifi.controller.FileSystemSwapManager&lt;BR /&gt;nifi.queue.swap.threshold=20000&lt;BR /&gt;&lt;BR /&gt;# Content Repository&lt;BR /&gt;nifi.content.repository.implementation=org.apache.nifi.controller.repository.FileSystemRepository&lt;BR /&gt;nifi.content.claim.max.appendable.size=1 MB&lt;BR /&gt;nifi.content.repository.directory.default=./content_repository&lt;BR /&gt;nifi.content.repository.archive.max.retention.period=7 days&lt;BR /&gt;nifi.content.repository.archive.max.usage.percentage=50%&lt;BR /&gt;nifi.content.repository.archive.enabled=true&lt;BR /&gt;nifi.content.repository.always.sync=false&lt;BR /&gt;nifi.content.viewer.url=../nifi-content-viewer/&lt;BR /&gt;&lt;BR /&gt;# Provenance Repository Properties&lt;BR /&gt;nifi.provenance.repository.implementation=org.apache.nifi.provenance.WriteAheadProvenanceRepository&lt;BR /&gt;&lt;BR /&gt;# Persistent Provenance Repository Properties&lt;BR /&gt;nifi.provenance.repository.directory.default=./provenance_repository&lt;BR /&gt;nifi.provenance.repository.max.storage.time=30 days&lt;BR /&gt;nifi.provenance.repository.max.storage.size=10 GB&lt;BR /&gt;nifi.provenance.repository.rollover.time=10 mins&lt;BR /&gt;nifi.provenance.repository.rollover.size=100 MB&lt;BR /&gt;nifi.provenance.repository.query.threads=2&lt;BR /&gt;nifi.provenance.repository.index.threads=2&lt;BR /&gt;nifi.provenance.repository.compress.on.rollover=true&lt;BR /&gt;nifi.provenance.repository.always.sync=false&lt;BR /&gt;# Comma-separated list of fields. Fields that are not indexed will not be searchable. Valid fields are:&lt;BR /&gt;# EventType, FlowFileUUID, Filename, TransitURI, ProcessorID, AlternateIdentifierURI, Relationship, Details&lt;BR /&gt;nifi.provenance.repository.indexed.fields=EventType, FlowFileUUID, Filename, ProcessorID, Relationship&lt;BR /&gt;# FlowFile Attributes that should be indexed and made searchable.&amp;nbsp; Some examples to consider are filename, uuid, mime.type&lt;BR /&gt;nifi.provenance.repository.indexed.attributes=&lt;BR /&gt;# Large values for the shard size will result in more Java heap usage when searching the Provenance Repository&lt;BR /&gt;# but should provide better performance&lt;BR /&gt;nifi.provenance.repository.index.shard.size=500 MB&lt;BR /&gt;# Indicates the maximum length that a FlowFile attribute can be when retrieving a Provenance Event from&lt;BR /&gt;# the repository. If the length of any attribute exceeds this value, it will be truncated when the event is retrieved.&lt;BR /&gt;nifi.provenance.repository.max.attribute.length=65536&lt;BR /&gt;nifi.provenance.repository.concurrent.merge.threads=2&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;# Volatile Provenance Respository Properties&lt;BR /&gt;nifi.provenance.repository.buffer.size=100000&lt;BR /&gt;&lt;BR /&gt;# Component and Node Status History Repository&lt;BR /&gt;nifi.components.status.repository.implementation=org.apache.nifi.controller.status.history.VolatileComponentStatusRepository&lt;BR /&gt;&lt;BR /&gt;# Volatile Status History Repository Properties&lt;BR /&gt;nifi.components.status.repository.buffer.size=1440&lt;BR /&gt;nifi.components.status.snapshot.frequency=1 min&lt;BR /&gt;&lt;BR /&gt;# QuestDB Status History Repository Properties&lt;BR /&gt;nifi.status.repository.questdb.persist.node.days=14&lt;BR /&gt;nifi.status.repository.questdb.persist.component.days=3&lt;BR /&gt;nifi.status.repository.questdb.persist.location=./status_repository&lt;BR /&gt;&lt;BR /&gt;# Site to Site properties&lt;BR /&gt;nifi.remote.input.host=&lt;BR /&gt;nifi.remote.input.secure=false&lt;BR /&gt;nifi.remote.input.socket.port=&lt;BR /&gt;nifi.remote.input.http.enabled=false&lt;BR /&gt;nifi.remote.input.http.transaction.ttl=30 sec&lt;BR /&gt;nifi.remote.contents.cache.expiration=30 secs&lt;BR /&gt;&lt;BR /&gt;# web properties #&lt;BR /&gt;#############################################&lt;BR /&gt;&lt;BR /&gt;# For security, NiFi will present the UI on 127.0.0.1 and only be accessible through this loopback interface.&lt;BR /&gt;# Be aware that changing these properties may affect how your instance can be accessed without any restriction.&lt;BR /&gt;# We recommend configuring HTTPS instead. The administrators guide provides instructions on how to do this.&lt;BR /&gt;&lt;BR /&gt;nifi.web.http.host=&lt;BR /&gt;nifi.web.http.port=&lt;BR /&gt;nifi.web.http.network.interface.default=&lt;BR /&gt;&lt;BR /&gt;#############################################&lt;BR /&gt;&lt;BR /&gt;nifi.web.https.host=&lt;A href="http://w-nifi-inf-wf02.dev.company.com/" target="_blank" rel="noopener"&gt;w-nifi-inf-wf02.dev.Company.com&lt;/A&gt;&lt;BR /&gt;nifi.web.https.port=9443&lt;BR /&gt;nifi.web.https.network.interface.default=&lt;BR /&gt;nifi.web.jetty.working.directory=./work/jetty&lt;BR /&gt;nifi.web.jetty.threads=200&lt;BR /&gt;nifi.web.max.header.size=16 KB&lt;BR /&gt;nifi.web.proxy.context.path=&lt;BR /&gt;nifi.web.proxy.host=&lt;A href="http://ds-nifi.dev.company.com:9443/" target="_blank" rel="noopener"&gt;ds-nifi.dev.Company.com:9443&lt;/A&gt;&lt;BR /&gt;nifi.web.max.content.size=&lt;BR /&gt;nifi.web.max.requests.per.second=30000&lt;BR /&gt;nifi.web.max.access.token.requests.per.second=25&lt;BR /&gt;nifi.web.request.timeout=60 secs&lt;BR /&gt;nifi.web.request.ip.whitelist=&lt;BR /&gt;nifi.web.should.send.server.version=true&lt;BR /&gt;&lt;BR /&gt;# Include or Exclude TLS Cipher Suites for HTTPS&lt;BR /&gt;nifi.web.https.ciphersuites.include=&lt;BR /&gt;nifi.web.https.ciphersuites.exclude=&lt;BR /&gt;&lt;BR /&gt;# security properties #&lt;BR /&gt;nifi.sensitive.props.key=55MiiQS7efV0LR7C7SDpkMNP/2Hj4ASJ&lt;BR /&gt;nifi.sensitive.props.key.protected=&lt;BR /&gt;nifi.sensitive.props.algorithm=NIFI_PBKDF2_AES_GCM_256&lt;BR /&gt;nifi.sensitive.props.additional.keys=&lt;BR /&gt;&lt;BR /&gt;nifi.security.autoreload.enabled=false&lt;BR /&gt;nifi.security.autoreload.interval=10 secs&lt;BR /&gt;nifi.security.keystore=./conf/w-nifi-inf-wf02.dev-PRIVATE.pfx&lt;BR /&gt;nifi.security.keystoreType=PKCS12&lt;BR /&gt;nifi.security.keystorePasswd=abc123&lt;BR /&gt;nifi.security.keyPasswd=abc123&lt;BR /&gt;nifi.security.truststore=./conf/truststore.jks&lt;BR /&gt;nifi.security.truststoreType=jks&lt;BR /&gt;nifi.security.truststorePasswd=abc123&lt;BR /&gt;#nifi.security.user.authorizer=single-user-authorizer&lt;BR /&gt;nifi.security.user.authorizer=managed-authorizer&lt;BR /&gt;nifi.security.allow.anonymous.authentication=false&lt;BR /&gt;#nifi.security.user.login.identity.provider=single-user-provider&lt;BR /&gt;nifi.security.user.login.identity.provider=&lt;BR /&gt;nifi.security.user.jws.key.rotation.period=PT1H&lt;BR /&gt;nifi.security.ocsp.responder.url=&lt;BR /&gt;nifi.security.ocsp.responder.certificate=&lt;BR /&gt;&lt;BR /&gt;# OpenId Connect SSO Properties #&lt;BR /&gt;nifi.security.user.oidc.discovery.url=&lt;BR /&gt;nifi.security.user.oidc.connect.timeout=5 secs&lt;BR /&gt;nifi.security.user.oidc.read.timeout=5 secs&lt;BR /&gt;&lt;A href="http://nifi.security.user.oidc.client.id/" target="_blank" rel="noopener"&gt;nifi.security.user.oidc.client.id&lt;/A&gt;=&lt;BR /&gt;nifi.security.user.oidc.client.secret=&lt;BR /&gt;nifi.security.user.oidc.preferred.jwsalgorithm=&lt;BR /&gt;nifi.security.user.oidc.additional.scopes=&lt;BR /&gt;nifi.security.user.oidc.claim.identifying.user=&lt;BR /&gt;nifi.security.user.oidc.fallback.claims.identifying.user=&lt;BR /&gt;&lt;BR /&gt;# Apache Knox SSO Properties #&lt;BR /&gt;nifi.security.user.knox.url=&lt;BR /&gt;nifi.security.user.knox.publicKey=&lt;BR /&gt;nifi.security.user.knox.cookieName=hadoop-jwt&lt;BR /&gt;nifi.security.user.knox.audiences=&lt;BR /&gt;&lt;BR /&gt;# SAML Properties #&lt;BR /&gt;#nifi.security.user.saml.idp.metadata.url=&lt;A href="https://auth-preview.company.com/app/exk2jl211r89OP6bw1d7/sso/saml/metadata" target="_blank" rel="noopener"&gt;https://auth-preview.Company.com/app/exk2jl211r89OP6bw1d7/sso/saml/metadata&lt;/A&gt;&lt;BR /&gt;nifi.security.user.saml.idp.metadata.url=file://d:/nifi-1.15.3/conf/okta_metadata&lt;BR /&gt;&lt;A href="http://nifi.security.user.saml.sp.entity.id/" target="_blank" rel="noopener"&gt;nifi.security.user.saml.sp.entity.id&lt;/A&gt;=&lt;A href="https://ds-nifi.dev.company.com:9443/nifi" target="_blank" rel="noopener"&gt;https://ds-nifi.dev.Company.com:9443/nifi&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://nifi.security.user.saml.identity.attribute.name/" target="_blank" rel="noopener"&gt;nifi.security.user.saml.identity.attribute.name&lt;/A&gt;=uid&lt;BR /&gt;&lt;A href="http://nifi.security.user.saml.group.attribute.name/" target="_blank" rel="noopener"&gt;nifi.security.user.saml.group.attribute.name&lt;/A&gt;=&lt;BR /&gt;nifi.security.user.saml.metadata.signing.enabled=false&lt;BR /&gt;nifi.security.user.saml.request.signing.enabled=false&lt;BR /&gt;nifi.security.user.saml.want.assertions.signed=true&lt;BR /&gt;nifi.security.user.saml.signature.algorithm=&lt;A href="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256" target="_blank" rel="noopener"&gt;http://www.w3.org/2001/04/xmldsig-more#rsa-sha256&lt;/A&gt;&lt;BR /&gt;nifi.security.user.saml.signature.digest.algorithm=&lt;A href="http://www.w3.org/2001/04/xmlenc#sha256" target="_blank" rel="noopener"&gt;http://www.w3.org/2001/04/xmlenc#sha256&lt;/A&gt;&lt;BR /&gt;nifi.security.user.saml.message.logging.enabled=false&lt;BR /&gt;nifi.security.user.saml.authentication.expiration=12 hours&lt;BR /&gt;nifi.security.user.saml.single.logout.enabled=true&lt;BR /&gt;nifi.security.user.saml.http.client.truststore.strategy=JDK&lt;BR /&gt;nifi.security.user.saml.http.client.connect.timeout=30 secs&lt;BR /&gt;nifi.security.user.saml.http.client.read.timeout=30 secs&lt;BR /&gt;&lt;BR /&gt;# Identity Mapping Properties #&lt;BR /&gt;# These properties allow normalizing user identities such that identities coming from different identity providers&lt;BR /&gt;# (certificates, LDAP, Kerberos) can be treated the same internally in NiFi. The following example demonstrates normalizing&lt;BR /&gt;# DNs from certificates and principals from Kerberos into a common identity string:&lt;BR /&gt;#&lt;BR /&gt;# nifi.security.identity.mapping.pattern.dn=^CN=(.*?), OU=(.*?), O=(.*?), L=(.*?), ST=(.*?), C=(.*?)$&lt;BR /&gt;# nifi.security.identity.mapping.value.dn=$1@$2&lt;BR /&gt;# nifi.security.identity.mapping.transform.dn=NONE&lt;BR /&gt;# nifi.security.identity.mapping.pattern.kerb=^(.*?)/instance@(.*?)$&lt;BR /&gt;# nifi.security.identity.mapping.value.kerb=$1@$2&lt;BR /&gt;# nifi.security.identity.mapping.transform.kerb=UPPER&lt;BR /&gt;&lt;BR /&gt;# Group Mapping Properties #&lt;BR /&gt;# These properties allow normalizing group names coming from external sources like LDAP. The following example&lt;BR /&gt;# lowercases any group name.&lt;BR /&gt;#&lt;BR /&gt;# nifi.security.group.mapping.pattern.anygroup=^(.*)$&lt;BR /&gt;# nifi.security.group.mapping.value.anygroup=$1&lt;BR /&gt;# nifi.security.group.mapping.transform.anygroup=LOWER&lt;BR /&gt;&lt;BR /&gt;# cluster common properties (all nodes must have same values) #&lt;BR /&gt;nifi.cluster.protocol.heartbeat.interval=5 sec&lt;BR /&gt;nifi.cluster.protocol.heartbeat.missable.max=8&lt;BR /&gt;nifi.cluster.protocol.is.secure=true&lt;BR /&gt;&lt;BR /&gt;# cluster node properties (only configure for cluster nodes) #&lt;BR /&gt;nifi.cluster.is.node=true&lt;BR /&gt;nifi.cluster.node.address=&lt;A href="http://w-nifi-inf-wf02.dev.company.com/" target="_blank" rel="noopener"&gt;w-nifi-inf-wf02.dev.Company.com&lt;/A&gt;&lt;BR /&gt;nifi.cluster.node.protocol.port=7474&lt;BR /&gt;nifi.cluster.node.protocol.max.threads=50&lt;BR /&gt;nifi.cluster.node.event.history.size=25&lt;BR /&gt;nifi.cluster.node.connection.timeout=5 sec&lt;BR /&gt;nifi.cluster.node.read.timeout=5 sec&lt;BR /&gt;nifi.cluster.node.max.concurrent.requests=100&lt;BR /&gt;nifi.cluster.firewall.file=&lt;BR /&gt;nifi.cluster.flow.election.max.wait.time=5 mins&lt;BR /&gt;nifi.cluster.flow.election.max.candidates=&lt;BR /&gt;&lt;BR /&gt;# cluster load balancing properties #&lt;BR /&gt;nifi.cluster.load.balance.host=&lt;A href="http://w-nifi-inf-wf02.dev.company.com/" target="_blank" rel="noopener"&gt;w-nifi-inf-wf02.dev.Company.com&lt;/A&gt;&lt;BR /&gt;nifi.cluster.load.balance.port=6342&lt;BR /&gt;nifi.cluster.load.balance.connections.per.node=1&lt;BR /&gt;nifi.cluster.load.balance.max.thread.count=8&lt;BR /&gt;nifi.cluster.load.balance.comms.timeout=30 sec&lt;/DIV&gt;</description>
    <pubDate>Tue, 22 Mar 2022 17:04:15 GMT</pubDate>
    <dc:creator>Tra</dc:creator>
    <dc:date>2022-03-22T17:04:15Z</dc:date>
    <item>
      <title>Tried other resolutions but no luck for Unable to locate node to seed policies</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Tried-other-resolutions-but-no-luck-for-Unable-to-locate/m-p/339044#M233005</link>
      <description>&lt;P&gt;Version 1.15.3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Error:&amp;nbsp;org.apache.nifi.authorization.exception.AuthorizerCreationException: Unable to locate node CN=w-nifi-inf-wf03.dev.Company.com, OU=OCIO, O=Company to seed policies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Authorizers.xml:&lt;/P&gt;&lt;P&gt;&amp;lt;userGroupProvider&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;file-user-group-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.authorization.FileUserGroupProvider&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;property name="Users File"&amp;gt;./conf/users.xml&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Initial User Identity 1"&amp;gt;user1&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Initial User Identity 2"&amp;gt;CN=w-nifi-inf-wf02.dev.Company.com, OU=OCIO, O=Company&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Initial User Identity 3"&amp;gt;CN=w-nifi-inf-wf03.dev.Company.com, OU=OCIO, O=Company&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/userGroupProvider&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;accessPolicyProvider&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;file-access-policy-provider&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.authorization.FileAccessPolicyProvider&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;property name="User Group Provider"&amp;gt;file-user-group-provider&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Authorizations File"&amp;gt;./conf/authorizations.xml&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Initial Admin Identity"&amp;gt;user1&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Node Identity 1"&amp;gt;CN=w-nifi-inf-wf02.dev.Company.com, OU=OCIO, O=Company&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Node Identity 2"&amp;gt;CN=w-nifi-inf-wf03.dev.Company.com, OU=OCIO, O=Company&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;property name="Node Group"&amp;gt;&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/accessPolicyProvider&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;lt;authorizer&amp;gt;&lt;BR /&gt;&amp;lt;identifier&amp;gt;managed-authorizer&amp;lt;/identifier&amp;gt;&lt;BR /&gt;&amp;lt;class&amp;gt;org.apache.nifi.authorization.StandardManagedAuthorizer&amp;lt;/class&amp;gt;&lt;BR /&gt;&amp;lt;property name="Access Policy Provider"&amp;gt;file-access-policy-provider&amp;lt;/property&amp;gt;&lt;BR /&gt;&amp;lt;/authorizer&amp;gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2022 16:40:12 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Tried-other-resolutions-but-no-luck-for-Unable-to-locate/m-p/339044#M233005</guid>
      <dc:creator>Tra</dc:creator>
      <dc:date>2022-03-21T16:40:12Z</dc:date>
    </item>
    <item>
      <title>Re: Tried other resolutions but no luck for Unable to locate node to seed policies</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Tried-other-resolutions-but-no-luck-for-Unable-to-locate/m-p/339063#M233011</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/96647"&gt;@Tra&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you please explains what your configuration is and which steps you executed to get to this point?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;André&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2022 22:07:31 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Tried-other-resolutions-but-no-luck-for-Unable-to-locate/m-p/339063#M233011</guid>
      <dc:creator>araujo</dc:creator>
      <dc:date>2022-03-21T22:07:31Z</dc:date>
    </item>
    <item>
      <title>Re: Tried other resolutions but no luck for Unable to locate node to seed policies</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Tried-other-resolutions-but-no-luck-for-Unable-to-locate/m-p/339131#M233051</link>
      <description>&lt;DIV&gt;We are building a two server secure cluster.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;To get here:&lt;/DIV&gt;&lt;DIV&gt;[1] Setup first server as secure and configured for SAML and successfully tested&lt;/DIV&gt;&lt;DIV&gt;[2] Tested single server and worked fine&lt;/DIV&gt;&lt;DIV&gt;[3]Configured ZooKeeper and StateManagement on both servers&lt;/DIV&gt;&lt;DIV&gt;[4]Opened firewall ports&lt;/DIV&gt;&lt;DIV&gt;[5]Tried deleting authorizers and users but server will not start and says unable to locate node to seed policies.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Config:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;# Licensed to the Apache Software Foundation (ASF) under one or more&lt;BR /&gt;# contributor license agreements.&amp;nbsp; See the NOTICE file distributed with&lt;BR /&gt;# this work for additional information regarding copyright ownership.&lt;BR /&gt;# The ASF licenses this file to You under the Apache License, Version 2.0&lt;BR /&gt;# (the "License"); you may not use this file except in compliance with&lt;BR /&gt;# the License.&amp;nbsp; You may obtain a copy of the License at&lt;BR /&gt;#&lt;BR /&gt;# &amp;nbsp; &amp;nbsp;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://www.apache.org/licenses/LICENSE-2.0" target="_blank" rel="noopener"&gt;http://www.apache.org/licenses/LICENSE-2.0&lt;/A&gt;&lt;BR /&gt;#&lt;BR /&gt;# Unless required by applicable law or agreed to in writing, software&lt;BR /&gt;# distributed under the License is distributed on an "AS IS" BASIS,&lt;BR /&gt;# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.&lt;BR /&gt;# See the License for the specific language governing permissions and&lt;BR /&gt;# limitations under the License.&lt;BR /&gt;&lt;BR /&gt;# Core Properties #&lt;BR /&gt;nifi.flow.configuration.file=./conf/flow.xml.gz&lt;BR /&gt;nifi.flow.configuration.archive.enabled=true&lt;BR /&gt;nifi.flow.configuration.archive.dir=./conf/archive/&lt;BR /&gt;nifi.flow.configuration.archive.max.time=30 days&lt;BR /&gt;nifi.flow.configuration.archive.max.storage=500 MB&lt;BR /&gt;nifi.flow.configuration.archive.max.count=&lt;BR /&gt;nifi.flowcontroller.autoResumeState=true&lt;BR /&gt;nifi.flowcontroller.graceful.shutdown.period=10 sec&lt;BR /&gt;nifi.flowservice.writedelay.interval=500 ms&lt;BR /&gt;nifi.administrative.yield.duration=30 sec&lt;BR /&gt;# If a component has no work to do (is "bored"), how long should we wait before checking again for work?&lt;BR /&gt;nifi.bored.yield.duration=10 millis&lt;BR /&gt;nifi.queue.backpressure.count=10000&lt;BR /&gt;nifi.queue.backpressure.size=1 GB&lt;BR /&gt;&lt;BR /&gt;nifi.authorizer.configuration.file=./conf/authorizers.xml&lt;BR /&gt;#nifi.login.identity.provider.configuration.file=./conf/login-identity-providers.xml&lt;BR /&gt;nifi.templates.directory=./conf/templates&lt;BR /&gt;nifi.ui.banner.text=&lt;BR /&gt;nifi.ui.autorefresh.interval=30 sec&lt;BR /&gt;nifi.nar.library.directory=./lib&lt;BR /&gt;nifi.nar.library.autoload.directory=./extensions&lt;BR /&gt;nifi.nar.working.directory=./work/nar/&lt;BR /&gt;nifi.documentation.working.directory=./work/docs/components&lt;BR /&gt;&lt;BR /&gt;####################&lt;BR /&gt;# State Management #&lt;BR /&gt;####################&lt;BR /&gt;nifi.state.management.configuration.file=./conf/state-management.xml&lt;BR /&gt;# The ID of the local state provider&lt;BR /&gt;nifi.state.management.provider.local=local-provider&lt;BR /&gt;# The ID of the cluster-wide state provider. This will be ignored if NiFi is not clustered but must be populated if running in a cluster.&lt;BR /&gt;nifi.state.management.provider.cluster=zk-provider&lt;BR /&gt;# Specifies whether or not this instance of NiFi should run an embedded ZooKeeper server&lt;BR /&gt;nifi.state.management.embedded.zookeeper.start=true&lt;BR /&gt;# Properties file that provides the ZooKeeper properties to use if &amp;lt;nifi.state.management.embedded.zookeeper.start&amp;gt; is set to true&lt;BR /&gt;nifi.state.management.embedded.zookeeper.properties=./conf/zookeeper.properties&lt;BR /&gt;&lt;BR /&gt;# H2 Settings&lt;BR /&gt;nifi.database.directory=./database_repository&lt;BR /&gt;nifi.h2.url.append=;LOCK_TIMEOUT=25000;WRITE_DELAY=0;AUTO_SERVER=FALSE&lt;BR /&gt;&lt;BR /&gt;# Repository Encryption properties override individual repository implementation properties&lt;BR /&gt;nifi.repository.encryption.protocol.version=&lt;BR /&gt;&lt;A href="http://nifi.repository.encryption.key.id/" target="_blank" rel="noopener"&gt;nifi.repository.encryption.key.id&lt;/A&gt;=&lt;BR /&gt;nifi.repository.encryption.key.provider=&lt;BR /&gt;nifi.repository.encryption.key.provider.keystore.location=&lt;BR /&gt;nifi.repository.encryption.key.provider.keystore.password=&lt;BR /&gt;&lt;BR /&gt;# FlowFile Repository&lt;BR /&gt;nifi.flowfile.repository.implementation=org.apache.nifi.controller.repository.WriteAheadFlowFileRepository&lt;BR /&gt;nifi.flowfile.repository.wal.implementation=org.apache.nifi.wali.SequentialAccessWriteAheadLog&lt;BR /&gt;nifi.flowfile.repository.directory=./flowfile_repository&lt;BR /&gt;nifi.flowfile.repository.checkpoint.interval=20 secs&lt;BR /&gt;nifi.flowfile.repository.always.sync=false&lt;BR /&gt;nifi.flowfile.repository.retain.orphaned.flowfiles=true&lt;BR /&gt;&lt;BR /&gt;nifi.swap.manager.implementation=org.apache.nifi.controller.FileSystemSwapManager&lt;BR /&gt;nifi.queue.swap.threshold=20000&lt;BR /&gt;&lt;BR /&gt;# Content Repository&lt;BR /&gt;nifi.content.repository.implementation=org.apache.nifi.controller.repository.FileSystemRepository&lt;BR /&gt;nifi.content.claim.max.appendable.size=1 MB&lt;BR /&gt;nifi.content.repository.directory.default=./content_repository&lt;BR /&gt;nifi.content.repository.archive.max.retention.period=7 days&lt;BR /&gt;nifi.content.repository.archive.max.usage.percentage=50%&lt;BR /&gt;nifi.content.repository.archive.enabled=true&lt;BR /&gt;nifi.content.repository.always.sync=false&lt;BR /&gt;nifi.content.viewer.url=../nifi-content-viewer/&lt;BR /&gt;&lt;BR /&gt;# Provenance Repository Properties&lt;BR /&gt;nifi.provenance.repository.implementation=org.apache.nifi.provenance.WriteAheadProvenanceRepository&lt;BR /&gt;&lt;BR /&gt;# Persistent Provenance Repository Properties&lt;BR /&gt;nifi.provenance.repository.directory.default=./provenance_repository&lt;BR /&gt;nifi.provenance.repository.max.storage.time=30 days&lt;BR /&gt;nifi.provenance.repository.max.storage.size=10 GB&lt;BR /&gt;nifi.provenance.repository.rollover.time=10 mins&lt;BR /&gt;nifi.provenance.repository.rollover.size=100 MB&lt;BR /&gt;nifi.provenance.repository.query.threads=2&lt;BR /&gt;nifi.provenance.repository.index.threads=2&lt;BR /&gt;nifi.provenance.repository.compress.on.rollover=true&lt;BR /&gt;nifi.provenance.repository.always.sync=false&lt;BR /&gt;# Comma-separated list of fields. Fields that are not indexed will not be searchable. Valid fields are:&lt;BR /&gt;# EventType, FlowFileUUID, Filename, TransitURI, ProcessorID, AlternateIdentifierURI, Relationship, Details&lt;BR /&gt;nifi.provenance.repository.indexed.fields=EventType, FlowFileUUID, Filename, ProcessorID, Relationship&lt;BR /&gt;# FlowFile Attributes that should be indexed and made searchable.&amp;nbsp; Some examples to consider are filename, uuid, mime.type&lt;BR /&gt;nifi.provenance.repository.indexed.attributes=&lt;BR /&gt;# Large values for the shard size will result in more Java heap usage when searching the Provenance Repository&lt;BR /&gt;# but should provide better performance&lt;BR /&gt;nifi.provenance.repository.index.shard.size=500 MB&lt;BR /&gt;# Indicates the maximum length that a FlowFile attribute can be when retrieving a Provenance Event from&lt;BR /&gt;# the repository. If the length of any attribute exceeds this value, it will be truncated when the event is retrieved.&lt;BR /&gt;nifi.provenance.repository.max.attribute.length=65536&lt;BR /&gt;nifi.provenance.repository.concurrent.merge.threads=2&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;# Volatile Provenance Respository Properties&lt;BR /&gt;nifi.provenance.repository.buffer.size=100000&lt;BR /&gt;&lt;BR /&gt;# Component and Node Status History Repository&lt;BR /&gt;nifi.components.status.repository.implementation=org.apache.nifi.controller.status.history.VolatileComponentStatusRepository&lt;BR /&gt;&lt;BR /&gt;# Volatile Status History Repository Properties&lt;BR /&gt;nifi.components.status.repository.buffer.size=1440&lt;BR /&gt;nifi.components.status.snapshot.frequency=1 min&lt;BR /&gt;&lt;BR /&gt;# QuestDB Status History Repository Properties&lt;BR /&gt;nifi.status.repository.questdb.persist.node.days=14&lt;BR /&gt;nifi.status.repository.questdb.persist.component.days=3&lt;BR /&gt;nifi.status.repository.questdb.persist.location=./status_repository&lt;BR /&gt;&lt;BR /&gt;# Site to Site properties&lt;BR /&gt;nifi.remote.input.host=&lt;BR /&gt;nifi.remote.input.secure=false&lt;BR /&gt;nifi.remote.input.socket.port=&lt;BR /&gt;nifi.remote.input.http.enabled=false&lt;BR /&gt;nifi.remote.input.http.transaction.ttl=30 sec&lt;BR /&gt;nifi.remote.contents.cache.expiration=30 secs&lt;BR /&gt;&lt;BR /&gt;# web properties #&lt;BR /&gt;#############################################&lt;BR /&gt;&lt;BR /&gt;# For security, NiFi will present the UI on 127.0.0.1 and only be accessible through this loopback interface.&lt;BR /&gt;# Be aware that changing these properties may affect how your instance can be accessed without any restriction.&lt;BR /&gt;# We recommend configuring HTTPS instead. The administrators guide provides instructions on how to do this.&lt;BR /&gt;&lt;BR /&gt;nifi.web.http.host=&lt;BR /&gt;nifi.web.http.port=&lt;BR /&gt;nifi.web.http.network.interface.default=&lt;BR /&gt;&lt;BR /&gt;#############################################&lt;BR /&gt;&lt;BR /&gt;nifi.web.https.host=&lt;A href="http://w-nifi-inf-wf02.dev.company.com/" target="_blank" rel="noopener"&gt;w-nifi-inf-wf02.dev.Company.com&lt;/A&gt;&lt;BR /&gt;nifi.web.https.port=9443&lt;BR /&gt;nifi.web.https.network.interface.default=&lt;BR /&gt;nifi.web.jetty.working.directory=./work/jetty&lt;BR /&gt;nifi.web.jetty.threads=200&lt;BR /&gt;nifi.web.max.header.size=16 KB&lt;BR /&gt;nifi.web.proxy.context.path=&lt;BR /&gt;nifi.web.proxy.host=&lt;A href="http://ds-nifi.dev.company.com:9443/" target="_blank" rel="noopener"&gt;ds-nifi.dev.Company.com:9443&lt;/A&gt;&lt;BR /&gt;nifi.web.max.content.size=&lt;BR /&gt;nifi.web.max.requests.per.second=30000&lt;BR /&gt;nifi.web.max.access.token.requests.per.second=25&lt;BR /&gt;nifi.web.request.timeout=60 secs&lt;BR /&gt;nifi.web.request.ip.whitelist=&lt;BR /&gt;nifi.web.should.send.server.version=true&lt;BR /&gt;&lt;BR /&gt;# Include or Exclude TLS Cipher Suites for HTTPS&lt;BR /&gt;nifi.web.https.ciphersuites.include=&lt;BR /&gt;nifi.web.https.ciphersuites.exclude=&lt;BR /&gt;&lt;BR /&gt;# security properties #&lt;BR /&gt;nifi.sensitive.props.key=55MiiQS7efV0LR7C7SDpkMNP/2Hj4ASJ&lt;BR /&gt;nifi.sensitive.props.key.protected=&lt;BR /&gt;nifi.sensitive.props.algorithm=NIFI_PBKDF2_AES_GCM_256&lt;BR /&gt;nifi.sensitive.props.additional.keys=&lt;BR /&gt;&lt;BR /&gt;nifi.security.autoreload.enabled=false&lt;BR /&gt;nifi.security.autoreload.interval=10 secs&lt;BR /&gt;nifi.security.keystore=./conf/w-nifi-inf-wf02.dev-PRIVATE.pfx&lt;BR /&gt;nifi.security.keystoreType=PKCS12&lt;BR /&gt;nifi.security.keystorePasswd=abc123&lt;BR /&gt;nifi.security.keyPasswd=abc123&lt;BR /&gt;nifi.security.truststore=./conf/truststore.jks&lt;BR /&gt;nifi.security.truststoreType=jks&lt;BR /&gt;nifi.security.truststorePasswd=abc123&lt;BR /&gt;#nifi.security.user.authorizer=single-user-authorizer&lt;BR /&gt;nifi.security.user.authorizer=managed-authorizer&lt;BR /&gt;nifi.security.allow.anonymous.authentication=false&lt;BR /&gt;#nifi.security.user.login.identity.provider=single-user-provider&lt;BR /&gt;nifi.security.user.login.identity.provider=&lt;BR /&gt;nifi.security.user.jws.key.rotation.period=PT1H&lt;BR /&gt;nifi.security.ocsp.responder.url=&lt;BR /&gt;nifi.security.ocsp.responder.certificate=&lt;BR /&gt;&lt;BR /&gt;# OpenId Connect SSO Properties #&lt;BR /&gt;nifi.security.user.oidc.discovery.url=&lt;BR /&gt;nifi.security.user.oidc.connect.timeout=5 secs&lt;BR /&gt;nifi.security.user.oidc.read.timeout=5 secs&lt;BR /&gt;&lt;A href="http://nifi.security.user.oidc.client.id/" target="_blank" rel="noopener"&gt;nifi.security.user.oidc.client.id&lt;/A&gt;=&lt;BR /&gt;nifi.security.user.oidc.client.secret=&lt;BR /&gt;nifi.security.user.oidc.preferred.jwsalgorithm=&lt;BR /&gt;nifi.security.user.oidc.additional.scopes=&lt;BR /&gt;nifi.security.user.oidc.claim.identifying.user=&lt;BR /&gt;nifi.security.user.oidc.fallback.claims.identifying.user=&lt;BR /&gt;&lt;BR /&gt;# Apache Knox SSO Properties #&lt;BR /&gt;nifi.security.user.knox.url=&lt;BR /&gt;nifi.security.user.knox.publicKey=&lt;BR /&gt;nifi.security.user.knox.cookieName=hadoop-jwt&lt;BR /&gt;nifi.security.user.knox.audiences=&lt;BR /&gt;&lt;BR /&gt;# SAML Properties #&lt;BR /&gt;#nifi.security.user.saml.idp.metadata.url=&lt;A href="https://auth-preview.company.com/app/exk2jl211r89OP6bw1d7/sso/saml/metadata" target="_blank" rel="noopener"&gt;https://auth-preview.Company.com/app/exk2jl211r89OP6bw1d7/sso/saml/metadata&lt;/A&gt;&lt;BR /&gt;nifi.security.user.saml.idp.metadata.url=file://d:/nifi-1.15.3/conf/okta_metadata&lt;BR /&gt;&lt;A href="http://nifi.security.user.saml.sp.entity.id/" target="_blank" rel="noopener"&gt;nifi.security.user.saml.sp.entity.id&lt;/A&gt;=&lt;A href="https://ds-nifi.dev.company.com:9443/nifi" target="_blank" rel="noopener"&gt;https://ds-nifi.dev.Company.com:9443/nifi&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://nifi.security.user.saml.identity.attribute.name/" target="_blank" rel="noopener"&gt;nifi.security.user.saml.identity.attribute.name&lt;/A&gt;=uid&lt;BR /&gt;&lt;A href="http://nifi.security.user.saml.group.attribute.name/" target="_blank" rel="noopener"&gt;nifi.security.user.saml.group.attribute.name&lt;/A&gt;=&lt;BR /&gt;nifi.security.user.saml.metadata.signing.enabled=false&lt;BR /&gt;nifi.security.user.saml.request.signing.enabled=false&lt;BR /&gt;nifi.security.user.saml.want.assertions.signed=true&lt;BR /&gt;nifi.security.user.saml.signature.algorithm=&lt;A href="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256" target="_blank" rel="noopener"&gt;http://www.w3.org/2001/04/xmldsig-more#rsa-sha256&lt;/A&gt;&lt;BR /&gt;nifi.security.user.saml.signature.digest.algorithm=&lt;A href="http://www.w3.org/2001/04/xmlenc#sha256" target="_blank" rel="noopener"&gt;http://www.w3.org/2001/04/xmlenc#sha256&lt;/A&gt;&lt;BR /&gt;nifi.security.user.saml.message.logging.enabled=false&lt;BR /&gt;nifi.security.user.saml.authentication.expiration=12 hours&lt;BR /&gt;nifi.security.user.saml.single.logout.enabled=true&lt;BR /&gt;nifi.security.user.saml.http.client.truststore.strategy=JDK&lt;BR /&gt;nifi.security.user.saml.http.client.connect.timeout=30 secs&lt;BR /&gt;nifi.security.user.saml.http.client.read.timeout=30 secs&lt;BR /&gt;&lt;BR /&gt;# Identity Mapping Properties #&lt;BR /&gt;# These properties allow normalizing user identities such that identities coming from different identity providers&lt;BR /&gt;# (certificates, LDAP, Kerberos) can be treated the same internally in NiFi. The following example demonstrates normalizing&lt;BR /&gt;# DNs from certificates and principals from Kerberos into a common identity string:&lt;BR /&gt;#&lt;BR /&gt;# nifi.security.identity.mapping.pattern.dn=^CN=(.*?), OU=(.*?), O=(.*?), L=(.*?), ST=(.*?), C=(.*?)$&lt;BR /&gt;# nifi.security.identity.mapping.value.dn=$1@$2&lt;BR /&gt;# nifi.security.identity.mapping.transform.dn=NONE&lt;BR /&gt;# nifi.security.identity.mapping.pattern.kerb=^(.*?)/instance@(.*?)$&lt;BR /&gt;# nifi.security.identity.mapping.value.kerb=$1@$2&lt;BR /&gt;# nifi.security.identity.mapping.transform.kerb=UPPER&lt;BR /&gt;&lt;BR /&gt;# Group Mapping Properties #&lt;BR /&gt;# These properties allow normalizing group names coming from external sources like LDAP. The following example&lt;BR /&gt;# lowercases any group name.&lt;BR /&gt;#&lt;BR /&gt;# nifi.security.group.mapping.pattern.anygroup=^(.*)$&lt;BR /&gt;# nifi.security.group.mapping.value.anygroup=$1&lt;BR /&gt;# nifi.security.group.mapping.transform.anygroup=LOWER&lt;BR /&gt;&lt;BR /&gt;# cluster common properties (all nodes must have same values) #&lt;BR /&gt;nifi.cluster.protocol.heartbeat.interval=5 sec&lt;BR /&gt;nifi.cluster.protocol.heartbeat.missable.max=8&lt;BR /&gt;nifi.cluster.protocol.is.secure=true&lt;BR /&gt;&lt;BR /&gt;# cluster node properties (only configure for cluster nodes) #&lt;BR /&gt;nifi.cluster.is.node=true&lt;BR /&gt;nifi.cluster.node.address=&lt;A href="http://w-nifi-inf-wf02.dev.company.com/" target="_blank" rel="noopener"&gt;w-nifi-inf-wf02.dev.Company.com&lt;/A&gt;&lt;BR /&gt;nifi.cluster.node.protocol.port=7474&lt;BR /&gt;nifi.cluster.node.protocol.max.threads=50&lt;BR /&gt;nifi.cluster.node.event.history.size=25&lt;BR /&gt;nifi.cluster.node.connection.timeout=5 sec&lt;BR /&gt;nifi.cluster.node.read.timeout=5 sec&lt;BR /&gt;nifi.cluster.node.max.concurrent.requests=100&lt;BR /&gt;nifi.cluster.firewall.file=&lt;BR /&gt;nifi.cluster.flow.election.max.wait.time=5 mins&lt;BR /&gt;nifi.cluster.flow.election.max.candidates=&lt;BR /&gt;&lt;BR /&gt;# cluster load balancing properties #&lt;BR /&gt;nifi.cluster.load.balance.host=&lt;A href="http://w-nifi-inf-wf02.dev.company.com/" target="_blank" rel="noopener"&gt;w-nifi-inf-wf02.dev.Company.com&lt;/A&gt;&lt;BR /&gt;nifi.cluster.load.balance.port=6342&lt;BR /&gt;nifi.cluster.load.balance.connections.per.node=1&lt;BR /&gt;nifi.cluster.load.balance.max.thread.count=8&lt;BR /&gt;nifi.cluster.load.balance.comms.timeout=30 sec&lt;/DIV&gt;</description>
      <pubDate>Tue, 22 Mar 2022 17:04:15 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Tried-other-resolutions-but-no-luck-for-Unable-to-locate/m-p/339131#M233051</guid>
      <dc:creator>Tra</dc:creator>
      <dc:date>2022-03-22T17:04:15Z</dc:date>
    </item>
    <item>
      <title>Re: Tried other resolutions but no luck for Unable to locate node to seed policies</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Tried-other-resolutions-but-no-luck-for-Unable-to-locate/m-p/339574#M233122</link>
      <description>&lt;P&gt;Replaced authorizers file with one from System Admin Guide&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&amp;lt;authorizers&amp;gt;
    &amp;lt;userGroupProvider&amp;gt;
        &amp;lt;identifier&amp;gt;file-user-group-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.FileUserGroupProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="Users File"&amp;gt;./conf/users.xml&amp;lt;/property&amp;gt;
        &amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;

        &amp;lt;property name="Initial User Identity 1"&amp;gt;johnsmith@NIFI.APACHE.ORG&amp;lt;/property&amp;gt;
        &amp;lt;property name="Initial User Identity 2"&amp;gt;cn=nifi-1,ou=people,dc=example,dc=com&amp;lt;/property&amp;gt;
        &amp;lt;property name="Initial User Identity 3"&amp;gt;cn=nifi-2,ou=people,dc=example,dc=com&amp;lt;/property&amp;gt;
    &amp;lt;/userGroupProvider&amp;gt;
    &amp;lt;accessPolicyProvider&amp;gt;
        &amp;lt;identifier&amp;gt;file-access-policy-provider&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.FileAccessPolicyProvider&amp;lt;/class&amp;gt;
        &amp;lt;property name="User Group Provider"&amp;gt;file-user-group-provider&amp;lt;/property&amp;gt;
        &amp;lt;property name="Authorizations File"&amp;gt;./conf/authorizations.xml&amp;lt;/property&amp;gt;
        &amp;lt;property name="Initial Admin Identity"&amp;gt;johnsmith@NIFI.APACHE.ORG&amp;lt;/property&amp;gt;
        &amp;lt;property name="Legacy Authorized Users File"&amp;gt;&amp;lt;/property&amp;gt;

        &amp;lt;property name="Node Identity 1"&amp;gt;cn=nifi-1,ou=people,dc=example,dc=com&amp;lt;/property&amp;gt;
        &amp;lt;property name="Node Identity 2"&amp;gt;cn=nifi-2,ou=people,dc=example,dc=com&amp;lt;/property&amp;gt;
    &amp;lt;/accessPolicyProvider&amp;gt;
    &amp;lt;authorizer&amp;gt;
        &amp;lt;identifier&amp;gt;managed-authorizer&amp;lt;/identifier&amp;gt;
        &amp;lt;class&amp;gt;org.apache.nifi.authorization.StandardManagedAuthorizer&amp;lt;/class&amp;gt;
        &amp;lt;property name="Access Policy Provider"&amp;gt;file-access-policy-provider&amp;lt;/property&amp;gt;
    &amp;lt;/authorizer&amp;gt;
&amp;lt;/authorizers&amp;gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Mar 2022 12:54:58 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Tried-other-resolutions-but-no-luck-for-Unable-to-locate/m-p/339574#M233122</guid>
      <dc:creator>Tra</dc:creator>
      <dc:date>2022-03-24T12:54:58Z</dc:date>
    </item>
  </channel>
</rss>

