<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: Kafka ssl Nifi in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Kafka-ssl-Nifi/m-p/369026#M240346</link>
    <description>&lt;P&gt;the issue was resolved the problem was in the settings of the version of the tls protocol&lt;/P&gt;</description>
    <pubDate>Thu, 20 Apr 2023 14:31:15 GMT</pubDate>
    <dc:creator>VLban</dc:creator>
    <dc:date>2023-04-20T14:31:15Z</dc:date>
    <item>
      <title>Kafka ssl Nifi</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kafka-ssl-Nifi/m-p/369012#M240342</link>
      <description>&lt;P&gt;ConsumerKafka2.6&amp;nbsp;I connect to kafka using ssl I added a keystore and a triac from kafka servera I placed the same ones on the nifi server but in the nifi logs I get this error.&lt;/P&gt;&lt;PRE&gt;ConsumeKafka_2_6[id=9da42b1a-0187-1000-ffff-ffffb41254ef] Exception while interacting with Kafka so will close the lease org.apache.nifi.processors.kafka.pubsub.ConsumerPool$SimpleConsumerLease@62e55d3b due to SSL handshake failed: org.apache.kafka.common.errors.SslAuthenticationException: SSL handshake failed
- Caused by: javax.net.ssl.SSLHandshakeException: No subject alternative names matching IP address &lt;/PRE&gt;&lt;DIV&gt;&lt;DIV class="configuration-tab controller-service-configuration-tabs-content"&gt;&lt;DIV class="property-container"&gt;&lt;DIV class="property-table slickgrid_352501 ui-widget"&gt;&lt;DIV class="slick-pane slick-pane-top slick-pane-left"&gt;&lt;DIV class="slick-viewport slick-viewport-top slick-viewport-left"&gt;&lt;DIV class="grid-canvas grid-canvas-top grid-canvas-left"&gt;&lt;DIV class="ui-widget-content slick-row even"&gt;&lt;DIV class="slick-cell l0 r0"&gt;&lt;SPAN class="table-cell"&gt;my settings StandardSSLContextService&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="slick-cell l0 r0"&gt;&lt;SPAN class="table-cell"&gt;Keystore Filename&lt;/SPAN&gt;&lt;SPAN&gt;/var/ssl/nifi/kafka_broker.keystore.jks&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="ui-widget-content slick-row odd"&gt;&lt;DIV class="slick-cell l0 r0"&gt;&lt;SPAN class="table-cell"&gt;Keystore Password&lt;/SPAN&gt;&lt;SPAN&gt;Sensitive value set&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="ui-widget-content slick-row even"&gt;&lt;DIV class="slick-cell l0 r0"&gt;&lt;SPAN class="table-cell"&gt;Key Password&lt;/SPAN&gt;&lt;SPAN&gt;Sensitive value set&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="ui-widget-content slick-row odd"&gt;&lt;DIV class="slick-cell l0 r0"&gt;&lt;SPAN class="table-cell"&gt;Keystore Type&lt;/SPAN&gt;&lt;SPAN&gt;JKS&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="ui-widget-content slick-row even"&gt;&lt;DIV class="slick-cell l0 r0"&gt;&lt;SPAN class="table-cell"&gt;Truststore Filename /&lt;/SPAN&gt;&lt;SPAN&gt;var/ssl/nifi/kafka_broker.truststore.jks&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="ui-widget-content slick-row odd"&gt;&lt;DIV class="slick-cell l0 r0"&gt;&lt;SPAN class="table-cell"&gt;Truststore Password&lt;/SPAN&gt;&lt;SPAN&gt;Sensitive value set&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="ui-widget-content slick-row even"&gt;&lt;DIV class="slick-cell l0 r0"&gt;&lt;SPAN class="table-cell"&gt;Truststore Type&lt;/SPAN&gt;&lt;SPAN&gt;JKS&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="ui-widget-content slick-row odd"&gt;&lt;DIV class="slick-cell l0 r0"&gt;&lt;SPAN class="table-cell"&gt;TLS Protocol&lt;/SPAN&gt;&lt;SPAN&gt;TLS&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="slick-cell l0 r0"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="slick-cell l0 r0"&gt;&lt;SPAN&gt;My settings consumerKafka2.6&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="slick-cell l0 r0"&gt;&lt;DIV class="ui-widget-content slick-row odd"&gt;&lt;DIV class="slick-cell l0 r0"&gt;&lt;SPAN class="table-cell required"&gt;Security Protocol&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;SSL&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="ui-widget-content slick-row even"&gt;&lt;DIV class="slick-cell l0 r0"&gt;&lt;SPAN class="table-cell required"&gt;SASL Mechanism&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;SCRAM-SHA-512&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="ui-widget-content slick-row even"&gt;&lt;DIV class="slick-cell l0 r0"&gt;&lt;SPAN class="table-cell"&gt;Username&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;admin&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="ui-widget-content slick-row odd"&gt;&lt;DIV class="slick-cell l0 r0"&gt;&lt;SPAN class="table-cell"&gt;Password&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Sensitive value set&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="ui-widget-content slick-row odd"&gt;&lt;DIV class="slick-cell l0 r0 selected"&gt;&lt;SPAN class="table-cell"&gt;SSL Context Service&lt;/SPAN&gt;&lt;SPAN&gt;StandardSSLContextService&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="slick-cell l0 r0 selected"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="slick-cell l0 r0 selected"&gt;&lt;SPAN&gt;Help me&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 20 Apr 2023 12:53:10 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kafka-ssl-Nifi/m-p/369012#M240342</guid>
      <dc:creator>VLban</dc:creator>
      <dc:date>2023-04-20T12:53:10Z</dc:date>
    </item>
    <item>
      <title>Re: Kafka ssl Nifi</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kafka-ssl-Nifi/m-p/369023#M240343</link>
      <description>&lt;DIV&gt;2023-04-20 16:51:55,924 ERROR [Timer-Driven Process Thread-10] o.a.n.p.kafka.pubsub.ConsumeKafka_2_6 [ConsumeKafka_2_6[id=9da42b1a-0187-1000-ffff-ffffb41254ef], org.apache.nifi.processors.kafka.pubsub.ConsumerPool$SimpleConsumerLease@475bfba5, org.apache.kafka.common.errors.SslAuthenticationException: SSL handshake failed] Exception while interacting with Kafka so will close the lease {} due to {}&lt;/DIV&gt;&lt;DIV&gt;org.apache.kafka.common.errors.SslAuthenticationException: SSL handshake failed&lt;/DIV&gt;&lt;DIV&gt;Caused by: javax.net.ssl.SSLHandshakeException: No subject alternative names matching IP address 10.1 found&lt;/DIV&gt;&lt;DIV&gt;at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:131)&lt;/DIV&gt;&lt;DIV&gt;at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:353)&lt;/DIV&gt;&lt;DIV&gt;at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:296)&lt;/DIV&gt;&lt;DIV&gt;at java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:291)&lt;/DIV&gt;&lt;DIV&gt;at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1357)&lt;/DIV&gt;&lt;DIV&gt;at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.onConsumeCertificate(CertificateMessage.java:1232)&lt;/DIV&gt;&lt;DIV&gt;at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.consume(CertificateMessage.java:1175)&lt;/DIV&gt;&lt;DIV&gt;at java.base/sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:392)&lt;/DIV&gt;&lt;DIV&gt;at java.base/sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:443)&lt;/DIV&gt;&lt;DIV&gt;at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1076)&lt;/DIV&gt;&lt;DIV&gt;at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:1063)&lt;/DIV&gt;&lt;DIV&gt;at java.base/java.security.AccessController.doPrivileged(Native Method)&lt;/DIV&gt;&lt;DIV&gt;at java.base/sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:1010)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.kafka.common.network.SslTransportLayer.runDelegatedTasks(SslTransportLayer.java:430)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.kafka.common.network.SslTransportLayer.handshakeUnwrap(SslTransportLayer.java:514)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.kafka.common.network.SslTransportLayer.doHandshake(SslTransportLayer.java:368)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.kafka.common.network.SslTransportLayer.handshake(SslTransportLayer.java:291)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.kafka.common.network.KafkaChannel.prepare(KafkaChannel.java:173)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.kafka.common.network.Selector.pollSelectionKeys(Selector.java:547)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.kafka.common.network.Selector.poll(Selector.java:485)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.kafka.clients.NetworkClient.poll(NetworkClient.java:547)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.kafka.clients.consumer.internals.ConsumerNetworkClient.poll(ConsumerNetworkClient.java:265)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.kafka.clients.consumer.internals.ConsumerNetworkClient.poll(ConsumerNetworkClient.java:236)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.kafka.clients.consumer.internals.ConsumerNetworkClient.poll(ConsumerNetworkClient.java:215)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.kafka.clients.consumer.internals.AbstractCoordinator.ensureCoordinatorReady(AbstractCoordinator.java:245)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.kafka.clients.consumer.internals.ConsumerCoordinator.poll(ConsumerCoordinator.java:480)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.kafka.clients.consumer.KafkaConsumer.updateAssignmentMetadataIfNeeded(KafkaConsumer.java:1261)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.kafka.clients.consumer.KafkaConsumer.poll(KafkaConsumer.java:1230)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.kafka.clients.consumer.KafkaConsumer.poll(KafkaConsumer.java:1210)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.nifi.processors.kafka.pubsub.ConsumerLease.poll(ConsumerLease.java:220)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.nifi.processors.kafka.pubsub.ConsumeKafka_2_6.onTrigger(ConsumeKafka_2_6.java:479)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.nifi.processor.AbstractProcessor.onTrigger(AbstractProcessor.java:27)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.nifi.controller.StandardProcessorNode.onTrigger(StandardProcessorNode.java:1357)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.nifi.controller.tasks.ConnectableTask.invoke(ConnectableTask.java:246)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.nifi.controller.scheduling.TimerDrivenSchedulingAgent$1.run(TimerDrivenSchedulingAgent.java:102)&lt;/DIV&gt;&lt;DIV&gt;at org.apache.nifi.engine.FlowEngine$2.run(FlowEngine.java:110)&lt;/DIV&gt;&lt;DIV&gt;at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515)&lt;/DIV&gt;&lt;DIV&gt;at java.base/java.util.concurrent.FutureTask.runAndReset(FutureTask.java:305)&lt;/DIV&gt;&lt;DIV&gt;at java.base/java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:305)&lt;/DIV&gt;&lt;DIV&gt;at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128)&lt;/DIV&gt;&lt;DIV&gt;at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628)&lt;/DIV&gt;&lt;DIV&gt;at java.base/java.lang.Thread.run(Thread.java:829)&lt;/DIV&gt;&lt;DIV&gt;Caused by: java.security.cert.CertificateException: No subject alternative names matching IP address 10.1 found&lt;/DIV&gt;&lt;DIV&gt;at java.base/sun.security.util.HostnameChecker.matchIP(HostnameChecker.java:165)&lt;/DIV&gt;&lt;DIV&gt;at java.base/sun.security.util.HostnameChecker.match(HostnameChecker.java:101)&lt;/DIV&gt;&lt;DIV&gt;at java.base/sun.security.ssl.X509TrustManagerImpl.checkIdentity(X509TrustManagerImpl.java:455)&lt;/DIV&gt;&lt;DIV&gt;at java.base/sun.security.ssl.X509TrustManagerImpl.checkIdentity(X509TrustManagerImpl.java:429)&lt;/DIV&gt;&lt;DIV&gt;at java.base/sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:283)&lt;/DIV&gt;&lt;DIV&gt;at java.base/sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141)&lt;/DIV&gt;&lt;DIV&gt;at java.base/sun.security.ssl.CertificateMessage$T13CertificateConsumer.checkServerCerts(CertificateMessage.java:1335)&lt;/DIV&gt;&lt;DIV&gt;... 37 common frames omitted&lt;/DIV&gt;</description>
      <pubDate>Thu, 20 Apr 2023 13:57:16 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kafka-ssl-Nifi/m-p/369023#M240343</guid>
      <dc:creator>VLban</dc:creator>
      <dc:date>2023-04-20T13:57:16Z</dc:date>
    </item>
    <item>
      <title>Re: Kafka ssl Nifi</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kafka-ssl-Nifi/m-p/369026#M240346</link>
      <description>&lt;P&gt;the issue was resolved the problem was in the settings of the version of the tls protocol&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 14:31:15 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kafka-ssl-Nifi/m-p/369026#M240346</guid>
      <dc:creator>VLban</dc:creator>
      <dc:date>2023-04-20T14:31:15Z</dc:date>
    </item>
  </channel>
</rss>

