<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question NIFI Connection refused zookeeper in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/NIFI-Connection-refused-zookeeper/m-p/402568#M251709</link>
    <description>&lt;P&gt;HI&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good Day,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we are experiencing new error called"&amp;nbsp; &lt;STRONG&gt;Connection refused: zookeepernode2&lt;/STRONG&gt;" post setting up DNS&amp;nbsp; with the keystore and Password for NIFI which we generated internally using keytool, same keystore and password we are using in zookeeper as well.&lt;/P&gt;&lt;P&gt;Attaching the Required details, Request you to please check and provide your valuable feedback&lt;/P&gt;&lt;P&gt;Below is the web UI error.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nifi certficate error.png" style="width: 762px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/44009i3441FBDCCB1F2867/image-size/large?v=v2&amp;amp;px=999" role="button" title="nifi certficate error.png" alt="nifi certficate error.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we setted up the nifi cluster in below format&lt;/P&gt;&lt;P&gt;NIFINODE1, NIFINODE2. two azure vm's&lt;/P&gt;&lt;P&gt;Zookeepernode1, Zookeepernode2, Zookeepernode3. three Azure vm's&lt;/P&gt;&lt;P&gt;please find zoo,cfg details below.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="zookeeper config.png" style="width: 944px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/44010i60B58A5729BF8B5B/image-size/large?v=v2&amp;amp;px=999" role="button" title="zookeeper config.png" alt="zookeeper config.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;#zookeeper node3 has been choosen has an elector&lt;/P&gt;&lt;P&gt;sudo bin/zkServer.sh status&lt;BR /&gt;/usr/bin/java&lt;BR /&gt;ZooKeeper JMX enabled by default&lt;BR /&gt;Using config: /opt/zookeeper/bin/../conf/zoo.cfg&lt;BR /&gt;Client port not found in static config file. Looking in dynamic config file.&lt;BR /&gt;grep: : No such file or directory&lt;BR /&gt;Client port not found in the server configs&lt;BR /&gt;Client port found: 2181. Client address: localhost. Client SSL: false.&lt;BR /&gt;Mode: leader&lt;/P&gt;&lt;P&gt;___________________________________________________________________________&lt;BR /&gt;&lt;BR /&gt;Attaching the nifi.properties details.&lt;/P&gt;&lt;P&gt;# Core Properties #&lt;BR /&gt;nifi.flow.configuration.file=./conf/flow.xml.gz&lt;BR /&gt;nifi.flow.configuration.json.file=./conf/flow.json.gz&lt;BR /&gt;nifi.flow.configuration.archive.enabled=true&lt;BR /&gt;nifi.flow.configuration.archive.dir=./conf/archive/&lt;BR /&gt;nifi.flow.configuration.archive.max.time=30 days&lt;BR /&gt;nifi.flow.configuration.archive.max.storage=500 MB&lt;BR /&gt;nifi.flow.configuration.archive.max.count=&lt;BR /&gt;nifi.flowcontroller.autoResumeState=true&lt;BR /&gt;nifi.flowcontroller.graceful.shutdown.period=10 sec&lt;BR /&gt;nifi.flowservice.writedelay.interval=500 ms&lt;BR /&gt;nifi.administrative.yield.duration=30 sec&lt;BR /&gt;# If a component has no work to do (is "bored"), how long should we wait before checking again for work?&lt;BR /&gt;nifi.bored.yield.duration=10 millis&lt;BR /&gt;nifi.queue.backpressure.count=10000&lt;BR /&gt;nifi.queue.backpressure.size=1 GB&lt;/P&gt;&lt;P&gt;nifi.authorizer.configuration.file=./conf/authorizers.xml&lt;BR /&gt;nifi.login.identity.provider.configuration.file=./conf/login-identity-providers.xml&lt;BR /&gt;nifi.templates.directory=./conf/templates&lt;BR /&gt;nifi.ui.banner.text=&lt;BR /&gt;nifi.ui.autorefresh.interval=30 sec&lt;BR /&gt;nifi.nar.library.directory=./lib&lt;BR /&gt;nifi.nar.library.autoload.directory=./extensions&lt;BR /&gt;nifi.nar.working.directory=./work/nar/&lt;BR /&gt;nifi.documentation.working.directory=./work/docs/components&lt;BR /&gt;nifi.nar.unpack.uber.jar=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nifi.state.management.configuration.file=./conf/state-management.xml&lt;BR /&gt;# The ID of the local state provider&lt;BR /&gt;nifi.state.management.provider.local=local-provider&lt;BR /&gt;# The ID of the cluster-wide state provider. This will be ignored if NiFi is not clustered but must be populated if running in a cluster.&lt;BR /&gt;nifi.state.management.provider.cluster=zk-provider&lt;BR /&gt;# Specifies whether or not this instance of NiFi should run an embedded ZooKeeper server&lt;BR /&gt;nifi.state.management.embedded.zookeeper.start=false&lt;BR /&gt;# Properties file that provides the ZooKeeper properties to use if &amp;lt;nifi.state.management.embedded.zookeeper.start&amp;gt; is set to true&lt;BR /&gt;nifi.state.management.embedded.zookeeper.properties=./conf/zookeeper.properties&lt;/P&gt;&lt;P&gt;# Database Settings&lt;BR /&gt;nifi.database.directory=./database_repository&lt;/P&gt;&lt;P&gt;# Repository Encryption properties override individual repository implementation properties&lt;BR /&gt;nifi.repository.encryption.protocol.version=&lt;BR /&gt;nifi.repository.encryption.key.id=&lt;BR /&gt;nifi.repository.encryption.key.provider=&lt;BR /&gt;nifi.repository.encryption.key.provider.keystore.location=&lt;BR /&gt;nifi.repository.encryption.key.provider.keystore.password=&lt;/P&gt;&lt;P&gt;# FlowFile Repository&lt;BR /&gt;nifi.flowfile.repository.implementation=org.apache.nifi.controller.repository.WriteAheadFlowFileRepository&lt;BR /&gt;nifi.flowfile.repository.wal.implementation=org.apache.nifi.wali.SequentialAccessWriteAheadLog&lt;BR /&gt;nifi.flowfile.repository.directory=./flowfile_repository&lt;BR /&gt;nifi.flowfile.repository.checkpoint.interval=20 secs&lt;BR /&gt;nifi.flowfile.repository.always.sync=false&lt;BR /&gt;nifi.flowfile.repository.retain.orphaned.flowfiles=true&lt;/P&gt;&lt;P&gt;nifi.swap.manager.implementation=org.apache.nifi.controller.FileSystemSwapManager&lt;BR /&gt;nifi.queue.swap.threshold=20000&lt;/P&gt;&lt;P&gt;# Content Repository&lt;BR /&gt;nifi.content.repository.implementation=org.apache.nifi.controller.repository.FileSystemRepository&lt;BR /&gt;nifi.content.claim.max.appendable.size=50 KB&lt;BR /&gt;nifi.content.repository.directory.default=./content_repository&lt;BR /&gt;nifi.content.repository.archive.max.retention.period=7 days&lt;BR /&gt;nifi.content.repository.archive.max.usage.percentage=50%&lt;BR /&gt;nifi.content.repository.archive.enabled=true&lt;BR /&gt;nifi.content.repository.always.sync=false&lt;BR /&gt;nifi.content.viewer.url=../nifi-content-viewer/&lt;/P&gt;&lt;P&gt;nifi.provenance.repository.implementation=org.apache.nifi.provenance.WriteAheadProvenanceRepository&lt;/P&gt;&lt;P&gt;# Persistent Provenance Repository Properties&lt;BR /&gt;nifi.provenance.repository.directory.default=./provenance_repository&lt;BR /&gt;nifi.provenance.repository.max.storage.time=30 days&lt;BR /&gt;nifi.provenance.repository.max.storage.size=10 GB&lt;BR /&gt;nifi.provenance.repository.rollover.time=10 mins&lt;BR /&gt;nifi.provenance.repository.rollover.size=100 MB&lt;BR /&gt;nifi.provenance.repository.query.threads=2&lt;BR /&gt;nifi.provenance.repository.index.threads=2&lt;BR /&gt;nifi.provenance.repository.compress.on.rollover=true&lt;BR /&gt;nifi.provenance.repository.always.sync=false&lt;BR /&gt;# Comma-separated list of fields. Fields that are not indexed will not be searchable. Valid fields are:&lt;BR /&gt;# EventType, FlowFileUUID, Filename, TransitURI, ProcessorID, AlternateIdentifierURI, Relationship, Details&lt;BR /&gt;nifi.provenance.repository.indexed.fields=EventType, FlowFileUUID, Filename, ProcessorID, Relationship&lt;BR /&gt;# FlowFile Attributes that should be indexed and made searchable. Some examples to consider are filename, uuid, mime.type&lt;BR /&gt;nifi.provenance.repository.indexed.attributes=&lt;BR /&gt;# Large values for the shard size will result in more Java heap usage when searching the Provenance Repository&lt;BR /&gt;# but should provide better performance&lt;BR /&gt;nifi.provenance.repository.index.shard.size=500 MB&lt;BR /&gt;# Indicates the maximum length that a FlowFile attribute can be when retrieving a Provenance Event from&lt;BR /&gt;# the repository. If the length of any attribute exceeds this value, it will be truncated when the event is retrieved.&lt;BR /&gt;nifi.provenance.repository.max.attribute.length=65536&lt;BR /&gt;nifi.provenance.repository.concurrent.merge.threads=2&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;# Volatile Provenance Respository Properties&lt;BR /&gt;nifi.provenance.repository.buffer.size=100000&lt;/P&gt;&lt;P&gt;# Component and Node Status History Repository&lt;BR /&gt;nifi.components.status.repository.implementation=org.apache.nifi.controller.status.history.VolatileComponentStatusRepository&lt;/P&gt;&lt;P&gt;# Volatile Status History Repository Properties&lt;BR /&gt;nifi.components.status.repository.buffer.size=1440&lt;BR /&gt;nifi.components.status.snapshot.frequency=1 min&lt;/P&gt;&lt;P&gt;# QuestDB Status History Repository Properties&lt;BR /&gt;nifi.status.repository.questdb.persist.node.days=14&lt;BR /&gt;nifi.status.repository.questdb.persist.component.days=3&lt;BR /&gt;nifi.status.repository.questdb.persist.location=./status_repository&lt;/P&gt;&lt;P&gt;# Site to Site properties&lt;BR /&gt;nifi.remote.input.host=nifinode1&lt;BR /&gt;nifi.remote.input.secure=true&lt;BR /&gt;nifi.remote.input.socket.port=10000&lt;BR /&gt;nifi.remote.input.http.enabled=true&lt;/P&gt;&lt;P&gt;nifi.remote.input.socket.port=10000&lt;BR /&gt;nifi.remote.input.http.enabled=true&lt;BR /&gt;nifi.remote.input.http.transaction.ttl=30 sec&lt;BR /&gt;nifi.remote.contents.cache.expiration=30 secs&lt;/P&gt;&lt;P&gt;# web properties #&lt;BR /&gt;#############################################&lt;/P&gt;&lt;P&gt;# For security, NiFi will present the UI on 127.0.0.1 and only be accessible through this loopback interface.&lt;BR /&gt;# Be aware that changing these properties may affect how your instance can be accessed without any restriction.&lt;BR /&gt;# We recommend configuring HTTPS instead. The administrators guide provides instructions on how to do this.&lt;/P&gt;&lt;P&gt;nifi.web.http.host=&lt;BR /&gt;nifi.web.http.port=&lt;BR /&gt;nifi.web.http.network.interface.default=&lt;/P&gt;&lt;P&gt;#############################################&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;nifi.web.https.host=nifinode1.web.net&lt;BR /&gt;nifi.web.https.port=8443&lt;BR /&gt;nifi.web.https.network.interface.default=&lt;BR /&gt;nifi.web.https.application.protocols=http/1.1&lt;BR /&gt;nifi.web.jetty.working.directory=./work/jetty&lt;BR /&gt;nifi.web.jetty.threads=200&lt;BR /&gt;nifi.web.max.header.size=16 KB&lt;BR /&gt;nifi.web.proxy.context.path=&lt;BR /&gt;nifi.web.proxy.host=nifi-web-net,nifi-web-net:8443&lt;BR /&gt;nifi.web.max.content.size=&lt;BR /&gt;nifi.web.max.requests.per.second=30000&lt;BR /&gt;nifi.web.max.access.token.requests.per.second=25&lt;BR /&gt;nifi.web.request.timeout=60 secs&lt;BR /&gt;nifi.web.request.ip.whitelist=&lt;BR /&gt;nifi.web.should.send.server.version=true&lt;BR /&gt;nifi.web.request.log.format=%{client}a - %u %t "%r" %s %O "%{Referer}i" "%{User-Agent}i"&lt;/P&gt;&lt;P&gt;# Filter JMX MBeans available through the System Diagnostics REST API&lt;BR /&gt;nifi.web.jmx.metrics.allowed.filter.pattern=&lt;/P&gt;&lt;P&gt;# Include or Exclude TLS Cipher Suites for HTTPS&lt;BR /&gt;nifi.web.https.ciphersuites.include=&lt;BR /&gt;nifi.web.https.ciphersuites.exclude=&lt;/P&gt;&lt;P&gt;nifi.sensitive.props.key=@Rfs]HjNl=r(z0&amp;amp;ocSsTrrR8rm?/7qMP&lt;BR /&gt;nifi.sensitive.props.key.protected=&lt;BR /&gt;nifi.sensitive.props.algorithm=NIFI_PBKDF2_AES_GCM_256&lt;BR /&gt;nifi.sensitive.props.additional.keys=&lt;/P&gt;&lt;P&gt;*************************************************************&lt;BR /&gt;nifi.security.user.authentication.kerberos=false&lt;BR /&gt;#nifi.security.user.login.identity.provider=empty&lt;BR /&gt;nifi.security.needClientAuth=false&lt;BR /&gt;#nifi.cluster.protocol.is.secure=false&lt;BR /&gt;#nifi.security.needClientAuth=true&lt;BR /&gt;#nifi.cluster.protocol.is.secure=true&lt;/P&gt;&lt;P&gt;nifi.security.allow.anonymous.authentication=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;***********************************************************&lt;BR /&gt;nifi.security.autoreload.enabled=false&lt;BR /&gt;nifi.security.autoreload.interval=10 secs&lt;BR /&gt;nifi.security.keystore=./conf/keystore.jks&lt;BR /&gt;#nifi.security.keystoreType=PKCS12&lt;BR /&gt;nifi.security.keystoreType=JKS&lt;BR /&gt;nifi.security.keystorePasswd=XXXXXXXXcWRvgEXXXXXXmxGxNyw&lt;BR /&gt;nifi.security.keyPasswd=XXXXXXXXWeQAngXXXXbYCzrEf&lt;BR /&gt;nifi.security.truststore=./conf/truststore.jks&lt;BR /&gt;nifi.security.truststoreType=JKS&lt;BR /&gt;nifi.security.truststorePasswd=XXXXXXXXcWRvgEXXXXXXmxGxNyw&lt;BR /&gt;#nifi.security.user.authorizer=single-user-authorizer&lt;BR /&gt;#nifi.security.allow.anonymous.authentication=false&lt;BR /&gt;#nifi.security.user.login.identity.provider=single-user-provider&lt;BR /&gt;nifi.security.user.authorizer=managed-authorizer&lt;BR /&gt;#nifi.security.user.authorizer=org.apache.nifi.authorization.CertificateBasedAuthorizer&lt;BR /&gt;nifi.security.user.login.identity.provider=&lt;BR /&gt;nifi.security.user.jws.key.rotation.period=PT1H&lt;BR /&gt;nifi.security.ocsp.responder.url=&lt;BR /&gt;nifi.security.ocsp.responder.certificate=&lt;/P&gt;&lt;P&gt;nifi.security.user.oidc.discovery.url=&lt;A href="https://SSo-login-page" target="_blank" rel="noopener"&gt;https://SSo-login-page&lt;/A&gt;&lt;BR /&gt;nifi.security.user.oidc.connect.timeout=5 secs&lt;BR /&gt;nifi.security.user.oidc.read.timeout=5 secs&lt;BR /&gt;nifi.security.user.oidc.client.id=XXXXXXX-be28-XXXXXXX-cd0e5f2da902&lt;BR /&gt;nifi.security.user.oidc.client.secret=cmNTTsotwXXXXXXXXXXXXXBtsmfWFwoXXXXXyggP&lt;BR /&gt;nifi.security.user.oidc.preferred.jwsalgorithm=&lt;BR /&gt;nifi.security.user.oidc.additional.scopes=offline_access,personal_data&lt;BR /&gt;nifi.security.user.oidc.claim.identifying.user=corporate_user_id&lt;BR /&gt;nifi.security.user.oidc.fallback.claims.identifying.user=&lt;/P&gt;&lt;P&gt;# Apache Knox SSO Properties #&lt;BR /&gt;nifi.security.user.knox.url=&lt;BR /&gt;nifi.security.user.knox.publicKey=&lt;BR /&gt;nifi.security.user.knox.cookieName=hadoop-jwt&lt;BR /&gt;nifi.security.user.knox.audiences=&lt;/P&gt;&lt;P&gt;# SAML Properties #&lt;BR /&gt;nifi.security.user.saml.idp.metadata.url=&lt;BR /&gt;nifi.security.user.saml.sp.entity.id=&lt;BR /&gt;nifi.security.user.saml.identity.attribute.name=&lt;BR /&gt;nifi.security.user.saml.group.attribute.name=&lt;BR /&gt;nifi.security.user.saml.request.signing.enabled=false&lt;BR /&gt;nifi.security.user.saml.want.assertions.signed=true&lt;BR /&gt;nifi.security.user.saml.signature.algorithm=&lt;A href="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256" target="_blank" rel="noopener"&gt;http://www.w3.org/2001/04/xmldsig-more#rsa-sha256&lt;/A&gt;&lt;BR /&gt;nifi.security.user.saml.authentication.expiration=12 hours&lt;BR /&gt;nifi.security.user.saml.single.logout.enabled=false&lt;BR /&gt;nifi.security.user.saml.http.client.truststore.strategy=JDK&lt;BR /&gt;nifi.security.user.saml.http.client.connect.timeout=30 secs&lt;BR /&gt;nifi.security.user.saml.http.client.read.timeout=30 secs&lt;/P&gt;&lt;P&gt;# cluster node properties (only configure for cluster nodes) #&lt;BR /&gt;nifi.cluster.is.node=true&lt;BR /&gt;nifi.cluster.node.address=nifinode1.web&lt;BR /&gt;nifi.cluster.node.protocol.port=9991&lt;BR /&gt;nifi.cluster.node.protocol.max.threads=50&lt;BR /&gt;nifi.cluster.node.event.history.size=25&lt;BR /&gt;nifi.cluster.node.connection.timeout=5 sec&lt;BR /&gt;nifi.cluster.node.read.timeout=5 sec&lt;BR /&gt;nifi.cluster.node.max.concurrent.requests=100&lt;BR /&gt;nifi.cluster.firewall.file=&lt;BR /&gt;nifi.cluster.flow.election.max.wait.time=1 mins&lt;BR /&gt;nifi.cluster.flow.election.max.candidates=&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;# cluster load balancing properties #&lt;BR /&gt;nifi.cluster.load.balance.host=nifinode1.web&lt;BR /&gt;nifi.cluster.load.balance.port=6342&lt;/P&gt;&lt;P&gt;nifi.cluster.load.balance.connections.per.node=1&lt;BR /&gt;nifi.cluster.load.balance.max.thread.count=8&lt;BR /&gt;nifi.cluster.load.balance.comms.timeout=30 sec&lt;BR /&gt;nifi.cluster.protocol.ssl.context.protocol=TLS&lt;/P&gt;&lt;P&gt;# zookeeper properties, used for cluster management #&lt;BR /&gt;nifi.zookeeper.connect.string=zookeepernode1:2181,zookeepernode2:2181,zookeepernode3:2181&lt;BR /&gt;#nifi.zookeeper.connect.string=zookeepernode1:2181,zookeepernode2:2182,zookeepernode3:2183&lt;BR /&gt;nifi.zookeeper.connect.timeout=10 secs&lt;BR /&gt;nifi.zookeeper.session.timeout=10 secs&lt;BR /&gt;nifi.zookeeper.root.node=/nifi&lt;BR /&gt;#nifi.zookeeper.client.secure=false&lt;BR /&gt;nifi.zookeeper.ssl.clientAuth=none&lt;BR /&gt;nifi.zookeeper.client.secure=true&lt;BR /&gt;nifi.zookeeper.security.keystore=./conf/keystore.jks&lt;BR /&gt;nifi.zookeeper.security.keystoreType=jks&lt;BR /&gt;nifi.zookeeper.security.keystorePasswd=OXXXXXXXXXXXXXXXNyw&lt;BR /&gt;nifi.zookeeper.security.truststore=./conf/truststore.jks&lt;BR /&gt;nifi.zookeeper.security.truststoreType=jks&lt;BR /&gt;nifi.zookeeper.security.truststorePasswd=OXXXXXXXXXXXXXGxNyw&lt;BR /&gt;nifi.zookeeper.jute.maxbuffer=&lt;BR /&gt;nifi.zookeeper.ssl.client.auth=none&lt;/P&gt;&lt;P&gt;# Zookeeper properties for the authentication scheme used when creating acls on znodes used for cluster management&lt;BR /&gt;# Values supported for nifi.zookeeper.auth.type are "default", which will apply world/anyone rights on znodes&lt;BR /&gt;# and "sasl" which will give rights to the sasl/kerberos identity used to authenticate the nifi node&lt;BR /&gt;# The identity is determined using the value in nifi.kerberos.service.principal and the removeHostFromPrincipal&lt;BR /&gt;# and removeRealmFromPrincipal values (which should align with the kerberos.removeHostFromPrincipal and kerberos.removeRealmFromPrincipal&lt;BR /&gt;# values configured on the zookeeper server).&lt;BR /&gt;nifi.zookeeper.auth.type=&lt;BR /&gt;nifi.zookeeper.kerberos.removeHostFromPrincipal=&lt;BR /&gt;nifi.zookeeper.kerberos.removeRealmFromPrincipal=&lt;/P&gt;&lt;P&gt;# kerberos #&lt;BR /&gt;nifi.kerberos.krb5.file=&lt;/P&gt;&lt;P&gt;# kerberos service principal #&lt;BR /&gt;nifi.kerberos.service.principal=&lt;BR /&gt;nifi.kerberos.service.keytab.location=&lt;/P&gt;&lt;P&gt;# kerberos spnego principal #&lt;BR /&gt;nifi.kerberos.spnego.principal=&lt;BR /&gt;nifi.kerberos.spnego.keytab.location=&lt;/P&gt;&lt;P&gt;nifi.kerberos.spnego.principal=&lt;BR /&gt;nifi.kerberos.spnego.keytab.location=&lt;BR /&gt;nifi.kerberos.spnego.authentication.expiration=12 hours&lt;/P&gt;&lt;P&gt;# external properties files for variable registry&lt;BR /&gt;# supports a comma delimited list of file locations&lt;BR /&gt;nifi.variable.registry.properties=&lt;/P&gt;&lt;P&gt;# analytics properties #&lt;BR /&gt;nifi.analytics.predict.enabled=false&lt;BR /&gt;nifi.analytics.predict.interval=3 mins&lt;BR /&gt;nifi.analytics.query.interval=5 mins&lt;BR /&gt;nifi.analytics.connection.model.implementation=org.apache.nifi.controller.status.analytics.models.OrdinaryLeastSquares&lt;BR /&gt;nifi.analytics.connection.model.score.name=rSquared&lt;BR /&gt;nifi.analytics.connection.model.score.threshold=.90&lt;/P&gt;&lt;P&gt;# runtime monitoring properties&lt;BR /&gt;nifi.monitor.long.running.task.schedule=&lt;BR /&gt;nifi.monitor.long.running.task.threshold=&lt;/P&gt;&lt;P&gt;# Enable automatic diagnostic at shutdown.&lt;BR /&gt;nifi.diagnostics.on.shutdown.enabled=false&lt;/P&gt;&lt;P&gt;# Include verbose diagnostic information.&lt;BR /&gt;nifi.diagnostics.on.shutdown.verbose=false&lt;/P&gt;&lt;P&gt;# The location of the diagnostics folder.&lt;BR /&gt;nifi.diagnostics.on.shutdown.directory=./diagnostics&lt;/P&gt;&lt;P&gt;# The maximum number of files permitted in the directory. If the limit is exceeded, the oldest files are deleted.&lt;BR /&gt;nifi.diagnostics.on.shutdown.max.filecount=10&lt;/P&gt;&lt;P&gt;# The diagnostics folder's maximum permitted size in bytes. If the limit is exceeded, the oldest files are deleted.&lt;BR /&gt;nifi.diagnostics.on.shutdown.max.directory.size=10 MB&lt;/P&gt;&lt;P&gt;# Performance tracking properties&lt;BR /&gt;## Specifies what percentage of the time we should track the amount of time processors are using CPU, reading from/writing to content repo, etc.&lt;BR /&gt;## This can be useful to understand which components are the most expensive and to understand where system bottlenecks may be occurring.&lt;BR /&gt;## The value must be in the range of 0 (inclusive) to 100 (inclusive). A larger value will produce more accurate results, while a smaller value may be&lt;BR /&gt;## less expensive to compute.&lt;BR /&gt;## Results can be obtained by running "nifi.sh diagnostics &amp;lt;filename&amp;gt;" and then inspecting the produced file.&lt;BR /&gt;nifi.performance.tracking.percentage=0&lt;/P&gt;&lt;P&gt;# NAR Provider Properties #&lt;BR /&gt;# These properties allow configuring one or more NAR providers. A NAR provider retrieves NARs from an external source&lt;BR /&gt;# and copies them to the directory specified by nifi.nar.library.autoload.directory.&lt;/P&gt;&lt;P&gt;____________________________________________________________________________________&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;logs/nifi-app.log error details&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2025-02-19 10:02:01,616 INFO [epollEventLoopGroup-4-1] o.apache.zookeeper.ClientCnxnSocketNetty channel is disconnected: [id: 0xf6690cd4, L:/53.13.138.70:53038 ! R:zookeepernode2/53.13.138.7&lt;BR /&gt;2:2181]&lt;BR /&gt;2025-02-19 10:02:01,616 INFO [epollEventLoopGroup-4-1] o.apache.zookeeper.ClientCnxnSocketNetty channel is told closing&lt;BR /&gt;2025-02-19 10:02:02,157 INFO [epollEventLoopGroup-4-1] o.apache.zookeeper.ClientCnxnSocketNetty SSL handler added for channel: [id: 0x48429c0b]&lt;BR /&gt;2025-02-19 10:02:02,158 INFO [epollEventLoopGroup-4-1] o.apache.zookeeper.ClientCnxnSocketNetty channel is connected: [id: 0x48429c0b, L:/53.13.138.70:34056 - R:zookeepernode1/53.13.138.71:2&lt;BR /&gt;181]&lt;BR /&gt;2025-02-19 10:02:02,159 INFO [epollEventLoopGroup-4-1] o.apache.zookeeper.ClientCnxnSocketNetty channel is disconnected: [id: 0x48429c0b, L:/53.13.138.70:34056 ! R:zookeepernode1/53.13.138.7&lt;BR /&gt;1:2181]&lt;BR /&gt;2025-02-19 10:02:02,159 INFO [epollEventLoopGroup-4-1] o.apache.zookeeper.ClientCnxnSocketNetty channel is told closing&lt;BR /&gt;2025-02-19 10:02:02,159 WARN [main] o.a.n.c.l.e.CuratorLeaderElectionManager Unable to determine leader for role 'Cluster Coordinator'; returning null&lt;BR /&gt;org.apache.zookeeper.KeeperException$ConnectionLossException: KeeperErrorCode = ConnectionLoss for /nifi/leaders/Cluster Coordinator&lt;BR /&gt;at org.apache.zookeeper.KeeperException.create(KeeperException.java:101)&lt;BR /&gt;at org.apache.zookeeper.KeeperException.create(KeeperException.java:53)&lt;BR /&gt;at org.apache.zookeeper.ZooKeeper.getChildren(ZooKeeper.java:2480)&lt;BR /&gt;at org.apache.curator.framework.imps.GetChildrenBuilderImpl$3.call(GetChildrenBuilderImpl.java:235)&lt;BR /&gt;at org.apache.curator.framework.imps.GetChildrenBuilderImpl$3.call(GetChildrenBuilderImpl.java:228)&lt;BR /&gt;at org.apache.curator.RetryLoop.callWithRetry(RetryLoop.java:88)&lt;BR /&gt;at org.apache.curator.framework.imps.GetChildrenBuilderImpl.pathInForeground(GetChildrenBuilderImpl.java:228)&lt;BR /&gt;at org.apache.curator.framework.imps.GetChildrenBuilderImpl.forPath(GetChildrenBuilderImpl.java:221)&lt;BR /&gt;at org.apache.curator.framework.imps.GetChildrenBuilderImpl.forPath(GetChildrenBuilderImpl.java:42)&lt;BR /&gt;at org.apache.curator.framework.recipes.locks.LockInternals.getSortedChildren(LockInternals.java:133)&lt;BR /&gt;at org.apache.curator.framework.recipes.locks.LockInternals.getParticipantNodes(LockInternals.java:119)&lt;BR /&gt;at org.apache.curator.framework.recipes.locks.InterProcessMutex.getParticipantNodes(InterProcessMutex.java:153)&lt;BR /&gt;at org.apache.curator.framework.recipes.leader.LeaderSelector.getLeader(LeaderSelector.java:321)&lt;BR /&gt;at org.apache.nifi.controller.leader.election.CuratorLeaderElectionManager.getLeader(CuratorLeaderElectionManager.java:288)&lt;BR /&gt;at org.apache.nifi.cluster.coordination.node.LeaderElectionNodeProtocolSender.getServiceAddress(LeaderElectionNodeProtocolSender.java:46)&lt;BR /&gt;at org.apache.nifi.cluster.protocol.AbstractNodeProtocolSender.requestConnection(AbstractNodeProtocolSender.java:64)&lt;BR /&gt;at org.apache.nifi.cluster.protocol.impl.NodeProtocolSenderListener.requestConnection(NodeProtocolSenderListener.java:89)&lt;BR /&gt;at org.apache.nifi.controller.StandardFlowService.connect(StandardFlowService.java:928)&lt;BR /&gt;at org.apache.nifi.controller.StandardFlowService.load(StandardFlowService.java:476)&lt;BR /&gt;at org.apache.nifi.web.server.JettyServer.start(JettyServer.java:896)&lt;BR /&gt;at org.apache.nifi.NiFi.&amp;lt;init&amp;gt;(NiFi.java:172)&lt;BR /&gt;at org.apache.nifi.NiFi.&amp;lt;init&amp;gt;(NiFi.java:83)&lt;BR /&gt;at org.apache.nifi.NiFi.main(NiFi.java:332)&lt;BR /&gt;2025-02-19 10:02:02,159 WARN [main] o.a.nifi.controller.StandardFlowService There is currently no Cluster Coordinator. This often happens upon restart of NiFi when running an embedded ZooKee&lt;BR /&gt;per. Will register this node to become the active Cluster Coordinator and will attempt to connect to cluster again&lt;BR /&gt;2025-02-19 10:02:02,159 INFO [main] o.a.n.c.l.e.CuratorLeaderElectionManager CuratorLeaderElectionManager[stopped=false] Attempted to register Leader Election for role 'Cluster Coordinator'&lt;BR /&gt;but this role is already registered&lt;BR /&gt;2025-02-19 10:02:02,343 INFO [epollEventLoopGroup-4-1] o.apache.zookeeper.ClientCnxnSocketNetty SSL handler added for channel: [id: 0x0703dfdc]&lt;BR /&gt;2025-02-19 10:02:02,344 INFO [epollEventLoopGroup-4-1] o.apache.zookeeper.ClientCnxnSocketNetty channel is connected: [id: 0x0703dfdc, L:/53.13.138.70:39036 - R:zookeepernode3/53.13.247.198:&lt;BR /&gt;2181]&lt;BR /&gt;2025-02-19 10:02:02,345 INFO [epollEventLoopGroup-4-1] o.apache.zookeeper.ClientCnxnSocketNetty channel is disconnected: [id: 0x0703dfdc, L:/53.13.138.70:39036 ! R:zookeepernode3/53.13.247.1&lt;BR /&gt;98:2181]&lt;BR /&gt;2025-02-19 10:02:02,345 INFO [epollEventLoopGroup-4-1] o.apache.zookeeper.ClientCnxnSocketNetty channel is told closing&lt;/P&gt;</description>
    <pubDate>Wed, 19 Feb 2025 10:04:00 GMT</pubDate>
    <dc:creator>vg27</dc:creator>
    <dc:date>2025-02-19T10:04:00Z</dc:date>
    <item>
      <title>NIFI Connection refused zookeeper</title>
      <link>https://community.cloudera.com/t5/Support-Questions/NIFI-Connection-refused-zookeeper/m-p/402568#M251709</link>
      <description>&lt;P&gt;HI&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454"&gt;@MattWho&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good Day,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we are experiencing new error called"&amp;nbsp; &lt;STRONG&gt;Connection refused: zookeepernode2&lt;/STRONG&gt;" post setting up DNS&amp;nbsp; with the keystore and Password for NIFI which we generated internally using keytool, same keystore and password we are using in zookeeper as well.&lt;/P&gt;&lt;P&gt;Attaching the Required details, Request you to please check and provide your valuable feedback&lt;/P&gt;&lt;P&gt;Below is the web UI error.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nifi certficate error.png" style="width: 762px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/44009i3441FBDCCB1F2867/image-size/large?v=v2&amp;amp;px=999" role="button" title="nifi certficate error.png" alt="nifi certficate error.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we setted up the nifi cluster in below format&lt;/P&gt;&lt;P&gt;NIFINODE1, NIFINODE2. two azure vm's&lt;/P&gt;&lt;P&gt;Zookeepernode1, Zookeepernode2, Zookeepernode3. three Azure vm's&lt;/P&gt;&lt;P&gt;please find zoo,cfg details below.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="zookeeper config.png" style="width: 944px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/44010i60B58A5729BF8B5B/image-size/large?v=v2&amp;amp;px=999" role="button" title="zookeeper config.png" alt="zookeeper config.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;#zookeeper node3 has been choosen has an elector&lt;/P&gt;&lt;P&gt;sudo bin/zkServer.sh status&lt;BR /&gt;/usr/bin/java&lt;BR /&gt;ZooKeeper JMX enabled by default&lt;BR /&gt;Using config: /opt/zookeeper/bin/../conf/zoo.cfg&lt;BR /&gt;Client port not found in static config file. Looking in dynamic config file.&lt;BR /&gt;grep: : No such file or directory&lt;BR /&gt;Client port not found in the server configs&lt;BR /&gt;Client port found: 2181. Client address: localhost. Client SSL: false.&lt;BR /&gt;Mode: leader&lt;/P&gt;&lt;P&gt;___________________________________________________________________________&lt;BR /&gt;&lt;BR /&gt;Attaching the nifi.properties details.&lt;/P&gt;&lt;P&gt;# Core Properties #&lt;BR /&gt;nifi.flow.configuration.file=./conf/flow.xml.gz&lt;BR /&gt;nifi.flow.configuration.json.file=./conf/flow.json.gz&lt;BR /&gt;nifi.flow.configuration.archive.enabled=true&lt;BR /&gt;nifi.flow.configuration.archive.dir=./conf/archive/&lt;BR /&gt;nifi.flow.configuration.archive.max.time=30 days&lt;BR /&gt;nifi.flow.configuration.archive.max.storage=500 MB&lt;BR /&gt;nifi.flow.configuration.archive.max.count=&lt;BR /&gt;nifi.flowcontroller.autoResumeState=true&lt;BR /&gt;nifi.flowcontroller.graceful.shutdown.period=10 sec&lt;BR /&gt;nifi.flowservice.writedelay.interval=500 ms&lt;BR /&gt;nifi.administrative.yield.duration=30 sec&lt;BR /&gt;# If a component has no work to do (is "bored"), how long should we wait before checking again for work?&lt;BR /&gt;nifi.bored.yield.duration=10 millis&lt;BR /&gt;nifi.queue.backpressure.count=10000&lt;BR /&gt;nifi.queue.backpressure.size=1 GB&lt;/P&gt;&lt;P&gt;nifi.authorizer.configuration.file=./conf/authorizers.xml&lt;BR /&gt;nifi.login.identity.provider.configuration.file=./conf/login-identity-providers.xml&lt;BR /&gt;nifi.templates.directory=./conf/templates&lt;BR /&gt;nifi.ui.banner.text=&lt;BR /&gt;nifi.ui.autorefresh.interval=30 sec&lt;BR /&gt;nifi.nar.library.directory=./lib&lt;BR /&gt;nifi.nar.library.autoload.directory=./extensions&lt;BR /&gt;nifi.nar.working.directory=./work/nar/&lt;BR /&gt;nifi.documentation.working.directory=./work/docs/components&lt;BR /&gt;nifi.nar.unpack.uber.jar=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nifi.state.management.configuration.file=./conf/state-management.xml&lt;BR /&gt;# The ID of the local state provider&lt;BR /&gt;nifi.state.management.provider.local=local-provider&lt;BR /&gt;# The ID of the cluster-wide state provider. This will be ignored if NiFi is not clustered but must be populated if running in a cluster.&lt;BR /&gt;nifi.state.management.provider.cluster=zk-provider&lt;BR /&gt;# Specifies whether or not this instance of NiFi should run an embedded ZooKeeper server&lt;BR /&gt;nifi.state.management.embedded.zookeeper.start=false&lt;BR /&gt;# Properties file that provides the ZooKeeper properties to use if &amp;lt;nifi.state.management.embedded.zookeeper.start&amp;gt; is set to true&lt;BR /&gt;nifi.state.management.embedded.zookeeper.properties=./conf/zookeeper.properties&lt;/P&gt;&lt;P&gt;# Database Settings&lt;BR /&gt;nifi.database.directory=./database_repository&lt;/P&gt;&lt;P&gt;# Repository Encryption properties override individual repository implementation properties&lt;BR /&gt;nifi.repository.encryption.protocol.version=&lt;BR /&gt;nifi.repository.encryption.key.id=&lt;BR /&gt;nifi.repository.encryption.key.provider=&lt;BR /&gt;nifi.repository.encryption.key.provider.keystore.location=&lt;BR /&gt;nifi.repository.encryption.key.provider.keystore.password=&lt;/P&gt;&lt;P&gt;# FlowFile Repository&lt;BR /&gt;nifi.flowfile.repository.implementation=org.apache.nifi.controller.repository.WriteAheadFlowFileRepository&lt;BR /&gt;nifi.flowfile.repository.wal.implementation=org.apache.nifi.wali.SequentialAccessWriteAheadLog&lt;BR /&gt;nifi.flowfile.repository.directory=./flowfile_repository&lt;BR /&gt;nifi.flowfile.repository.checkpoint.interval=20 secs&lt;BR /&gt;nifi.flowfile.repository.always.sync=false&lt;BR /&gt;nifi.flowfile.repository.retain.orphaned.flowfiles=true&lt;/P&gt;&lt;P&gt;nifi.swap.manager.implementation=org.apache.nifi.controller.FileSystemSwapManager&lt;BR /&gt;nifi.queue.swap.threshold=20000&lt;/P&gt;&lt;P&gt;# Content Repository&lt;BR /&gt;nifi.content.repository.implementation=org.apache.nifi.controller.repository.FileSystemRepository&lt;BR /&gt;nifi.content.claim.max.appendable.size=50 KB&lt;BR /&gt;nifi.content.repository.directory.default=./content_repository&lt;BR /&gt;nifi.content.repository.archive.max.retention.period=7 days&lt;BR /&gt;nifi.content.repository.archive.max.usage.percentage=50%&lt;BR /&gt;nifi.content.repository.archive.enabled=true&lt;BR /&gt;nifi.content.repository.always.sync=false&lt;BR /&gt;nifi.content.viewer.url=../nifi-content-viewer/&lt;/P&gt;&lt;P&gt;nifi.provenance.repository.implementation=org.apache.nifi.provenance.WriteAheadProvenanceRepository&lt;/P&gt;&lt;P&gt;# Persistent Provenance Repository Properties&lt;BR /&gt;nifi.provenance.repository.directory.default=./provenance_repository&lt;BR /&gt;nifi.provenance.repository.max.storage.time=30 days&lt;BR /&gt;nifi.provenance.repository.max.storage.size=10 GB&lt;BR /&gt;nifi.provenance.repository.rollover.time=10 mins&lt;BR /&gt;nifi.provenance.repository.rollover.size=100 MB&lt;BR /&gt;nifi.provenance.repository.query.threads=2&lt;BR /&gt;nifi.provenance.repository.index.threads=2&lt;BR /&gt;nifi.provenance.repository.compress.on.rollover=true&lt;BR /&gt;nifi.provenance.repository.always.sync=false&lt;BR /&gt;# Comma-separated list of fields. Fields that are not indexed will not be searchable. Valid fields are:&lt;BR /&gt;# EventType, FlowFileUUID, Filename, TransitURI, ProcessorID, AlternateIdentifierURI, Relationship, Details&lt;BR /&gt;nifi.provenance.repository.indexed.fields=EventType, FlowFileUUID, Filename, ProcessorID, Relationship&lt;BR /&gt;# FlowFile Attributes that should be indexed and made searchable. Some examples to consider are filename, uuid, mime.type&lt;BR /&gt;nifi.provenance.repository.indexed.attributes=&lt;BR /&gt;# Large values for the shard size will result in more Java heap usage when searching the Provenance Repository&lt;BR /&gt;# but should provide better performance&lt;BR /&gt;nifi.provenance.repository.index.shard.size=500 MB&lt;BR /&gt;# Indicates the maximum length that a FlowFile attribute can be when retrieving a Provenance Event from&lt;BR /&gt;# the repository. If the length of any attribute exceeds this value, it will be truncated when the event is retrieved.&lt;BR /&gt;nifi.provenance.repository.max.attribute.length=65536&lt;BR /&gt;nifi.provenance.repository.concurrent.merge.threads=2&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;# Volatile Provenance Respository Properties&lt;BR /&gt;nifi.provenance.repository.buffer.size=100000&lt;/P&gt;&lt;P&gt;# Component and Node Status History Repository&lt;BR /&gt;nifi.components.status.repository.implementation=org.apache.nifi.controller.status.history.VolatileComponentStatusRepository&lt;/P&gt;&lt;P&gt;# Volatile Status History Repository Properties&lt;BR /&gt;nifi.components.status.repository.buffer.size=1440&lt;BR /&gt;nifi.components.status.snapshot.frequency=1 min&lt;/P&gt;&lt;P&gt;# QuestDB Status History Repository Properties&lt;BR /&gt;nifi.status.repository.questdb.persist.node.days=14&lt;BR /&gt;nifi.status.repository.questdb.persist.component.days=3&lt;BR /&gt;nifi.status.repository.questdb.persist.location=./status_repository&lt;/P&gt;&lt;P&gt;# Site to Site properties&lt;BR /&gt;nifi.remote.input.host=nifinode1&lt;BR /&gt;nifi.remote.input.secure=true&lt;BR /&gt;nifi.remote.input.socket.port=10000&lt;BR /&gt;nifi.remote.input.http.enabled=true&lt;/P&gt;&lt;P&gt;nifi.remote.input.socket.port=10000&lt;BR /&gt;nifi.remote.input.http.enabled=true&lt;BR /&gt;nifi.remote.input.http.transaction.ttl=30 sec&lt;BR /&gt;nifi.remote.contents.cache.expiration=30 secs&lt;/P&gt;&lt;P&gt;# web properties #&lt;BR /&gt;#############################################&lt;/P&gt;&lt;P&gt;# For security, NiFi will present the UI on 127.0.0.1 and only be accessible through this loopback interface.&lt;BR /&gt;# Be aware that changing these properties may affect how your instance can be accessed without any restriction.&lt;BR /&gt;# We recommend configuring HTTPS instead. The administrators guide provides instructions on how to do this.&lt;/P&gt;&lt;P&gt;nifi.web.http.host=&lt;BR /&gt;nifi.web.http.port=&lt;BR /&gt;nifi.web.http.network.interface.default=&lt;/P&gt;&lt;P&gt;#############################################&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;nifi.web.https.host=nifinode1.web.net&lt;BR /&gt;nifi.web.https.port=8443&lt;BR /&gt;nifi.web.https.network.interface.default=&lt;BR /&gt;nifi.web.https.application.protocols=http/1.1&lt;BR /&gt;nifi.web.jetty.working.directory=./work/jetty&lt;BR /&gt;nifi.web.jetty.threads=200&lt;BR /&gt;nifi.web.max.header.size=16 KB&lt;BR /&gt;nifi.web.proxy.context.path=&lt;BR /&gt;nifi.web.proxy.host=nifi-web-net,nifi-web-net:8443&lt;BR /&gt;nifi.web.max.content.size=&lt;BR /&gt;nifi.web.max.requests.per.second=30000&lt;BR /&gt;nifi.web.max.access.token.requests.per.second=25&lt;BR /&gt;nifi.web.request.timeout=60 secs&lt;BR /&gt;nifi.web.request.ip.whitelist=&lt;BR /&gt;nifi.web.should.send.server.version=true&lt;BR /&gt;nifi.web.request.log.format=%{client}a - %u %t "%r" %s %O "%{Referer}i" "%{User-Agent}i"&lt;/P&gt;&lt;P&gt;# Filter JMX MBeans available through the System Diagnostics REST API&lt;BR /&gt;nifi.web.jmx.metrics.allowed.filter.pattern=&lt;/P&gt;&lt;P&gt;# Include or Exclude TLS Cipher Suites for HTTPS&lt;BR /&gt;nifi.web.https.ciphersuites.include=&lt;BR /&gt;nifi.web.https.ciphersuites.exclude=&lt;/P&gt;&lt;P&gt;nifi.sensitive.props.key=@Rfs]HjNl=r(z0&amp;amp;ocSsTrrR8rm?/7qMP&lt;BR /&gt;nifi.sensitive.props.key.protected=&lt;BR /&gt;nifi.sensitive.props.algorithm=NIFI_PBKDF2_AES_GCM_256&lt;BR /&gt;nifi.sensitive.props.additional.keys=&lt;/P&gt;&lt;P&gt;*************************************************************&lt;BR /&gt;nifi.security.user.authentication.kerberos=false&lt;BR /&gt;#nifi.security.user.login.identity.provider=empty&lt;BR /&gt;nifi.security.needClientAuth=false&lt;BR /&gt;#nifi.cluster.protocol.is.secure=false&lt;BR /&gt;#nifi.security.needClientAuth=true&lt;BR /&gt;#nifi.cluster.protocol.is.secure=true&lt;/P&gt;&lt;P&gt;nifi.security.allow.anonymous.authentication=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;***********************************************************&lt;BR /&gt;nifi.security.autoreload.enabled=false&lt;BR /&gt;nifi.security.autoreload.interval=10 secs&lt;BR /&gt;nifi.security.keystore=./conf/keystore.jks&lt;BR /&gt;#nifi.security.keystoreType=PKCS12&lt;BR /&gt;nifi.security.keystoreType=JKS&lt;BR /&gt;nifi.security.keystorePasswd=XXXXXXXXcWRvgEXXXXXXmxGxNyw&lt;BR /&gt;nifi.security.keyPasswd=XXXXXXXXWeQAngXXXXbYCzrEf&lt;BR /&gt;nifi.security.truststore=./conf/truststore.jks&lt;BR /&gt;nifi.security.truststoreType=JKS&lt;BR /&gt;nifi.security.truststorePasswd=XXXXXXXXcWRvgEXXXXXXmxGxNyw&lt;BR /&gt;#nifi.security.user.authorizer=single-user-authorizer&lt;BR /&gt;#nifi.security.allow.anonymous.authentication=false&lt;BR /&gt;#nifi.security.user.login.identity.provider=single-user-provider&lt;BR /&gt;nifi.security.user.authorizer=managed-authorizer&lt;BR /&gt;#nifi.security.user.authorizer=org.apache.nifi.authorization.CertificateBasedAuthorizer&lt;BR /&gt;nifi.security.user.login.identity.provider=&lt;BR /&gt;nifi.security.user.jws.key.rotation.period=PT1H&lt;BR /&gt;nifi.security.ocsp.responder.url=&lt;BR /&gt;nifi.security.ocsp.responder.certificate=&lt;/P&gt;&lt;P&gt;nifi.security.user.oidc.discovery.url=&lt;A href="https://SSo-login-page" target="_blank" rel="noopener"&gt;https://SSo-login-page&lt;/A&gt;&lt;BR /&gt;nifi.security.user.oidc.connect.timeout=5 secs&lt;BR /&gt;nifi.security.user.oidc.read.timeout=5 secs&lt;BR /&gt;nifi.security.user.oidc.client.id=XXXXXXX-be28-XXXXXXX-cd0e5f2da902&lt;BR /&gt;nifi.security.user.oidc.client.secret=cmNTTsotwXXXXXXXXXXXXXBtsmfWFwoXXXXXyggP&lt;BR /&gt;nifi.security.user.oidc.preferred.jwsalgorithm=&lt;BR /&gt;nifi.security.user.oidc.additional.scopes=offline_access,personal_data&lt;BR /&gt;nifi.security.user.oidc.claim.identifying.user=corporate_user_id&lt;BR /&gt;nifi.security.user.oidc.fallback.claims.identifying.user=&lt;/P&gt;&lt;P&gt;# Apache Knox SSO Properties #&lt;BR /&gt;nifi.security.user.knox.url=&lt;BR /&gt;nifi.security.user.knox.publicKey=&lt;BR /&gt;nifi.security.user.knox.cookieName=hadoop-jwt&lt;BR /&gt;nifi.security.user.knox.audiences=&lt;/P&gt;&lt;P&gt;# SAML Properties #&lt;BR /&gt;nifi.security.user.saml.idp.metadata.url=&lt;BR /&gt;nifi.security.user.saml.sp.entity.id=&lt;BR /&gt;nifi.security.user.saml.identity.attribute.name=&lt;BR /&gt;nifi.security.user.saml.group.attribute.name=&lt;BR /&gt;nifi.security.user.saml.request.signing.enabled=false&lt;BR /&gt;nifi.security.user.saml.want.assertions.signed=true&lt;BR /&gt;nifi.security.user.saml.signature.algorithm=&lt;A href="http://www.w3.org/2001/04/xmldsig-more#rsa-sha256" target="_blank" rel="noopener"&gt;http://www.w3.org/2001/04/xmldsig-more#rsa-sha256&lt;/A&gt;&lt;BR /&gt;nifi.security.user.saml.authentication.expiration=12 hours&lt;BR /&gt;nifi.security.user.saml.single.logout.enabled=false&lt;BR /&gt;nifi.security.user.saml.http.client.truststore.strategy=JDK&lt;BR /&gt;nifi.security.user.saml.http.client.connect.timeout=30 secs&lt;BR /&gt;nifi.security.user.saml.http.client.read.timeout=30 secs&lt;/P&gt;&lt;P&gt;# cluster node properties (only configure for cluster nodes) #&lt;BR /&gt;nifi.cluster.is.node=true&lt;BR /&gt;nifi.cluster.node.address=nifinode1.web&lt;BR /&gt;nifi.cluster.node.protocol.port=9991&lt;BR /&gt;nifi.cluster.node.protocol.max.threads=50&lt;BR /&gt;nifi.cluster.node.event.history.size=25&lt;BR /&gt;nifi.cluster.node.connection.timeout=5 sec&lt;BR /&gt;nifi.cluster.node.read.timeout=5 sec&lt;BR /&gt;nifi.cluster.node.max.concurrent.requests=100&lt;BR /&gt;nifi.cluster.firewall.file=&lt;BR /&gt;nifi.cluster.flow.election.max.wait.time=1 mins&lt;BR /&gt;nifi.cluster.flow.election.max.candidates=&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;# cluster load balancing properties #&lt;BR /&gt;nifi.cluster.load.balance.host=nifinode1.web&lt;BR /&gt;nifi.cluster.load.balance.port=6342&lt;/P&gt;&lt;P&gt;nifi.cluster.load.balance.connections.per.node=1&lt;BR /&gt;nifi.cluster.load.balance.max.thread.count=8&lt;BR /&gt;nifi.cluster.load.balance.comms.timeout=30 sec&lt;BR /&gt;nifi.cluster.protocol.ssl.context.protocol=TLS&lt;/P&gt;&lt;P&gt;# zookeeper properties, used for cluster management #&lt;BR /&gt;nifi.zookeeper.connect.string=zookeepernode1:2181,zookeepernode2:2181,zookeepernode3:2181&lt;BR /&gt;#nifi.zookeeper.connect.string=zookeepernode1:2181,zookeepernode2:2182,zookeepernode3:2183&lt;BR /&gt;nifi.zookeeper.connect.timeout=10 secs&lt;BR /&gt;nifi.zookeeper.session.timeout=10 secs&lt;BR /&gt;nifi.zookeeper.root.node=/nifi&lt;BR /&gt;#nifi.zookeeper.client.secure=false&lt;BR /&gt;nifi.zookeeper.ssl.clientAuth=none&lt;BR /&gt;nifi.zookeeper.client.secure=true&lt;BR /&gt;nifi.zookeeper.security.keystore=./conf/keystore.jks&lt;BR /&gt;nifi.zookeeper.security.keystoreType=jks&lt;BR /&gt;nifi.zookeeper.security.keystorePasswd=OXXXXXXXXXXXXXXXNyw&lt;BR /&gt;nifi.zookeeper.security.truststore=./conf/truststore.jks&lt;BR /&gt;nifi.zookeeper.security.truststoreType=jks&lt;BR /&gt;nifi.zookeeper.security.truststorePasswd=OXXXXXXXXXXXXXGxNyw&lt;BR /&gt;nifi.zookeeper.jute.maxbuffer=&lt;BR /&gt;nifi.zookeeper.ssl.client.auth=none&lt;/P&gt;&lt;P&gt;# Zookeeper properties for the authentication scheme used when creating acls on znodes used for cluster management&lt;BR /&gt;# Values supported for nifi.zookeeper.auth.type are "default", which will apply world/anyone rights on znodes&lt;BR /&gt;# and "sasl" which will give rights to the sasl/kerberos identity used to authenticate the nifi node&lt;BR /&gt;# The identity is determined using the value in nifi.kerberos.service.principal and the removeHostFromPrincipal&lt;BR /&gt;# and removeRealmFromPrincipal values (which should align with the kerberos.removeHostFromPrincipal and kerberos.removeRealmFromPrincipal&lt;BR /&gt;# values configured on the zookeeper server).&lt;BR /&gt;nifi.zookeeper.auth.type=&lt;BR /&gt;nifi.zookeeper.kerberos.removeHostFromPrincipal=&lt;BR /&gt;nifi.zookeeper.kerberos.removeRealmFromPrincipal=&lt;/P&gt;&lt;P&gt;# kerberos #&lt;BR /&gt;nifi.kerberos.krb5.file=&lt;/P&gt;&lt;P&gt;# kerberos service principal #&lt;BR /&gt;nifi.kerberos.service.principal=&lt;BR /&gt;nifi.kerberos.service.keytab.location=&lt;/P&gt;&lt;P&gt;# kerberos spnego principal #&lt;BR /&gt;nifi.kerberos.spnego.principal=&lt;BR /&gt;nifi.kerberos.spnego.keytab.location=&lt;/P&gt;&lt;P&gt;nifi.kerberos.spnego.principal=&lt;BR /&gt;nifi.kerberos.spnego.keytab.location=&lt;BR /&gt;nifi.kerberos.spnego.authentication.expiration=12 hours&lt;/P&gt;&lt;P&gt;# external properties files for variable registry&lt;BR /&gt;# supports a comma delimited list of file locations&lt;BR /&gt;nifi.variable.registry.properties=&lt;/P&gt;&lt;P&gt;# analytics properties #&lt;BR /&gt;nifi.analytics.predict.enabled=false&lt;BR /&gt;nifi.analytics.predict.interval=3 mins&lt;BR /&gt;nifi.analytics.query.interval=5 mins&lt;BR /&gt;nifi.analytics.connection.model.implementation=org.apache.nifi.controller.status.analytics.models.OrdinaryLeastSquares&lt;BR /&gt;nifi.analytics.connection.model.score.name=rSquared&lt;BR /&gt;nifi.analytics.connection.model.score.threshold=.90&lt;/P&gt;&lt;P&gt;# runtime monitoring properties&lt;BR /&gt;nifi.monitor.long.running.task.schedule=&lt;BR /&gt;nifi.monitor.long.running.task.threshold=&lt;/P&gt;&lt;P&gt;# Enable automatic diagnostic at shutdown.&lt;BR /&gt;nifi.diagnostics.on.shutdown.enabled=false&lt;/P&gt;&lt;P&gt;# Include verbose diagnostic information.&lt;BR /&gt;nifi.diagnostics.on.shutdown.verbose=false&lt;/P&gt;&lt;P&gt;# The location of the diagnostics folder.&lt;BR /&gt;nifi.diagnostics.on.shutdown.directory=./diagnostics&lt;/P&gt;&lt;P&gt;# The maximum number of files permitted in the directory. If the limit is exceeded, the oldest files are deleted.&lt;BR /&gt;nifi.diagnostics.on.shutdown.max.filecount=10&lt;/P&gt;&lt;P&gt;# The diagnostics folder's maximum permitted size in bytes. If the limit is exceeded, the oldest files are deleted.&lt;BR /&gt;nifi.diagnostics.on.shutdown.max.directory.size=10 MB&lt;/P&gt;&lt;P&gt;# Performance tracking properties&lt;BR /&gt;## Specifies what percentage of the time we should track the amount of time processors are using CPU, reading from/writing to content repo, etc.&lt;BR /&gt;## This can be useful to understand which components are the most expensive and to understand where system bottlenecks may be occurring.&lt;BR /&gt;## The value must be in the range of 0 (inclusive) to 100 (inclusive). A larger value will produce more accurate results, while a smaller value may be&lt;BR /&gt;## less expensive to compute.&lt;BR /&gt;## Results can be obtained by running "nifi.sh diagnostics &amp;lt;filename&amp;gt;" and then inspecting the produced file.&lt;BR /&gt;nifi.performance.tracking.percentage=0&lt;/P&gt;&lt;P&gt;# NAR Provider Properties #&lt;BR /&gt;# These properties allow configuring one or more NAR providers. A NAR provider retrieves NARs from an external source&lt;BR /&gt;# and copies them to the directory specified by nifi.nar.library.autoload.directory.&lt;/P&gt;&lt;P&gt;____________________________________________________________________________________&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;logs/nifi-app.log error details&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2025-02-19 10:02:01,616 INFO [epollEventLoopGroup-4-1] o.apache.zookeeper.ClientCnxnSocketNetty channel is disconnected: [id: 0xf6690cd4, L:/53.13.138.70:53038 ! R:zookeepernode2/53.13.138.7&lt;BR /&gt;2:2181]&lt;BR /&gt;2025-02-19 10:02:01,616 INFO [epollEventLoopGroup-4-1] o.apache.zookeeper.ClientCnxnSocketNetty channel is told closing&lt;BR /&gt;2025-02-19 10:02:02,157 INFO [epollEventLoopGroup-4-1] o.apache.zookeeper.ClientCnxnSocketNetty SSL handler added for channel: [id: 0x48429c0b]&lt;BR /&gt;2025-02-19 10:02:02,158 INFO [epollEventLoopGroup-4-1] o.apache.zookeeper.ClientCnxnSocketNetty channel is connected: [id: 0x48429c0b, L:/53.13.138.70:34056 - R:zookeepernode1/53.13.138.71:2&lt;BR /&gt;181]&lt;BR /&gt;2025-02-19 10:02:02,159 INFO [epollEventLoopGroup-4-1] o.apache.zookeeper.ClientCnxnSocketNetty channel is disconnected: [id: 0x48429c0b, L:/53.13.138.70:34056 ! R:zookeepernode1/53.13.138.7&lt;BR /&gt;1:2181]&lt;BR /&gt;2025-02-19 10:02:02,159 INFO [epollEventLoopGroup-4-1] o.apache.zookeeper.ClientCnxnSocketNetty channel is told closing&lt;BR /&gt;2025-02-19 10:02:02,159 WARN [main] o.a.n.c.l.e.CuratorLeaderElectionManager Unable to determine leader for role 'Cluster Coordinator'; returning null&lt;BR /&gt;org.apache.zookeeper.KeeperException$ConnectionLossException: KeeperErrorCode = ConnectionLoss for /nifi/leaders/Cluster Coordinator&lt;BR /&gt;at org.apache.zookeeper.KeeperException.create(KeeperException.java:101)&lt;BR /&gt;at org.apache.zookeeper.KeeperException.create(KeeperException.java:53)&lt;BR /&gt;at org.apache.zookeeper.ZooKeeper.getChildren(ZooKeeper.java:2480)&lt;BR /&gt;at org.apache.curator.framework.imps.GetChildrenBuilderImpl$3.call(GetChildrenBuilderImpl.java:235)&lt;BR /&gt;at org.apache.curator.framework.imps.GetChildrenBuilderImpl$3.call(GetChildrenBuilderImpl.java:228)&lt;BR /&gt;at org.apache.curator.RetryLoop.callWithRetry(RetryLoop.java:88)&lt;BR /&gt;at org.apache.curator.framework.imps.GetChildrenBuilderImpl.pathInForeground(GetChildrenBuilderImpl.java:228)&lt;BR /&gt;at org.apache.curator.framework.imps.GetChildrenBuilderImpl.forPath(GetChildrenBuilderImpl.java:221)&lt;BR /&gt;at org.apache.curator.framework.imps.GetChildrenBuilderImpl.forPath(GetChildrenBuilderImpl.java:42)&lt;BR /&gt;at org.apache.curator.framework.recipes.locks.LockInternals.getSortedChildren(LockInternals.java:133)&lt;BR /&gt;at org.apache.curator.framework.recipes.locks.LockInternals.getParticipantNodes(LockInternals.java:119)&lt;BR /&gt;at org.apache.curator.framework.recipes.locks.InterProcessMutex.getParticipantNodes(InterProcessMutex.java:153)&lt;BR /&gt;at org.apache.curator.framework.recipes.leader.LeaderSelector.getLeader(LeaderSelector.java:321)&lt;BR /&gt;at org.apache.nifi.controller.leader.election.CuratorLeaderElectionManager.getLeader(CuratorLeaderElectionManager.java:288)&lt;BR /&gt;at org.apache.nifi.cluster.coordination.node.LeaderElectionNodeProtocolSender.getServiceAddress(LeaderElectionNodeProtocolSender.java:46)&lt;BR /&gt;at org.apache.nifi.cluster.protocol.AbstractNodeProtocolSender.requestConnection(AbstractNodeProtocolSender.java:64)&lt;BR /&gt;at org.apache.nifi.cluster.protocol.impl.NodeProtocolSenderListener.requestConnection(NodeProtocolSenderListener.java:89)&lt;BR /&gt;at org.apache.nifi.controller.StandardFlowService.connect(StandardFlowService.java:928)&lt;BR /&gt;at org.apache.nifi.controller.StandardFlowService.load(StandardFlowService.java:476)&lt;BR /&gt;at org.apache.nifi.web.server.JettyServer.start(JettyServer.java:896)&lt;BR /&gt;at org.apache.nifi.NiFi.&amp;lt;init&amp;gt;(NiFi.java:172)&lt;BR /&gt;at org.apache.nifi.NiFi.&amp;lt;init&amp;gt;(NiFi.java:83)&lt;BR /&gt;at org.apache.nifi.NiFi.main(NiFi.java:332)&lt;BR /&gt;2025-02-19 10:02:02,159 WARN [main] o.a.nifi.controller.StandardFlowService There is currently no Cluster Coordinator. This often happens upon restart of NiFi when running an embedded ZooKee&lt;BR /&gt;per. Will register this node to become the active Cluster Coordinator and will attempt to connect to cluster again&lt;BR /&gt;2025-02-19 10:02:02,159 INFO [main] o.a.n.c.l.e.CuratorLeaderElectionManager CuratorLeaderElectionManager[stopped=false] Attempted to register Leader Election for role 'Cluster Coordinator'&lt;BR /&gt;but this role is already registered&lt;BR /&gt;2025-02-19 10:02:02,343 INFO [epollEventLoopGroup-4-1] o.apache.zookeeper.ClientCnxnSocketNetty SSL handler added for channel: [id: 0x0703dfdc]&lt;BR /&gt;2025-02-19 10:02:02,344 INFO [epollEventLoopGroup-4-1] o.apache.zookeeper.ClientCnxnSocketNetty channel is connected: [id: 0x0703dfdc, L:/53.13.138.70:39036 - R:zookeepernode3/53.13.247.198:&lt;BR /&gt;2181]&lt;BR /&gt;2025-02-19 10:02:02,345 INFO [epollEventLoopGroup-4-1] o.apache.zookeeper.ClientCnxnSocketNetty channel is disconnected: [id: 0x0703dfdc, L:/53.13.138.70:39036 ! R:zookeepernode3/53.13.247.1&lt;BR /&gt;98:2181]&lt;BR /&gt;2025-02-19 10:02:02,345 INFO [epollEventLoopGroup-4-1] o.apache.zookeeper.ClientCnxnSocketNetty channel is told closing&lt;/P&gt;</description>
      <pubDate>Wed, 19 Feb 2025 10:04:00 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/NIFI-Connection-refused-zookeeper/m-p/402568#M251709</guid>
      <dc:creator>vg27</dc:creator>
      <dc:date>2025-02-19T10:04:00Z</dc:date>
    </item>
    <item>
      <title>Re: NIFI Connection refused zookeeper</title>
      <link>https://community.cloudera.com/t5/Support-Questions/NIFI-Connection-refused-zookeeper/m-p/402571#M251711</link>
      <description>&lt;P&gt;Also used the trustore and keystore from the certficate which is genearted from the DNS level&amp;nbsp;&lt;SPAN&gt;nifi-web-net.&lt;BR /&gt;we have DNS c-name for NIFI vm's and zookeeper vm's&lt;BR /&gt;like nifinode1.web.net, nifinode2.web.net&lt;BR /&gt;zookeepernode1.web.net. zookeepernode2.web.net&lt;BR /&gt;&lt;BR /&gt;can you guide us to generate certficate&amp;nbsp; based on DNS level or each VM level..?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Feb 2025 12:49:40 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/NIFI-Connection-refused-zookeeper/m-p/402571#M251711</guid>
      <dc:creator>vg27</dc:creator>
      <dc:date>2025-02-19T12:49:40Z</dc:date>
    </item>
    <item>
      <title>Re: NIFI Connection refused zookeeper</title>
      <link>https://community.cloudera.com/t5/Support-Questions/NIFI-Connection-refused-zookeeper/m-p/402610#M251721</link>
      <description>&lt;P&gt;HI anyone nifi expert can you please update on these.. its urgent&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2025 05:13:04 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/NIFI-Connection-refused-zookeeper/m-p/402610#M251721</guid>
      <dc:creator>vg27</dc:creator>
      <dc:date>2025-02-20T05:13:04Z</dc:date>
    </item>
    <item>
      <title>Re: NIFI Connection refused zookeeper</title>
      <link>https://community.cloudera.com/t5/Support-Questions/NIFI-Connection-refused-zookeeper/m-p/402841#M251796</link>
      <description>&lt;P&gt;Hi request you to please update on these.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 13:16:45 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/NIFI-Connection-refused-zookeeper/m-p/402841#M251796</guid>
      <dc:creator>vg27</dc:creator>
      <dc:date>2025-02-24T13:16:45Z</dc:date>
    </item>
    <item>
      <title>Re: NIFI Connection refused zookeeper</title>
      <link>https://community.cloudera.com/t5/Support-Questions/NIFI-Connection-refused-zookeeper/m-p/403663#M252148</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;Issue got Resolved, Issue was with the certications, access keys sand keystore got generated wrong,&lt;/P&gt;&lt;P&gt;Post generating the new keys, issue was resolved&lt;/P&gt;</description>
      <pubDate>Thu, 06 Mar 2025 13:30:49 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/NIFI-Connection-refused-zookeeper/m-p/403663#M252148</guid>
      <dc:creator>vg27</dc:creator>
      <dc:date>2025-03-06T13:30:49Z</dc:date>
    </item>
  </channel>
</rss>

