<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Integrating Git to Nifi Registry using SSH Authentication in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Integrating-Git-to-Nifi-Registry-using-SSH-Authentication/m-p/403056#M251867</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;We have installed Nifi and Nifi Registry 1.28 on an AWS ECS instance running on Fargate. The installation seems to be working fine, and both the applications can communicate with each other. We now wanted to set up Git Integration for Nifi Registry using ssh authentication. Can someone please help with detailed steps, article or content with this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We did try multiple options, but this is not successful.&lt;/P&gt;&lt;P&gt;Since our Nifi instance is on ECS Fargate, we tried cloning the repo using Docker Image and SSH key which was successful. However, when we pass the details in the providers.xml file, the instance doesn't come up.&lt;/P&gt;&lt;P&gt;Can someone please help with the exact steps and what properties and values to be passed in providers.xml file when using ssh authentication.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/95503" target="_blank" rel="noopener"&gt;@steven-matison&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454" target="_blank" rel="noopener"&gt;@MattWho&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;: Your guidance and help will be much appreciated!!!&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 27 Feb 2025 10:01:18 GMT</pubDate>
    <dc:creator>rj27</dc:creator>
    <dc:date>2025-02-27T10:01:18Z</dc:date>
    <item>
      <title>Integrating Git to Nifi Registry using SSH Authentication</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Integrating-Git-to-Nifi-Registry-using-SSH-Authentication/m-p/403056#M251867</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;We have installed Nifi and Nifi Registry 1.28 on an AWS ECS instance running on Fargate. The installation seems to be working fine, and both the applications can communicate with each other. We now wanted to set up Git Integration for Nifi Registry using ssh authentication. Can someone please help with detailed steps, article or content with this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We did try multiple options, but this is not successful.&lt;/P&gt;&lt;P&gt;Since our Nifi instance is on ECS Fargate, we tried cloning the repo using Docker Image and SSH key which was successful. However, when we pass the details in the providers.xml file, the instance doesn't come up.&lt;/P&gt;&lt;P&gt;Can someone please help with the exact steps and what properties and values to be passed in providers.xml file when using ssh authentication.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/95503" target="_blank" rel="noopener"&gt;@steven-matison&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/35454" target="_blank" rel="noopener"&gt;@MattWho&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;: Your guidance and help will be much appreciated!!!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2025 10:01:18 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Integrating-Git-to-Nifi-Registry-using-SSH-Authentication/m-p/403056#M251867</guid>
      <dc:creator>rj27</dc:creator>
      <dc:date>2025-02-27T10:01:18Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating Git to Nifi Registry using SSH Authentication</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Integrating-Git-to-Nifi-Registry-using-SSH-Authentication/m-p/403167#M251953</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/124412"&gt;@rj27&lt;/a&gt;,&amp;nbsp;Welcome to our community! To help you get the best possible answer, I have tagged in our NiFi experts &lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/80381"&gt;@SAMSAL&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/20288"&gt;@Shelton&lt;/a&gt;&amp;nbsp;who may be able to assist you further.&lt;BR /&gt;&lt;BR /&gt;Please feel free to provide any additional information or details about your query, and we hope that you will find a satisfactory solution to your question.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 06:41:31 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Integrating-Git-to-Nifi-Registry-using-SSH-Authentication/m-p/403167#M251953</guid>
      <dc:creator>VidyaSargur</dc:creator>
      <dc:date>2025-02-28T06:41:31Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating Git to Nifi Registry using SSH Authentication</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Integrating-Git-to-Nifi-Registry-using-SSH-Authentication/m-p/403301#M252008</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/124412"&gt;@rj27&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;SPAN&gt;To set up Git integration for Apache NiFi Registry using SSH authentication, you need to configure the NiFi Registry to use a Git-based flow persistence provider. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;&lt;FONT size="4"&gt;Analysis of Current Setup&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;UL class=""&gt;&lt;LI&gt;You have Apache NiFi 1.28 running on AWS ECS Fargate&lt;/LI&gt;&lt;LI&gt;You have Apache NiFi Registry 1.28 running on AWS ECS Fargate&lt;/LI&gt;&lt;LI&gt;Both applications are communicating with each other successfully&lt;/LI&gt;&lt;LI&gt;You need to integrate NiFi Registry with Git using SSH authentication&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Below are the detailed steps to achieve this on an AWS ECS instance running on Fargate with NiFi and NiFi Registry 1.28.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;U&gt;Detailed Steps for Git Integration&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Step 1: Update NiFi Registry Configuration&lt;/STRONG&gt;&lt;/P&gt;&lt;OL class=""&gt;&lt;LI&gt;Modify the nifi-registry.properties file in your container&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Add the following properties&amp;nbsp;&lt;SPAN&gt;to configure the Git flow persistence provider&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV&gt;&lt;LI-SPOILER&gt;# Git Configuration&lt;BR /&gt;nifi.registry.db.git.remote=true&lt;BR /&gt;nifi.registry.db.git.remote.to.push=true&lt;BR /&gt;nifi.registry.db.git.repository=/opt/nifi-registry/git-repository nifi.registry.db.git.flow.storage.directory=/opt/nifi-registry/flow-storage nifi.registry.db.git.remote.url=ssh://git@your-git-server:port/your-repo.git&lt;BR /&gt;nifi.registry.db.git.remote.branch=master&lt;/LI-SPOILER&gt;&lt;/DIV&gt;&lt;H3&gt;&lt;FONT size="4"&gt;Step 2: Set Up SSH Keys for Authentication&lt;/FONT&gt;&lt;/H3&gt;&lt;P&gt;1. Generate an SSH key pair inside your container&lt;/P&gt;&lt;LI-SPOILER&gt;mkdir -p /opt/nifi-registry/.ssh&lt;BR /&gt;ssh-keygen -t rsa -b 4096 -C "nifi-registry@example.com" -f /opt/nifi-registry/.ssh/id_rsa -N ""&lt;/LI-SPOILER&gt;&lt;P&gt;2. Add your public key to your Git repository's authorized keys (in GitHub, GitLab, etc.)&lt;/P&gt;&lt;UL class=""&gt;&lt;LI&gt;Copy the contents of /opt/nifi-registry/.ssh/id_rsa.pub&lt;/LI&gt;&lt;LI&gt;Add it to your Git provider as a deploy key or authentication key&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;3. Configure SSH client in the container&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;SPAN class="token string"&gt;&lt;SPAN class="token function"&gt;cat&lt;/SPAN&gt; &lt;SPAN class="token operator"&gt;&amp;gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt; /opt/nifi-registry/.ssh/config &lt;/SPAN&gt;&lt;SPAN class="token operator"&gt;&amp;lt;&amp;lt;&lt;/SPAN&gt; EOF&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="token string"&gt;Host your-git-server&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="token string"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;IdentityFile /opt/nifi-registry/.ssh/id_rsa&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="token string"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;StrictHostKeyChecking no&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="token string"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;UserKnownHostsFile /dev/null&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="token string"&gt;EOF&lt;/SPAN&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;4.&amp;nbsp;Set proper permissions&lt;/P&gt;&lt;DIV&gt;&lt;LI-SPOILER&gt;chmod 700 /opt/nifi-registry/.ssh&lt;BR /&gt;chmod 600 /opt/nifi-registry/.ssh/id_rsa&lt;BR /&gt;chmod 644 /opt/nifi-registry/.ssh/id_rsa.pub&lt;BR /&gt;chmod 600 /opt/nifi-registry/.ssh/config&lt;/LI-SPOILER&gt;&lt;/DIV&gt;&lt;H3&gt;&lt;FONT size="4"&gt;Step 3: Update ECS Task Definition for Persistence&lt;/FONT&gt;&lt;/H3&gt;&lt;P&gt;1. Update your ECS task definition to include a volume for SSH keys and Git repository&amp;nbsp;&amp;nbsp;validate the JSON's&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token property"&gt;"volumes"&lt;/SPAN&gt;&lt;SPAN class="token operator"&gt;:&lt;/SPAN&gt; &lt;SPAN class="token punctuation"&gt;[&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token punctuation"&gt;&amp;nbsp; &amp;nbsp; {&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token property"&gt;&amp;nbsp; &amp;nbsp;"name"&lt;/SPAN&gt;&lt;SPAN class="token operator"&gt;:&lt;/SPAN&gt; &lt;SPAN class="token string"&gt;"nifi-registry-git"&lt;/SPAN&gt;&lt;SPAN class="token punctuation"&gt;,&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token property"&gt;&amp;nbsp; &amp;nbsp;"dockerVolumeConfiguration"&lt;/SPAN&gt;&lt;SPAN class="token operator"&gt;:&lt;/SPAN&gt; &lt;SPAN class="token punctuation"&gt;{&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token property"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; "scope"&lt;/SPAN&gt;&lt;SPAN class="token operator"&gt;:&lt;/SPAN&gt; &lt;SPAN class="token string"&gt;"task"&lt;/SPAN&gt;&lt;SPAN class="token punctuation"&gt;,&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token property"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; "driver"&lt;/SPAN&gt;&lt;SPAN class="token operator"&gt;:&lt;/SPAN&gt; &lt;SPAN class="token string"&gt;"local"&lt;/SPAN&gt;&lt;SPAN class="token punctuation"&gt;,&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token property"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; "labels"&lt;/SPAN&gt;&lt;SPAN class="token operator"&gt;:&lt;/SPAN&gt; &lt;SPAN class="token null keyword"&gt;null&lt;/SPAN&gt;&lt;SPAN class="token punctuation"&gt;,&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token property"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; "autoprovision"&lt;/SPAN&gt;&lt;SPAN class="token operator"&gt;:&lt;/SPAN&gt; &lt;SPAN class="token boolean"&gt;true&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token punctuation"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;}&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token punctuation"&gt;&amp;nbsp; }&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token punctuation"&gt;]&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;2.&amp;nbsp;Mount this volume in your container definition&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token property"&gt;"mountPoints"&lt;/SPAN&gt;&lt;SPAN class="token operator"&gt;:&lt;/SPAN&gt; &lt;SPAN class="token punctuation"&gt;[&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token punctuation"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;{&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token property"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "sourceVolume"&lt;/SPAN&gt;&lt;SPAN class="token operator"&gt;:&lt;/SPAN&gt; &lt;SPAN class="token string"&gt;"nifi-registry-git"&lt;/SPAN&gt;&lt;SPAN class="token punctuation"&gt;,&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token property"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "containerPath"&lt;/SPAN&gt;&lt;SPAN class="token operator"&gt;:&lt;/SPAN&gt; &lt;SPAN class="token string"&gt;"/opt/nifi-registry/.ssh"&lt;/SPAN&gt;&lt;SPAN class="token punctuation"&gt;,&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token property"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "readOnly"&lt;/SPAN&gt;&lt;SPAN class="token operator"&gt;:&lt;/SPAN&gt; &lt;SPAN class="token boolean"&gt;false&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token punctuation"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; }&lt;/SPAN&gt;&lt;SPAN class="token punctuation"&gt;,&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token punctuation"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;{&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token property"&gt;"sourceVolume"&lt;/SPAN&gt;&lt;SPAN class="token operator"&gt;:&lt;/SPAN&gt; &lt;SPAN class="token string"&gt;"nifi-registry-git"&lt;/SPAN&gt;&lt;SPAN class="token punctuation"&gt;,&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token property"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "containerPath"&lt;/SPAN&gt;&lt;SPAN class="token operator"&gt;:&lt;/SPAN&gt; &lt;SPAN class="token string"&gt;"/opt/nifi-registry/git-repository"&lt;/SPAN&gt;&lt;SPAN class="token punctuation"&gt;,&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token property"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; "readOnly"&lt;/SPAN&gt;&lt;SPAN class="token operator"&gt;:&lt;/SPAN&gt; &lt;SPAN class="token boolean"&gt;false&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token punctuation"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;}&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token punctuation"&gt;]&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI-SPOILER&gt;&lt;H3&gt;&lt;FONT size="4"&gt;Step 4: Configure Git User Information&lt;/FONT&gt;&lt;/H3&gt;&lt;OL class=""&gt;&lt;LI&gt;Set Git user configuration&lt;/LI&gt;&lt;/OL&gt;&lt;LI-SPOILER&gt;git config --global user.name "NiFi Registry"&lt;BR /&gt;git config --global user.email "nifi-registry@example.com"&lt;/LI-SPOILER&gt;&lt;H3&gt;&lt;FONT size="4"&gt;Step 5: Initialize the Git Repository&lt;/FONT&gt;&lt;/H3&gt;&lt;OL class=""&gt;&lt;LI&gt;Initialize the local Git repository&lt;/LI&gt;&lt;/OL&gt;&lt;LI-SPOILER&gt;mkdir -p /opt/nifi-registry/git-repository&lt;BR /&gt;cd /opt/nifi-registry/git-repository&lt;BR /&gt;git init&lt;BR /&gt;git remote add origin ssh://git@your-git-server:port/your-repository.git&lt;/LI-SPOILER&gt;&lt;P&gt;2.&amp;nbsp;Test the connection&lt;/P&gt;&lt;LI-SPOILER&gt;ssh -T git@your-git-server&lt;/LI-SPOILER&gt;&lt;H3&gt;&lt;FONT size="4"&gt;Step 6: Configure NiFi to Connect to NiFi Registry&lt;/FONT&gt;&lt;/H3&gt;&lt;OL class=""&gt;&lt;LI&gt;In NiFi UI, configure the Registry Client:&lt;UL&gt;&lt;LI&gt;Click on the hamburger menu (≡) in the top-right corner&lt;/LI&gt;&lt;LI&gt;Select "Controller Settings"&lt;/LI&gt;&lt;LI&gt;Go to the "Registry Clients" tab&lt;/LI&gt;&lt;LI&gt;Add a new Registry Client with:&lt;UL&gt;&lt;LI&gt;Name: Git-Backed Registry&lt;/LI&gt;&lt;LI&gt;URL: &lt;A href="http://your-nifi-registry:18080" target="_blank" rel="noopener"&gt;http://your-nifi-registry:18080&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;FONT size="4"&gt;Step 7: Restart NiFi Registry&lt;/FONT&gt;&lt;/P&gt;&lt;OL class=""&gt;&lt;LI&gt;Restart the NiFi Registry service to apply change&lt;/LI&gt;&lt;/OL&gt;&lt;LI-SPOILER&gt;&lt;P&gt;# If using systemd&lt;BR /&gt;systemctl restart nifi-registry&lt;/P&gt;&lt;P&gt;# If using the command line&lt;BR /&gt;./bin/nifi-registry.sh restart&lt;/P&gt;&lt;P&gt;# In AWS ECS, update the service to force new deployment&lt;BR /&gt;aws ecs update-service --cluster your-cluster --service your-nifi-registry-service --force-new-deployment&lt;/P&gt;&lt;/LI-SPOILER&gt;&lt;H3&gt;&lt;FONT size="4"&gt;Troubleshooting&lt;/FONT&gt;&lt;/H3&gt;&lt;P&gt;1. Check NiFi Registry logs for Git-related errors:&lt;/P&gt;&lt;LI-SPOILER&gt;tail -f /opt/nifi-registry/logs/nifi-registry-app.log&lt;/LI-SPOILER&gt;&lt;P&gt;2.&amp;nbsp;Verify SSH connectivity&lt;/P&gt;&lt;LI-SPOILER&gt;ssh -vT git@your-git-server&lt;/LI-SPOILER&gt;&lt;P&gt;3.&amp;nbsp;Common issues:&lt;/P&gt;&lt;UL class=""&gt;&lt;LI&gt;Permission problems: Ensure the NiFi Registry user has appropriate permissions&lt;/LI&gt;&lt;LI&gt;Known hosts: If StrictHostKeyChecking is on, you need to accept the host key first&lt;/LI&gt;&lt;LI&gt;Firewall: Ensure outbound connections to the Git server are allowed from the ECS task&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;U&gt;&lt;FONT color="#FF0000"&gt; Important precautions&amp;nbsp;&lt;/FONT&gt;&lt;/U&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Security&lt;/STRONG&gt;: Ensure the private key is stored securely and not exposed in the container image or logs.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Automation&lt;/STRONG&gt;: Consider using AWS Secrets Manager or Parameter Store to manage the SSH key and passphrase securely.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Backup&lt;/STRONG&gt;: Regularly back up your Git repository to avoid data loss.&lt;BR /&gt;&lt;BR /&gt;Happy hadooping&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Mar 2025 19:46:39 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Integrating-Git-to-Nifi-Registry-using-SSH-Authentication/m-p/403301#M252008</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2025-03-01T19:46:39Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating Git to Nifi Registry using SSH Authentication</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Integrating-Git-to-Nifi-Registry-using-SSH-Authentication/m-p/403350#M252035</link>
      <description>&lt;P&gt;Thank You&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/20288"&gt;@Shelton&lt;/a&gt;&amp;nbsp; for your revert. Will give this this a try and confirm back. Could you also please suggest the values to be passed in providers.xml file. Also, we are going to use EFS as our external volume and mount the same here. So do we add the same for keys instead of local. Lastly, I am using my personal user and email id for git configuration as of now. What is the best way suggested. I see that you have mentioned below user name and email for configuration. Is that a default user or we create a service user with same name. Please suggest&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;git config --global user.name "NiFi Registry"&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;git config --global user.email "nifi-registry@example.com"&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Mar 2025 09:51:40 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Integrating-Git-to-Nifi-Registry-using-SSH-Authentication/m-p/403350#M252035</guid>
      <dc:creator>rj27</dc:creator>
      <dc:date>2025-03-02T09:51:40Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating Git to Nifi Registry using SSH Authentication</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Integrating-Git-to-Nifi-Registry-using-SSH-Authentication/m-p/403351#M252036</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/20288"&gt;@Shelton&lt;/a&gt;&amp;nbsp;- Also if you suggest the best way to set up CICD pipelines for 1.28 version considering we have GIT in place. How can I move my code and parameter context in higher environments. We have different set of nifi and nifi registry for each environmenet and we plan to maintain separate dev, qa and prod branches in same git repo. We want to set up GitHub Action workflows for the same. We have just adopted Nifi and are trying to figure out the best way to set up automated cicd pipelines for each environment considering all flows and parameter context are being taken care of.&lt;/P&gt;</description>
      <pubDate>Sun, 02 Mar 2025 09:59:44 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Integrating-Git-to-Nifi-Registry-using-SSH-Authentication/m-p/403351#M252036</guid>
      <dc:creator>rj27</dc:creator>
      <dc:date>2025-03-02T09:59:44Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating Git to Nifi Registry using SSH Authentication</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Integrating-Git-to-Nifi-Registry-using-SSH-Authentication/m-p/403353#M252038</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/124412"&gt;@rj27&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Some clarification on the git setup&amp;nbsp;&lt;BR /&gt;This is the author name that will appear in commit messages&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;EM&gt;Set the global Git username to "NiFi Registry"&amp;nbsp;&lt;/EM&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;This is the email address associated with commits&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;EM&gt;Set the global Git email to "&lt;A class="underline" href="mailto:nifi-registry@example.com" target="_blank"&gt;nifi-registry@example.com&lt;/A&gt;"&amp;nbsp;&amp;nbsp;&lt;/EM&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;Values to be passed&amp;nbsp;&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token tag punctuation"&gt;&amp;lt;&lt;/SPAN&gt;&lt;SPAN class="token tag"&gt;flowPersistenceProvider&lt;/SPAN&gt;&lt;SPAN class="token tag punctuation"&gt;&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token tag punctuation"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;&lt;/SPAN&gt;&lt;SPAN class="token tag"&gt;property&lt;/SPAN&gt; &lt;SPAN class="token tag attr-name"&gt;name&lt;/SPAN&gt;&lt;SPAN class="token tag attr-value punctuation attr-equals"&gt;=&lt;/SPAN&gt;&lt;SPAN class="token tag attr-value punctuation"&gt;"&lt;/SPAN&gt;&lt;SPAN class="token tag attr-value"&gt;Flow Storage Directory&lt;/SPAN&gt;&lt;SPAN class="token tag attr-value punctuation"&gt;"&lt;/SPAN&gt;&lt;SPAN class="token tag punctuation"&gt;&amp;gt;&lt;/SPAN&gt;./flow_storage&lt;SPAN class="token tag punctuation"&gt;&amp;lt;/&lt;/SPAN&gt;&lt;SPAN class="token tag"&gt;property&lt;/SPAN&gt;&lt;SPAN class="token tag punctuation"&gt;&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token tag punctuation"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;lt;&lt;/SPAN&gt;&lt;SPAN class="token tag"&gt;property&lt;/SPAN&gt; &lt;SPAN class="token tag attr-name"&gt;name&lt;/SPAN&gt;&lt;SPAN class="token tag attr-value punctuation attr-equals"&gt;=&lt;/SPAN&gt;&lt;SPAN class="token tag attr-value punctuation"&gt;"&lt;/SPAN&gt;&lt;SPAN class="token tag attr-value"&gt;Git Remote To Push&lt;/SPAN&gt;&lt;SPAN class="token tag attr-value punctuation"&gt;"&lt;/SPAN&gt;&lt;SPAN class="token tag punctuation"&gt;&amp;gt;&lt;/SPAN&gt;origin&lt;SPAN class="token tag punctuation"&gt;&amp;lt;/&lt;/SPAN&gt;&lt;SPAN class="token tag"&gt;property&lt;/SPAN&gt;&lt;SPAN class="token tag punctuation"&gt;&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token tag punctuation"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;lt;&lt;/SPAN&gt;&lt;SPAN class="token tag"&gt;property&lt;/SPAN&gt; &lt;SPAN class="token tag attr-name"&gt;name&lt;/SPAN&gt;&lt;SPAN class="token tag attr-value punctuation attr-equals"&gt;=&lt;/SPAN&gt;&lt;SPAN class="token tag attr-value punctuation"&gt;"&lt;/SPAN&gt;&lt;SPAN class="token tag attr-value"&gt;Git Remote Access User&lt;/SPAN&gt;&lt;SPAN class="token tag attr-value punctuation"&gt;"&lt;/SPAN&gt;&lt;SPAN class="token tag punctuation"&gt;&amp;gt;&lt;/SPAN&gt;username&lt;SPAN class="token tag punctuation"&gt;&amp;lt;/&lt;/SPAN&gt;&lt;SPAN class="token tag"&gt;property&lt;/SPAN&gt;&lt;SPAN class="token tag punctuation"&gt;&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token tag punctuation"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;&lt;/SPAN&gt;&lt;SPAN class="token tag"&gt;property&lt;/SPAN&gt; &lt;SPAN class="token tag attr-name"&gt;name&lt;/SPAN&gt;&lt;SPAN class="token tag attr-value punctuation attr-equals"&gt;=&lt;/SPAN&gt;&lt;SPAN class="token tag attr-value punctuation"&gt;"&lt;/SPAN&gt;&lt;SPAN class="token tag attr-value"&gt;Git Remote Access Password&lt;/SPAN&gt;&lt;SPAN class="token tag attr-value punctuation"&gt;"&lt;/SPAN&gt;&lt;SPAN class="token tag punctuation"&gt;&amp;gt;&lt;/SPAN&gt;password&lt;SPAN class="token tag punctuation"&gt;&amp;lt;/&lt;/SPAN&gt;&lt;SPAN class="token tag"&gt;property&lt;/SPAN&gt;&lt;SPAN class="token tag punctuation"&gt;&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token tag punctuation"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;&lt;/SPAN&gt;&lt;SPAN class="token tag"&gt;property&lt;/SPAN&gt; &lt;SPAN class="token tag attr-name"&gt;name&lt;/SPAN&gt;&lt;SPAN class="token tag attr-value punctuation attr-equals"&gt;=&lt;/SPAN&gt;&lt;SPAN class="token tag attr-value punctuation"&gt;"&lt;/SPAN&gt;&lt;SPAN class="token tag attr-value"&gt;Remote Clone Repository&lt;/SPAN&gt;&lt;SPAN class="token tag attr-value punctuation"&gt;"&lt;/SPAN&gt;&lt;SPAN class="token tag punctuation"&gt;&amp;gt;&lt;/SPAN&gt;&lt;A href="https://git-repo-url/your-flow-repo.git" target="_blank"&gt;https://git-repo-url/your-flow-repo.git&lt;/A&gt;&lt;SPAN class="token tag punctuation"&gt;&amp;lt;/&lt;/SPAN&gt;&lt;SPAN class="token tag"&gt;property&lt;/SPAN&gt;&lt;SPAN class="token tag punctuation"&gt;&amp;gt;&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class="token tag punctuation"&gt;&amp;lt;/&lt;/SPAN&gt;&lt;SPAN class="token tag"&gt;flowPersistenceProvider&lt;/SPAN&gt;&lt;SPAN class="token tag punctuation"&gt;&amp;gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI-SPOILER&gt;</description>
      <pubDate>Sun, 02 Mar 2025 10:31:38 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Integrating-Git-to-Nifi-Registry-using-SSH-Authentication/m-p/403353#M252038</guid>
      <dc:creator>Shelton</dc:creator>
      <dc:date>2025-03-02T10:31:38Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating Git to Nifi Registry using SSH Authentication</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Integrating-Git-to-Nifi-Registry-using-SSH-Authentication/m-p/404665#M252350</link>
      <description>&lt;P&gt;Thank you so much for helping me out.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Mar 2025 10:58:52 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Integrating-Git-to-Nifi-Registry-using-SSH-Authentication/m-p/404665#M252350</guid>
      <dc:creator>RobertWilliams</dc:creator>
      <dc:date>2025-03-24T10:58:52Z</dc:date>
    </item>
  </channel>
</rss>

