Support Questions
Find answers, ask questions, and share your expertise

NiFi not starting HDF3.1.2 -ERROR [main] org.apache.nifi.properties.ConfigEncryptionTool: Encountered an error javax.crypto.BadPaddingException: pad block corrupted

NiFi not starting HDF3.1.2 -ERROR [main] org.apache.nifi.properties.ConfigEncryptionTool: Encountered an error javax.crypto.BadPaddingException: pad block corrupted

Expert Contributor

I just installed HDF 3.1.2 and NiFi is not starting because of this error below. I have changed the hard coded memory definition in the encrypt script but it still fails. Can anyone help?


Traceback (most recent call last):  File "/var/lib/ambari-agent/cache/common-services/NIFI/1.0.0/package/scripts/nifi.py", line 231, in <module>    Master().execute()  File "/usr/lib/ambari-agent/lib/resource_management/libraries/script/script.py", line 375, in execute    method(env)  File "/usr/lib/ambari-agent/lib/resource_management/libraries/script/script.py", line 978, in restart    self.start(env, upgrade_type=upgrade_type)  File "/var/lib/ambari-agent/cache/common-services/NIFI/1.0.0/package/scripts/nifi.py", line 152, in start    self.configure(env, is_starting = True)  File "/usr/lib/ambari-agent/lib/resource_management/libraries/script/script.py", line 120, in locking_configure    original_configure(obj, *args, **kw)  File "/var/lib/ambari-agent/cache/common-services/NIFI/1.0.0/package/scripts/nifi.py", line 122, in configure    params.stack_support_encrypt_authorizers)  File "/var/lib/ambari-agent/cache/common-services/NIFI/1.0.0/package/scripts/nifi_toolkit_util.py", line 454, in encrypt_sensitive_properties    Execute(encrypt_config_command, user=nifi_user, logoutput=False, environment=environment)  File "/usr/lib/ambari-agent/lib/resource_management/core/base.py", line 166, in __init__    self.env.run()  File "/usr/lib/ambari-agent/lib/resource_management/core/environment.py", line 160, in run    self.run_action(resource, action)  File "/usr/lib/ambari-agent/lib/resource_management/core/environment.py", line 124, in run_action    provider_action()  File "/usr/lib/ambari-agent/lib/resource_management/core/providers/system.py", line 262, in action_run    tries=self.resource.tries, try_sleep=self.resource.try_sleep)  File "/usr/lib/ambari-agent/lib/resource_management/core/shell.py", line 72, in inner    result = function(command, **kwargs)  File "/usr/lib/ambari-agent/lib/resource_management/core/shell.py", line 102, in checked_call    tries=tries, try_sleep=try_sleep, timeout_kill_strategy=timeout_kill_strategy)  File "/usr/lib/ambari-agent/lib/resource_management/core/shell.py", line 150, in _call_wrapper    result = _call(command, **kwargs_copy)  File "/usr/lib/ambari-agent/lib/resource_management/core/shell.py", line 303, in _call    raise ExecutionFailed(err_msg, code, out, err) resource_management.core.exceptions.ExecutionFailed: Execution of '/var/lib/ambari-agent/tmp/nifi-toolkit-1.5.0.3.1.2.0-7/bin/encrypt-config.sh -v -b /usr/hdf/current/nifi/conf/bootstrap.conf -n /usr/hdf/current/nifi/conf/nifi.properties -f /var/lib/nifi/conf/flow.xml.gz -s '[PROTECTED]' -p '[PROTECTED]'' returned 4. 2019/04/12 02:03:50 INFO [main] org.apache.nifi.properties.ConfigEncryptionTool: Handling encryption of nifi.properties 2019/04/12 02:03:50 WARN [main] org.apache.nifi.properties.ConfigEncryptionTool: The source nifi.properties and destination nifi.properties are identical [/usr/hdf/current/nifi/conf/nifi.properties] so the original will be overwritten 2019/04/12 02:03:50 INFO [main] org.apache.nifi.properties.ConfigEncryptionTool: Handling encryption of flow.xml.gz 2019/04/12 02:03:50 WARN [main] org.apache.nifi.properties.ConfigEncryptionTool: The source flow.xml.gz and destination flow.xml.gz are identical [/var/lib/nifi/conf/flow.xml.gz] so the original will be overwritten 2019/04/12 02:03:50 INFO [main] org.apache.nifi.properties.ConfigEncryptionTool:        bootstrap.conf:               /usr/hdf/current/nifi/conf/bootstrap.conf 2019/04/12 02:03:50 INFO [main] org.apache.nifi.properties.ConfigEncryptionTool: (src)  nifi.properties:              /usr/hdf/current/nifi/conf/nifi.properties 2019/04/12 02:03:50 INFO [main] org.apache.nifi.properties.ConfigEncryptionTool: (dest) nifi.properties:              /usr/hdf/current/nifi/conf/nifi.properties 2019/04/12 02:03:50 INFO [main] org.apache.nifi.properties.ConfigEncryptionTool: (src)  login-identity-providers.xml: null 2019/04/12 02:03:50 INFO [main] org.apache.nifi.properties.ConfigEncryptionTool: (dest) login-identity-providers.xml: null 2019/04/12 02:03:50 INFO [main] org.apache.nifi.properties.ConfigEncryptionTool: (src)  authorizers.xml:              null 2019/04/12 02:03:50 INFO [main] org.apache.nifi.properties.ConfigEncryptionTool: (dest) authorizers.xml:              null 2019/04/12 02:03:50 INFO [main] org.apache.nifi.properties.ConfigEncryptionTool: (src)  flow.xml.gz:                  /var/lib/nifi/conf/flow.xml.gz 2019/04/12 02:03:50 INFO [main] org.apache.nifi.properties.ConfigEncryptionTool: (dest) flow.xml.gz:                  /var/lib/nifi/conf/flow.xml.gz 2019/04/12 02:03:50 INFO [main] org.apache.nifi.properties.NiFiPropertiesLoader: Loaded 145 properties from /usr/hdf/current/nifi/conf/nifi.properties 2019/04/12 02:03:51 INFO [main] org.apache.nifi.properties.NiFiPropertiesLoader: Loaded 145 properties from /usr/hdf/current/nifi/conf/nifi.properties 2019/04/12 02:03:51 INFO [main] org.apache.nifi.properties.ConfigEncryptionTool: Loaded NiFiProperties instance with 145 properties 2019/04/12 02:03:53 ERROR [main] org.apache.nifi.properties.ConfigEncryptionTool: Encountered an error javax.crypto.BadPaddingException: pad block corrupted     at org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher$BufferedGenericBlockCipher.doFinal(Unknown Source)     at org.bouncycastle.jcajce.provider.symmetric.util.BaseBlockCipher.engineDoFinal(Unknown Source)     at javax.crypto.Cipher.doFinal(Cipher.java:2164)     at javax.crypto.Cipher$doFinal$2.call(Unknown Source)     at org.codehaus.groovy.runtime.callsite.CallSiteArray.defaultCall(CallSiteArray.java:48)     at org.codehaus.groovy.runtime.callsite.AbstractCallSite.call(AbstractCallSite.java:113)     at org.codehaus.groovy.runtime.callsite.AbstractCallSite.call(AbstractCallSite.java:125)     at org.apache.nifi.properties.ConfigEncryptionTool.decryptFlowElement(ConfigEncryptionTool.groovy:636)     at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)     at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)     at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)     at java.lang.reflect.Method.invoke(Method.java:498)     at org.codehaus.groovy.reflection.CachedMethod.invoke(CachedMethod.java:93)     at groovy.lang.MetaMethod.doMethodInvoke(MetaMethod.java:325)     at org.codehaus.groovy.runtime.metaclass.ClosureMetaClass.invokeMethod(ClosureMetaClass.java:384)     at groovy.lang.MetaClassImpl.invokeMethod(MetaClassImpl.java:1019)     at org.codehaus.groovy.runtime.callsite.PogoMetaClassSite.callCurrent(PogoMetaClassSite.java:69)     at org.codehaus.groovy.runtime.callsite.CallSiteArray.defaultCallCurrent(CallSiteArray.java:52)     at org.codehaus.groovy.runtime.callsite.AbstractCallSite.callCurrent(AbstractCallSite.java:154)     at org.codehaus.groovy.runtime.callsite.AbstractCallSite.callCurrent(AbstractCallSite.java:190)     at org.apache.nifi.properties.ConfigEncryptionTool$_migrateFlowXmlContent_closure4.doCall(ConfigEncryptionTool.groovy:731)     at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)     at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)     at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)     at java.lang.reflect.Method.invoke(Method.java:498)     at org.codehaus.groovy.reflection.CachedMethod.invoke(CachedMethod.java:93)     at groovy.lang.MetaMethod.doMethodInvoke(MetaMethod.java:325)     at org.codehaus.groovy.runtime.metaclass.ClosureMetaClass.invokeMethod(ClosureMetaClass.java:294)     at groovy.lang.MetaClassImpl.invokeMethod(MetaClassImpl.java:1019)     at groovy.lang.Closure.call(Closure.java:426)     at groovy.lang.Closure.call(Closure.java:442)     at org.codehaus.groovy.runtime.StringGroovyMethods.getReplacement(StringGroovyMethods.java:1543)     at org.codehaus.groovy.runtime.StringGroovyMethods.replaceAll(StringGroovyMethods.java:2580)     at org.codehaus.groovy.runtime.StringGroovyMethods.replaceAll(StringGroovyMethods.java:2506)     at org.codehaus.groovy.runtime.dgm$1127.invoke(Unknown Source)     at org.codehaus.groovy.runtime.callsite.PojoMetaMethodSite$PojoMetaMethodSiteNoUnwrapNoCoerce.invoke(PojoMetaMethodSite.java:274)     at org.codehaus.groovy.runtime.callsite.PojoMetaMethodSite.call(PojoMetaMethodSite.java:56)     at org.codehaus.groovy.runtime.callsite.CallSiteArray.defaultCall(CallSiteArray.java:48)     at org.codehaus.groovy.runtime.callsite.AbstractCallSite.call(AbstractCallSite.java:113)     at org.codehaus.groovy.runtime.callsite.AbstractCallSite.call(AbstractCallSite.java:133)     at org.apache.nifi.properties.ConfigEncryptionTool.migrateFlowXmlContent(ConfigEncryptionTool.groovy:730)     at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)     at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)     at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)     at java.lang.reflect.Method.invoke(Method.java:498)     at org.codehaus.groovy.runtime.callsite.PogoMetaMethodSite$PogoCachedMethodSiteNoUnwrapNoCoerce.invoke(PogoMetaMethodSite.java:210)     at org.codehaus.groovy.runtime.callsite.PogoMetaMethodSite.call(PogoMetaMethodSite.java:71)     at org.codehaus.groovy.runtime.callsite.CallSiteArray.defaultCall(CallSiteArray.java:48)     at org.codehaus.groovy.runtime.callsite.AbstractCallSite.call(AbstractCallSite.java:113)     at org.apache.nifi.properties.ConfigEncryptionTool.main(ConfigEncryptionTool.groovy:1427)     at org.apache.nifi.properties.ConfigEncryptionTool$main.call(Unknown Source)     at org.codehaus.groovy.runtime.callsite.CallSiteArray.defaultCall(CallSiteArray.java:48)     at org.codehaus.groovy.runtime.callsite.AbstractCallSite.call(AbstractCallSite.java:113)     at org.codehaus.groovy.runtime.callsite.AbstractCallSite.call(AbstractCallSite.java:125)     at org.apache.nifi.toolkit.encryptconfig.LegacyMode.run(LegacyMode.groovy:30)     at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)     at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)     at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)     at java.lang.reflect.Method.invoke(Method.java:498)     at org.codehaus.groovy.runtime.callsite.PogoMetaMethodSite$PogoCachedMethodSite.invoke(PogoMetaMethodSite.java:169)     at org.codehaus.groovy.runtime.callsite.PogoMetaMethodSite.call(PogoMetaMethodSite.java:71)     at org.codehaus.groovy.runtime.callsite.CallSiteArray.defaultCall(CallSiteArray.java:48)     at org.codehaus.groovy.runtime.callsite.AbstractCallSite.call(AbstractCallSite.java:113)     at org.codehaus.groovy.runtime.callsite.AbstractCallSite.call(AbstractCallSite.java:125)     at org.apache.nifi.toolkit.encryptconfig.EncryptConfigMain.main(EncryptConfigMain.groovy:109) pad block corrupted 
usage: org.apache.nifi.properties.ConfigEncryptionTool [-h] [-v] [-n <file>] [-o <file>] [-l <file>] [-i <file>] [-a <file>] [-u <file>] [-f <file>] [-g <file>]       [-b <file>] [-k <keyhex>] [-e <keyhex>] [-p <password>] [-w <password>] [-r] [-m] [-x] [-s <password|keyhex>] [-A <algorithm>] [-P <algorithm>] 
This tool reads from a nifi.properties and/or login-identity-providers.xml file with plain sensitive configuration values, prompts the user for a master key, and encrypts each value. It will replace the plain value with the protected value in the same file (or write to a new file if specified). It can also be used to migrate already-encrypted values in those files or in flow.xml.gz to be encrypted with a new key.  -h,--help                                  Show usage information (this message) -v,--verbose                               Sets verbose mode (default false) -n,--niFiProperties <file>                 The nifi.properties file containing unprotected config values (will be overwritten unless -o is specified) -o,--outputNiFiProperties <file>           The destination nifi.properties file containing protected config values (will not modify input nifi.properties) -l,--loginIdentityProviders <file>         The login-identity-providers.xml file containing unprotected config values (will be overwritten unless -i is                                            specified) -i,--outputLoginIdentityProviders <file>   The destination login-identity-providers.xml file containing protected config values (will not modify input                                            login-identity-providers.xml) -a,--authorizers <file>                    The authorizers.xml file containing unprotected config values (will be overwritten unless -u is specified) -u,--outputAuthorizers <file>              The destination authorizers.xml file containing protected config values (will not modify input authorizers.xml) -f,--flowXml <file>                        The flow.xml.gz file currently protected with old password (will be overwritten unless -g is specified) -g,--outputFlowXml <file>                  The destination flow.xml.gz file containing protected config values (will not modify input flow.xml.gz) -b,--bootstrapConf <file>                  The bootstrap.conf file to persist master key -k,--key <keyhex>                          The raw hexadecimal key to use to encrypt the sensitive properties -e,--oldKey <keyhex>                       The old raw hexadecimal key to use during key migration -p,--password <password>                   The password from which to derive the key to use to encrypt the sensitive properties -w,--oldPassword <password>                The old password from which to derive the key during migration -r,--useRawKey                             If provided, the secure console will prompt for the raw key value in hexadecimal form -m,--migrate                               If provided, the nifi.properties and/or login-identity-providers.xml sensitive properties will be re-encrypted with                                            a new key -x,--encryptFlowXmlOnly                    If provided, the properties in flow.xml.gz will be re-encrypted with a new key but the nifi.properties and/or                                            login-identity-providers.xml files will not be modified -s,--propsKey <password|keyhex>            The password or key to use to encrypt the sensitive processor properties in flow.xml.gz -A,--newFlowAlgorithm <algorithm>          The algorithm to use to encrypt the sensitive processor properties in flow.xml.gz -P,--newFlowProvider <algorithm>           The security provider to use to encrypt the sensitive processor properties in flow.xml.gz 
Java home: /usr/java/latest/ NiFi Toolkit home: /var/lib/ambari-agent/tmp/nifi-toolkit-1.5.0.3.1.2.0-7
2019-04-12 02:03:40,971 - Stack Feature Version Info: Cluster Stack=3.1, Command Stack=None, Command Version=3.0.0.0-453 -> 3.0.0.0-453 2019-04-12 02:03:41,547 - Stack Feature Version Info: Cluster Stack=3.1, Command Stack=None, Command Version=3.0.0.0-453 -> 3.0.0.0-453 User Group mapping (user_group) is missing in the hostLevelParams 2019-04-12 02:03:41,565 - Group['hadoop'] {} 2019-04-12 02:03:41,570 - Group['nifi'] {} 2019-04-12 02:03:41,571 - File['/var/lib/ambari-agent/tmp/changeUid.sh'] {'content': StaticFile('changeToSecureUid.sh'), 'mode': 0555} 2019-04-12 02:03:41,576 - call['/var/lib/ambari-agent/tmp/changeUid.sh infra-solr'] {} 2019-04-12 02:03:41,602 - call returned (0, '1005') 2019-04-12 02:03:41,604 - User['infra-solr'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': [u'hadoop'], 'uid': 1005} 2019-04-12 02:03:41,608 - File['/var/lib/ambari-agent/tmp/changeUid.sh'] {'content': StaticFile('changeToSecureUid.sh'), 'mode': 0555} 2019-04-12 02:03:41,612 - call['/var/lib/ambari-agent/tmp/changeUid.sh zookeeper'] {} 2019-04-12 02:03:41,638 - call returned (0, '1006') 2019-04-12 02:03:41,640 - User['zookeeper'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': [u'hadoop'], 'uid': 1006} 2019-04-12 02:03:41,644 - File['/var/lib/ambari-agent/tmp/changeUid.sh'] {'content': StaticFile('changeToSecureUid.sh'), 'mode': 0555} 2019-04-12 02:03:41,648 - call['/var/lib/ambari-agent/tmp/changeUid.sh ams'] {} 2019-04-12 02:03:41,673 - call returned (0, '1007') 2019-04-12 02:03:41,674 - User['ams'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': [u'hadoop'], 'uid': 1007} 2019-04-12 02:03:41,678 - User['ambari-qa'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['users'], 'uid': None} 2019-04-12 02:03:41,681 - File['/var/lib/ambari-agent/tmp/changeUid.sh'] {'content': StaticFile('changeToSecureUid.sh'), 'mode': 0555} 2019-04-12 02:03:41,685 - call['/var/lib/ambari-agent/tmp/changeUid.sh nifi'] {} 2019-04-12 02:03:41,710 - call returned (0, '1010') 2019-04-12 02:03:41,712 - User['nifi'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': [u'hadoop'], 'uid': 1010} 2019-04-12 02:03:41,715 - File['/var/lib/ambari-agent/tmp/changeUid.sh'] {'content': StaticFile('changeToSecureUid.sh'), 'mode': 0555} 2019-04-12 02:03:41,721 - Execute['/var/lib/ambari-agent/tmp/changeUid.sh ambari-qa /tmp/hadoop-ambari-qa,/tmp/hsperfdata_ambari-qa,/home/ambari-qa,/tmp/ambari-qa,/tmp/sqoop-ambari-qa 0'] {'not_if': '(test $(id -u ambari-qa) -gt 1000) || (false)'} 2019-04-12 02:03:41,738 - Skipping Execute['/var/lib/ambari-agent/tmp/changeUid.sh ambari-qa /tmp/hadoop-ambari-qa,/tmp/hsperfdata_ambari-qa,/home/ambari-qa,/tmp/ambari-qa,/tmp/sqoop-ambari-qa 0'] due to not_if 2019-04-12 02:03:41,806 - Execute[('setenforce', '0')] {'not_if': '(! which getenforce ) || (which getenforce && getenforce | grep -q Disabled)', 'sudo': True, 'only_if': 'test -f /selinux/enforce'} 2019-04-12 02:03:41,828 - Skipping Execute[('setenforce', '0')] due to not_if 2019-04-12 02:03:42,959 - Stack Feature Version Info: Cluster Stack=3.1, Command Stack=None, Command Version=3.0.0.0-453 -> 3.0.0.0-453 2019-04-12 02:03:43,104 - File['/usr/hdf/current/nifi/bin/nifi-env.sh'] {'owner': 'nifi', 'content': InlineTemplate(...), 'group': 'nifi', 'mode': 0755} 2019-04-12 02:03:43,107 - Execute['export JAVA_HOME=/usr/java/latest/;/usr/hdf/current/nifi/bin/nifi.sh stop >> /var/log/nifi/nifi-setup.log'] {'user': 'nifi'} 2019-04-12 02:03:47,567 - Pid file /var/run/nifi/nifi.pid is empty or does not exist 2019-04-12 02:03:47,577 - Directory['/var/run/nifi'] {'owner': 'nifi', 'create_parents': True, 'group': 'nifi', 'recursive_ownership': True, 'cd_access': 'a'} 2019-04-12 02:03:47,581 - Directory['/var/lib/nifi'] {'owner': 'nifi', 'create_parents': True, 'group': 'nifi', 'recursive_ownership': True, 'cd_access': 'a'} 2019-04-12 02:03:48,130 - Directory['/var/lib/nifi/database_repository'] {'owner': 'nifi', 'create_parents': True, 'group': 'nifi', 'recursive_ownership': True, 'cd_access': 'a'} 2019-04-12 02:03:48,132 - Directory['/var/lib/nifi/flowfile_repository'] {'owner': 'nifi', 'create_parents': True, 'group': 'nifi', 'recursive_ownership': True, 'cd_access': 'a'} 2019-04-12 02:03:48,151 - Directory['/var/lib/nifi/provenance_repository'] {'owner': 'nifi', 'create_parents': True, 'group': 'nifi', 'recursive_ownership': True, 'cd_access': 'a'} 2019-04-12 02:03:48,155 - Directory['/usr/hdf/current/nifi/conf'] {'owner': 'nifi', 'create_parents': True, 'group': 'nifi', 'recursive_ownership': True, 'cd_access': 'a'} 2019-04-12 02:03:48,157 - Directory['/var/lib/nifi/conf'] {'owner': 'nifi', 'create_parents': True, 'group': 'nifi', 'recursive_ownership': True, 'cd_access': 'a'} 2019-04-12 02:03:48,157 - Directory['/var/lib/nifi/state/local'] {'owner': 'nifi', 'create_parents': True, 'group': 'nifi', 'recursive_ownership': True, 'cd_access': 'a'} 2019-04-12 02:03:48,159 - Directory['/usr/hdf/current/nifi/lib'] {'owner': 'nifi', 'create_parents': True, 'group': 'nifi', 'recursive_ownership': True, 'cd_access': 'a'} 2019-04-12 02:03:48,164 - Directory['/var/lib/nifi/content_repository'] {'owner': 'nifi', 'create_parents': True, 'group': 'nifi', 'recursive_ownership': True, 'cd_access': 'a'} 2019-04-12 02:03:48,296 - Directory['/var/lib/nifi/content_repository'] {'owner': 'nifi', 'group': 'nifi', 'create_parents': True, 'recursive_ownership': True, 'cd_access': 'a'} 2019-04-12 02:03:48,552 - Directory['/etc/security/limits.d'] {'owner': 'root', 'create_parents': True, 'group': 'root'} 2019-04-12 02:03:48,560 - File['/etc/security/limits.d/nifi.conf'] {'content': Template('nifi.conf.j2'), 'owner': 'root', 'group': 'root', 'mode': 0644} 2019-04-12 02:03:48,562 - PropertiesFile['/usr/hdf/current/nifi/conf/nifi.properties'] {'owner': 'nifi', 'group': 'nifi', 'mode': 0600, 'properties': ...} 2019-04-12 02:03:48,570 - Generating properties file: /usr/hdf/current/nifi/conf/nifi.properties 2019-04-12 02:03:48,570 - File['/usr/hdf/current/nifi/conf/nifi.properties'] {'owner': 'nifi', 'content': InlineTemplate(...), 'group': 'nifi', 'mode': 0600} 2019-04-12 02:03:48,722 - Writing File['/usr/hdf/current/nifi/conf/nifi.properties'] because contents don't match 2019-04-12 02:03:48,730 - File['/usr/hdf/current/nifi/conf/bootstrap.conf'] {'owner': 'nifi', 'content': InlineTemplate(...), 'group': 'nifi', 'mode': 0600} 2019-04-12 02:03:48,738 - File['/usr/hdf/current/nifi/conf/logback.xml'] {'owner': 'nifi', 'content': InlineTemplate(...), 'group': 'nifi', 'mode': 0400} 2019-04-12 02:03:48,743 - File['/usr/hdf/current/nifi/conf/state-management.xml'] {'owner': 'nifi', 'content': InlineTemplate(...), 'group': 'nifi', 'mode': 0400} 2019-04-12 02:03:48,756 - File['/usr/hdf/current/nifi/conf/authorizers.xml'] {'owner': 'nifi', 'content': InlineTemplate(...), 'group': 'nifi', 'mode': 0600} 2019-04-12 02:03:48,765 - File['/usr/hdf/current/nifi/conf/login-identity-providers.xml'] {'owner': 'nifi', 'content': InlineTemplate(...), 'group': 'nifi', 'mode': 0600} 2019-04-12 02:03:48,769 - File['/usr/hdf/current/nifi/bin/nifi-env.sh'] {'owner': 'nifi', 'content': InlineTemplate(...), 'group': 'nifi', 'mode': 0755} 2019-04-12 02:03:48,772 - File['/usr/hdf/current/nifi/conf/bootstrap-notification-services.xml'] {'owner': 'nifi', 'content': InlineTemplate(...), 'group': 'nifi', 'mode': 0400} 2019-04-12 02:03:48,773 - Encrypting NiFi sensitive configuration properties 2019-04-12 02:03:48,774 - File['/var/lib/ambari-agent/tmp/nifi-toolkit-1.5.0.3.1.2.0-7/bin/encrypt-config.sh'] {'mode': 0755} 2019-04-12 02:03:48,786 - Execute[('/var/lib/ambari-agent/tmp/nifi-toolkit-1.5.0.3.1.2.0-7/bin/encrypt-config.sh', '-v', '-b', u'/usr/hdf/current/nifi/conf/bootstrap.conf', '-n', u'/usr/hdf/current/nifi/conf/nifi.properties', '-f', u'/var/lib/nifi/conf/flow.xml.gz', '-s', [PROTECTED], '-p', [PROTECTED])] {'environment': {'JAVA_OPTS': u'-Xms128m -Xmx256m', 'JAVA_HOME': u'/usr/java/latest/'}, 'logoutput': False, 'user': 'nifi'} 
Command failed after 1 tries