Created 07-21-2025 11:48 AM
We want to move from NiFi 1.28.1 -> NiFi 2.4. We have done most of the prerequisites like using the json flow file not xml but are confused with the deprecation of the the ./tls-toolkit.sh. How are NiFi 2.0+ clusters secured? We are using helm charts.
Created 07-22-2025 05:26 AM
@jfs912
NiFi 2.x is secured in the same way as NiFi 1.x was secured. The Apache NIFi community made a decision to move away from providing a toolkit for generating TLS certificates since it did not make sense to have its own tool to manage certificate creation when there is nothing special the toolkit does (NIFI-12200)
. You can create your own self signed certificates (simple web search will show many resources on how to do this), you can use a certificate service to create yoru certificates and sign them for you, you can setup your own certificate authority for signing your certificates, etc. It really made no sense for Apache NiFi to maintain this code.
The important parts to remember when creating your NiFi certificates are:
Keystore for NiFi:
Truststore for NiFi:
Please help our community grow. If you found any of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "Accept as Solution" on one or more of them that helped.
Thank you,
Matt
Created 11-11-2025 12:24 PM
Matt, thanks for the response, unfortunately our deployment is a little more complicated than that. Its using a custom cetic helm chart and deployed in k8s. Considering what you said would you suggest not using the ca from cetic and just run this in a statefulset?
Created 11-12-2025 07:11 AM
@jfs912 The NiFi toolkit was removed with the NiFi 2.0 releases. See below for more details on why that decision was made.
https://lists.apache.org/thread/vn1nzobtz4fh7fs461sgg8jj9zygrk0f
I am not well versed on cetic helm charts, so not going to be able to provide specific guidance there. The bottom line is there is nothing special about toolkit generated certficates. I see no reason why you coudl not use the ca from cetic as long as the certificates meet the NiFi requirements for EKUs, SANs, Wildcards..
A NiFi or NiFi-Registry keystore:
- Must contain ONLY one PrivateKeyEntry.
- PrivateKeyEntry DN must not use wildcards.
- PrivateKeyEntry Extended Key Usage (EKU) must support ClientAuth and ServerAuth
- PrivateKeyEntry must contain one or more SAN entries. A SAN must match the hostname used by NiFi
A NiFi or NiFi-Registry Keystore. (typically same truststore is used by both):
- Must contain the complete trust chain for at clientAuth Certificate used to connect with NIFi. This includes any intermediate and root CA in the trust chain.
Please help our community grow. If you found any of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "Accept as Solution" on one or more of them that helped.
Thank you,
Matt