Member since
07-29-2019
640
Posts
113
Kudos Received
48
Solutions
My Accepted Solutions
Title | Views | Posted |
---|---|---|
7326 | 12-01-2022 05:40 PM | |
1987 | 11-24-2022 08:44 AM | |
2868 | 11-12-2022 12:38 PM | |
969 | 10-10-2022 06:58 AM | |
1405 | 09-11-2022 05:43 PM |
07-06-2022
06:23 AM
Thank you all for your replays, The fix was so simple: All I need to do to specify from which database schema I want to work with or have the lookup service connected to I just added the schema name before the table name like this : sandbox_s01.table_name
... View more
06-21-2022
10:55 AM
Hi @Techie123
Hopefully after reading the link that @SAMSAL shared earlier, you've reached the understanding that no, you don't have to install the database on the same server as the server that NiFi is installed on, but of course the server hosting the database must be accessible to the NiFi server via the JDBC protocol, regardless of where it is located. There are any number of things that could be causing the error message that you are getting.
Given what you have shared in this thread, I would recommend that you begin by talking to your DBA or perhaps the person that installed the database on the server. The string that you have entered on the properties tab, as shown in your page shot:
jdbc:oracle:thin@hostname:portnumber:sname
…needs to be replaced with the values appropriate for the server where your actual database is installed. To be a bit more specific, you have to get the actual literal values for hostname, portnumber and sname necessary to access your database and enter all of them correctly. In my personal experience, you'd also be much better off if you can verify that the database server is accessible via JDBC using some other tool so you have a way to validate the connection string before you get involved with NiFi-specific details.
... View more
06-17-2022
05:34 AM
Thanks Guys.
... View more
06-15-2022
11:39 AM
2 Kudos
@Techie123 When you say "Cooperates Linux Machine", are you referring to http://www.colinux.org/ installation? If so, this does not sound like an ideal place to try and run a NiFi instance or NiFi cluster as it appears to isolate that linux to a single core on the host hardware. NiFi can be a resource intensive application, especially when setup as a cluster. When NiFi is started, you can tail the nifi-app.log to observe the complete startup process. NiFi has completed its startup once you see the following lines: 2022-06-15 13:52:52,727 INFO org.apache.nifi.web.server.JettyServer: NiFi has started. The UI is available at the following URLs:
2022-06-15 13:52:52,727 INFO org.apache.nifi.web.server.JettyServer: https://nifi-node1:8443/nifi
2022-06-15 13:52:52,730 INFO org.apache.nifi.BootstrapListener: Successfully initiated communication with Bootstrap At this time the NiFi URL should be reachable. If not, I would be making sure a firewall or some issue with your "Cooperates Linux Machine" setup is not blocking access to the port on which the NiFi is bound. The latter error you shared: o.a.nifi.controller.StandardFlowService Failed to connect to cluster due to: org.apache.nifi.cluster.protocol.ProtocolException: Failed marshalling 'CONNECTION_REQUEST' protocol message due to: javax.net.ssl.SSLHandshakeException: PKIX path validation failed: java.security.cert.CertPathValidatorException: Path does not chain with any of the trust anchors implies that your NiFi cluster has been setup to start secured over HTTPS. Secured NiFi nodes must have a configured keystore and truststore. The above error is telling you that node's truststore does not contain the TrustedCertEntry(s) needed to trust the client certificate presented by another node (in this case the elected cluster coordinator node). The NiFi configured keystore must meet these requirements: 1. Contain only ONE PrivateKeyEntry. (this private key is typically unique per node) 2. That Private key must support both ClientAuth and ServerAuth EKUs 3. That PrivateKey must contain a SAN entry for the NiFI host on which it is being used. That SAN must mach the hostname of the host. The NiFi configured truststore must contain the complete trust chain for the nodes private keys. You can use the keytool command to inspect the contents of either the keystore or truststore and verify above requirements are satisfied, keytool -v -list -keystore <keystore or truststore> A certificate (private "PrivateKeyEntry" or public "TrustedCertEntry") will have an owner an issuer. The issuer is the authority for that key. A self-signed certificate will have the same owner and issuer. The truststore needs to have a TrustedCertEntry for each public certificate in the trusts chain. For example: Assume you have a PrivateKey in your keystore with: owner: cn=nifi-node1, ou=nifi
Issuer: cn=intermediate-ca, ou=trust Your Truststore would then need to have a TrustedCertEntry for the public key for: owner: cn=intermediate-ca, ou=trust
issuer: cn=root-ca, ou=trust and: owner: cn=root-ca, ou=trust
issuer: cn=root-ca, ou=trust You know you have the complete trust chain once you reach the public cert where owner and issuer have the same value. If you found this response assisted with your query, please take a moment to login and click on "Accept as Solution" below this post. Thank you, Matt
... View more
05-29-2022
10:18 AM
the problem persists in all versions of the virtual box.
... View more
05-20-2022
04:55 PM
Hi @Zinway
Assuming that you have a valid Cloudera subscription, you should be able to log into your My Cloudera account and navigate to the support portal in order to get in contact with Support and initiate a request for that specific .tar.gz file.
... View more
05-20-2022
04:45 PM
1 Kudo
@Vijay11
I cannot offer you any assurances that Cloudera maintains a repository for Ambari 2.7.6. I say that because, while Cloudera continues to support customers using Ambari in accordance with its associated products' support lifecycle, Cloudera announced it was ending its involvement in the Ambari open source community in 2021. The part of that announcement that is relevant to your questions is this paragraph:
Please note that Cloudera does not support direct installation of Apache Ambari 2.7.6. Although 2.7.6 contains numerous patches provided by Cloudera (some of which were delivered separately as hotfix releases to customers); the 2.7.6 release is not itself a Cloudera release.
You should carefully read the whole thing.
As far as how you can get paid access to access the private repositories and the costs for a Cloudera subscription, the only way to obtain answers to those questions is to get in touch with the Cloudera sales team. Once you make contact with someone there, be sure to tell them that you're looking to gain access to a repository, if any, for Ambari 2.7.6.. Note that as of this writing, Cloudera recommends upgrading to the latest version of CDP Private Cloud Base as soon as possible, as it has a richer set of features, is up-to-date and remains under standard Cloudera support through August 2024.
... View more
05-20-2022
08:55 AM
Hi @DzBoris
May I ask why you are attempting to download CDH 5.11.1? And does your organization have a valid Cloudera subscription?
Cloudera Enterprise 5.11 became generally available in June of 2017. As you no doubt are aware, that was quite a while ago, especially in terms of "internet time". Cloudera Enterprise 5.11 reached it's end of support date in April 2020 (open that link and then expand the section labeled "Cloudera Enterprise products" underneath Current End of Support (EoS) Dates).
The current Enterprise Data Platform offered by Cloudera is Cloudera Data Platform (CDP), which in it's on-premises "form factor" is offered as CDP Private Cloud. CDP supersedes CDH as it is fairly up to date on all the included components, which is not the case with CDH 5.11.
As a general matter, the credentials to access the private repository where Cloudera is now distributing previous versions of CDH are not generally the same ones to access Cloudera's website or the Cloudera community. Employees of organizations with a valid Cloudera subscription can upgrade their versions of Cloudera Manager to a newer version that uses the modified URLs which can contain these credentials. You can get started reading about how to do this in the Cloudera Enterprise 5.x Release Notes here: Version, Packaging, and Download Information.
The use of credentials which are not tied to a valid Cloudera subscription is the most common cause of the HTTP 403 Forbidden error message you are encountering.
... View more
05-17-2022
02:43 PM
@joshtheflame
I just wanted to provide a bit more context. The partial page shot you've included above appears to show Cloudera Manager running against a CDH 6.1.0 cluster. CDH 6.1.0 was released in December of 2018. As you no doubt are aware, that was quite a while ago, especially in terms of "internet time". Hopefully you are aware that CDH 6.1.x has reached its End of Support (EoS). You can find the most recent official reminder of the previous announcement that Cloudera Enterprise 6.x reached End of Support (EoS) in 2021 here:
March 2021 Customer Advisory - 2: End of Support for Cloudera Products (CDH/CM 6.x & HDP 3.x).
Cloudera's lifecycle support policies are documented here:
https://www.cloudera.com/legal/policies/support-lifecycle-policy.html
My understanding is that organizations with a valid Cloudera subscription for legacy products such as CDH would have been sent this announcement directly.
If that screenshot represents what your bank is running in production, I would recommend that you reach out to your Cloudera Account team and discuss your upgrade options as soon as possible. You are going to have to upgrade in order to take advantage of any of the offerings mentioned in @steven-matison 's reply earlier.
... View more
05-16-2022
12:30 PM
@Eric_B CFM 2.1.4 has been released. https://docs.cloudera.com/cfm/2.1.4/release-notes/topics/cfm-whats-new.html Thanks, Matt
... View more