Member since
07-30-2019
3406
Posts
1621
Kudos Received
1006
Solutions
My Accepted Solutions
| Title | Views | Posted |
|---|---|---|
| 36 | 12-17-2025 05:55 AM | |
| 97 | 12-15-2025 01:29 PM | |
| 59 | 12-15-2025 06:50 AM | |
| 200 | 12-05-2025 08:25 AM | |
| 342 | 12-03-2025 10:21 AM |
05-23-2017
11:59 AM
3 Kudos
@Bhushan Babar In order to access the UI of a secured NiFi instance/cluster two things must be successful: 1. A user must be successfully authenticated. By default NiFi will always look for a user's certificate being presented in the connection to use for authentication. If a user certificate is not present, the connection will be closed unless and alternative authentication strategy has been configured in your NiFi. NiFi can be configured to also use LDAP or Kerberos for user authentication. 2. A user must be authorized to access the NiFi resource they are requesting. Only after a user has been successfully authenticated, then the user will be looked up in the configured authorizer to see what NiFi resource that user has been granted access to. In you case, you have a user (cn=neha+ou=business,dc=example,dc=com) that authenticates successfully. I am going to assume this is via user certificate. The full DN from the user certificate is then being passed to the NiFi file based authorizer to determine what resources that authenticated user has been granted. The user added to the authorizer must match this DN exactly. When you changed the DN of the user in the authorizer, it no longer matched what was being presented in the user's certificate and authorized access was being denied. You can always tail the nifi-user.log to see exactly what value is being passed to the authorizer after successful authentication. There will be two entries in this log when a user connects. First you will see a line that says user X successfully authenticated. The next line will say access denied if user was not authorized for the resource. If you want to change the DN in NiFi's authorizer, you must also issue your user a new certificate with a matching DN. Thanks, Matt
... View more
05-23-2017
11:39 AM
3 Kudos
@regie canada Does each request in the file always start with ####################################################################### START of Request ####################################################################### and end with: ####################################################################### END of Request ####################################################################### If so, you could use the SplitContent processor to split your incoming FlowFile in multiple FlowFiles (each with a single request). Then you could parse each of those requests for the lines/values you want. The SplitContent processor would be configured as follows in this scenario: Do the 4 lines you want to extract the values from have a specific format? For example do they actually start with "Line" or is that property name always dynamic in nature? Thanks, Matt
... View more
05-17-2017
05:40 PM
2 Kudos
@Toky Raobelina The caused by line in the stack trace you provided points at a truststore issue most likely. Causedby: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target Try running the following command from the command line on the serevr running NiFi: <JAVA_HOME>/bin/java -Djavax.net.ssl.trustStore=/<path to NiFi truststore>/truststore SSLPoke hostname:663 If it fails, use keytool to get a verbose output of both the keystore being used on your LDAPS server and Truststore being used by your NiFi. keytool -v --list -keystore /<path>/<truststore or keystore> Is the issuer of the PrivateKeyEntry in the LDAPS keystore found in NiFi's truststore as a trustedCertEntry? Thanks, Matt
... View more
05-17-2017
05:19 PM
1 Kudo
@Huahua Wei
1. Yes, HDF is free (Official Hortonworks support for HDF is what you pay for) https://hortonworks.com/products/data-center/hdf/ 2. As of the most recent official release, HDF and HDP require their own separate Ambari servers. A release coming in the not so distant future will allow you to install one Ambari that can manage both HDP and HDF services. Thanks, Matt
... View more
05-17-2017
03:16 PM
@Muhammad Umar Did changing to absolute paths resolve your issue here? If so, please mark answer as accepted. Thank you, Matt
... View more
05-17-2017
02:12 PM
2 Kudos
@Simon Jespersen You need to trigger the PutHiveQL processor only once after ingesting all files?
If that is the case, the approach that comes to mind is as follows: Route the success relationship of your ingest processor twice. Route one as you would normally do for your existing dataflow and route the second "success" relationship to a ReplaceText processor. This does not introduce duplicate data or much additional IO. The file content is still only ingested once, but there are two FlowFile pointing at the same content. The "success" relationship that feeds into the ReplaceText processor will be your putHiveQL trigger flow. We are going to use the ReplaceText processor to remove the content of those FlowFiles (down that path only. What happens in the background is new FlowFiles are created at this point, but since they are all zero byte there is little IO involved). Then you can use a MergeContent processor to merge all those 0 byte FlowFiles in to 1 FlowFile. Finally route the "merged" relationship of the MergeContent processor to your PutHiveQl processor. So the Flow would look something like this: The ReplaceText would be configured as follows: and your MergeContent processor would be configured something like this: As always, NiFi provides many ways to accomplish a variety of different dataflow needs. This is just one suggestion. Thanks, Matt
... View more
05-17-2017
12:33 PM
2 Kudos
@Toky Raobelina I am really not sure what version of NiFi you are running. The Authentication strategy "LDAPS" is different then "START_TLS". LDAPS support in NiFi's login identifier is a fairly new addition. Consult your NiFi's imbedded admin guide documentation to verify that LDAPS is an option. If so you will want to first change your login-idnetity-providers.xml fiel configuration to use LDAPS instead of START_TLS. Next you will want to confirm your ldap servers URL. Typically ldaps urls start with ldaps:// instead of just ldap://. You also mentioned that you add the ldaps servers public key to NiFi's keystore. NiFI use 2-way TLS authentication. You should have added the ldaps servers public key as a trustedCertEntry in NIFi's truststore instead of the keystore. Also you want to make sure you have added NiFi's nodes public key as a trustedCertEntry on the ldaps server as well. If all you NIfi certs where signed by a CA, you just need to add the public key for your CA as a trustedCertEntry instead. Thank you, Matt
... View more
05-17-2017
12:22 PM
1 Kudo
@Muhammad Umar You have to remember that NiFi is being run by some user and that user is running all these processor components. NiFi's base directory is not going to be the same directory as where you point to the script. Try passing the absolute directory path to the script inside of NiFi instead of just "nifi-srcfiles/*" and "BackupFiles/". Thank you, Matt
... View more
05-16-2017
01:34 PM
@bhumi limbu That is a very useful ERROR log message. You appear to be running in to teh following reported issue: https://issues.apache.org/jira/browse/NIFI-3096 Thanks, Matt
... View more
05-16-2017
01:25 PM
@Gaurav Jain Was I able to successful answer your question? If so please mark the answer as accepted. Thank you, Matt
... View more