Member since
07-30-2019
3470
Posts
1642
Kudos Received
1018
Solutions
My Accepted Solutions
| Title | Views | Posted |
|---|---|---|
| 270 | 05-06-2026 09:16 AM | |
| 451 | 05-04-2026 05:20 AM | |
| 331 | 05-01-2026 10:15 AM | |
| 513 | 03-23-2026 05:44 AM | |
| 388 | 02-18-2026 09:59 AM |
08-23-2023
05:47 AM
@pashtet04 There is a significant jump in version from NiFi 1.11.4 to 1.23.0 As with any upgrade/migration, you should NOT be just copying core configuration files from old version to new version. You should instead use the old configuration files to update the new configuration files as those new configuration files would have introduced new properties that would then be missing if you simply copied old to new. NiFi 1.11.4 loaded a flow.xml.gz file on startup. With release of NiFi 1.16, NiFi introduced a new flow storage format using flow.json.gz (which also introduced a new property in the nifi.properties file: "nifi.flow.configuration.json.file"). 1.16 and later version will still load from the flow.xml.gz file if a flow.json.gz is not present and then generate the flow.json.gz file which will be used for all subsequent launches starting with 1.18+ version. I am guessing your exception about flow configuration file [NULL] comes from missing configuration property in the nifi.properties you copied over. This may have also resulted in a failure to convert the flow.xml.gz??? I'd recommend re-copying over your original flow.xml.gz, utilize old config files to populate new config files to avoid missing properties, start NiFi 1.23 first time using original sensitive props key and sensitive props algorithm so that the flow.json.gz gets generated. Then use the nifi.sh commands to change the sensitive props key and sensitive key algorithm. If you don't know your original sensitive props key, you could use the Encrypt-config toolkit to change it as an alternative to the nifi.sh commands. If you found that the provided solution(s) assisted you with your query, please take a moment to login and click Accept as Solution below each response that helped. Thank you, Matt
... View more
08-22-2023
05:55 AM
@mslnrd TLS/SSL is nothing specific to NiFi or LDAP. There are certain requirements in the TLS exchange specification. This applies to any application that would use TLS. Based on your exception: [Root exception is javax.naming.CommunicationException: my.network.com:636 [Root exception is javax.net.ssl.SSLHandshakeException: No subject alternative DNS name matching my.network.com found.]] The issue happens during the TLS exchange. NiFi's ldap-user-group-provider within the authorizers.xml file is attempting to execute during NiFi startup in order to sync users and groups from your target LDAPS server. At a very high basic level here, you have configured NiFi to connect to your LDAPS host "my.network.com". NiFi is acting as the client in the TLS exchange and the LDAPS as the server side. Your LDAPS is returning a serverAuth certificate that is missing a Subject Alternative Name (SAN) entry matching the hostname (my.network.com) the client is trying to connect with. Within the TLS spec, the client is then rejecting this connection as insecure since it can not verify the authenticity of the server that is responding. It assumes a man in the middle type issue where client is trying to establish a secure connection with server "my.network.com"; however, certificate returned does not indicate it belongs to that server via its list of SAN entries. So the issue here is with the certificate being used by your LDAPS server missing the expected SAN entry. NiFi does not provide an option to force allow an insecure connection. Bottom line is the NiFi Keystore needs to meet following requirements: 1. The Keystore can contain only one PriavteKeyEntry 2. The PrivateKeyEntry must have both clientAuth and ServerAuth Extended Key Usage (EKUs) 3. The PrivateKeyEnrty must have a SAN entry that matches the hostname of the server on which NiFi is installled. The NiFi Truststore needs to meet the following: 1. The truststore can contain one too many TrustedCert entries. 2. The complete trust chain for any server certificates NiFi will need to establish a TLS connection with will need to be present in the truststore. When a certificate is created it has an owner and a signer/issuer. The signer of the certificate might be self-signed (meaning owner DN and signer/issuer DN are the same), it might be an intermediate CA (Owner DN is different the signer/issuer DN), and a Root CA (also has matching owner DN and signer/issuer DN). A complete trust chain means all trusted certificates (public certs) from client certificate to root CA need to be present in the truststore. This could encompass the server public cert, one or more intermediate CA public certs, and the CA root public cert. Often, but not always you can get all the public certificates using openssl. openssl s_client -connect <target server hostname>:<port> -showcerts Above would initiate a TLS handshake with target server and will return within the response the public certs from the target server. It may or may not have complete trustchain. You can then load these public certificates into your truststore. In your case however, it does not look like a trust chain issue at this point. As i mentioned above, your current issue is that your serverAuth certificate used by your target LDAP is missing the TLS spec required SAN entry. If you found that the provided solution(s) assisted you with your query, please take a moment to login and click Accept as Solution below each response that helped. Thank you, Matt
... View more
08-22-2023
05:24 AM
@sahil0915 What you are proposing would require you to ingest into NiFi all ~100 million records from DC2, hash that record, write all ~100 million hashes to a map cache like Redis or HBase (which you would also need to install somewhere) using DistributedMapCache processor, then ingest all 100 million records from DC1, hash those records and finally compare the hash of those 100 million record with the hashes you added to the Distributed map cache using DetectDuplicate. Any records routed to non-duplicate would represent what is not in DC2. Then you would have to flush your Distributed Map Cache and repeat process except this time writing the hashes from DC3 to the Distributed Map Cache. I suspect this is going to perform poorly. You would have NiFi ingesting ~300 million records just to create hash for a one time comparison. If you found that the provided solution(s) assisted you with your query, please take a moment to login and click Accept as Solution below each response that helped. Thank you, Matt
... View more
08-22-2023
05:22 AM
@Yasine Adding Cloudera Flow Management (CFM) to an existing CDP installation requires adding both the CFM Parcel and Cloudera Service Descriptors (CSDs). Step one is verify CFM compatibility with your CDP deployment. https://docs.cloudera.com/cfm/2.1.5/release-notes/topics/cfm-system-requirements.html CFM 2.1.5 is supported on CDP Private Cloud Base versions CDP 7.1.7 (plus all Service packs) and CDP 7.1.8 only. I see you mentioned you are deploying on CDP 7.1.5, so you should upgrade to CDP 7.1.7 or newer first. Then follow the steps for preparing your CDP Private Cloud Base environment: https://docs.cloudera.com/cfm/2.1.5/deployment/topics/cfm-prepare-cdpdc.html Installing the CFM Parcel: https://docs.cloudera.com/cfm/2.1.5/deployment/topics/cfm-add-parcel-url.html Installing the CFM CSDs: https://docs.cloudera.com/cfm/2.1.5/deployment/topics/cfm-get-csd.html CFM Download locations for Parcel and CSDs (there are two CSD jar files that need to be added before the NiFi and NIFi-Registry services will show in the list of available services within your CDP Private Cloud Base. If you found that the provided solution(s) assisted you with your query, please take a moment to login and click Accept as Solution below each response that helped. Thank you, Matt
... View more
08-18-2023
05:29 AM
@sahil0915 I don't know that this is a good use case for NiFi. NiFi at the most basic level is designed to automate the movement of data between systems. In between the ingest of data and egress of data, NiFi provides a variety of components for route, enhancing, modify, etc that data. So trying to use NiFi to compare the data existing in multiple data centers is not a good fit. If you found that the provided solution(s) assisted you with your query, please take a moment to login and click Accept as Solution below each response that helped. Thank you, Matt
... View more
08-18-2023
05:16 AM
3 Kudos
@sinRudra As a workaround you could take the "nifi-standard-nar-1.16.3.nar" from the NiFi 1.16.3 distro and add it to your NiFi 1.21 install. This will give you access to both version of all the standard nar components. The nifi-standard-nar does however contain a lot of components besides just listFTP. You'll end up seeing two available versions of a lot of components with either 1.21.0 or 1.16.3 as the version when adding components to the canvas. If you found that the provided solution(s) assisted you with your query, please take a moment to login and click Accept as Solution below each response that helped. Thank you, Matt
... View more
08-17-2023
12:00 PM
1 Kudo
@leqlaz777 What version of NiFi are you using? How large is your response body? I have no issues creating FlowFile Attributes with values larger then 256 bytes. Can you share your processors being used and the configuration of them? Thank you, Matt
... View more
08-17-2023
10:19 AM
@abdullahvvs What exceptions are you seeing in the nifi-app.log when this processor gets scheduled to execute? Does your NiFi service user have ability to execute python3? Does your NiFi service user have ability to travers the directory tree and read /opt/nifi/nifi-current/Testxx.py? If you found that the provided solution(s) assisted you with your query, please take a moment to login and click Accept as Solution below each response that helped. Thank you, Matt
... View more
08-17-2023
10:14 AM
1 Kudo
@sinRudra I recommend reading through the comments, suggestions, and troubleshooting done within the following Apache NiFi Jira to see if you are encountering similar observations. https://issues.apache.org/jira/browse/NIFI-10143 If so, it may be best to create a new Apache JIra for your specific character set issues to see what the committer community can do for you. If you found that the provided solution(s) assisted you with your query, please take a moment to login and click Accept as Solution below each response that helped. Thank you, Matt
... View more
08-17-2023
09:37 AM
1 Kudo
@edim2525 Just to add to what @cotopaul already shared: Out-of-the-box NiFi install sets users up with a single user authorizer and single user login provider. These provider are not designed for production use, but where designed to allow for an easy out-of-the-box secure install of NiFi. This default provider allows for only a single user with full unmanaged access to NiFi. See links provided by @cotopaul for more info there. Reconfiguring your out-of-the-box NiFi configuration to instead use a managed authorizer would then give you the ability to create various levels of authorization for different authenticated users. The managed authorizer used a file-access-policy-provider and file-user-group-provider to create and seed the users.xml and authorizations.xml files upon first startup. After these files exist, those two providers will not modify them via any config changes you make within the providers. The initial user identity and initial admin defined in those providers will seed those files with the required authorization policies for that authenticated user to perform admin type actions (such as authorizing additional authenticated users against various NiFi policies. NiFi does NOT have the ability to managed local users, this means that user authentication must be handled via an external method. The most commonly used method for user authentication are Mutual TLS using clientAuth certificate, ldap-provider (allowing user authentication via. uses ldap username and password), and kerberos based authentication (via Spnego or Kerberos-provider login provider). Once your NiFi is setup to support multi-user authentication and authorization, your "initial admin" will have ability to define additional user authorizations including those authorization your initial admin was pre-configured with. If you found that the provided solution(s) assisted you with your query, please take a moment to login and click Accept as Solution below each response that helped. Thank you, Matt
... View more