Member since
07-30-2019
3406
Posts
1623
Kudos Received
1008
Solutions
My Accepted Solutions
| Title | Views | Posted |
|---|---|---|
| 322 | 12-17-2025 05:55 AM | |
| 383 | 12-15-2025 01:29 PM | |
| 366 | 12-15-2025 06:50 AM | |
| 358 | 12-05-2025 08:25 AM | |
| 599 | 12-03-2025 10:21 AM |
12-10-2019
10:21 AM
I followed the suggestions #1 in this answer and it worked. If that doesn't work, to be sure that the files are identical on the servers, do md5sum of the files.
... View more
12-10-2019
07:28 AM
Hi Matt, thanks - works fine for me!
... View more
12-09-2019
12:58 PM
@Aaki_08 You may want to try executing following commands: 1. On the Ambari server host: ambari-server stop 2. On all hosts ambari-agent stop 3. On Ambari server host: ambari-server uninstall-mpack --mpack-name=hdf-ambari-mpack --verbose Hope this helps you, Matt
... View more
12-06-2019
03:01 AM
Thank u Matt. Its working.
... View more
12-05-2019
04:49 PM
@emanueol as of this writing, I believe that XML attachments aren't allowed, but you can cut and paste the XML source code into the body of a post using the Insert/edit code sample feature of the editor.
... View more
12-05-2019
12:49 AM
yes, this helped, thank you
... View more
12-04-2019
07:13 AM
@Cl0ck I see nothing you listed as having been removed as an issue. NiFi will create all of the following on startup if they do not exist: - All 4 repository directrories (content, flowfile, database, and provenance) and their contents provided the NiFi service user has permsissions to configured directory to do so. - flow.xml.gz - local state directory and its contents - users.xml (if needed based on authorizers.xml configuration) - authorizations.xml (if needed based on authorizers.xml configuration) I would start by digging in to your shutdown exception: java.lang.IllegalStateException: no valid keystore You'll want to get a verbose listing of your keystore and make sure the following exists: 1. Keystore contains only one PrivateKeyEntry 2. That PrivateKeyEntry has ExtendedKeyUsage (EKU) that supports both clientAuth and ServerAuth 3. That PrivateKeyEntry has one or more SubjectAlternativeName (SAN) entries. One of those SAN entries must match the hostname of the server on which this keystore is being used. 4. The password on the key inside the keystore must use the same password as the keystore itself. A verbose output of your truststore should show that it contains 1 or more TrustedCertEntry Also make sure that your NiFi service users owns and can navigate to the directory where the keystore and truststore files have been placed. Hope this helps, Matt
... View more
12-04-2019
06:23 AM
@pxm You'll want to use the SplitRecord processor to accomplish what you are looking to do. Configure it with a RecordReader and RecordWriter for you input data and desired output data formats along with the desired 1000 records per split. Hope this helps, Matt
... View more
12-02-2019
11:19 AM
Thanks Matt, With new certs, like you mentioned, we were able to make it work.
... View more