Member since
09-18-2022
11
Posts
1
Kudos Received
1
Solution
My Accepted Solutions
Title | Views | Posted |
---|---|---|
2418 | 09-29-2022 08:48 PM |
09-29-2022
08:48 PM
Hello everyone, the problem was solved by replacing java Oracle openjdk-11.0.1.13 with java Liberica jdk11.0.16
... View more
09-23-2022
12:02 AM
Today there was such an error, I didn't change anything in the configuration.
... View more
09-22-2022
07:41 AM
JAVA node1 o.a.zookeeper.server.ZooKeeperServer Server environment:java.version=11.0.11 o.a.zookeeper.server.ZooKeeperServer Server environment:java.vendor=Red Hat, Inc. node2 o.a.zookeeper.server.ZooKeeperServer Server environment:java.version=11.0.1 o.a.zookeeper.server.ZooKeeperServer Server environment:java.vendor=Oracle Corporation
... View more
09-22-2022
06:35 AM
Now I tried to log in to the second node and got an error: 2022-09-22 15:02:41,439 WARN [Replicate Request Thread-2] o.a.n.c.c.h.r.ThreadPoolRequestReplicator Failed to replicate request GET /nifi-api/flow/current-user to node1:8080 due to javax.net.ssl.SSLPeerUnverifiedException: Hostname node1 not verified (no certificates) 2022-09-22 15:02:41,439 WARN [Replicate Request Thread-2] o.a.n.c.c.h.r.ThreadPoolRequestReplicator javax.net.ssl.SSLPeerUnverifiedException: Hostname node1 not verified (no certificates) at okhttp3.internal.connection.RealConnection.connectTls(RealConnection.kt:396) at okhttp3.internal.connection.RealConnection.establishProtocol(RealConnection.kt:337) at okhttp3.internal.connection.RealConnection.connect(RealConnection.kt:209) at okhttp3.internal.connection.ExchangeFinder.findConnection(ExchangeFinder.kt:226) at okhttp3.internal.connection.ExchangeFinder.findHealthyConnection(ExchangeFinder.kt:106) at okhttp3.internal.connection.ExchangeFinder.find(ExchangeFinder.kt:74) at okhttp3.internal.connection.RealCall.initExchange$okhttp(RealCall.kt:255) at okhttp3.internal.connection.ConnectInterceptor.intercept(ConnectInterceptor.kt:32) at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.kt:109) at okhttp3.internal.cache.CacheInterceptor.intercept(CacheInterceptor.kt:95) at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.kt:109) at okhttp3.internal.http.BridgeInterceptor.intercept(BridgeInterceptor.kt:83) at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.kt:109) at okhttp3.internal.http.RetryAndFollowUpInterceptor.intercept(RetryAndFollowUpInterceptor.kt:76) at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.kt:109) at okhttp3.internal.connection.RealCall.getResponseWithInterceptorChain$okhttp(RealCall.kt:201) at okhttp3.internal.connection.RealCall.execute(RealCall.kt:154) at org.apache.nifi.cluster.coordination.http.replication.okhttp.OkHttpReplicationClient.replicate(OkHttpReplicationClient.java:132) at org.apache.nifi.cluster.coordination.http.replication.okhttp.OkHttpReplicationClient.replicate(OkHttpReplicationClient.java:126) at org.apache.nifi.cluster.coordination.http.replication.ThreadPoolRequestReplicator.replicateRequest(ThreadPoolRequestReplicator.java:652) at org.apache.nifi.cluster.coordination.http.replication.ThreadPoolRequestReplicator$NodeHttpRequest.run(ThreadPoolRequestReplicator.java:844) at java.base/java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:515) at java.base/java.util.concurrent.FutureTask.run(FutureTask.java:264) at java.base/java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1128) at java.base/java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:628) at java.base/java.lang.Thread.run(Thread.java:834)
... View more
09-22-2022
06:23 AM
@MattWho TRUSTSTORE.JKS Keystore type: JKS Keystore provider: SUN Your keystore contains 3 entries Alias name: nifi-cert Entry type: trustedCertEntry Owner: CN=node1, OU=NIFI Issuer: CN=node1, OU=NIFI Signature algorithm name: SHA256withRSA Subject Public Key Algorithm: 2048-bit RSA key Version: 3 Extensions: #1: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [ key ] ] #2: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ clientAuth serverAuth ] #4: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Non_repudiation Key_Encipherment Data_Encipherment Key_Agreement Key_CertSign Crl_Sign ] #5: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ DNSName: node1 ] #6: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [key ] ] Alias name: node2 Creation date: Sep 22, 2022 Entry type: trustedCertEntry Owner: CN=node2, OU=NIFI Issuer: CN=node2, OU=NIFI Signature algorithm name: SHA256withRSA Subject Public Key Algorithm: 2048-bit RSA key Version: 3 Extensions: #1: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [key ] ] #2: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ clientAuth serverAuth ] #4: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Non_repudiation Key_Encipherment Data_Encipherment Key_Agreement Key_CertSign Crl_Sign ] #5: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ DNSName: node2 ] #6: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [key ] ] KEYSTORE.JKS (NODE1) Alias name: nifi-key Entry type: PrivateKeyEntry Certificate chain length: 2 Certificate[1]: Owner: CN=node1, OU=NIFI Issuer: CN=node1, OU=NIFI Signature algorithm name: SHA256withRSA Subject Public Key Algorithm: 2048-bit RSA key Version: 3 Extensions: #1: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [key ] ] #2: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] #3: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ clientAuth serverAuth ] #4: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Non_repudiation Key_Encipherment Data_Encipherment Key_Agreement ] #5: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ DNSName: node1 DNSName: node1 ] #6: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [key ] ] Certificate[2]: Owner: CN=node1, OU=NIFI Issuer: CN=snode1, OU=NIFI Signature algorithm name: SHA256withRSA Subject Public Key Algorithm: 2048-bit RSA key Version: 3 Extensions: #1: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [key ] ] #2: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ clientAuth serverAuth ] #4: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Non_repudiation Key_Encipherment Data_Encipherment Key_Agreement Key_CertSign Crl_Sign ] #5: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ DNSName: node1 ] #6: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [key ] ] KEYSTORE.JKS (NODE2) Alias name: nifi-key Entry type: PrivateKeyEntry Certificate chain length: 2 Certificate[1]: Owner: CN=node2, OU=NIFI Issuer: CN=node2, OU=NIFI Signature algorithm name: SHA256withRSA Subject Public Key Algorithm: 2048-bit RSA key Version: 3 Extensions: #1: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [key ] ] #2: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:false PathLen: undefined ] #3: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ clientAuth serverAuth ] #4: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Non_repudiation Key_Encipherment Data_Encipherment Key_Agreement ] #5: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ DNSName: node2 DNSName: node2 ] #6: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [key ] ] Certificate[2]: Owner: CN=node2, OU=NIFI Issuer: CN=snode2, OU=NIFI Signature algorithm name: SHA256withRSA Subject Public Key Algorithm: 2048-bit RSA key Version: 3 Extensions: #1: ObjectId: 2.5.29.35 Criticality=false AuthorityKeyIdentifier [ KeyIdentifier [key ] ] #2: ObjectId: 2.5.29.19 Criticality=false BasicConstraints:[ CA:true PathLen:2147483647 ] #3: ObjectId: 2.5.29.37 Criticality=false ExtendedKeyUsages [ clientAuth serverAuth ] #4: ObjectId: 2.5.29.15 Criticality=true KeyUsage [ DigitalSignature Non_repudiation Key_Encipherment Data_Encipherment Key_Agreement Key_CertSign Crl_Sign ] #5: ObjectId: 2.5.29.17 Criticality=false SubjectAlternativeName [ DNSName: node2 ] #6: ObjectId: 2.5.29.14 Criticality=false SubjectKeyIdentifier [ KeyIdentifier [key ] ] I created certificates with this commands: /nifi/nifi-toolkit-1.16.3/bin/tls-toolkit.sh standalone -c node1 -n node1 --days 3650 --keyStorePassword Passwd --trustStorePassword Passwd -o /nifi/CA/node1 --subjectAlternativeNames node1 /nifi/nifi-toolkit-1.16.3/bin/tls-toolkit.sh standalone -c node2 -n node2 --days 3650 --keyStorePassword Passwd --trustStorePassword Passwd -o /nifi/CA/node2 --subjectAlternativeNames node2 And created a single truststore.jks keytool -import -alias node2 -file /nifi/CA//nifi-cert.pem -keystore /nifi/CA/truststore.jks
... View more
09-22-2022
04:07 AM
At the moment, I have done the following: 1. Created the initial configuration on the first node. 2. Copied the configuration to the second node. 3. Launched both nodes. 4. Tried to log in on the first node. 5 . I got this screen. How can I insert configuration files and logs?
... View more
09-20-2022
10:18 PM
The first time I log in after restarting the nodes, I get a message: 2022-09-21 05:24:07,127 DEBUG [NiFi Web Server-236] o.a.n.w.s.NiFiAuthenticationFilter org.apache.nifi.web.security.InvalidAuthenticationException: Anonymous authentication has not been configured. In the future, when I try to log in from node1, I return to the authorization interface In the logs of node1, I see the following: == Proxy Entity Chain == Identity: username , IDP Groups: [] Identity: CN=node2.domain, OU=NIFI , IDP Groups: [] Identity: CN=node1.domain, OU=NIFI , IDP Groups: [] ============ 2022-09-21 06:05:29,191 INFO [NiFi Web Server-242] o.a.n.w.s.NiFiAuthenticationFilter Authentication success for username 2022-09-21 06:05:29,191 DEBUG [NiFi Web Server-242] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: username 2022-09-21 06:05:29,191 DEBUG [NiFi Web Server-242] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: username 2022-09-21 06:05:29,191 DEBUG [NiFi Web Server-242] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: username 2022-09-21 06:05:29,191 DEBUG [NiFi Web Server-242] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: username 2022-09-21 07:35:37,938 DEBUG [NiFi Web Server-295] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: null 2022-09-21 07:35:37,938 DEBUG [NiFi Web Server-295] o.a.n.w.s.x509.X509AuthenticationFilter Raw X-ProxiedEntitiesChain - <username> 2022-09-21 07:35:37,938 DEBUG [NiFi Web Server-295] o.a.n.w.s.x509.X509AuthenticationFilter Raw X-ProxiedEntityGroups - <> 2022-09-21 07:35:37,938 INFO [NiFi Web Server-295] o.a.n.w.s.NiFiAuthenticationFilter Attempting request for (<username><CN=node2.domain, OU=NIFI>) GET https://node1.domain:8080/nifi-api/flow/current-user (source ip: IP node2) 2022-09-21 07:35:37,938 TRACE [NiFi Web Server-295] o.a.n.w.s.x.X509AuthenticationProvider == Proxy Entity Chain == Identity: username , IDP Groups: [] Identity: CN=node2.domain, OU=NIFI , IDP Groups: [] ============ 2022-09-21 07:35:37,939 INFO [NiFi Web Server-295] o.a.n.w.s.NiFiAuthenticationFilter Authentication success for username 2022-09-21 07:35:37,939 DEBUG [NiFi Web Server-295] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: username 2022-09-21 07:35:37,939 DEBUG [NiFi Web Server-295] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: username 2022-09-21 07:35:37,939 DEBUG [NiFi Web Server-295] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: username 2022-09-21 07:35:37,939 DEBUG [NiFi Web Server-295] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: username 2022-09-21 07:35:37,954 DEBUG [NiFi Web Server-284] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: null 2022-09-21 07:35:37,954 DEBUG [NiFi Web Server-284] o.a.n.w.s.x509.X509AuthenticationFilter Raw X-ProxiedEntitiesChain - <username><CN=node2.domain, OU=NIFI> 2022-09-21 07:35:37,954 DEBUG [NiFi Web Server-284] o.a.n.w.s.x509.X509AuthenticationFilter Raw X-ProxiedEntityGroups - <> 2022-09-21 07:35:37,954 INFO [NiFi Web Server-284] o.a.n.w.s.NiFiAuthenticationFilter Attempting request for (<username><CN=node2.domain, OU=NIFI><CN=node1.domain, OU=NIFI>) GET https://node1.domain:8080/nifi-api/flow/current-user (source ip: IP node1) 2022-09-21 07:35:37,954 TRACE [NiFi Web Server-284] o.a.n.w.s.x.X509AuthenticationProvider When I try to log in from node 2, I first get an error on the browser screen: javax.net.ssl.SSLPeerUnverifiedException: Hostname node1.domain not verified (no certificates) In the logs of node2: 2022-09-21 06:15:58,864 WARN [Replicate Request Thread-1] o.a.n.c.c.h.r.ThreadPoolRequestReplicator Failed to replicate request GET /nifi-api/flow/current-user to node1.domain:8080 due to javax.net.ssl.SSLPeerUnverifiedException: Hostname node1.domain not verified (no certificates) 2022-09-21 06:15:58,864 WARN [Replicate Request Thread-1] o.a.n.c.c.h.r.ThreadPoolRequestReplicator javax.net.ssl.SSLPeerUnverifiedException: Hostname node1.domain not verified (no certificates) on subsequent authorization attempts from node 2, I return to the authorization interface and: in the logs of node1, I see the following: 2022-09-21 08:06:41,481 DEBUG [NiFi Web Server-310] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: null 2022-09-21 08:06:41,481 DEBUG [NiFi Web Server-310] o.a.n.w.s.x509.X509AuthenticationFilter Raw X-ProxiedEntitiesChain - <username> 2022-09-21 08:06:41,481 DEBUG [NiFi Web Server-310] o.a.n.w.s.x509.X509AuthenticationFilter Raw X-ProxiedEntityGroups - <> 2022-09-21 08:06:41,481 INFO [NiFi Web Server-310] o.a.n.w.s.NiFiAuthenticationFilter Attempting request for (<username><CN=node2.domain, OU=NIFI>) GET https://node1.domain:8080/nifi-api/flow/current-user (source ip: IP node2) 2022-09-21 08:06:41,481 TRACE [NiFi Web Server-310] o.a.n.w.s.x.X509AuthenticationProvider == Proxy Entity Chain == Identity: username , IDP Groups: [] Identity: CN=node2.domain, OU=NIFI , IDP Groups: [] ============ 2022-09-21 08:06:41,481 INFO [NiFi Web Server-310] o.a.n.w.s.NiFiAuthenticationFilter Authentication success for username 2022-09-21 08:06:41,481 DEBUG [NiFi Web Server-310] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: username 2022-09-21 08:06:41,481 DEBUG [NiFi Web Server-310] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: username 2022-09-21 08:06:41,481 DEBUG [NiFi Web Server-310] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: username 2022-09-21 08:06:41,481 DEBUG [NiFi Web Server-310] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: username 2022-09-21 08:06:41,487 DEBUG [NiFi Web Server-311] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: null 2022-09-21 08:06:41,487 DEBUG [NiFi Web Server-311] o.a.n.w.s.x509.X509AuthenticationFilter Raw X-ProxiedEntitiesChain - <username><CN=node2.domain, OU=NIFI> 2022-09-21 08:06:41,487 DEBUG [NiFi Web Server-311] o.a.n.w.s.x509.X509AuthenticationFilter Raw X-ProxiedEntityGroups - <> 2022-09-21 08:06:41,488 INFO [NiFi Web Server-311] o.a.n.w.s.NiFiAuthenticationFilter Attempting request for (<username><CN=node2.domain, OU=NIFI><CN=node1.domain, OU=NIFI>) GET https://node1.domain:8080/nifi-api/flow/current-user (source ip: IP node1) 2022-09-21 08:06:41,488 TRACE [NiFi Web Server-311] o.a.n.w.s.x.X509AuthenticationProvider == Proxy Entity Chain == Identity: username , IDP Groups: [] Identity: CN=node2.domain, OU=NIFI , IDP Groups: [] Identity: CN=node1.domain, OU=NIFI , IDP Groups: [] ============ 2022-09-21 08:06:41,488 INFO [NiFi Web Server-311] o.a.n.w.s.NiFiAuthenticationFilter Authentication success for username 2022-09-21 08:06:41,488 DEBUG [NiFi Web Server-311] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: username 2022-09-21 08:06:41,488 DEBUG [NiFi Web Server-311] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: username 2022-09-21 08:06:41,488 DEBUG [NiFi Web Server-311] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: username 2022-09-21 08:06:41,488 DEBUG [NiFi Web Server-311] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: username in the logs of node2, I see the following: 2022-09-21 08:06:40,026 TRACE [NiFi Web Server-183] o.a.nifi.web.security.jwt.JwtService Generating JWT for LoginAuthenticationToken for username issued by LdapProvider expiring at 21-09-2022 20:06:40.025 [1663780000025 ms, 43199999 ms remaining] 2022-09-21 08:06:40,090 DEBUG [NiFi Web Server-212] o.a.n.w.s.x509.X509CertificateExtractor No client certificate found in request. 2022-09-21 08:06:41,473 DEBUG [NiFi Web Server-235] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: null 2022-09-21 08:06:41,473 DEBUG [NiFi Web Server-235] o.a.n.w.s.x509.X509CertificateExtractor No client certificate found in request. 2022-09-21 08:06:41,473 DEBUG [NiFi Web Server-235] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: null 2022-09-21 08:06:41,473 INFO [NiFi Web Server-235] o.a.n.w.s.NiFiAuthenticationFilter Attempting request for (<JWT token>) GET https://node2.domain:8080/nifi-api/flow/current-user (source ip: IP user computer) 2022-09-21 08:06:41,475 INFO [NiFi Web Server-235] o.a.n.w.s.NiFiAuthenticationFilter Authentication success for username 2022-09-21 08:06:41,475 DEBUG [NiFi Web Server-235] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: username 2022-09-21 08:06:41,475 DEBUG [NiFi Web Server-235] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: username 2022-09-21 08:06:41,475 DEBUG [NiFi Web Server-235] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: username 2022-09-21 08:06:41,489 DEBUG [NiFi Web Server-214] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: null 2022-09-21 08:06:41,489 DEBUG [NiFi Web Server-214] o.a.n.w.s.x509.X509CertificateExtractor No client certificate found in request. 2022-09-21 08:06:41,489 DEBUG [NiFi Web Server-214] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: null 2022-09-21 08:06:41,489 DEBUG [NiFi Web Server-214] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: null 2022-09-21 08:06:41,489 DEBUG [NiFi Web Server-214] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: null 2022-09-21 08:06:41,489 DEBUG [NiFi Web Server-214] o.a.n.w.s.NiFiAuthenticationFilter Checking secure context token: null 2022-09-21 08:06:41,489 INFO [NiFi Web Server-214] o.a.n.w.s.NiFiAuthenticationFilter Attempting request for (<anonymous>) GET https://node2.domain:8080/nifi-api/flow/current-user (source ip: IP node1) 2022-09-21 08:06:41,490 WARN [NiFi Web Server-214] o.a.n.w.s.NiFiAuthenticationFilter Rejecting access to web api: Anonymous authentication has not been configured. 2022-09-21 08:06:41,490 DEBUG [NiFi Web Server-214] o.a.n.w.s.NiFiAuthenticationFilter org.apache.nifi.web.security.InvalidAuthenticationException: Anonymous authentication has not been configured. at org.apache.nifi.web.security.anonymous.NiFiAnonymousAuthenticationProvider.authenticate(NiFiAnonymousAuthenticationProvider.java:46) at org.springframework.security.authentication.ProviderManager.authenticate(ProviderManager.java:174) at org.apache.nifi.web.security.NiFiAuthenticationFilter.authenticate(NiFiAuthenticationFilter.java:79) at org.apache.nifi.web.security.NiFiAuthenticationFilter.doFilter(NiFiAuthenticationFilter.java:59) at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:331) at org.apache.nifi.web.security.NiFiAuthenticationFilter.authenticate(NiFiAuthenticationFilter.java:100) at org.apache.nifi.web.security.NiFiAuthenticationFilter.doFilter(NiFiAuthenticationFilter.java:59) at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:331) at org.apache.nifi.web.security.NiFiAuthenticationFilter.authenticate(NiFiAuthenticationFilter.java:100) at org.apache.nifi.web.security.NiFiAuthenticationFilter.doFilter(NiFiAuthenticationFilter.java:59) at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:331) at org.apache.nifi.web.security.NiFiAuthenticationFilter.authenticate(NiFiAuthenticationFilter.java:100) at org.apache.nifi.web.security.NiFiAuthenticationFilter.doFilter(NiFiAuthenticationFilter.java:59) at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:331) at org.apache.nifi.web.security.NiFiAuthenticationFilter.authenticate(NiFiAuthenticationFilter.java:100) at org.apache.nifi.web.security.NiFiAuthenticationFilter.doFilter(NiFiAuthenticationFilter.java:59) at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:331) at org.springframework.web.filter.CorsFilter.doFilterInternal(CorsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:107) at org.springframework.security.web.FilterChainProxy$VirtualFilterChain.doFilter(FilterChainProxy.java:331) at org.springframework.security.web.FilterChainProxy.doFilterInternal(FilterChainProxy.java:214) at org.springframework.security.web.FilterChainProxy.doFilter(FilterChainProxy.java:177) at org.springframework.web.filter.DelegatingFilterProxy.invokeDelegate(DelegatingFilterProxy.java:347) at org.springframework.web.filter.DelegatingFilterProxy.doFilter(DelegatingFilterProxy.java:263) at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193) at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1601) at org.apache.nifi.web.filter.TimerFilter.doFilter(TimerFilter.java:51) at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193) at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1601) at org.apache.nifi.web.filter.ExceptionFilter.doFilter(ExceptionFilter.java:46) at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:201) at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1601) at org.eclipse.jetty.servlets.DoSFilter.doFilterChain(DoSFilter.java:487) at org.eclipse.jetty.servlets.DoSFilter.doFilter(DoSFilter.java:336) at org.eclipse.jetty.servlets.DoSFilter.doFilter(DoSFilter.java:301) at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193) at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1601) at org.apache.nifi.web.security.headers.StrictTransportSecurityFilter.doFilter(StrictTransportSecurityFilter.java:48) at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193) at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1601) at org.apache.nifi.web.security.headers.XContentTypeOptionsFilter.doFilter(XContentTypeOptionsFilter.java:48) at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193) at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1601) at org.apache.nifi.web.security.headers.XSSProtectionFilter.doFilter(XSSProtectionFilter.java:48) at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193) at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1601) at org.apache.nifi.web.security.headers.ContentSecurityPolicyFilter.doFilter(ContentSecurityPolicyFilter.java:47) at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193) at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1601) at org.apache.nifi.web.security.headers.XFrameOptionsFilter.doFilter(XFrameOptionsFilter.java:48) at org.eclipse.jetty.servlet.FilterHolder.doFilter(FilterHolder.java:193) at org.eclipse.jetty.servlet.ServletHandler$Chain.doFilter(ServletHandler.java:1601) at org.eclipse.jetty.servlet.ServletHandler.doHandle(ServletHandler.java:548) at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:143) at org.eclipse.jetty.security.SecurityHandler.handle(SecurityHandler.java:602) at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:127) at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:235) at org.eclipse.jetty.server.session.SessionHandler.doHandle(SessionHandler.java:1624) at org.eclipse.jetty.server.handler.ScopedHandler.nextHandle(ScopedHandler.java:233) at org.eclipse.jetty.server.handler.ContextHandler.doHandle(ContextHandler.java:1435) at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:188) at org.eclipse.jetty.servlet.ServletHandler.doScope(ServletHandler.java:501) at org.eclipse.jetty.server.session.SessionHandler.doScope(SessionHandler.java:1594) at org.eclipse.jetty.server.handler.ScopedHandler.nextScope(ScopedHandler.java:186) at org.eclipse.jetty.server.handler.ContextHandler.doScope(ContextHandler.java:1350) at org.eclipse.jetty.server.handler.ScopedHandler.handle(ScopedHandler.java:141) at org.eclipse.jetty.server.handler.HandlerCollection.handle(HandlerCollection.java:146) at org.eclipse.jetty.server.handler.gzip.GzipHandler.handle(GzipHandler.java:763) at org.eclipse.jetty.server.handler.ContextHandlerCollection.handle(ContextHandlerCollection.java:191) at org.eclipse.jetty.server.handler.HandlerList.handle(HandlerList.java:59) at org.eclipse.jetty.server.handler.HandlerWrapper.handle(HandlerWrapper.java:127) at org.eclipse.jetty.server.Server.handle(Server.java:516) at org.eclipse.jetty.server.HttpChannel.lambda$handle$1(HttpChannel.java:388) at org.eclipse.jetty.server.HttpChannel.dispatch(HttpChannel.java:633) at org.eclipse.jetty.server.HttpChannel.handle(HttpChannel.java:380) at org.eclipse.jetty.server.HttpConnection.onFillable(HttpConnection.java:279) at org.eclipse.jetty.io.AbstractConnection$ReadCallback.succeeded(AbstractConnection.java:311) at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:105) at org.eclipse.jetty.io.ssl.SslConnection$DecryptedEndPoint.onFillable(SslConnection.java:540) at org.eclipse.jetty.io.ssl.SslConnection.onFillable(SslConnection.java:395) at org.eclipse.jetty.io.ssl.SslConnection$2.succeeded(SslConnection.java:161) at org.eclipse.jetty.io.FillInterest.fillable(FillInterest.java:105) at org.eclipse.jetty.io.ChannelEndPoint$1.run(ChannelEndPoint.java:104) at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.runTask(EatWhatYouKill.java:336) at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.doProduce(EatWhatYouKill.java:313) at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.tryProduce(EatWhatYouKill.java:171) at org.eclipse.jetty.util.thread.strategy.EatWhatYouKill.run(EatWhatYouKill.java:129) at org.eclipse.jetty.util.thread.ReservedThreadExecutor$ReservedThread.run(ReservedThreadExecutor.java:383) at org.eclipse.jetty.util.thread.QueuedThreadPool.runJob(QueuedThreadPool.java:882) at org.eclipse.jetty.util.thread.QueuedThreadPool$Runner.run(QueuedThreadPool.java:1036) at java.base/java.lang.Thread.run(Thread.java:834) 2022-09-21 08:06:41,808 DEBUG [NiFi Web Server-45] o.a.n.w.s.x509.X509CertificateExtractor No client certificate found in request. Please tell me how it is configured authorization of nodes for user proxy requests?
... View more
09-19-2022
07:32 AM
Hi, Matt, thanks for your reply. I don't have a network load balancer in front of my nifi. I get an error even when starting both nodes with the initial configuration
... View more