Member since
07-30-2019
3396
Posts
1619
Kudos Received
1001
Solutions
My Accepted Solutions
| Title | Views | Posted |
|---|---|---|
| 419 | 11-05-2025 11:01 AM | |
| 317 | 11-05-2025 08:01 AM | |
| 452 | 11-04-2025 10:16 AM | |
| 672 | 10-20-2025 06:29 AM | |
| 812 | 10-10-2025 08:03 AM |
12-02-2025
07:51 AM
@Rohit1997jio I would discourage you from continuing to any automation using Apache NiFi 1.x "templates". NiFi templates were deprecated in the now end of life Apache NiFi 1.x major release version. They were officially removed in the Apache NiFi 2.x major release. versions. Uploaded NiFi templates consume valuable NiFi heap memory. The replacement is NiFi Flow Definitions. Apache NiFi started moving away from XML based configuration files in around Apache NiFi 1.16. While all NiFi 1.x retained the flow.xml.gz until its final release version, the flow.json.gz was introduced in 1.16 and is what is loaded on NiFi startup. The only difference is the deprecated flow templates allowed you to create a template that consists of just individual low level components, while flow definitions can be created at only the "Process Group" level. Flow Definitions can be created by downloaded the flow definition directly from a process group. Deploying Flow Definitions is also easier. Simply drag the add new "Process group" icon to canvas and click on the "Browse" icon in the Process Group Name field box. You will be prompted to provide the downloaded flow definition json file. This upload can also be done via a rest-api call. The Apache NiFi 1.x major release REST API covers the api calls to do everything that you can accomplish via directly in the NiFI UI. But you can also use your browser build in "Developer Tools" capture these rest-api calls as you perform the actions directly in the NiFi UI. The Developer tools even give you an option to "Copy as curl" making it even easier to learn (browser will add many unnecessary headers you can opt to remove. If you remove a header that is needed, the curl command will fail): NOTE: Apache NiFi 1.x is end of life and no longer being contributed to. This means no more bug and CVE issues being addressed in the the 1,x release line. The Apache NiFi 2.x major release is the new supported major release (where templates no longer exist). Please help our community grow. If you found any of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "Accept as Solution" on one or more of them that helped. Thank you, Matt
... View more
12-02-2025
07:20 AM
@zzzz77 When you executed your curl commands, did you check both the nifi-app.log and nifi-user.log for any ERROR or WARN log output that would provide more detail on the exception. The Apache NIFi 2.x Provenance rest-api endpoint request should look more like this: curl 'https://<HOSTNAME>:<PORT>/nifi-api/provenance' \
-H 'accept: application/json, text/plain, */*' \
-H 'content-type: application/json' \
-H 'Authorization:Bearer <TOKEN>' \
--data-raw '{"provenance":{"request":{"incrementalResults":false,"maxResults":1000,"summarize":true}}}' \
--insecure Please help our community grow. If you found any of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "Accept as Solution" on one or more of them that helped. Thank you, Matt
... View more
12-02-2025
06:55 AM
@hckorkmaz01 While you are currently still using Apache NiFi 1.x major release version, it has reached end of life and is no longer receiving contributions. As such components will not get library updates or security fixes going forward. Apache NiFi 2.x is currently active major release being contributed to in the community. The PrometheusReportingTask was deprecated in Apache NiFi 1.x and officially removed in Apache NiFi 2.x major release. So I would avoid using it as you will eventually need to move to Apache NiFi 2.x to maintain a secure supported product release. But technically, this reporting task, while not well maintained in the community, is capable of creating a prometheus endpoint which exposes metrics for all components (includes connections) for consumption. That being said, Cloudera has taken steps to create Cloudera versions of many of the deprecated and removed components in Apache NiFi 2.x; as well as, introduced many components not available at all in any Apache release version (PrometheusReportingTask is not one of them that was retained). https://docs.cloudera.com/cfm/4.11.0/nifi-components-cfm/components/ NOTE: You are already using a considerably older Apache NiFI 1.18 release. Many bug fixes and CVEs security issues have been addressed since that release. If you cannot yet move to Apache NiFi 2.x, you should at least be on the most recent release of Apache NIFi 1.28. Please help our community grow. If you found any of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "Accept as Solution" on one or more of them that helped. Thank you, Matt
... View more
12-02-2025
06:35 AM
@zzzz77 To ask a community question: 1. Go to https://community.cloudera.com/ 2. Make sure you are logged in 3. Click on the "Ask a Question" button: 4. Fill out all form: Note: Adding "labels" make your question more visible to those community members that specialize in specific products. Hope this helps, Matt
... View more
11-21-2025
05:28 AM
1 Kudo
@hckorkmaz01 There are a few options here: SiteToSiteStatusReportingTask - Utilizes NiFi's Site-To-Site protocol to send Records to a NiFi Remote Input Port. It can be configured to send specific component type metrics (Connection) in your case. The Site-To-Site reporting tasks function as task specific remote process groups for generating and sending FlowFiles to the configured target Remote Input port. InvokeHTTP processor - Can be used to invoke the rest-api endpoint to get the metrics you want directly in a NiFi dataflow. Site-To-Site reference documentation: Admin guide: Site-To-Site Properties (core setup) User guide: Site-To-Site (user guide) Please help our community grow. If you found any of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "Accept as Solution" on one or more of them that helped. Thank you, Matt
... View more
11-17-2025
06:48 AM
@Soli Unfortunately, there is not enough shared to say what is taking so long during your startup. Above log snippet shows ~.001 millisecond between each log line. At 34,000 connections, that would be only 34 seconds. Assuming About the same for other components, I don't think the synchronizing of components is what is taking the bulk of the 10-15 minutes of startup time. In the nifi-app.log, what time is reported application start: INFO [main] org.apache.nifi.runtime.Application Started Application in <xxxxx> seconds What does each node report here? Are all nodes taking roughly same time to start or is there any specific node taking longer then the other two? Is performance good once NiFi is up and running? Are all ~21,000 components in the running state? Any WARN or ERROR logging during startup? How many FlowFiles are queued per node? After NiFi is started, maybe collect a verbose NiFi diagnostics output for review. ./bin/nifi.sh diagnostics --verbose diag.txt You may also collect thread dumps every minute during startup to see what thread during is taking so long. Hopefully some of this will help you see what is slowing your startup. There have been some improvements to startup time in Apache NiFi 2.x release. There were a few improvements to startup in Nifi 1.x releases, but those were made prior to 1.22. Please help our community grow. If you found any of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "Accept as Solution" on one or more of them that helped. Thank you, Matt
... View more
11-13-2025
06:08 AM
@ThierryOfNantes The "install" option for nifi.sh was removed as of NiFi 2.x release because of the nuisances of the many different linux distributions that exist today. I am not implying that is your issue here, but wanted you to be aware that I could be a contributing factor to your issue. Since you can successfully start NiFi manually using the ./bin/nifi.sh start command, NiFi is working fine. So the permission issue is outside of NiFi. What user are you logged in as when you issue the command systemctl start nifi? Is that user able to sudo to your run.as user? Perhaps try enabling debug on your journalctl log to see ifget more detail on where the permission denied is coming from. Hope this helps, Matt
... View more
11-12-2025
07:11 AM
@jfs912 The NiFi toolkit was removed with the NiFi 2.0 releases. See below for more details on why that decision was made. https://lists.apache.org/thread/vn1nzobtz4fh7fs461sgg8jj9zygrk0f I am not well versed on cetic helm charts, so not going to be able to provide specific guidance there. The bottom line is there is nothing special about toolkit generated certficates. I see no reason why you coudl not use the ca from cetic as long as the certificates meet the NiFi requirements for EKUs, SANs, Wildcards.. A NiFi or NiFi-Registry keystore: - Must contain ONLY one PrivateKeyEntry. - PrivateKeyEntry DN must not use wildcards. - PrivateKeyEntry Extended Key Usage (EKU) must support ClientAuth and ServerAuth - PrivateKeyEntry must contain one or more SAN entries. A SAN must match the hostname used by NiFi A NiFi or NiFi-Registry Keystore. (typically same truststore is used by both): - Must contain the complete trust chain for at clientAuth Certificate used to connect with NIFi. This includes any intermediate and root CA in the trust chain. Please help our community grow. If you found any of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "Accept as Solution" on one or more of them that helped. Thank you, Matt
... View more
11-12-2025
05:31 AM
@casaui Your new issue is completely unrelated to your NiFi to NiFi-Registry MutualTLS authentication based issue in this community question. I kindly ask that your start a new community question so that future users reading this question don't get confuse by multiple unrelated issues being discussed. If you found my assistance on this query helped you, please take a moment to click on "Accept as Solution" on the thread that helped guide you to resolution. Thank you, Matt
... View more
11-06-2025
09:19 AM
@phadkev Have you considered using the ValidateRecord processor instead of the ValidateJson? The ValidateRecord processor can be configured with a JSON reader. The Json readers can be configured to use "Schema Text". The Schema text property support expression language allowing you to extract the Schema you want to use from an inbound FlowFile attribute. Please help our community grow. If you found any of the suggestions/solutions provided helped you with solving your issue or answering your question, please take a moment to login and click "Accept as Solution" on one or more of them that helped. Thank you, Matt
... View more