Member since
07-30-2019
3434
Posts
1632
Kudos Received
1012
Solutions
My Accepted Solutions
| Title | Views | Posted |
|---|---|---|
| 126 | 01-27-2026 12:46 PM | |
| 551 | 01-13-2026 11:14 AM | |
| 1184 | 01-09-2026 06:58 AM | |
| 986 | 12-17-2025 05:55 AM | |
| 489 | 12-17-2025 05:34 AM |
01-10-2022
05:24 AM
@Elmer What you described here is the use case for the NiFi Parameters capability. Parameters allow you to set configurations values within NiFi components thaT are unique per environment. Parameters can be used in both non-sensitive and sensitive property ( password) fields. Then in each unique environment you set up a parameter context that uses the parameter name, but with the unique value for that specific environment. Then when you port over your flow definition or template, you can configure the NiFi process group in which contains your ported over flow to use the cluster specific parameter context. No need to go to each component and reconfigure them anymore. If you found this response assisted with your query, please take a moment to login and click on "Accept as Solution" below this post. Thank you, Matt [1]https://nifi.apache.org/docs/nifi-docs/html/user-guide.html#Parameters
... View more
01-03-2022
09:07 AM
We have started using 1.13 version. Any example or documentation using the OAuth2TokenProviderImpl controller service is much appreciated.
... View more
12-16-2021
10:12 PM
@MattWho -Thanks for your reply. We have changed below property Before “nifi.provenance.repository.compress.on.rollover=true” After “nifi.provenance.repository.compress.on.rollover=false” We have the enough space for provenance /dev/mapper/vg04-provenrepo 3.7T 27G 3.7T 1% /opt/nifi/provenance_repository
... View more
12-14-2021
12:03 PM
1 Kudo
@gvkarthik93 The HandleHTTPRequest processor only support user based authentication via a mutual TLS handshake. But there is no authorization built in to the processor. So if the truststore configured in the configured SSLContextService contains the needed trustedCertEntries to trust a user/client certificate presented in the handshake, that user would be allowed to send traffic to this listener. The processor could then route the success relationship via a connection to a routeOnAttribute processor that checks the dn set in the "http.subject.dn" FlowFile attribute created by the HandleHttpRequest processor to see if matches a list of DN. Based in that outcome decide to either route the FlowFile to a HandleHTTPResponse processor that responds with not authorized or route down an authorized path and respond accordingly. I want to check if the username and password is correct or not Check against what? NiFi has no local users with passwords for authentication, nor do any NiFi processors have any integration in to an external user authenticator like ldap. Even if you were to pass a username and password via a header on the request, there is no native processor that could take that username and password and verify it. Maybe you could use a scripting processor to validate the username and password against an external service like ldap. But between HandleHTTPRequest and that scripting processor, that user's name and password would be in plaintext within the FlowFiles attributes which is not ideal. Also keep in mind that if you do not use TLS at all, anything you send over the connection is not encrypted and in plain text. Hope this helps answer your query, Matt
... View more
12-14-2021
11:32 AM
@Saraali I'd love to help, but I have never done any scripting to convert to excel format. All I can tell you is there is no native processor available in NiFi that does this conversion. I'd recommend raising a new feature request jira in apache for NiFi: https://issues.apache.org/jira/projects/NIFI/issues/ Perhaps others in the community may be looking for the same capability who are willing to contribute code? Thanks, Matt
... View more
12-13-2021
02:27 PM
Many thanks @MattWho It seems that I started NIFI based on the old flow.xml.gz. I successfully granted all access for myself.
... View more
12-13-2021
01:02 PM
@armensano Just to make sure we are clear on your ask here. You have a secured NiFi and NiFi-Registry installation that uses user/client certificates to authenticate your user via the mutual TLS handshake? If that is the case, you should not be seeing a NiFi/NiFi-registry login window. Can you share screenshots? What do you see in the nifi-user.log when you attempt to access NiFi? Thanks, Matt
... View more
12-13-2021
10:57 AM
@Eristocrat @Eristocrat Logging varies by class. Some classes don't produce anything beyond INFO level, while others will produce even TRACE level logging. With TRACE level being the highest level, you will get all possible logging by using it. Do you have a screenshot of the exception you are seeing? At time of exception, did you find anything logged in the NiFi user and/or app logs? Thanks, Matt
... View more
12-13-2021
10:38 AM
@IAJ Has the reply helped resolve your issue? If so, please mark the appropriate reply as the solution, as it will make it easier for others to find the answer in the future. Thank you.
... View more
12-09-2021
07:00 PM
Thanks mate, I had completely forgotten about the need for the need for the '\\\\', that solved it.
... View more