Member since
08-25-2017
15
Posts
4
Kudos Received
2
Solutions
My Accepted Solutions
Title | Views | Posted |
---|---|---|
5337 | 08-15-2018 06:58 PM | |
2595 | 01-11-2018 06:40 PM |
08-15-2018
09:20 PM
Andy\Amarnath, My question was initially why my expected outcome was not working and why this other format did work. Along the way, I believe my question was answered, assuming my understanding is correct. I did't want to dive to deep as I thought it may be outside the scope of my initial post. Since the conversation has gone that way tho, Andy is correct. I did not understand the difference between 1-way SSL and 2-way SSL. Using 1-way SSL (keystore only) all HTTPS connections are accepted regardless if the source is who we are expecting or not. Using 2-way SSL only HTTPS connections are accepted but now we must verify who the source is by authenticating with a private key & server certificate that can be authenticated by my truststore. My use case for this knowledge, is we are promoting projects between our Dev & Prod clusters. I wanted to ensure we had the correct security in place to proceed. The developers are wanting 1-way SSL but I lacked the knowledge at the time to make it work and only had 2-way. They were upset because this required more data to be sent via REST protocol using 2-way. Now that I understand each protocol, I will not allow to them proceed to Production with their architecture without 2-way SSL. Originally, I was simply ignorant of how to setup 1-way SSL, without understanding the security hole it would make. Thank you both for your time and effort in reviewing this concept.
... View more
04-11-2018
06:55 PM
@Zack Atkinson Make sure that every node in your NiFi Cluster can resolve the hostnames for every other node in your NiFi cluster. Make sure that all NiFi nodes can resolve and reach the configured zookeeper servers. Make sure the following properties are set and their are no typos (including leading or trailing whitespaces) in the nifi.properties file: nifi.zookeeper.connect.string <-- should be set to resolvable hostnames for zookeeper servers nifi.web.https.host or nifi.web.http.host <-- should be set to resolvable hostname for server nifi.cluster.is.node <-- should be set to resolvable hostname for server What is seen in the nifi-app.log around timeframe issue occurs? Is there a full stack trace with this error? Thanks, Matt
... View more
01-11-2018
06:40 PM
Hey Kevin, I have tried this syntax. It allows SOLR to load but it does not kick off the agent. I added my line to the JAVA_MEM variable in ambari and that seems to work. This issue is solved for me. Thank you for taking the time to comment. # Increase Java Min/Max Heap as needed to support your indexing / query needs
SOLR_JAVA_MEM="-Xms{{solr_min_mem}}m -Xmx{{solr_max_mem}}m \
-javaagent:/data/solr_jmx_exporter/jmx_prometheus_javaagent-0.10.jar=7500:/data/solr_jmx_exporter/solr_jmx_exporter.yml \ "
... View more
05-29-2018
10:31 AM
@Zack Atkinson. Did you find a solution to this? I'm in the same situation now as you have described (single cluster), and find the explicit round-trip through a RPG on root canvas very hard to manage, and not elegant. All for just load balancing FlowFiles after ListSFTP/Fetch.
... View more