Member since
03-30-2022
10
Posts
0
Kudos Received
0
Solutions
11-06-2022
07:21 PM
Have been getting the below exception "ReplaceText[id=3fa43c98-5a5a-1c87-8e34-911a06de02aa] Processing failed: org.apache.nifi.processor.exception.ProcessException: IOException thrown from ReplaceText[id=3fa43c98-5a5a-1c87-8e34-911a06de02aa]: java.io.FileNotFoundException: /opt/nifi-1.17.0/content_repository/466/1666653401958-112082 (No space left on device) - Caused by: java.io.FileNotFoundException: /opt/nifi-1.17.0/content_repository/466/1666653401958-112082 (No space left on device)"
It seems like the disk is full which is not allowing the processors to update or modify the data. I notice that the logs directory on all the cluster have taken all the space.
Each node has 64G of storage space and log directory has taken almost 55G of space.
I recently notice my disk is getting full very quickly. I remove the logs and the repository and restart nifi and that seems to work but then again after a few hours it got filled up. I finally notice that the logs directly is taking all the space. How to prevent nifi-app logs from filling my drive.
... View more
Labels:
- Labels:
-
Apache NiFi
09-15-2022
03:42 PM
I have been getting erros when I try to access the UI. I have create my certificated and import in the chrome browser. Unknown user with identity 'CN=Sefahnifi, OU=SEFAHDEMO'. Contact the system administrator. <authorizers> <userGroupProvider> <identifier>file-user-group-provider</identifier> <class>org.apache.nifi.authorization.FileUserGroupProvider</class> <property name="Users File">./conf/users.xml</property> <property name="Legacy Authorized Users File"></property> <property name="Initial User Identity 1">CN=Sefahnifi,OU=SEFAHDEMO</property> </userGroupProvider> <accessPolicyProvider> <identifier>file-access-policy-provider</identifier> <class>org.apache.nifi.authorization.FileAccessPolicyProvider</class> <property name="User Group Provider">file-user-group-provider</property> <property name="Authorizations File">./conf/authorizations.xml</property> <property name="Initial Admin Identity">CN=Sefahnifi,OU=SEFAHDEMO</property> <property name="Legacy Authorized Users File"></property> <property name="Node Identity 1"></property> <property name="Node Group"></property> </accessPolicyProvider> <authorizer> <identifier>managed-authorizer</identifier> <class>org.apache.nifi.authorization.StandardManagedAuthorizer</class> <property name="Access Policy Provider">file-access-policy-provider</property> </authorizer> </authorizers>
... View more
Labels:
- Labels:
-
Apache NiFi
09-15-2022
01:42 PM
Currently getting error when the managed authorizer setting. I have everything set as per the document. It is not working for a cluster so I decided to do it in a single node. Any help. <?xml version="1.0" encoding="UTF-8" standalone="yes"?> <!-- Licensed to the Apache Software Foundation (ASF) under one or more contributor license agreements. See the NOTICE file distributed with this work for additional information regarding copyright ownership. The ASF licenses this file to You under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. --> <!-- This file lists the userGroupProviders, accessPolicyProviders, and authorizers to use when running securely. In order to use a specific authorizer it must be configured here and it's identifier must be specified in the nifi.properties file. If the authorizer is a managedAuthorizer, it may need to be configured with an accessPolicyProvider and an userGroupProvider. This file allows for configuration of them, but they must be configured in order: ... all userGroupProviders all accessPolicyProviders all Authorizers ... --> <authorizers> <!-- The FileUserGroupProvider will provide support for managing users and groups which is backed by a file on the local file system. - Users File - The file where the FileUserGroupProvider will store users and groups. - Legacy Authorized Users File - The full path to an existing authorized-users.xml that will be automatically be used to load the users and groups into the Users File. - Initial User Identity [unique key] - The identity of a users and systems to seed the Users File. The name of each property must be unique, for example: "Initial User Identity A", "Initial User Identity B", "Initial User Identity C" or "Initial User Identity 1", "Initial User Identity 2", "Initial User Identity 3" NOTE: Any identity mapping rules specified in nifi.properties will also be applied to the user identities, so the values should be the unmapped identities (i.e. full DN from a certificate). --> <userGroupProvider> <identifier>file-user-group-provider</identifier> <class>org.apache.nifi.authorization.FileUserGroupProvider</class> <property name="Users File">./conf/users.xml</property> <property name="Legacy Authorized Users File"></property> <property name="Initial User Identity 1">CN=Sefahnifi,OU=SEFAHDEMO</property> </userGroupProvider> <!-- The LdapUserGroupProvider will retrieve users and groups from an LDAP server. The users and groups are not configurable. 'Authentication Strategy' - How the connection to the LDAP server is authenticated. Possible values are ANONYMOUS, SIMPLE, LDAPS, or START_TLS. 'Manager DN' - The DN of the manager that is used to bind to the LDAP server to search for users. 'Manager Password' - The password of the manager that is used to bind to the LDAP server to search for users. 'TLS - Keystore' - Path to the Keystore that is used when connecting to LDAP using LDAPS or START_TLS. 'TLS - Keystore Password' - Password for the Keystore that is used when connecting to LDAP using LDAPS or START_TLS. 'TLS - Keystore Type' - Type of the Keystore that is used when connecting to LDAP using LDAPS or START_TLS such as PKCS12. 'TLS - Truststore' - Path to the Truststore that is used when connecting to LDAP using LDAPS or START_TLS. 'TLS - Truststore Password' - Password for the Truststore that is used when connecting to LDAP using LDAPS or START_TLS. 'TLS - Truststore Type' - Type of the Truststore that is used when connecting to LDAP using LDAPS or START_TLS such as PKCS12. 'TLS - Client Auth' - Client authentication policy when connecting to LDAP using LDAPS or START_TLS. Possible values are REQUIRED, WANT, NONE. 'TLS - Protocol' - Protocol to use when connecting to LDAP using LDAPS or START_TLS. (i.e. TLS, TLSv1.1, TLSv1.2, etc). 'TLS - Shutdown Gracefully' - Specifies whether the TLS should be shut down gracefully before the target context is closed. Defaults to false. 'Referral Strategy' - Strategy for handling referrals. Possible values are FOLLOW, IGNORE, THROW. 'Connect Timeout' - Duration of connect timeout. (i.e. 10 secs). 'Read Timeout' - Duration of read timeout. (i.e. 10 secs). 'Url' - Space-separated list of URLs of the LDAP servers (i.e. ldap://<hostname>:<port>). 'Page Size' - Sets the page size when retrieving users and groups. If not specified, no paging is performed. 'Sync Interval' - Duration of time between syncing users and groups (i.e. 30 mins). Minimum allowable value is 10 secs. 'Group Membership - Enforce Case Sensitivity' - Sets whether group membership decisions are case sensitive. When a user or group is inferred (by not specifying or user or group search base or user identity attribute or group name attribute) case sensitivity is enforced since the value to use for the user identity or group name would be ambiguous. Defaults to false. 'User Search Base' - Base DN for searching for users (i.e. ou=users,o=nifi). Required to search users. 'User Object Class' - Object class for identifying users (i.e. person). Required if searching users. 'User Search Scope' - Search scope for searching users (ONE_LEVEL, OBJECT, or SUBTREE). Required if searching users. 'User Search Filter' - Filter for searching for users against the 'User Search Base' (i.e. (memberof=cn=team1,ou=groups,o=nifi) ). Optional. 'User Identity Attribute' - Attribute to use to extract user identity (i.e. cn). Optional. If not set, the entire DN is used. 'User Group Name Attribute' - Attribute to use to define group membership (i.e. memberof). Optional. If not set group membership will not be calculated through the users. Will rely on group membership being defined through 'Group Member Attribute' if set. The value of this property is the name of the attribute in the user ldap entry that associates them with a group. The value of that user attribute could be a dn or group name for instance. What value is expected is configured in the 'User Group Name Attribute - Referenced Group Attribute'. 'User Group Name Attribute - Referenced Group Attribute' - If blank, the value of the attribute defined in 'User Group Name Attribute' is expected to be the full dn of the group. If not blank, this property will define the attribute of the group ldap entry that the value of the attribute defined in 'User Group Name Attribute' is referencing (i.e. name). Use of this property requires that 'Group Search Base' is also configured. 'Group Search Base' - Base DN for searching for groups (i.e. ou=groups,o=nifi). Required to search groups. 'Group Object Class' - Object class for identifying groups (i.e. groupOfNames). Required if searching groups. 'Group Search Scope' - Search scope for searching groups (ONE_LEVEL, OBJECT, or SUBTREE). Required if searching groups. 'Group Search Filter' - Filter for searching for groups against the 'Group Search Base'. Optional. 'Group Name Attribute' - Attribute to use to extract group name (i.e. cn). Optional. If not set, the entire DN is used. 'Group Member Attribute' - Attribute to use to define group membership (i.e. member). Optional. If not set group membership will not be calculated through the groups. Will rely on group membership being defined through 'User Group Name Attribute' if set. The value of this property is the name of the attribute in the group ldap entry that associates them with a user. The value of that group attribute could be a dn or memberUid for instance. What value is expected is configured in the 'Group Member Attribute - Referenced User Attribute'. (i.e. member: cn=User 1,ou=users,o=nifi vs. memberUid: user1) 'Group Member Attribute - Referenced User Attribute' - If blank, the value of the attribute defined in 'Group Member Attribute' is expected to be the full dn of the user. If not blank, this property will define the attribute of the user ldap entry that the value of the attribute defined in 'Group Member Attribute' is referencing (i.e. uid). Use of this property requires that 'User Search Base' is also configured. (i.e. member: cn=User 1,ou=users,o=nifi vs. memberUid: user1) NOTE: Any identity mapping rules specified in nifi.properties will also be applied to the user identities. Group names are not mapped. --> <!-- To enable the ldap-user-group-provider remove 2 lines. This is 1 of 2. <userGroupProvider> <identifier>ldap-user-group-provider</identifier> <class>org.apache.nifi.ldap.tenants.LdapUserGroupProvider</class> <property name="Authentication Strategy">START_TLS</property> <property name="Manager DN"></property> <property name="Manager Password"></property> <property name="TLS - Keystore"></property> <property name="TLS - Keystore Password"></property> <property name="TLS - Keystore Type"></property> <property name="TLS - Truststore"></property> <property name="TLS - Truststore Password"></property> <property name="TLS - Truststore Type"></property> <property name="TLS - Client Auth"></property> <property name="TLS - Protocol"></property> <property name="TLS - Shutdown Gracefully"></property> <property name="Referral Strategy">FOLLOW</property> <property name="Connect Timeout">10 secs</property> <property name="Read Timeout">10 secs</property> <property name="Url"></property> <property name="Page Size"></property> <property name="Sync Interval">30 mins</property> <property name="Group Membership - Enforce Case Sensitivity">false</property> <property name="User Search Base"></property> <property name="User Object Class">person</property> <property name="User Search Scope">ONE_LEVEL</property> <property name="User Search Filter"></property> <property name="User Identity Attribute"></property> <property name="User Group Name Attribute"></property> <property name="User Group Name Attribute - Referenced Group Attribute"></property> <property name="Group Search Base"></property> <property name="Group Object Class">group</property> <property name="Group Search Scope">ONE_LEVEL</property> <property name="Group Search Filter"></property> <property name="Group Name Attribute"></property> <property name="Group Member Attribute"></property> <property name="Group Member Attribute - Referenced User Attribute"></property> </userGroupProvider> To enable the ldap-user-group-provider remove 2 lines. This is 2 of 2. --> <!-- The ShellUserGroupProvider provides support for retrieving users and groups by way of shell commands on systems that support `sh`. Implementations available for Linux and Mac OS, and are selected by the provider based on the system property `os.name`. 'Refresh Delay' - duration to wait between subsequent refreshes. Default is '5 mins'. 'Exclude Groups' - regular expression used to exclude groups. Default is '', which means no groups are excluded. 'Exclude Users' - regular expression used to exclude users. Default is '', which means no users are excluded. 'Legacy Identifier Mode' - preserves the legacy behavior for id generation. Disabling this will ensure that user and group ids are differentiated to handle the case where a user and group have the same identity. Default is 'true', which means users and groups are not differentiated. 'Command Timeout' - amount of time to wait while executing a command before timing out --> <!-- To enable the shell-user-group-provider remove 2 lines. This is 1 of 2. <userGroupProvider> <identifier>shell-user-group-provider</identifier> <class>org.apache.nifi.authorization.ShellUserGroupProvider</class> <property name="Refresh Delay">5 mins</property> <property name="Exclude Groups"></property> <property name="Exclude Users"></property> <property name="Legacy Identifier Mode">true</property> <property name="Command Timeout">60 seconds</property> </userGroupProvider> To enable the shell-user-group-provider remove 2 lines. This is 2 of 2. --> <!-- The AzureGraphUserGroupProvider fetches users and groups from Azure Active Directory (AAD) using the Microsoft Graph API. 'Refresh Delay' - (Optional) Duration of delay between each user and group refresh. Default is `5 mins`. 'Authority Endpoint' - The endpoint of the Azure AD login. This can be found in the Azure portal under Azure Active Directory -> App registrations -> [application name] -> Endpoints. 'Directory ID' - Tenant ID or Directory ID. This can be found in the Azural portal under Azure Active Directory -> App registrations -> [application name] -> Directory (tenant) ID. 'Application ID' - Client ID or Application ID of the Azure app registration. This can be found in the Azure portal under Azure Active Directory -> App registrations -> [application name] -> Overview -> Application (client) ID. 'Client Secret' - A client secret from the Azure app registration. Secrets can be created in the Azure portal under Azure Active Directory -> App registrations -> [application name] -> Certificates & secrets -> Client secrets -> [+] New client secret. 'Group Filter Prefix' - (Optional) Prefix filter for Azure AD groups. Matches against the group displayName to retrieve only groups with names starting with the provided prefix. 'Group Filter Suffix' - (Optional) Suffix filter for Azure AD groups. Matches against the group displayName to retrieve only groups with names ending with the provided suffix. 'Group Filter Substring' - (Optional) Substring filter for Azure AD groups. Matches against the group displayName to retrieve only groups with names containing the provided substring. 'Group Filter List Inclusion' - (Optional) Comma-separated list of Azure AD groups. If no string-based matching filter (i.e., prefix, suffix, and substring) is specified, set this property to avoid fetching all groups and users in the Azure AD tenant. 'Page Size' - (Optional) Page size to use with the Microsoft Graph API. Set to 0 to disable paging API calls. Default: 50, Max: 999. 'Claim for Username' - (Optional) The property of the user directory object mapped to the NiFi user name field. Default is 'upn'. 'email' is another option when nifi.security.user.oidc.fallback.claims.identifying.user is set to 'upn'. --> <!-- To enable the azure-graph-user-group-provider remove 2 lines. This is 1 of 2. <userGroupProvider> <identifier>azure-graph-user-group-provider</identifier> <class>org.apache.nifi.authorization.azure.AzureGraphUserGroupProvider</class> <property name="Refresh Delay">5 mins</property> <property name="Authority Endpoint">https://login.microsoftonline.com</property> <property name="Directory ID">XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXX</property> <property name="Application ID">XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXX</property> <property name="Client Secret">XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX</property> <property name="Group Filter Prefix"></property> <property name="Group Filter Suffix"></property> <property name="Group Filter Substring"></property> <property name="Group Filter List Inclusion"></property> <property name="Page Size"></property> <property name="Claim for Username">upn</property> </userGroupProvider> To enable the azure-graph-user-group-provider remove 2 lines. This is 2 of 2. --> <!-- The CompositeUserGroupProvider will provide support for retrieving users and groups from multiple sources. - User Group Provider [unique key] - The identifier of user group providers to load from. The name of each property must be unique, for example: "User Group Provider A", "User Group Provider B", "User Group Provider C" or "User Group Provider 1", "User Group Provider 2", "User Group Provider 3" NOTE: Any identity mapping rules specified in nifi.properties are not applied in this implementation. This behavior would need to be applied by the base implementation. --> <!-- To enable the composite-user-group-provider remove 2 lines. This is 1 of 2. <userGroupProvider> <identifier>composite-user-group-provider</identifier> <class>org.apache.nifi.authorization.CompositeUserGroupProvider</class> <property name="User Group Provider 1"></property> </userGroupProvider> To enable the composite-user-group-provider remove 2 lines. This is 2 of 2. --> <!-- The CompositeConfigurableUserGroupProvider will provide support for retrieving users and groups from multiple sources. Additionally, a single configurable user group provider is required. Users from the configurable user group provider are configurable, however users loaded from one of the User Group Provider [unique key] will not be. - Configurable User Group Provider - A configurable user group provider. - User Group Provider [unique key] - The identifier of user group providers to load from. The name of each property must be unique, for example: "User Group Provider A", "User Group Provider B", "User Group Provider C" or "User Group Provider 1", "User Group Provider 2", "User Group Provider 3" NOTE: Any identity mapping rules specified in nifi.properties are not applied in this implementation. This behavior would need to be applied by the base implementation. --> <!-- To enable the composite-configurable-user-group-provider remove 2 lines. This is 1 of 2. <userGroupProvider> <identifier>composite-configurable-user-group-provider</identifier> <class>org.apache.nifi.authorization.CompositeConfigurableUserGroupProvider</class> <property name="Configurable User Group Provider">file-user-group-provider</property> <property name="User Group Provider 1"></property> </userGroupProvider> To enable the composite-configurable-user-group-provider remove 2 lines. This is 2 of 2. --> <!-- The FileAccessPolicyProvider will provide support for managing access policies which is backed by a file on the local file system. - User Group Provider - The identifier for an User Group Provider defined above that will be used to access users and groups for use in the managed access policies. - Authorizations File - The file where the FileAccessPolicyProvider will store policies. - Initial Admin Identity - The identity of an initial admin user that will be granted access to the UI and given the ability to create additional users, groups, and policies. The value of this property could be a DN when using certificates or LDAP, or a Kerberos principal. This property will only be used when there are no other policies defined. If this property is specified then a Legacy Authorized Users File can not be specified. NOTE: Any identity mapping rules specified in nifi.properties will also be applied to the initial admin identity, so the value should be the unmapped identity. This identity must be found in the configured User Group Provider. - Legacy Authorized Users File - The full path to an existing authorized-users.xml that will be automatically converted to the new authorizations model. If this property is specified then an Initial Admin Identity can not be specified, and this property will only be used when there are no other users, groups, and policies defined. NOTE: Any users in the legacy users file must be found in the configured User Group Provider. - Node Identity [unique key] - The identity of a NiFi cluster node. When clustered, a property for each node should be defined, so that every node knows about every other node. If not clustered these properties can be ignored. The name of each property must be unique, for example for a three node cluster: "Node Identity A", "Node Identity B", "Node Identity C" or "Node Identity 1", "Node Identity 2", "Node Identity 3" NOTE: Any identity mapping rules specified in nifi.properties will also be applied to the node identities, so the values should be the unmapped identities (i.e. full DN from a certificate). This identity must be found in the configured User Group Provider. - Node Group - The name of a group containing NiFi cluster nodes. The typical use for this is when nodes are dynamically added/removed from the cluster. NOTE: The group must exist before starting NiFi. --> <accessPolicyProvider> <identifier>file-access-policy-provider</identifier> <class>org.apache.nifi.authorization.FileAccessPolicyProvider</class> <property name="User Group Provider">file-user-group-provider</property> <property name="Authorizations File">./conf/authorizations.xml</property> <property name="Initial Admin Identity">CN=Sefahnifi,OU=SEFAHDEMO</property> <property name="Legacy Authorized Users File"></property> <property name="Node Identity 1"></property> <property name="Node Group"></property> </accessPolicyProvider> <!-- The StandardManagedAuthorizer. This authorizer implementation must be configured with the Access Policy Provider which it will use to access and manage users, groups, and policies. These users, groups, and policies will be used to make all access decisions during authorization requests. - Access Policy Provider - The identifier for an Access Policy Provider defined above. --> <authorizer> <identifier>managed-authorizer</identifier> <class>org.apache.nifi.authorization.StandardManagedAuthorizer</class> <property name="Access Policy Provider">file-access-policy-provider</property> </authorizer> <!-- NOTE: This Authorizer has been replaced with the more granular approach configured above with the Standard Managed Authorizer. However, it is still available for backwards compatibility reasons. The FileAuthorizer is NiFi's provided authorizer and has the following properties: - Authorizations File - The file where the FileAuthorizer will store policies. - Users File - The file where the FileAuthorizer will store users and groups. - Initial Admin Identity - The identity of an initial admin user that will be granted access to the UI and given the ability to create additional users, groups, and policies. The value of this property could be a DN when using certificates or LDAP, or a Kerberos principal. This property will only be used when there are no other users, groups, and policies defined. If this property is specified then a Legacy Authorized Users File can not be specified. NOTE: Any identity mapping rules specified in nifi.properties will also be applied to the initial admin identity, so the value should be the unmapped identity. - Legacy Authorized Users File - The full path to an existing authorized-users.xml that will be automatically converted to the new authorizations model. If this property is specified then an Initial Admin Identity can not be specified, and this property will only be used when there are no other users, groups, and policies defined. - Node Identity [unique key] - The identity of a NiFi cluster node. When clustered, a property for each node should be defined, so that every node knows about every other node. If not clustered these properties can be ignored. The name of each property must be unique, for example for a three node cluster: "Node Identity A", "Node Identity B", "Node Identity C" or "Node Identity 1", "Node Identity 2", "Node Identity 3" NOTE: Any identity mapping rules specified in nifi.properties will also be applied to the node identities, so the values should be the unmapped identities (i.e. full DN from a certificate). --> <!-- <authorizer> <identifier>file-provider</identifier> <class>org.apache.nifi.authorization.FileAuthorizer</class> <property name="Authorizations File">./conf/authorizations.xml</property> <property name="Users File">./conf/users.xml</property> <property name="Initial Admin Identity"></property> <property name="Legacy Authorized Users File"></property> <property name="Node Identity 1"></property> </authorizer> --> <!-- Single User Authorizer requires the configuration of the SingleUserLoginIdentityProvider in login-identity-provider.xml and in nifi.properties The managed-authorizer should be used for production deployments --> <!--<authorizer> <identifier>single-user-authorizer</identifier> <class>org.apache.nifi.authorization.single.user.SingleUserAuthorizer</class> </authorizer> --> </authorizers>
... View more
Labels:
- Labels:
-
Apache NiFi
09-15-2022
12:58 PM
Currently installing nifi secured but getting error. I have followed the documentation and doing this right but still getting errors. Any idea.
https://nifi.apache.org/docs/nifi-docs/html/walkthroughs.html#securing-nifi-with-tls
****
Caused by: org.springframework.beans.factory.UnsatisfiedDependencyException: Error creating bean with name 'org.apache.nifi.web.security.configuration.AuthenticationSecurityConfiguration': Unsatisfied dependency expressed through constructor parameter 2; nested exception is org.springframework.beans.factory.BeanCreationException: Error creating bean with name 'authorizer': FactoryBean threw exception on object creation; nested exception is org.apache.nifi.authorization.exception.AuthorizerCreationException: org.apache.nifi.authorization.exception.AuthorizerCreationException: Unable to locate initial admin CN=Sefahnifi, OU=SEFAHDEMO to seed policies at org.springframework.beans.factory.support.ConstructorResolver.createArgumentArray(ConstructorResolver.java:800) at org.springframework.beans.factory.support.ConstructorResolver.autowireConstructor(ConstructorResolver.java:229) at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.autowireConstructor(AbstractAutowireCapableBeanFactory.java:1372) at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.createBeanInstance(AbstractAutowireCapableBeanFactory.java:1222) at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.doCreateBean(AbstractAutowireCapableBeanFactory.java:582) at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.createBean(AbstractAutowireCapableBeanFactory.java:542) at org.springframework.beans.factory.support.AbstractBeanFactory.lambda$doGetBean$0(AbstractBeanFactory.java:335) at org.springframework.beans.factory.support.DefaultSingletonBeanRegistry.getSingleton(DefaultSingletonBeanRegistry.java:234) at org.springframework.beans.factory.support.AbstractBeanFactory.doGetBean(AbstractBeanFactory.java:333) at org.springframework.beans.factory.support.AbstractBeanFactory.getBean(AbstractBeanFactory.java:208) at org.springframework.beans.factory.support.ConstructorResolver.instantiateUsingFactoryMethod(ConstructorResolver.java:410) at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.instantiateUsingFactoryMethod(AbstractAutowireCapableBeanFactory.java:1352) at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.createBeanInstance(AbstractAutowireCapableBeanFactory.java:1195) at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.getSingletonFactoryBeanForTypeCheck(AbstractAutowireCapableBeanFactory.java:1027) at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.getTypeForFactoryBean(AbstractAutowireCapableBeanFactory.java:907) at org.springframework.beans.factory.support.AbstractBeanFactory.isTypeMatch(AbstractBeanFactory.java:637) at org.springframework.beans.factory.support.DefaultListableBeanFactory.doGetBeanNamesForType(DefaultListableBeanFactory.java:583) at org.springframework.beans.factory.support.DefaultListableBeanFactory.getBeanNamesForType(DefaultListableBeanFactory.java:550) at org.springframework.beans.factory.BeanFactoryUtils.beanNamesForTypeIncludingAncestors(BeanFactoryUtils.java:265) at org.springframework.beans.factory.support.DefaultListableBeanFactory.findAutowireCandidates(DefaultListableBeanFactory.java:1557) at org.springframework.beans.factory.support.DefaultListableBeanFactory.doResolveDependency(DefaultListableBeanFactory.java:1354) at org.springframework.beans.factory.support.DefaultListableBeanFactory.resolveDependency(DefaultListableBeanFactory.java:1311) at org.springframework.beans.factory.annotation.AutowiredAnnotationBeanPostProcessor$AutowiredMethodElement.resolveMethodArguments(AutowiredAnnotationBeanPostProcessor.java:759) ... 87 common frames omitted Caused by: org.springframework.beans.factory.BeanCreationException: Error creating bean with name 'authorizer': FactoryBean threw exception on object creation; nested exception is org.apache.nifi.authorization.exception.AuthorizerCreationException: org.apache.nifi.authorization.exception.AuthorizerCreationException: Unable to locate initial admin CN=Sefahnifi, OU=SEFAHDEMO to seed policies at org.springframework.beans.factory.support.FactoryBeanRegistrySupport.doGetObjectFromFactoryBean(FactoryBeanRegistrySupport.java:176) at org.springframework.beans.factory.support.FactoryBeanRegistrySupport.getObjectFromFactoryBean(FactoryBeanRegistrySupport.java:101) at org.springframework.beans.factory.support.AbstractBeanFactory.getObjectForBeanInstance(AbstractBeanFactory.java:1884) at org.springframework.beans.factory.support.AbstractAutowireCapableBeanFactory.getObjectForBeanInstance(AbstractAutowireCapableBeanFactory.java:1284) at org.springframework.beans.factory.support.AbstractBeanFactory.doGetBean(AbstractBeanFactory.java:345) at org.springframework.beans.factory.support.AbstractBeanFactory.getBean(AbstractBeanFactory.java:208) at org.springframework.beans.factory.config.DependencyDescriptor.resolveCandidate(DependencyDescriptor.java:276) at org.springframework.beans.factory.support.DefaultListableBeanFactory.doResolveDependency(DefaultListableBeanFactory.java:1391) at org.springframework.beans.factory.support.DefaultListableBeanFactory.resolveDependency(DefaultListableBeanFactory.java:1311) at org.springframework.beans.factory.support.ConstructorResolver.resolveAutowiredArgument(ConstructorResolver.java:887) at org.springframework.beans.factory.support.ConstructorResolver.createArgumentArray(ConstructorResolver.java:791) ... 109 common frames omitted Caused by: org.apache.nifi.authorization.exception.AuthorizerCreationException: org.apache.nifi.authorization.exception.AuthorizerCreationException: Unable to locate initial admin CN=Sefahnifi, OU=SEFAHDEMO to seed policies at org.apache.nifi.authorization.FileAccessPolicyProvider.onConfigured(FileAccessPolicyProvider.java:267) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.apache.nifi.authorization.AccessPolicyProviderInvocationHandler.invoke(AccessPolicyProviderInvocationHandler.java:54) at com.sun.proxy.$Proxy48.onConfigured(Unknown Source) at org.apache.nifi.authorization.AuthorizerFactoryBean.loadProviderProperties(AuthorizerFactoryBean.java:211) at org.apache.nifi.authorization.AuthorizerFactoryBean.getObject(AuthorizerFactoryBean.java:168) at org.apache.nifi.authorization.AuthorizerFactoryBean.getObject(AuthorizerFactoryBean.java:72) at org.springframework.beans.factory.support.FactoryBeanRegistrySupport.doGetObjectFromFactoryBean(FactoryBeanRegistrySupport.java:169) ... 119 common frames omitted Caused by: org.apache.nifi.authorization.exception.AuthorizerCreationException: Unable to locate initial admin CN=Sefahnifi, OU=SEFAHDEMO to seed policies at org.apache.nifi.authorization.FileAccessPolicyProvider.populateInitialAdmin(FileAccessPolicyProvider.java:678) at org.apache.nifi.authorization.FileAccessPolicyProvider.load(FileAccessPolicyProvider.java:607) at org.apache.nifi.authorization.FileAccessPolicyProvider.onConfigured(FileAccessPolicyProvider.java:258) ... 129 common frames omitted 2022-09-15 14:35:23,542 INFO [Thread-1] org.apache.nifi.NiFi Application Server shutdown started
... View more
Labels:
- Labels:
-
Apache NiFi
04-01-2022
07:12 AM
see below Attribute Values RecId udhehdhhwgeueuhd73764hdhsh executesql.query.duration 32 executesql.query.executiontime 24 executesql.query.fetchtime 8 executesql.resultset.index 0 executesql.row.count 100 filename 9c344c33-599e-4dfd-9eda-2006f6df0de5 fragment.count 100 fragment.identifier da135c88-697d-498f-a5e3-6a45f23eb44a fragment.index 0 mime.type application/json path ./ segment.original.filename 9c344c33-599e-4dfd-9eda-2006f6df0de5 uuid 34d005dc-09c2-446c-b7aa-963b31e9769a
... View more
03-31-2022
06:16 AM
This is what I have. sample json from the executesql after split json. { "CreatedBy" : "jdhjhehdhjdjs", "CreatedDateTime" : "2021-10-20 12:05:42.0", "LastModBy" : "dhjdjjwjsjds", "LastModDateTime" : "2021-12-01 17:41:31.0", "OwnerTeam" : null, "OwnerType" : null, "RecId" : "udhehdhhwgeueuhd73764hdhsh", "CloudServiceTag" : null, "SQLCores" : null }
... View more
03-30-2022
12:15 PM
Getting this error when using evaluatejsonpath and putdynamodb. 2022-03-30 19:04:01,809 ERROR [Timer-Driven Process Thread-1] o.a.n.p.aws.dynamodb.PutDynamoDB PutDynamoDB[id=d8f73587-017f-1000-2455-aaff9f514cba] Failed to process session due to java.lang.IllegalArgumentException: Attribute name must not be null or empty; Processor Administratively Yielded for 1 sec: java.lang.IllegalArgumentException: Attribute name must not be null or empty java.lang.IllegalArgumentException: Attribute name must not be null or empty Any help will be much appreciated.
... View more
Labels:
- Labels:
-
Apache NiFi
03-30-2022
07:37 AM
2022-03-30 06:12:42,697 ERROR [Timer-Driven Process Thread-10] o.a.n.p.aws.dynamodb.PutDynamoDB PutDynamoDB[id=d8f73587-017f-1000-2455-aaff9f514cba] Hash key value '' is required for flow file StandardFlowFileRecord[uuid=eaf5b5ae-86c1-44b1-a253-00d44fdbbbff,claim=StandardContentClaim [resourceClaim=StandardResourceClaim[id=1648526788099-3, container=default, section=3], offset=0, length=45235],offset=44777,name=472d9a5c-9b9e-4a2e-91ae-589fbf7a5bec,size=458] 2022 Any help will be much appreciated.
... View more
Labels:
- Labels:
-
Apache NiFi