Member since
07-18-2022
5
Posts
0
Kudos Received
0
Solutions
12-15-2023
10:46 AM
I have a Vault server running propertly, and I have 2 folders ( app and test ) with my key/values configured. Inside the path sandbox/k8s_cluster-01_corp_sandbox/digital_transformation/dt_integrations/dt-apachenifi I configured the client service pointing to Vault server above, and the necessary permissions ( LIST and GET ) were granted to approle that Nifi is using. But when I try to configure the parameter provider, I always get the same error. If I run the curl commands from terminal using the approle, it works like a charm. And this terminal I ran from the EC2 that apache nifi is running, so it is not a problem in the communication. I am using Nifi 1.19.1 and Vault 1.11.4, no way of getting this working... I would appreciate any help.
... View more
Labels:
- Labels:
-
Apache NiFi
12-04-2023
04:09 AM
Hi @SAMSAL. Now it is clear to me why it wasn't working. JOLT has a tricky learning curve, isn't it ? I do appreciate your attention on helping me. Thanks !!!!
... View more
12-01-2023
10:30 AM
Hi, I'm trying to get this JOLT working, but in some cases, in the output is printing null values. The qty of itens inside RUBRICS array is dynamic. What am I doing wrong ? Payload [
{
"ENTITY_DOCUMENT": "11",
"ENTITY_ID": "",
"ENTITY_TYPE": "TEST_CARD",
"CLOSED": true,
"CALCULATION_DATE": "2023-11-01",
"RUBRICS": [
{
"name": "provisao_TEST_card",
"classification": "",
"code": "",
"amount": 110.08,
"type": "",
"business_unit": "TEST",
"aggregation_key": ""
}
]
},
{
"ENTITY_DOCUMENT": "12",
"ENTITY_ID": "",
"ENTITY_TYPE": "TEST_CARD",
"CLOSED": true,
"CALCULATION_DATE": "2023-11-01",
"RUBRICS": [
{
"name": "provisao_TEST_card",
"classification": "",
"code": "",
"amount": 120.08,
"type": "",
"business_unit": "TEST",
"aggregation_key": ""
}
]
},
{
"ENTITY_DOCUMENT": "13",
"ENTITY_ID": "",
"ENTITY_TYPE": "TEST_CARD",
"CLOSED": true,
"CALCULATION_DATE": "2023-11-01",
"RUBRICS": [
{
"name": "app_TEST_card",
"classification": "",
"code": "",
"amount": 1301.34,
"type": "",
"business_unit": "TEST",
"aggregation_key": ""
},
{
"name": "cred_cofins_cashback_TEST_card",
"classification": "",
"code": "",
"amount": 140.16,
"type": "",
"business_unit": "TEST",
"aggregation_key": ""
},
{
"name": "consumo_TEST_card",
"classification": "",
"code": "",
"amount": 150.35,
"type": "",
"business_unit": "TEST",
"aggregation_key": ""
},
{
"name": "consumo_TEST_card_manual",
"classification": "",
"code": "",
"amount": 160.94,
"type": "",
"business_unit": "TEST",
"aggregation_key": ""
},
{
"name": "cred_pis_cashback_TEST_card",
"classification": "",
"code": "",
"amount": 170.45,
"type": "",
"business_unit": "TEST",
"aggregation_key": ""
},
{
"name": "breakage_TEST_card",
"classification": "",
"code": "",
"amount": 180.85,
"type": "",
"business_unit": "TEST",
"aggregation_key": ""
},
{
"name": "pis_breakage_TEST_card",
"classification": "",
"code": "",
"amount": 190.01,
"type": "",
"business_unit": "TEST",
"aggregation_key": ""
},
{
"name": "perda_adquirencia_TEST_card",
"classification": "",
"code": "",
"amount": 200.77,
"type": "",
"business_unit": "TEST",
"aggregation_key": ""
},
{
"name": "cofins_breakage_TEST_card",
"classification": "",
"code": "",
"amount": 210.04,
"type": "",
"business_unit": "TEST",
"aggregation_key": ""
},
{
"name": "consumo_TEST_card_cashback",
"classification": "",
"code": "",
"amount": 220.49,
"type": "",
"business_unit": "TEST",
"aggregation_key": ""
},
{
"name": "cashback_TEST_card",
"classification": "",
"code": "",
"amount": 230.33,
"type": "",
"business_unit": "TEST",
"aggregation_key": ""
}
]
}
] Specs [
{
"operation": "shift",
"spec": {
"*": {
"RUBRICS": {
"*": {
"@name": "&[&3].RUBRIC",
"@business_unit": "&[&3].COMPENSATION_GROUP",
"@classification": "&[&3].CLASSIFICATION",
"@code": "&[&3].CODE",
"@amount": "&[&3].AMOUNT",
"@type": "&[&3].TYPE",
"@aggregation_key": "&[&3].AGGREGATION_KEY",
"@(2,ENTITY_TYPE)": "&[&3].ENTITY_TYPE",
"@(2,ENTITY_ID)": "&[&3].ENTITY_ID",
"@(2,ENTITY_DOCUMENT)": "&[&3].ENTITY_DOCUMENT",
"@(2,CALCULATION_DATE)": "&[&3].CALCULATION_DATE"
}
}
}
}
},
{
"operation": "shift",
"spec": {
"*": {
"*": ""
}
}
}
] Output [ { "RUBRIC" : "provisao_TEST_card", "COMPENSATION_GROUP" : "TEST", "CLASSIFICATION" : "", "CODE" : "", "AMOUNT" : 110.08, "TYPE" : "", "AGGREGATION_KEY" : "", "ENTITY_TYPE" : "TEST_CARD", "ENTITY_ID" : "", "ENTITY_DOCUMENT" : "11", "CALCULATION_DATE" : "2023-11-01" }, { "RUBRIC" : "provisao_TEST_card", "COMPENSATION_GROUP" : "TEST", "CLASSIFICATION" : "", "CODE" : "", "AMOUNT" : 120.08, "TYPE" : "", "AGGREGATION_KEY" : "", "ENTITY_TYPE" : "TEST_CARD", "ENTITY_ID" : "", "ENTITY_DOCUMENT" : "12", "CALCULATION_DATE" : "2023-11-01" }, { "RUBRIC" : "app_TEST_card", "COMPENSATION_GROUP" : "TEST", "CLASSIFICATION" : "", "CODE" : "", "AMOUNT" : 1301.34, "TYPE" : "", "AGGREGATION_KEY" : "", "ENTITY_TYPE" : "TEST_CARD", "ENTITY_ID" : "", "ENTITY_DOCUMENT" : "13", "CALCULATION_DATE" : "2023-11-01" }, null, null, { "RUBRIC" : "cred_cofins_cashback_TEST_card", "COMPENSATION_GROUP" : "TEST", "CLASSIFICATION" : "", "CODE" : "", "AMOUNT" : 140.16, "TYPE" : "", "AGGREGATION_KEY" : "", "ENTITY_TYPE" : "TEST_CARD", "ENTITY_ID" : "", "ENTITY_DOCUMENT" : "13", "CALCULATION_DATE" : "2023-11-01" }, null, null, { "RUBRIC" : "consumo_TEST_card", "COMPENSATION_GROUP" : "TEST", "CLASSIFICATION" : "", "CODE" : "", "AMOUNT" : 150.35, "TYPE" : "", "AGGREGATION_KEY" : "", "ENTITY_TYPE" : "TEST_CARD", "ENTITY_ID" : "", "ENTITY_DOCUMENT" : "13", "CALCULATION_DATE" : "2023-11-01" }, null, null, { "RUBRIC" : "consumo_TEST_card_manual", "COMPENSATION_GROUP" : "TEST", "CLASSIFICATION" : "", "CODE" : "", "AMOUNT" : 160.94, "TYPE" : "", "AGGREGATION_KEY" : "", "ENTITY_TYPE" : "TEST_CARD", "ENTITY_ID" : "", "ENTITY_DOCUMENT" : "13", "CALCULATION_DATE" : "2023-11-01" }, null, null, { "RUBRIC" : "cred_pis_cashback_TEST_card", "COMPENSATION_GROUP" : "TEST", "CLASSIFICATION" : "", "CODE" : "", "AMOUNT" : 170.45, "TYPE" : "", "AGGREGATION_KEY" : "", "ENTITY_TYPE" : "TEST_CARD", "ENTITY_ID" : "", "ENTITY_DOCUMENT" : "13", "CALCULATION_DATE" : "2023-11-01" }, null, null, { "RUBRIC" : "breakage_TEST_card", "COMPENSATION_GROUP" : "TEST", "CLASSIFICATION" : "", "CODE" : "", "AMOUNT" : 180.85, "TYPE" : "", "AGGREGATION_KEY" : "", "ENTITY_TYPE" : "TEST_CARD", "ENTITY_ID" : "", "ENTITY_DOCUMENT" : "13", "CALCULATION_DATE" : "2023-11-01" }, null, null, { "RUBRIC" : "pis_breakage_TEST_card", "COMPENSATION_GROUP" : "TEST", "CLASSIFICATION" : "", "CODE" : "", "AMOUNT" : 190.01, "TYPE" : "", "AGGREGATION_KEY" : "", "ENTITY_TYPE" : "TEST_CARD", "ENTITY_ID" : "", "ENTITY_DOCUMENT" : "13", "CALCULATION_DATE" : "2023-11-01" }, null, null, { "RUBRIC" : "perda_adquirencia_TEST_card", "COMPENSATION_GROUP" : "TEST", "CLASSIFICATION" : "", "CODE" : "", "AMOUNT" : 200.77, "TYPE" : "", "AGGREGATION_KEY" : "", "ENTITY_TYPE" : "TEST_CARD", "ENTITY_ID" : "", "ENTITY_DOCUMENT" : "13", "CALCULATION_DATE" : "2023-11-01" }, null, null, { "RUBRIC" : "cofins_breakage_TEST_card", "COMPENSATION_GROUP" : "TEST", "CLASSIFICATION" : "", "CODE" : "", "AMOUNT" : 210.04, "TYPE" : "", "AGGREGATION_KEY" : "", "ENTITY_TYPE" : "TEST_CARD", "ENTITY_ID" : "", "ENTITY_DOCUMENT" : "13", "CALCULATION_DATE" : "2023-11-01" }, null, null, { "RUBRIC" : "consumo_TEST_card_cashback", "COMPENSATION_GROUP" : "TEST", "CLASSIFICATION" : "", "CODE" : "", "AMOUNT" : 220.49, "TYPE" : "", "AGGREGATION_KEY" : "", "ENTITY_TYPE" : "TEST_CARD", "ENTITY_ID" : "", "ENTITY_DOCUMENT" : "13", "CALCULATION_DATE" : "2023-11-01" }, null, null, { "RUBRIC" : "cashback_TEST_card", "COMPENSATION_GROUP" : "TEST", "CLASSIFICATION" : "", "CODE" : "", "AMOUNT" : 230.33, "TYPE" : "", "AGGREGATION_KEY" : "", "ENTITY_TYPE" : "TEST_CARD", "ENTITY_ID" : "", "ENTITY_DOCUMENT" : "13", "CALCULATION_DATE" : "2023-11-01" } ]
... View more
Labels:
- Labels:
-
Apache NiFi
07-18-2022
02:02 PM
Hi Matt, thanks a lot for the explanation. I changed the path from truststore.jks to $JAVA_HOME\lib\security\cacerts on the StandardRestrictedSSLContextService settings , and worked fine !!!
... View more
07-18-2022
10:19 AM
Hi, I'm trying to make a kafka consumer working, but I am having this issue about SSL Handshake failed. Any ideas ? 2022-07-18 14:00:45,216 INFO [NiFi Web Server-203] o.a.n.c.s.StandardProcessScheduler Starting ConsumeKafkaRecord_2_6[id=f5ee162d-1006-1181-c1d1-1d8a7293ffb7] 2022-07-18 14:00:45,217 INFO [NiFi Web Server-203] o.a.n.controller.StandardProcessorNode Starting ConsumeKafkaRecord_2_6[id=f5ee162d-1006-1181-c1d1-1d8a7293ffb7] 2022-07-18 14:00:45,217 INFO [Timer-Driven Process Thread-5] o.a.n.c.s.TimerDrivenSchedulingAgent Scheduled ConsumeKafkaRecord_2_6[id=f5ee162d-1006-1181-c1d1-1d8a7293ffb7] to run with 1 threads 2022-07-18 14:00:45,219 INFO [Timer-Driven Process Thread-8] o.a.k.clients.consumer.ConsumerConfig ConsumerConfig values: allow.auto.create.topics = true auto.commit.interval.ms = 5000 auto.offset.reset = latest bootstrap.servers = [bootstrap-url:9092] check.crcs = true client.dns.lookup = use_all_dns_ips client.id = consumer-integration.cubo-transactions-consumer-20 client.rack = connections.max.idle.ms = 540000 default.api.timeout.ms = 60000 enable.auto.commit = false exclude.internal.topics = true fetch.max.bytes = 52428800 fetch.max.wait.ms = 500 fetch.min.bytes = 1 group.id = integration.cubo-transactions-consumer group.instance.id = null heartbeat.interval.ms = 3000 interceptor.classes = [] internal.leave.group.on.close = true internal.throw.on.fetch.stable.offset.unsupported = false isolation.level = read_uncommitted key.deserializer = class org.apache.kafka.common.serialization.ByteArrayDeserializer max.partition.fetch.bytes = 1048576 max.poll.interval.ms = 300000 max.poll.records = 10000 metadata.max.age.ms = 300000 metric.reporters = [] metrics.num.samples = 2 metrics.recording.level = INFO metrics.sample.window.ms = 30000 partition.assignment.strategy = [class org.apache.kafka.clients.consumer.RangeAssignor] receive.buffer.bytes = 65536 reconnect.backoff.max.ms = 1000 reconnect.backoff.ms = 50 request.timeout.ms = 30000 retry.backoff.ms = 100 sasl.client.callback.handler.class = null sasl.jaas.config = [hidden] sasl.kerberos.kinit.cmd = /usr/bin/kinit sasl.kerberos.min.time.before.relogin = 60000 sasl.kerberos.service.name = null sasl.kerberos.ticket.renew.jitter = 0.05 sasl.kerberos.ticket.renew.window.factor = 0.8 sasl.login.callback.handler.class = null sasl.login.class = null sasl.login.refresh.buffer.seconds = 300 sasl.login.refresh.min.period.seconds = 60 sasl.login.refresh.window.factor = 0.8 sasl.login.refresh.window.jitter = 0.05 sasl.mechanism = SCRAM-SHA-512 security.protocol = SASL_SSL security.providers = null send.buffer.bytes = 131072 session.timeout.ms = 10000 ssl.cipher.suites = null ssl.enabled.protocols = [TLSv1.2] ssl.endpoint.identification.algorithm = https ssl.engine.factory.class = null ssl.key.password = null ssl.keymanager.algorithm = SunX509 ssl.keystore.location = null ssl.keystore.password = null ssl.keystore.type = JKS ssl.protocol = TLSv1.2 ssl.provider = null ssl.secure.random.implementation = null ssl.trustmanager.algorithm = PKIX ssl.truststore.location = /opt/nifi-toolkit-1.15.3/bin/target/CN=localhost_OU=NIFI.p12 ssl.truststore.password = [hidden] ssl.truststore.type = PKCS12 value.deserializer = class org.apache.kafka.common.serialization.ByteArrayDeserializer 2022-07-18 14:00:45,224 INFO [Timer-Driven Process Thread-8] o.a.k.c.s.authenticator.AbstractLogin Successfully logged in. 2022-07-18 14:00:45,291 INFO [Timer-Driven Process Thread-8] o.a.kafka.common.utils.AppInfoParser Kafka version: 2.6.3 2022-07-18 14:00:45,291 INFO [Timer-Driven Process Thread-8] o.a.kafka.common.utils.AppInfoParser Kafka commitId: c24cbd3f5eeffa1e 2022-07-18 14:00:45,291 INFO [Timer-Driven Process Thread-8] o.a.kafka.common.utils.AppInfoParser Kafka startTimeMs: 1658163645291 2022-07-18 14:00:45,291 INFO [Timer-Driven Process Thread-8] o.a.kafka.clients.consumer.KafkaConsumer [Consumer clientId=consumer-integration.cubo-transactions-consumer-20, groupId=integration.cubo-transactions-consumer] Subscribed to topic(s): integration.cubo-transactions 2022-07-18 14:00:45,386 INFO [Flow Service Tasks Thread-1] o.a.nifi.controller.StandardFlowService Saved flow controller org.apache.nifi.controller.FlowController@558d7d23 // Another save pending = false 2022-07-18 14:00:45,532 INFO [pool-9-thread-1] o.a.n.c.r.WriteAheadFlowFileRepository Initiating checkpoint of FlowFile Repository 2022-07-18 14:00:45,532 INFO [pool-9-thread-1] o.a.n.c.r.WriteAheadFlowFileRepository Successfully checkpointed FlowFile Repository with 28 records in 0 milliseconds 2022-07-18 14:00:47,314 INFO [Timer-Driven Process Thread-2] org.apache.kafka.common.network.Selector [Consumer clientId=consumer-integration.cubo-transactions-consumer-20, groupId=integration.cubo-transactions-consumer] Failed authentication with bootstrap-url (SSL handshake failed) 2022-07-18 14:00:47,314 ERROR [Timer-Driven Process Thread-2] org.apache.kafka.clients.NetworkClient [Consumer clientId=consumer-integration.cubo-transactions-consumer-20, groupId=integration.cubo-transactions-consumer] Connection to node -1 (bootstrap-url:9092) failed authentication due to: SSL handshake failed 2022-07-18 14:00:47,314 WARN [Timer-Driven Process Thread-2] org.apache.kafka.clients.NetworkClient [Consumer clientId=consumer-integration.cubo-transactions-consumer-20, groupId=integration.cubo-transactions-consumer] Bootstrap broker bootstrap-url:9092 (id: -1 rack: null) disconnected 2022-07-18 14:00:47,315 ERROR [Timer-Driven Process Thread-2] o.a.n.p.k.pubsub.ConsumeKafkaRecord_2_6 ConsumeKafkaRecord_2_6[id=f5ee162d-1006-1181-c1d1-1d8a7293ffb7] Exception while interacting with Kafka so will close the lease org.apache.nifi.processors.kafka.pubsub.ConsumerPool$SimpleConsumerLease@6e83a054 due to org.apache.kafka.common.errors.SslAuthenticationException: SSL handshake failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target ↳ causes: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target ↳ causes: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target ↳ causes: org.apache.kafka.common.errors.SslAuthenticationException: SSL handshake failed org.apache.kafka.common.errors.SslAuthenticationException: SSL handshake failed Caused by: javax.net.ssl.SSLHandshakeException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at sun.security.ssl.Alert.createSSLException(Alert.java:131) at sun.security.ssl.TransportContext.fatal(TransportContext.java:324) at sun.security.ssl.TransportContext.fatal(TransportContext.java:267) at sun.security.ssl.TransportContext.fatal(TransportContext.java:262) at sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkServerCerts(CertificateMessage.java:654) at sun.security.ssl.CertificateMessage$T12CertificateConsumer.onCertificate(CertificateMessage.java:473) at sun.security.ssl.CertificateMessage$T12CertificateConsumer.consume(CertificateMessage.java:369) at sun.security.ssl.SSLHandshake.consume(SSLHandshake.java:377) at sun.security.ssl.HandshakeContext.dispatch(HandshakeContext.java:444) at sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:981) at sun.security.ssl.SSLEngineImpl$DelegatedTask$DelegatedAction.run(SSLEngineImpl.java:968) at java.security.AccessController.doPrivileged(Native Method) at sun.security.ssl.SSLEngineImpl$DelegatedTask.run(SSLEngineImpl.java:915) at org.apache.kafka.common.network.SslTransportLayer.runDelegatedTasks(SslTransportLayer.java:430) at org.apache.kafka.common.network.SslTransportLayer.handshakeUnwrap(SslTransportLayer.java:514) at org.apache.kafka.common.network.SslTransportLayer.doHandshake(SslTransportLayer.java:368) at org.apache.kafka.common.network.SslTransportLayer.handshake(SslTransportLayer.java:291) at org.apache.kafka.common.network.KafkaChannel.prepare(KafkaChannel.java:173) at org.apache.kafka.common.network.Selector.pollSelectionKeys(Selector.java:547) at org.apache.kafka.common.network.Selector.poll(Selector.java:485) at org.apache.kafka.clients.NetworkClient.poll(NetworkClient.java:547) at org.apache.kafka.clients.consumer.internals.ConsumerNetworkClient.poll(ConsumerNetworkClient.java:265) at org.apache.kafka.clients.consumer.internals.ConsumerNetworkClient.poll(ConsumerNetworkClient.java:236) at org.apache.kafka.clients.consumer.internals.ConsumerNetworkClient.poll(ConsumerNetworkClient.java:215) at org.apache.kafka.clients.consumer.internals.AbstractCoordinator.ensureCoordinatorReady(AbstractCoordinator.java:245) at org.apache.kafka.clients.consumer.internals.ConsumerCoordinator.poll(ConsumerCoordinator.java:480) at org.apache.kafka.clients.consumer.KafkaConsumer.updateAssignmentMetadataIfNeeded(KafkaConsumer.java:1261) at org.apache.kafka.clients.consumer.KafkaConsumer.poll(KafkaConsumer.java:1230) at org.apache.kafka.clients.consumer.KafkaConsumer.poll(KafkaConsumer.java:1210) at org.apache.nifi.processors.kafka.pubsub.ConsumerLease.poll(ConsumerLease.java:190) at org.apache.nifi.processors.kafka.pubsub.ConsumeKafkaRecord_2_6.onTrigger(ConsumeKafkaRecord_2_6.java:488) at org.apache.nifi.processor.AbstractProcessor.onTrigger(AbstractProcessor.java:27) at org.apache.nifi.controller.StandardProcessorNode.onTrigger(StandardProcessorNode.java:1273) at org.apache.nifi.controller.tasks.ConnectableTask.invoke(ConnectableTask.java:214) at org.apache.nifi.controller.scheduling.TimerDrivenSchedulingAgent$1.run(TimerDrivenSchedulingAgent.java:103) at org.apache.nifi.engine.FlowEngine$2.run(FlowEngine.java:110) at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511) at java.util.concurrent.FutureTask.runAndReset(FutureTask.java:308) at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.access$301(ScheduledThreadPoolExecutor.java:180) at java.util.concurrent.ScheduledThreadPoolExecutor$ScheduledFutureTask.run(ScheduledThreadPoolExecutor.java:294) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) at java.lang.Thread.run(Thread.java:748) Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:456) at sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:323) at sun.security.validator.Validator.validate(Validator.java:271) at sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:315) at sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:278) at sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:141) at sun.security.ssl.CertificateMessage$T12CertificateConsumer.checkServerCerts(CertificateMessage.java:632) ... 38 common frames omitted Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target at sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141) at sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126) at java.security.cert.CertPathBuilder.build(CertPathBuilder.java:280) at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:451) ... 44 common frames omitted
... View more
Labels:
- Labels:
-
Apache NiFi