Open cbrendanprice opened 8 months ago
more than happy to provide whatever additional information, clarity, context, etc. that would be necessary to help troubleshoot here. appreciate the efforts you all have made on this project and know you're busy making it better! would appreciate any help I can get here when you've time.
Hmm. I think that should work. And you created the secret? If you exec into one of the nifi containers, and do tail -f logs/nifi-user.log
do you see any information? Here is an example single user auth someone sent me on Slack that seems to work and has a sidecar to help troubleshoot/view the logs:
apiVersion: nifi.konpyutaika.com/v1
kind: NifiCluster
metadata:
name: nifikop
spec:
clusterImage: apache/nifi:1.23.2
externalServices:
- name: nifikop
spec:
portConfigs:
- internalListenerName: https
port: 443
- internalListenerName: prometheus
port: 9092
- internalListenerName: s2s
port: 10000
type: ClusterIP
listenersConfig:
internalListeners:
- containerPort: 8443
name: https
type: https
- containerPort: 6007
name: cluster
type: cluster
- containerPort: 10000
name: s2s
type: s2s
- containerPort: 9092
name: prometheus
type: prometheus
sslSecrets:
create: true
tlsSecretName: nifikop-tls
nifiClusterTaskSpec:
retryDurationMinutes: 10
nodeConfigGroups:
default_group:
fsGroup: 1337
isNode: true
resourcesRequirements:
limits:
cpu: "6"
memory: 6Gi
requests:
cpu: "6"
memory: 5Gi
storageConfigs:
- mountPath: /opt/nifi/nifi-current/logs
name: logs
pvcSpec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 50Gi
storageClassName: ssd-wait
- mountPath: /opt/nifi/data
name: data
pvcSpec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 5Gi
storageClassName: ssd-wait
- mountPath: /opt/nifi/flowfile_repository
name: flowfile-repository
pvcSpec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 12Gi
storageClassName: ssd-wait
- mountPath: /opt/nifi/nifi-current/conf
name: conf
pvcSpec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 5Gi
storageClassName: ssd-wait
- mountPath: /opt/nifi/content_repository
name: content-repository-default
pvcSpec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 10Gi
storageClassName: ssd-wait
- mountPath: /opt/nifi/content-additional/rep1
name: content-repository-rep1
pvcSpec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 35Gi
storageClassName: ssd-wait
- mountPath: /opt/nifi/content-additional/rep2
name: content-repository-rep2
pvcSpec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 35Gi
storageClassName: ssd-wait
- mountPath: /opt/nifi/provenance_repository
name: provenance-repository-default
pvcSpec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 10Gi
storageClassName: ssd-wait
- mountPath: /opt/nifi/provenance-additional/rep1
name: provenance-repository-rep1
pvcSpec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 12Gi
storageClassName: ssd-wait
- mountPath: /opt/nifi/provenance-additional/rep2
name: provenance-repository-rep2
pvcSpec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 12Gi
storageClassName: ssd-wait
- mountPath: /opt/nifi/extensions
name: extensions-repository
pvcSpec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 5Gi
storageClassName: ssd-wait
tolerations:
- effect: NoExecute
key: dedicated
operator: Equal
value: instances
nodes:
- id: 0
labels:
nifi_cr: nifikop
nifi_node_group: default_group
nodeConfigGroup: default_group
propagateLabels: true
readOnlyConfig:
bootstrapProperties:
nifiJvmMemory: 4g
maximumTimerDrivenThreadCount: 40
nifiProperties:
overrideConfigMap:
data: nifi.properties
name: nifi-config
namespace: squid-system
overrideConfigs: |
nifi.nar.library.autoload.directory=../extensions
nifi.security.identity.mapping.pattern.dn=CN=([^,]*)(?:, (?:O|OU)=.*)?
nifi.security.identity.mapping.value.dn=$1
nifi.security.identity.mapping.transform.dn=NONE
nifi.content.repository.directory.rep1=../content-additional/rep1
nifi.content.repository.directory.rep2=../content-additional/rep2
nifi.provenance.repository.directory.rep1=../provenance-additional/rep1
nifi.provenance.repository.directory.rep2=../provenance-additional/rep2
nifi.sensitive.props.key=nifikopnifikopnifikop
webProxyHosts:
- nifikop.konpyutaika.com:443
- nifikop.konpyutaika.com
service:
headlessEnabled: true
sidecarConfigs:
- args:
- tail
- -n+1
- -F
- /var/log/nifi-app.log
image: busybox:1.36
name: app-log
resources:
limits:
cpu: 50m
memory: 50Mi
requests:
cpu: 50m
memory: 50Mi
volumeMounts:
- mountPath: /var/log
name: logs
- args:
- tail
- -n+1
- -F
- /var/log/nifi-bootstrap.log
image: busybox:1.36
name: bootstrap-log
resources:
limits:
cpu: 50m
memory: 50Mi
requests:
cpu: 50m
memory: 50Mi
volumeMounts:
- mountPath: /var/log
name: logs
- args:
- tail
- -n+1
- -F
- /var/log/nifi-user.log
image: busybox:1.36
name: user-log
resources:
limits:
cpu: 50m
memory: 50Mi
requests:
cpu: 50m
memory: 50Mi
volumeMounts:
- mountPath: /var/log
name: logs
singleUserConfiguration:
authorizerEnabled: true
enabled: true
secretKeys:
username: username
password: password
secretRef:
name: nifikop
zkAddress: zookeeper.zookeeper:2181
zkPath: /nifikop-instances
---
apiVersion: v1
kind: Secret
metadata:
name: nifikop
stringData:
username: nifikop
password: nifikopnifikopnifikop
Type of question
Implementation Assistance
Support question
hello there!
im having troubles getting my nifi cluster to successfully work with single user configuration and https and was wondering if someone might be able to provide a working example configuration for this? for cotnext, i did first reference the example tls configuration in the repo but, unfortunately, it relies upon oidc for authorization.
find below my current configuration. while this configuration does result in the node running successfully, it does not correctly allow me to login with the credentials stored in the provided secret. i get the
Access Unknown: Certificate and Token not found.
each time i try to login.any help/insight/suggestions would be much appreciated! thank you.
NiFiKop version
v1.8.0-release
Golang version
No response
Kubernetes version
v1.28.0
NiFi version
1.24.0