This is an automated email from the ASF dual-hosted git repository.
exceptionfactory pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/nifi.git
The following commit(s) were added to refs/heads/main by this push:
new 55236e6 NIFI-8396 Update incorrect case in references to ZooKeeper in
Admin and Toolkit guides
55236e6 is described below
commit 55236e6fd70519d1ef89d909ae0e60d89de37398
Author: Andrew Lim <[email protected]>
AuthorDate: Fri Apr 9 13:01:58 2021 -0400
NIFI-8396 Update incorrect case in references to ZooKeeper in Admin and
Toolkit guides
This closes #4985
Signed-off-by: David Handermann <[email protected]>
---
.../src/main/asciidoc/administration-guide.adoc | 24 +++++++++++-----------
nifi-docs/src/main/asciidoc/toolkit-guide.adoc | 2 +-
2 files changed, 13 insertions(+), 13 deletions(-)
diff --git a/nifi-docs/src/main/asciidoc/administration-guide.adoc
b/nifi-docs/src/main/asciidoc/administration-guide.adoc
index 9315845..619058e 100644
--- a/nifi-docs/src/main/asciidoc/administration-guide.adoc
+++ b/nifi-docs/src/main/asciidoc/administration-guide.adoc
@@ -94,17 +94,17 @@ The following table lists the default ports used by NiFi
and the corresponding p
NOTE: The ports marked with an asterisk (*) have property values that are
blank by default in _nifi.properties_. The values shown in the table are the
default values for these ports when <<toolkit-guide.adoc#tls_toolkit,TLS
Toolkit>> is used to generate _nifi.properties_ for a secured NiFi instance.
The default Certificate Authority Port used by
<<toolkit-guide.adoc#tls_toolkit,TLS Toolkit>> is `8443`.
-=== Embedded Zookeeper
+=== Embedded ZooKeeper
The following table lists the default ports used by an <<embedded_zookeeper>>
and the corresponding property in the _zookeeper.properties_ file.
[options="header,footer"]
|==================================================================================================================================================
| Function | Property | Default
Value
-|Zookeeper Client Port (Deprecated: client port is no longer specified on a
separate line as of NiFi 1.10.x) | `clientPort` |
`2181`
-|Zookeeper Server Quorum and Leader Election Ports | `server.1` | _none_
+|ZooKeeper Client Port (Deprecated: client port is no longer specified on a
separate line as of NiFi 1.10.x) | `clientPort` |
`2181`
+|ZooKeeper Server Quorum and Leader Election Ports | `server.1` | _none_
|==================================================================================================================================================
-NOTE: Commented examples for the Zookeeper server ports are included in the
_zookeeper.properties_ file in the form
`server.N=nifi-nodeN-hostname:2888:3888;2181`.
+NOTE: Commented examples for the ZooKeeper server ports are included in the
_zookeeper.properties_ file in the form
`server.N=nifi-nodeN-hostname:2888:3888;2181`.
== Configuration Best Practices
If you are running on Linux, consider these best practices. Typical Linux
defaults are not necessarily well-tuned for the needs of an IO intensive
application like NiFi. For all of these areas, your distribution's
requirements may vary. Use these sections as advice, but
@@ -2028,8 +2028,8 @@ However, it is up to the administrator to determine the
number of nodes most app
If the `nifi.state.management.embedded.zookeeper.start` property is set to
`true`, the `nifi.state.management.embedded.zookeeper.properties` property
in _nifi.properties_ also becomes relevant. This specifies the ZooKeeper
properties file to use. At a minimum, this properties file needs to be populated
-with the list of ZooKeeper servers. The servers are specified as properties in
the form of `server.1`, `server.2`, to `server.n`. As of NiFi 1.10.x, Zookeeper
-has been upgraded to 3.5.5 and servers are now defined with the client port
appended at the end as per the
link:https://zookeeper.apache.org/doc/r3.5.2-alpha/zookeeperReconfig.html#sc_reconfig_clientport[Zookeeper
Documentation].
+with the list of ZooKeeper servers. The servers are specified as properties in
the form of `server.1`, `server.2`, to `server.n`. As of NiFi 1.10.x, ZooKeeper
+has been upgraded to 3.5.5 and servers are now defined with the client port
appended at the end as per the
link:https://zookeeper.apache.org/doc/r3.5.2-alpha/zookeeperReconfig.html#sc_reconfig_clientport[ZooKeeper
Documentation].
As such, each of these servers is configured as <hostname>:<quorum
port>[:<leader election port>][:role];[<client port address>:]<client port>.
As a simple example this would be `server.1 = myhost:2888:3888;2181`. This
list of nodes should be the same nodes in the NiFi cluster that have the
`nifi.state.management.embedded.zookeeper.start` property set to `true`.
Also note that because ZooKeeper will be listening on these ports, the
firewall may need to be configured to open these ports for incoming traffic, at
least between nodes in the cluster.
@@ -2174,9 +2174,9 @@ requireClientAuthScheme=sasl
The `kerberos.removeHostFromPrincipal` and the
`kerberos.removeRealmFromPrincipal` properties are used to normalize the user
principal name before comparing an identity to acls
applied on a Znode. By default the full principal is used however setting the
`kerberos.removeHostFromPrincipal` and the `kerberos.removeRealmFromPrincipal`
properties to true will instruct
-Zookeeper to remove the host and the realm from the logged in user's identity
for comparison. In cases where NiFi nodes (within the same cluster) use
principals that
+ZooKeeper to remove the host and the realm from the logged in user's identity
for comparison. In cases where NiFi nodes (within the same cluster) use
principals that
have different host(s)/realm(s) values, these kerberos properties can be
configured to ensure that the nodes' identity will be normalized and that the
nodes will have
-appropriate access to shared Znodes in Zookeeper.
+appropriate access to shared Znodes in ZooKeeper.
The last line is optional but specifies that clients MUST use Kerberos to
communicate with our ZooKeeper instance.
@@ -2232,7 +2232,7 @@ We add the following line anywhere in this file in order
to tell the NiFi JVM to
[source]
java.arg.15=-Djava.security.auth.login.config=./conf/zookeeper-jaas.conf
-Finally we need to update _nifi.properties_ to ensure that NiFi knows to apply
SASL specific ACLs for the Znodes it will create in Zookeeper for cluster
management.
+Finally we need to update _nifi.properties_ to ensure that NiFi knows to apply
SASL specific ACLs for the Znodes it will create in ZooKeeper for cluster
management.
To enable this, in the _$NIFI_HOME/conf/nifi.properties_ file and edit the
following properties as shown below:
[source]
@@ -2240,7 +2240,7 @@ nifi.zookeeper.auth.type=sasl
nifi.zookeeper.kerberos.removeHostFromPrincipal=true
nifi.zookeeper.kerberos.removeRealmFromPrincipal=true
-NOTE: The `kerberos.removeHostFromPrincipal` and
`kerberos.removeRealmFromPrincipal` should be consistent with what is set in
Zookeeper configuration.
+NOTE: The `kerberos.removeHostFromPrincipal` and
`kerberos.removeRealmFromPrincipal` should be consistent with what is set in
ZooKeeper configuration.
We can initialize our Kerberos ticket by running the following command:
@@ -2263,7 +2263,7 @@ in the following locations:
Failure to do so, may result in errors similar to the following:
[source]
-2016-01-08 16:08:57,888 ERROR [pool-26-thread-1-SendThread(localhost:2181)]
o.a.zookeeper.client.ZooKeeperSaslClient An error:
(java.security.PrivilegedActionException: javax.security.sasl.SaslException:
GSS initiate failed [Caused by GSSException: No valid credentials provided
(Mechanism level: Server not found in Kerberos database (7) -
LOOKING_UP_SERVER)]) occurred when evaluating Zookeeper Quorum Member's
received SASL token. Zookeeper Client will go to AUTH_FAILED state.
+2016-01-08 16:08:57,888 ERROR [pool-26-thread-1-SendThread(localhost:2181)]
o.a.zookeeper.client.ZooKeeperSaslClient An error:
(java.security.PrivilegedActionException: javax.security.sasl.SaslException:
GSS initiate failed [Caused by GSSException: No valid credentials provided
(Mechanism level: Server not found in Kerberos database (7) -
LOOKING_UP_SERVER)]) occurred when evaluating ZooKeeper Quorum Member's
received SASL token. ZooKeeper Client will go to AUTH_FAILED state.
If there are problems communicating or authenticating with Kerberos, this
link:http://docs.oracle.com/javase/7/docs/technotes/guides/security/jgss/tutorials/Troubleshooting.html[Troubleshooting
Guide^] may be of value.
@@ -2379,7 +2379,7 @@ For example, you may want to use the ZooKeeper Migrator
when you are:
* Upgrading from NiFi 0.x with an external ZooKeeper to NiFi 1.x with the same
external ZooKeeper
* Migrating from an external ZooKeeper to an embedded ZooKeeper in NiFi 1.x
-For more information, see the
<<toolkit-guide.adoc#zookeeper_migrator,Zookeeper Migrator>> section in the
link:toolkit-guide.html[NiFi Toolkit Guide].
+For more information, see the
<<toolkit-guide.adoc#zookeeper_migrator,ZooKeeper Migrator>> section in the
link:toolkit-guide.html[NiFi Toolkit Guide].
[[bootstrap_properties]]
== Bootstrap Properties
diff --git a/nifi-docs/src/main/asciidoc/toolkit-guide.adoc
b/nifi-docs/src/main/asciidoc/toolkit-guide.adoc
index b410fe7..2406648 100644
--- a/nifi-docs/src/main/asciidoc/toolkit-guide.adoc
+++ b/nifi-docs/src/main/asciidoc/toolkit-guide.adoc
@@ -1406,7 +1406,7 @@ The following are available options:
* `-k`,`--krb-conf <jaas-filename>` Allows the specification of
a JAAS configuration file to allow authentication with a ZooKeeper configured
to use Kerberos. This option is mutually exclusive with the `-a`,`--auth`
option.
* `-r`,`--receive` Receives data from ZooKeeper
and writes to the given filename (if the `-f`,`--file` option is provided) or
standard output. The data received will contain the full path to each node read
from ZooKeeper. This option is mutually exclusive with the `-s`,`--send` option.
* `-s`,`--send` Sends data to ZooKeeper that
is read from the given filename (if the `-f`,`--file` option is provided) or
standard input. The paths for each node in the data being sent to ZooKeeper are
absolute paths, and will be stored in ZooKeeper under the *path* portion of the
`-z`,`--zookeeper` argument. Typically, the *path* portion of the argument can
be omitted, which will store the nodes at their absolute paths. This option is
mutually exclusiv [...]
-* `--use-existing-acl` Allows the Zookeeper
Migrator to write ACL values retrieved from the source Zookeeper server to
destination server. Default action will apply Open rights for unsecured
destinations or Creator Only rights for secured destinations.
+* `--use-existing-acl` Allows the ZooKeeper
Migrator to write ACL values retrieved from the source ZooKeeper server to
destination server. Default action will apply Open rights for unsecured
destinations or Creator Only rights for secured destinations.
* `-z`,`--zookeeper <zookeeper-endpoint>` The ZooKeeper server(s) to
use, specified by a connect string, comprised of one or more comma-separated
host:port pairs followed by a path, in the format of
_host:port[,host2:port...,hostn:port]/znode/path_.
=== Migrating Between Source and Destination ZooKeepers