[ https://issues.apache.org/jira/browse/NIFI-13369?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17852550#comment-17852550 ]
Night Gryphon commented on NIFI-13369: -------------------------------------- The OS is exactly the same. Cloned the same base system VM image. Did you mean you upgraded ZK {_}server{_}? > 2.0.0-M3 Zookeeper TLS connection issue > --------------------------------------- > > Key: NIFI-13369 > URL: https://issues.apache.org/jira/browse/NIFI-13369 > Project: Apache NiFi > Issue Type: Bug > Components: Core Framework, Security > Affects Versions: 2.0.0-M3 > Environment: Ubuntu 22.04. > NiFi 2.0.0-M3 / OpenJDK-21 > Zookeeper 3.8.4 / OpenJDK-11 > Reporter: Night Gryphon > Priority: Major > > After upgrading from 2.0.0-M2 to M3 NiFi can't connect existing Zookeeper > cluster using SSL/TLS. That blocks upgrade to M3. > Looks like TLS version mismatch but NiFi don't have corresponding setting for > zookeeper client TLS version. > Below is the error log > {code:java} > 2024-06-05 20:21:14,543 INFO [epollEventLoopGroup-2-1] > o.apache.zookeeper.ClientCnxnSocketNetty SSL handler added for channel: [id: > 0x5e8f288a] > 2024-06-05 20:21:14,544 INFO [epollEventLoopGroup-2-1] > o.apache.zookeeper.ClientCnxnSocketNetty channel is connected: [id: > 0x5e8f288a, L:/10.10.0.145:14916 - R:zk3.nifi-test/10.10.0.14 > 3:2182] > 2024-06-05 20:21:14,549 ERROR [epollEventLoopGroup-2-1] > o.apache.zookeeper.ClientCnxnSocketNetty Unexpected throwable > io.netty.handler.codec.DecoderException: javax.net.ssl.SSLHandshakeException: > Received fatal alert: protocol_version > at > io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:500) > at > io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:290) > at > io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:444) > at > io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) > at > io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:412) > at > io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1410) > at > io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:440) > at > io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:420) > at > io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:919) > at > io.netty.channel.epoll.AbstractEpollStreamChannel$EpollStreamUnsafe.epollInReady(AbstractEpollStreamChannel.java:801) > at > io.netty.channel.epoll.EpollEventLoop.processReady(EpollEventLoop.java:501) > at io.netty.channel.epoll.EpollEventLoop.run(EpollEventLoop.java:399) > at > io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:997) > at > io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) > at > io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) > at java.base/java.lang.Thread.run(Thread.java:1583) > Caused by: javax.net.ssl.SSLHandshakeException: Received fatal alert: > protocol_version > at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:130) > at java.base/sun.security.ssl.Alert.createSSLException(Alert.java:117) > at > java.base/sun.security.ssl.TransportContext.fatal(TransportContext.java:365) > at java.base/sun.security.ssl.Alert$AlertConsumer.consume(Alert.java:287) > at > java.base/sun.security.ssl.TransportContext.dispatch(TransportContext.java:204) > at java.base/sun.security.ssl.SSLTransport.decode(SSLTransport.java:172) > at java.base/sun.security.ssl.SSLEngineImpl.decode(SSLEngineImpl.java:736) > at > java.base/sun.security.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:691) > at java.base/sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:506) > at java.base/sun.security.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:482) > at java.base/javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:679) > at > io.netty.handler.ssl.SslHandler$SslEngineType$3.unwrap(SslHandler.java:310) > at io.netty.handler.ssl.SslHandler.unwrap(SslHandler.java:1445) > at > io.netty.handler.ssl.SslHandler.decodeJdkCompatible(SslHandler.java:1338) > at io.netty.handler.ssl.SslHandler.decode(SslHandler.java:1387) > at > io.netty.handler.codec.ByteToMessageDecoder.decodeRemovalReentryProtection(ByteToMessageDecoder.java:530) > at > io.netty.handler.codec.ByteToMessageDecoder.callDecode(ByteToMessageDecoder.java:469) > ... 15 common frames omitted > 2024-06-05 20:21:14,549 INFO [epollEventLoopGroup-2-1] > o.apache.zookeeper.ClientCnxnSocketNetty channel is told closing > 2024-06-05 20:21:14,549 INFO [epollEventLoopGroup-2-1] > o.apache.zookeeper.ClientCnxnSocketNetty channel is disconnected: [id: > 0x5e8f288a, L:/10.10.0.145:14916 ! R:zk3.nifi-test/10.10.0 > .143:2182] > {code} -- This message was sent by Atlassian Jira (v8.20.10#820010)