Hi David, Is the “Security Configuration” added in the latest admin guide?
Regards, anup From: Matt Gilman <[email protected]<mailto:[email protected]>> Reply-To: "[email protected]<mailto:[email protected]>" <[email protected]<mailto:[email protected]>> Date: Wednesday, 29 April 2015 12:03 am To: "[email protected]<mailto:[email protected]>" <[email protected]<mailto:[email protected]>> Subject: Re: New to NiFi and interested on clustering capabilities David, Welcome and thanks for expressing interest in Apache NiFi. I just noticed that the administrator guide [1] on our website [2] was not in its current form so just uploaded the latest version. The document now includes a quick explanation of our clustering capabilities and example configurations. This would be a great place to start and become familiar with NiFi clustering. Please let us know if you have any follow up questions. Also, if you had already viewed the administrator guide your browser may have cached the older version so you may need to do a hard reload. [1] https://nifi.incubator.apache.org/docs/nifi-docs/administration-guide.html [2] https://nifi.incubator.apache.org/ On Tue, Apr 28, 2015 at 2:06 PM, David Klim <[email protected]<mailto:[email protected]>> wrote: Hello, Just joined the list, I am evaluating NiFi for a large project to see if NiFi would fit as the main data collector. So far I am quite impressed with it's capabilities, the concept is just great! The project I am working on would require retrieving several hundreds of millions of files per day (hundreds of TB per day) so my first question is how to achieve distribution/clustering with NiFi, if that's possible. Thanks in advance! ________________________________ The information contained in this message may be confidential and legally protected under applicable law. The message is intended solely for the addressee(s). If you are not the intended recipient, you are hereby notified that any use, forwarding, dissemination, or reproduction of this message is strictly prohibited and may be unlawful. If you are not the intended recipient, please contact the sender by return e-mail and destroy all copies of the original message.
