This is an automated email from the ASF dual-hosted git repository.
pvillard pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/nifi.git
The following commit(s) were added to refs/heads/main by this push:
new 0e53a1c NIFI-9642 Update Admin Guide and User Guide with correct
nifi.properties default values
0e53a1c is described below
commit 0e53a1cb4e8e985badc9f6dab4777f0ba3a8e41f
Author: Andrew Lim <[email protected]>
AuthorDate: Tue Feb 1 19:39:34 2022 -0500
NIFI-9642 Update Admin Guide and User Guide with correct nifi.properties
default values
Signed-off-by: Pierre Villard <[email protected]>
This closes #5735.
---
.../src/main/asciidoc/administration-guide.adoc | 84 +++++++++++-----------
nifi-docs/src/main/asciidoc/user-guide.adoc | 2 +-
2 files changed, 42 insertions(+), 44 deletions(-)
diff --git a/nifi-docs/src/main/asciidoc/administration-guide.adoc
b/nifi-docs/src/main/asciidoc/administration-guide.adoc
index 96c90de..44a8e34 100644
--- a/nifi-docs/src/main/asciidoc/administration-guide.adoc
+++ b/nifi-docs/src/main/asciidoc/administration-guide.adoc
@@ -436,8 +436,8 @@ To enable authentication via OpenId Connect the following
properties must be con
|==================================================================================================================================================
| Property Name | Description
|`nifi.security.user.oidc.discovery.url` | The discovery URL for the desired
OpenId Connect Provider
(link:http://openid.net/specs/openid-connect-discovery-1_0.html[http://openid.net/specs/openid-connect-discovery-1_0.html^]).
-|`nifi.security.user.oidc.connect.timeout` | Connect timeout when
communicating with the OpenId Connect Provider.
-|`nifi.security.user.oidc.read.timeout` | Read timeout when communicating with
the OpenId Connect Provider.
+|`nifi.security.user.oidc.connect.timeout` | Connect timeout when
communicating with the OpenId Connect Provider. The default value is `5 secs`.
+|`nifi.security.user.oidc.read.timeout` | Read timeout when communicating with
the OpenId Connect Provider. The default value is `5 secs`.
|`nifi.security.user.oidc.client.id` | The client id for NiFi after
registration with the OpenId Connect Provider.
|`nifi.security.user.oidc.client.secret` | The client secret for NiFi after
registration with the OpenId Connect Provider.
|`nifi.security.user.oidc.preferred.jwsalgorithm` | The preferred algorithm
for validating identity tokens. If this value is blank, it will default to
`RS256` which is required to be supported
@@ -461,17 +461,17 @@ To enable authentication via SAML the following
properties must be configured in
|`nifi.security.user.saml.sp.entity.id`| The entity id of the service provider
(i.e. NiFi). This value will be used as the `Issuer` for SAML authentication
requests and should be a valid URI. In some cases the service provider entity
id must be registered ahead of time with the identity provider.
|`nifi.security.user.saml.identity.attribute.name`| The name of a SAML
assertion attribute containing the user'sidentity. This property is optional
and if not specified, or if the attribute is not found, then the NameID of the
Subject will be used.
|`nifi.security.user.saml.group.attribute.name`| The name of a SAML assertion
attribute containing group names the user belongs to. This property is
optional, but if populated the groups will be passed along to the authorization
process.
-|`nifi.security.user.saml.metadata.signing.enabled`| Enables signing of the
generated service provider metadata.
-|`nifi.security.user.saml.request.signing.enabled`| Controls the value of
`AuthnRequestsSigned` in the generated service provider metadata from
`nifi-api/access/saml/metadata`. This indicates that the service provider (i.e.
NiFi) should not sign authentication requests sent to the identity provider,
but the requests may still need to be signed if the identity provider indicates
`WantAuthnRequestSigned=true`.
-|`nifi.security.user.saml.want.assertions.signed`| Controls the value of
`WantAssertionsSigned` in the generated service provider metadata from
`nifi-api/access/saml/metadata`. This indicates that the identity provider
should sign assertions, but some identity providers may provide their own
configuration for controlling whether assertions are signed.
-|`nifi.security.user.saml.signature.algorithm`| The algorithm to use when
signing SAML messages. Reference the
link:https://git.shibboleth.net/view/?p=java-xmltooling.git;a=blob;f=src/main/java/org/opensaml/xml/signature/SignatureConstants.java[Open
SAML Signature Constants] for a list of valid values. If not specified, a
default of SHA-256 will be used.
-|`nifi.security.user.saml.signature.digest.algorithm`| The digest algorithm to
use when signing SAML messages. Reference the
link:https://git.shibboleth.net/view/?p=java-xmltooling.git;a=blob;f=src/main/java/org/opensaml/xml/signature/SignatureConstants.java[Open
SAML Signature Constants] for a list of valid values. If not specified, a
default of SHA-256 will be used.
-|`nifi.security.user.saml.message.logging.enabled`| Enables logging of SAML
messages for debugging purposes.
-|`nifi.security.user.saml.authentication.expiration`| The expiration of the
NiFi JWT that will be produced from a successful SAML authentication response.
-|`nifi.security.user.saml.single.logout.enabled`| Enables SAML SingleLogout
which causes a logout from NiFi to logout of the identity provider. By default,
a logout of NiFi will only remove the NiFi JWT.
+|`nifi.security.user.saml.metadata.signing.enabled`| Enables signing of the
generated service provider metadata. The default value is `false`.
+|`nifi.security.user.saml.request.signing.enabled`| Controls the value of
`AuthnRequestsSigned` in the generated service provider metadata from
`nifi-api/access/saml/metadata`. This indicates that the service provider (i.e.
NiFi) should not sign authentication requests sent to the identity provider,
but the requests may still need to be signed if the identity provider indicates
`WantAuthnRequestSigned=true`. The default value is `false`.
+|`nifi.security.user.saml.want.assertions.signed`| Controls the value of
`WantAssertionsSigned` in the generated service provider metadata from
`nifi-api/access/saml/metadata`. This indicates that the identity provider
should sign assertions, but some identity providers may provide their own
configuration for controlling whether assertions are signed. The default value
is `true`.
+|`nifi.security.user.saml.signature.algorithm`| The algorithm to use when
signing SAML messages. Reference the
link:https://git.shibboleth.net/view/?p=java-xmltooling.git;a=blob;f=src/main/java/org/opensaml/xml/signature/SignatureConstants.java[Open
SAML Signature Constants] for a list of valid values. If not specified, a
default of SHA-256 will be used. The default value is
`http://www.w3.org/2001/04/xmldsig-more#rsa-sha256`.
+|`nifi.security.user.saml.signature.digest.algorithm`| The digest algorithm to
use when signing SAML messages. Reference the
link:https://git.shibboleth.net/view/?p=java-xmltooling.git;a=blob;f=src/main/java/org/opensaml/xml/signature/SignatureConstants.java[Open
SAML Signature Constants] for a list of valid values. If not specified, a
default of SHA-256 will be used. The default value is
`http://www.w3.org/2001/04/xmlenc#sha256`.
+|`nifi.security.user.saml.message.logging.enabled`| Enables logging of SAML
messages for debugging purposes. The default value is `false`.
+|`nifi.security.user.saml.authentication.expiration`| The expiration of the
NiFi JWT that will be produced from a successful SAML authentication response.
The default value is `12 hours`.
+|`nifi.security.user.saml.single.logout.enabled`| Enables SAML SingleLogout
which causes a logout from NiFi to logout of the identity provider. By default,
a logout of NiFi will only remove the NiFi JWT. The default value is `false`.
|`nifi.security.user.saml.http.client.truststore.strategy`| The truststore
strategy when the IDP metadata URL begins with https. A value of `JDK`
indicates to use the JDK's default truststore. A value of`NIFI`indicates to use
the truststore specified by `nifi.security.truststore`.
-|`nifi.security.user.saml.http.client.connect.timeout`| The connection timeout
when communicating with the SAML IDP.
-|`nifi.security.user.saml.http.client.read.timeout`| The read timeout when
communicating with the SAML IDP.
+|`nifi.security.user.saml.http.client.connect.timeout`| The connection timeout
when communicating with the SAML IDP. The default value is `30 secs`.
+|`nifi.security.user.saml.http.client.read.timeout`| The read timeout when
communicating with the SAML IDP. The default value is `30 secs`.
|==================================================================================================================================================
[[apache_knox]]
@@ -484,7 +484,7 @@ To enable authentication via Apache Knox the following
properties must be config
| Property Name | Description
|`nifi.security.user.knox.url` | The URL for the Apache Knox login page.
|`nifi.security.user.knox.publicKey` | The path to the Apache Knox public key
that will be used to verify the signatures of the authentication tokens in the
HTTP Cookie.
-|`nifi.security.user.knox.cookieName` | The name of the HTTP Cookie that
Apache Knox will generate after successful login.
+|`nifi.security.user.knox.cookieName` | The name of the HTTP Cookie that
Apache Knox will generate after successful login. The default value is
`hadoop-jwt`.
|`nifi.security.user.knox.audiences` | Optional. A comma separate listed of
allowed audiences. If set, the audience in the token must be present in
this listing. The audience that is populated in the token can be configured in
Knox.
|==================================================================================================================================================
@@ -2743,11 +2743,11 @@ configured recipients whenever NiFi is stopped.
|`nifi.died.notification.services`|This property is a comma-separated list of
Notification Service identifiers that correspond to the Notification Services
defined in the `notification.services.file`
property. The services with the specified identifiers will be used to notify
their
configured recipients if the bootstrap
determines that NiFi has unexpectedly died.
-|`nifi.diagnostics.on.shutdown.enabled`|(true or false) This property decides
whether to run NiFi diagnostics before shutting down.
-|`nifi.diagnostics.on.shutdown.verbose`|(true or false) This property decides
whether to run NiFi diagnostics in verbose mode.
-|`nifi.diagnostics.on.shutdown.directory`|This property specifies the location
of the NiFi diagnostics directory.
-|`nifi.diagnostics.on.shutdown.max.filecount`|This property specifies the
maximum permitted number of diagnostic files. If the limit is exceeded, the
oldest files are deleted.
-|`nifi.diagnostics.on.shutdown.max.directory.size`|This property specifies the
maximum permitted size of the diagnostics directory. If the limit is exceeded,
the oldest files are deleted.
+|`nifi.diagnostics.on.shutdown.enabled`|(true or false) This property decides
whether to run NiFi diagnostics before shutting down. The default value is
`false`.
+|`nifi.diagnostics.on.shutdown.verbose`|(true or false) This property decides
whether to run NiFi diagnostics in verbose mode. The default value is `false`.
+|`nifi.diagnostics.on.shutdown.directory`|This property specifies the location
of the NiFi diagnostics directory. The default value is `./diagnostics`.
+|`nifi.diagnostics.on.shutdown.max.filecount`|This property specifies the
maximum permitted number of diagnostic files. If the limit is exceeded, the
oldest files are deleted. The default value is `10`.
+|`nifi.diagnostics.on.shutdown.max.directory.size`|This property specifies the
maximum permitted size of the diagnostics directory. If the limit is exceeded,
the oldest files are deleted. The default value is `10 MB`.
|====
[[notification_services]]
@@ -3044,8 +3044,8 @@ only considered if
`nifi.security.user.login.identity.provider` is configured wi
|`nifi.templates.directory`*|This is the location of the directory where flow
templates are saved (for backward compatibility only). Templates are stored in
the _flow.json.gz_ starting with NiFi 1.0. The template directory can be used
to (bulk) import templates into the _flow.json.gz_ automatically on NiFi
startup. The default value is `./conf/templates`.
|`nifi.ui.banner.text`|This is banner text that may be configured to display
at the top of the User Interface. It is blank by default.
|`nifi.ui.autorefresh.interval`|The interval at which the User Interface
auto-refreshes. The default value is `30 secs`.
-|`nifi.nar.library.directory`|The location of the nar library. The default
value is `./lib` and probably should be left as is.
-|`nifi.restore.directory`|The location that certain providers (e.g.
UserGroupProviders) will look for previous configurations to restore from.
There is no default value.
+|`nifi.nar.library.directory`|The location of the nar library. The default
value is `./lib` and probably should be left as is.
+|`nifi.restore.directory`|The location that certain providers (e.g.
UserGroupProviders) will look for previous configurations to restore from.
There is no default value.
+
*NOTE*: Additional library directories can be specified by using the
`nifi.nar.library.directory.` prefix with unique suffixes and separate paths as
values. +
+
@@ -3071,8 +3071,8 @@ for components to persist state. See the
<<state_management>> section for more i
|`nifi.state.management.configuration.file`|The XML file that contains
configuration for the local and cluster-wide State Providers. The default value
is `./conf/state-management.xml`.
|`nifi.state.management.provider.local`|The ID of the Local State Provider to
use. This value must match the value of the `id` element of one of the
`local-provider` elements in the _state-management.xml_ file.
|`nifi.state.management.provider.cluster`|The ID of the Cluster State Provider
to use. This value must match the value of the `id` element of one of the
`cluster-provider` elements in the _state-management.xml_ file. This value is
ignored if not clustered but is required for nodes in a cluster.
-|`nifi.state.management.embedded.zookeeper.start`|Specifies whether or not
this instance of NiFi should start an embedded ZooKeeper Server. This is used
in conjunction with the ZooKeeperStateProvider.
-|`nifi.state.management.embedded.zookeeper.properties`|Specifies a properties
file that contains the configuration for the embedded ZooKeeper Server that is
started (if the `nifi.state.management.embedded.zookeeper.start` property is
set to `true`)
+|`nifi.state.management.embedded.zookeeper.start`|Specifies whether or not
this instance of NiFi should start an embedded ZooKeeper Server. This is used
in conjunction with the ZooKeeperStateProvider. The default value is `false`.
+|`nifi.state.management.embedded.zookeeper.properties`|Specifies a properties
file that contains the configuration for the embedded ZooKeeper Server that is
started (if the `nifi.state.management.embedded.zookeeper.start` property is
set to `true`). The default value is `./conf/zookeeper.properties`.
|====
@@ -3148,7 +3148,7 @@ To do so, set the value of this property to
`org.wali.MinimalLockingWriteAheadLo
If the value of this property is changed, upon restart, NiFi will still
recover the records written using the previously configured repository and
delete the files written by the previously configured
implementation.
|`nifi.flowfile.repository.directory`*|The location of the FlowFile
Repository. The default value is `./flowfile_repository`.
-|`nifi.flowfile.repository.checkpoint.interval`| The FlowFile Repository
checkpoint interval. The default value is `2 mins`.
+|`nifi.flowfile.repository.checkpoint.interval`| The FlowFile Repository
checkpoint interval. The default value is `20 secs`.
|`nifi.flowfile.repository.always.sync`|If set to `true`, any change to the
repository will be synchronized to the disk, meaning that NiFi will ask the
operating system not to cache the information. This is very expensive and can
significantly reduce NiFi performance. However, if it is `false`, there could
be the potential for data loss if either there is a sudden power loss or the
operating system crashes. The default value is `false`.
|====
@@ -3335,7 +3335,7 @@ When not set, the default value is derived as 2% greater
than `nifi.content.repo
For example, if `nifi.content.repository.archive.max.usage.percentage` is
`50%` and `nifi.content.repository.archive.backpressure.percentage` is not set,
the effective value of
`nifi.content.repository.archive.backpressure.percentage` will be `52%`.
|`nifi.content.repository.archive.enabled`|To enable content archiving, set
this to `true` and specify a value for the
`nifi.content.repository.archive.max.usage.percentage` property above. Content
archiving enables the provenance UI to view or replay content that is no longer
in a dataflow queue. By default, archiving is enabled.
|`nifi.content.repository.always.sync`|If set to `true`, any change to the
repository will be synchronized to the disk, meaning that NiFi will ask the
operating system not to cache the information. This is very expensive and can
significantly reduce NiFi performance. However, if it is `false`, there could
be the potential for data loss if either there is a sudden power loss or the
operating system crashes. The default value is `false`.
-|`nifi.content.viewer.url`|The URL for a web-based content viewer if one is
available. It is blank by default.
+|`nifi.content.viewer.url`|The URL for a web-based content viewer if one is
available. The default is `../nifi-content-viewer/`.
|`nifi.content.repository.archive.cleanup.frequency`| The frequency with which
to schedule the content archive clean up task. The default value is `1 Second`.
A value lower than `1 Second` is not allowed.
|====
@@ -3411,7 +3411,7 @@ For example, to provide two additional locations to act
as part of the provenanc
`nifi.provenance.repository.directory.provenance2=/repos/provenance2` +
+
Providing three total locations, including
`nifi.provenance.repository.directory.default`.
-|`nifi.provenance.repository.max.storage.time`|The maximum amount of time to
keep data provenance information. The default value is `24 hours`.
+|`nifi.provenance.repository.max.storage.time`|The maximum amount of time to
keep data provenance information. The default value is `30 days`.
|`nifi.provenance.repository.max.storage.size`|The maximum amount of data
provenance information to store at a time.
The default value is `10 GB`. The Data Provenance capability can consume a
great deal of storage space because so much data is kept.
For production environments, values of 1-2 TB or more is not uncommon. The
repository will write to a single "event file" (or set of
@@ -3490,9 +3490,9 @@ For example, to provide two additional locations to act
as part of the provenanc
`nifi.provenance.repository.directory.provenance2=/repos/provenance2` +
+
Providing three total locations, including
`nifi.provenance.repository.directory.default`.
-|`nifi.provenance.repository.max.storage.time`|The maximum amount of time to
keep data provenance information. The default value is `24 hours`.
+|`nifi.provenance.repository.max.storage.time`|The maximum amount of time to
keep data provenance information. The default value is `30 days`.
|`nifi.provenance.repository.max.storage.size`|The maximum amount of data
provenance information to store at a time. The default value is `10 GB`.
-|`nifi.provenance.repository.rollover.time`|The amount of time to wait before
rolling over the latest data provenance information so that it is available in
the User Interface. The default value is `30 secs`.
+|`nifi.provenance.repository.rollover.time`|The amount of time to wait before
rolling over the latest data provenance information so that it is available in
the User Interface. The default value is `10 mins`.
|`nifi.provenance.repository.rollover.size`|The amount of information to roll
over at a time. The default value is `100 MB`.
|`nifi.provenance.repository.query.threads`|The number of threads to use for
Provenance Repository queries. The default value is `2`.
|`nifi.provenance.repository.index.threads`|The number of threads to use for
indexing Provenance events so that they are searchable. The default value is
`2`.
@@ -3567,7 +3567,7 @@ Remote Process Groups can choose transport protocol from
RAW and HTTP. Propertie
|====
|*Property*|*Description*
|`nifi.remote.input.host`|The host name that will be given out to clients to
connect to this NiFi instance for Site-to-Site communication. By default, it is
the value from `InetAddress.getLocalHost().getHostName()`. On UNIX-like
operating systems, this is typically the output from the `hostname` command.
-|`nifi.remote.input.secure`|This indicates whether communication between this
instance of NiFi and remote NiFi instances should be secure. By default, it is
set to `false`. In order for secure site-to-site to work, set the property to
`true`. Many other <<security_properties>> must also be configured.
+|`nifi.remote.input.secure`|This indicates whether communication between this
instance of NiFi and remote NiFi instances should be secure (i.e., secure
site-to-site). By default, it is set to `true`. Many other
<<security_properties>> must also be configured.
|`nifi.remote.input.socket.port`|The remote input socket port for Site-to-Site
communication. By default, it is blank, but it must have a value in order to
use RAW socket as transport protocol for Site-to-Site.
|`nifi.remote.input.http.enabled`|Specifies whether HTTP Site-to-Site should
be enabled on this host. By default, it is set to `true`. +
Whether a Site-to-Site client uses HTTP or HTTPS is determined by
`nifi.remote.input.secure`. If it is set to `true`, then requests are sent as
HTTPS to `nifi.web.https.port`. If set to `false`, HTTP requests are sent to
`nifi.web.http.port`.
@@ -3855,7 +3855,6 @@ Providing three total network interfaces, including
`nifi.web.http.network.inte
|`nifi.web.https.port.forwarding`|Same as `nifi.web.http.port.forwarding`, but
with HTTPS for secure communication. It is blank by default.
|`nifi.web.https.ciphersuites.include`|Cipher suites used to initialize the
SSLContext of the Jetty HTTPS port. If unspecified, the runtime SSLContext
defaults are used.
|`nifi.web.https.ciphersuites.exclude`|Cipher suites that may not be used by
an SSL client to establish a connection to Jetty. If unspecified, the runtime
SSLContext defaults are used.
-|`nifi.web.max.access.token.requests.per.second`| Maximum amount of requests
per second the token endpoints will accept before filtering requests. The
default value is `25`
|`nifi.web.should.send.server.version`| Whether the Server header should be
included in HTTP responses. The default value is `true` +
In Chrome, the SSL cipher negotiated with Jetty may be examined in the
'Developer Tools' plugin, in the 'Security' tab.
@@ -3881,8 +3880,8 @@ host[:port] that NiFi is bound to.
|`nifi.web.proxy.context.path`|A comma separated list of allowed HTTP
X-ProxyContextPath, X-Forwarded-Context, or X-Forwarded-Prefix header values to
consider. By default, this value is
blank meaning all requests containing a proxy context path are rejected.
Configuring this property would allow requests where the proxy path is
contained in this listing.
|`nifi.web.max.content.size`|The maximum size (HTTP `Content-Length`) for PUT
and POST requests. No default value is set for backward compatibility.
Providing a value for this property enables the `Content-Length` filter on all
incoming API requests (except Site-to-Site and cluster communications). A
suggested value is `20 MB`.
-|`nifi.web.max.requests.per.second`|The maximum number of requests from a
connection per second. Requests in excess of this are first delayed, then
throttled.
-|`nifi.web.max.access.token.requests.per.second`|The maximum number of
requests for login Access Tokens from a connection per second. Requests in
excess of this are rejected with HTTP 429.
+|`nifi.web.max.requests.per.second`|The maximum number of requests from a
connection per second. Requests in excess of this are first delayed, then
throttled. The default value is `30000`.
+|`nifi.web.max.access.token.requests.per.second`|The maximum number of
requests for login Access Tokens from a connection per second. Requests in
excess of this are rejected with HTTP 429. The default value is `25`.
|`nifi.web.request.ip.whitelist`|A comma separated list of IP addresses. Used
to specify the IP addresses of clients which can exceed the maximum requests
per second (`nifi.web.max.requests.per.second`). Does not apply to web request
timeout.
|`nifi.web.request.timeout`|The request timeout for web requests. Requests
running longer than this time will be forced to end with a HTTP 503 Service
Unavailable response. Default value is `60 secs`.
|`nifi.web.request.log.format`|The parameterized format for HTTP request log
messages.
@@ -3913,17 +3912,16 @@ These properties pertain to various security features
in NiFi. Many of these pro
|`nifi.sensitive.props.additional.keys`|The comma separated list of properties
in _nifi.properties_ to encrypt in addition to the default sensitive properties
(see <<encrypt-config_tool>>).
|`nifi.security.autoreload.enabled`|Specifies whether the SSL context factory
should be automatically reloaded if updates to the keystore and truststore are
detected. By default, it is set to `false`.
|`nifi.security.autoreload.interval`|Specifies the interval at which the
keystore and truststore are checked for updates. Only applies if
`nifi.security.autoreload.enabled` is set to `true`. The default value is `10
secs`.
-|`nifi.security.keystore`*|The full path and name of the keystore. It is blank
by default.
-|`nifi.security.keystoreType`|The keystore type. It is blank by default.
+|`nifi.security.keystore`*|The full path and name of the keystore. The default
value is `./conf/keystore.p12`.
+|`nifi.security.keystoreType`|The keystore type. The default value is `PKCS12`.
|`nifi.security.keystorePasswd`|The keystore password. It is blank by default.
|`nifi.security.keyPasswd`|The key password. It is blank by default.
-|`nifi.security.truststore`*|The full path and name of the truststore. It is
blank by default.
-|`nifi.security.truststoreType`|The truststore type. It is blank by default.
+|`nifi.security.truststore`*|The full path and name of the truststore. The
default value is `./conf/truststore.p12`.
+|`nifi.security.truststoreType`|The truststore type. The default value is
`PKCS12`.
|`nifi.security.truststorePasswd`|The truststore password. It is blank by
default.
-|`nifi.security.user.authorizer`|Specifies which of the configured Authorizers
in the _authorizers.xml_ file to use. By default, it is set to `file-provider`.
-|`nifi.security.allow.anonymous.authentication`|Whether anonymous
authentication is allowed when running over HTTPS. If set to true, client
certificates are not required to connect via TLS.
-|`nifi.security.user.login.identity.provider`|This indicates what type of
login identity provider to use. The default value is blank, can be set to the
identifier from a provider
-in the file specified in `nifi.login.identity.provider.configuration.file`.
Setting this property will trigger NiFi to support username/password
authentication.
+|`nifi.security.user.authorizer`|Specifies which of the configured Authorizers
in the _authorizers.xml_ file to use. By default, it is set to
`single-user-authorizer`.
+|`nifi.security.allow.anonymous.authentication`|Whether anonymous
authentication is allowed when running over HTTPS. If set to true, client
certificates are not required to connect via TLS. The default value is `false`.
+|`nifi.security.user.login.identity.provider`|This indicates what type of
login identity provider to use. It can be set to the identifier from a provider
in the file specified in `nifi.login.identity.provider.configuration.file`.
Setting this property will trigger NiFi to support username/password
authentication. The default value is `single-user-provider`.
|`nifi.security.ocsp.responder.url`|This is the URL for the Online Certificate
Status Protocol (OCSP) responder if one is being used. It is blank by default.
|`nifi.security.ocsp.responder.certificate`|This is the location of the OCSP
responder certificate if one is being used. It is blank by default.
|====
@@ -4017,14 +4015,14 @@ to join a cluster.
|`nifi.zookeeper.connect.string`|The Connect String that is needed to connect
to Apache ZooKeeper. This is a comma-separated list
of hostname:port pairs. For example,
`localhost:2181,localhost:2182,localhost:2183`. This should contain a list of
all ZooKeeper
instances in the ZooKeeper quorum. This property must be specified to join a
cluster and has no default value.
-|`nifi.zookeeper.connect.timeout`|How long to wait when connecting to
ZooKeeper before considering the connection a failure. The default value is `3
secs`.
-|`nifi.zookeeper.session.timeout`|How long to wait after losing a connection
to ZooKeeper before the session is expired. The default value is `3 secs`.
+|`nifi.zookeeper.connect.timeout`|How long to wait when connecting to
ZooKeeper before considering the connection a failure. The default value is `10
secs`.
+|`nifi.zookeeper.session.timeout`|How long to wait after losing a connection
to ZooKeeper before the session is expired. The default value is `10 secs`.
|`nifi.zookeeper.root.node`|The root ZNode that should be used in ZooKeeper.
ZooKeeper provides a directory-like structure
for storing data. Each 'directory' in this structure is referred to as a
ZNode. This denotes the root ZNode, or 'directory',
-that should be used for storing data. The default value is `/root`. This is
important to set correctly, as which cluster
+that should be used for storing data. The default value is `/nifi`. This is
important to set correctly, as which cluster
the NiFi instance attempts to join is determined by which ZooKeeper instance
it connects to and the ZooKeeper Root Node
that is specified.
-|`nifi.zookeeper.client.secure`|Whether to acccess ZooKeeper using client TLS.
+|`nifi.zookeeper.client.secure`|Whether to acccess ZooKeeper using client TLS.
The default value is `false`.
|`nifi.zookeeper.security.keystore`|Filename of the Keystore containing the
private key to use when communicating with ZooKeeper.
|`nifi.zookeeper.security.keystoreType`|Optional. The type of the Keystore.
Must be `PKCS12`, `JKS`, or `PEM`. If not specified the type will be determined
from the file extension (`.p12`, `.jks`, `.pem`).
|`nifi.zookeeper.security.keystorePasswd`|The password for the Keystore.
diff --git a/nifi-docs/src/main/asciidoc/user-guide.adoc
b/nifi-docs/src/main/asciidoc/user-guide.adoc
index fb1e612..7f9be1d 100644
--- a/nifi-docs/src/main/asciidoc/user-guide.adoc
+++ b/nifi-docs/src/main/asciidoc/user-guide.adoc
@@ -2872,7 +2872,7 @@ Many of the same system properties are supported by both
the Persistent and Writ
* Change the settings for `nifi.provenance.repository.max.storage.time`
(default value of `24 hours`) and `nifi.provenance.repository.max.storage.size`
(default value of `1 GB`) to values more suitable for your production
environment
* Change `nifi.provenance.repository.index.shard.size` from the default value
of `500 MB` to `4 GB`
* Change `nifi.provenance.repository.index.threads` from the default value of
`2` to either `4` or `8` as the Write Ahead repository enables this to scale
better
-* If processing a high volume of events, change
`nifi.provenance.repository.rollover.time` from a default of `30 secs` to `1
min` and `nifi.provenance.repository.rollover.size` from the default of `100
MB` to `1 GB`
+* If processing a high volume of events, change
`nifi.provenance.repository.rollover.size` from the default of `100 MB` to `1
GB`
Once these property changes have been made, restart NiFi.