Paul, Thanks for providing some additional perspective on the Kafka components, and for your extensive work on the new Processors.
It sounds like some next steps involve writing up some Jira issues for additional features. NIFI-12952 outlines the authentication features as you noted, so it sounds like another for a new KafkaRecordSink would be worth considering. The RecordSink interface has more narrow usage, so that might be worth additional consideration before proceeding directly to implementation. As far as exactly once semantics, it would also be helpful to outline the scope of implementation for that work. With NiFi 2.0 supporting stateless execution for any process group, and with the new Kafka Connection Service architecture, there may be some opportunity for taking a different approach than previously implemented. With that background, I recognize the challenge of migration from existing Processors, and the gaps for some use cases. Although one option could be to continue maintaining the Kafka 2.6 Processors, this presents a larger maintenance effort together with the new components. Recognizing the concerns Pierre highlighted about migration, focusing on implementing features following the new design seems to be the better way forward from a project maintenance perspective. One important detail here we can note in Migration Guidance is that the nifi-kafka-nar version 2.0.0-M4 is available in Maven Central. Loading that NAR should provide an option for existing users to run with subsequent versions of NiFI 2.0, supporting a transitional path to the new components. Although it is not an automated migration, it does provide a path forward. I recognize that Kafka support is a key capability, and this migration is bound to be one of the more challenging aspects. However, NiFi 2.0 presents an important step forward on a number of levels. Tracking and addressing issues with the new Kafka components should provide the best path for maintainability. Regards, David Handermann On Mon, Jul 8, 2024 at 9:08 AM Paul Grey <grey...@gmail.com> wrote: > > > > > Kafka 2.6 parity concern - Can you share more on what is missing? > > Obviously supporting Kafka users within NiFi is quite important but I think > > we're making the right steps here. Whatever gap we have now let's identify > > and see who can knock it out. > > > I cited a few in the PR description [1]. > > > > - The PR as is should support the following authentication strategies: > > PLAINTEXT, SSL, SASL_PLAINTEXT, and SASL_SSL. Support for additional > > authentication strategies could be handled via follow on JIRAs. > > - Support for the KafkaRecordSink form factor could be handled via > > follow on JIRAs. > > - Support for Kafka "exactly once" semantics could be handled via > > follow on JIRAs. > > - Migration documentation could be handled via follow on JIRAs. > > > > This should not be considered a complete list. I consider it likely that > there are others that I did not identify. I did try to capture that > thinking in the PR [2]. > > Of note, there is a follow on JIRA [3] to flag the authentication features > that were backed in *Kafka_2_6 by processor properties. There likely > should be other JIRAs. > > In my opinion, this upgrade is more involved than the upgrade from > *Kafka*_2_0 to *Kafka*_2_6, from a design perspective, an implementation > perspective, and from the perspective of representing usages in a flow > definition. This has the potential to cause a lot of problems for the > community. > > It is hard for me to weigh all of the factors that should go into the > retain / remove decision for Kafka 2.6, and I understand that I am a guest > at this party. It does complicate things that the community is trying to > close the book on NiFi 2.0 with a minimum of technical debt. But I'm not > comfortable saying that the known (and unknown) functionality gaps can be > addressed in the timeline I've seen discussed elsewhere for 2.0 GA. And I > don't think that 2.0 should be held up for this issue. There is so much > good in the main line, when compared against 1.x. > > > [1] https://github.com/apache/nifi/pull/8463 > [2] https://github.com/apache/nifi/pull/8463#issuecomment-2090939791 > [3] https://issues.apache.org/jira/browse/NIFI-12952 > > > On Mon, Jul 8, 2024 at 8:24 AM David Handermann <exceptionfact...@apache.org> > wrote: > > > All, > > > > The discussion thus far has highlighted some important aspects of > > project maintenance at both general and specific levels. Clearly > > everyone shares a common goal to provide a supported and maintainable > > product. The concerns mentioned reflect the natural tension in any > > kind of technical debt evaluation, so the challenge is to determine > > how to navigate those concerns. > > > > As Joe said, nothing is lost, the source code and previous releases > > remain available for both internal and external use. > > > > Regarding the timeline for handling the removal of particular > > features, it is important to note that nothing has occurred outside of > > standard procedures. Every change has had a Jira issue, a pull > > request, feedback, and signed-off commits. Regarding updates to the > > deprecated features page, that has always occurred after merging, not > > before, because it reflects committed changes, rather than proposed > > changes. I understand the concern Pierre raised regarding the pace of > > some changes, so if contributing members of the PMC see a need to have > > a standard waiting period for Jira issues or pull requests, we should > > consider that on a separate thread. Not having that right now, it > > remains important that both removals and additions provide some sort > > of rationale as background. Sometimes that only requires a sentence or > > two, sometimes more, but that also characterizes the majority of > > changes. We have had past discussions about the need for feature > > proposals, and if it would improve maintainability to consider review > > timelines, active contributors should discuss the options. For now, > > however, raising issues even after merging changes continues to be a > > valid way to handle things that may have been missed. > > > > On repository encryption itself, the conversation thus far rightly > > acknowledged the problems noted in the Jira issue [1] NIFI-13494. > > Removal of repository encryption is one several security-focused > > removals, along with support for historical encryption processors and > > application property protection. Although these removals will > > undoubtedly impact some users, this is an area where we cannot > > maintain extended support at the community level. Encryption features > > include an inherent promise of security. If certain encryption > > features have fundamental flaws, it is better to remove those features > > than to hold on to compatibility. Major version changes are the > > standard way to introduce breaking changes, and that has been one of > > the primary themes for NiFi 2.0. With that understanding in mind, > > there is value in considering future alternatives. If there are any > > unanswered questions about security-focused feature removals, I would > > be glad to provide more background as one who has both introduced > > features and removed them during this process. > > > > The project has enjoyed significant adoption and contribution over the > > years. The process of preparing for NiFi 2.0 has highlighted a number > > of things, particularly that it is far easier to introduce > > capabilities than to remove them. I believe we are on a solid path > > forward. When we focus on specific concerns, such as those Pierre > > raised regarding Kafka or Kudu, we can incorporate solutions as we go > > forward. > > > > Regards, > > David Handermann > > > > [1] https://issues.apache.org/jira/browse/NIFI-13494 > > > > On Sun, Jul 7, 2024 at 11:44 PM Joe Witt <joe.w...@gmail.com> wrote: > > > > > > Adam, > > > > > > We are all sympathetic to Pierre's view. As one of the people who > > > participates in contributing code, code reviews, discussions, conducting > > > releases, and more, his concerns and actions carry considerable weight > > for > > > those of us that do so as well and the broader community. > > > > > > For repository encryption we should have raised a discussion thread. > > > Fortunately every code change is reversible. Nothing is lost. If there > > is > > > anything needing undone let's discuss them. There are no ships sailing. > > > Just contributors contributing. > > > > > > If you keep the rest of the sentence in the quote you snipped it reads > > > "let's surface them and address them" which does the opposite of close > > off > > > conversation. > > > > > > Thanks > > > Joe > > > > > > > > > On Mon, Jul 8, 2024 at 12:07 AM Adam Taft <a...@adamtaft.com> wrote: > > > > > > > Feeling sympathetic to Pierre's point of view here. > > > > > > > > Picking specifically on the repository encryption issue itself, we have > > > > deprecation of a fundamental and well-known capability of NiFi. > > Repository > > > > encryption has been a key highlight and feature for those using NiFi in > > > > highly secure enclaves that maintain the strictest of auditing > > oversight. > > > > This change will no doubt cause reassessment efforts and scrutiny over > > what > > > > will be perceived as a loss of information security. > > > > > > > > The justification for the change is probably warranted. Maybe > > repository > > > > encryption should never have been a problem NiFi attempted to solve. > > But > > > > regardless, the change was made without reasonable discussion, at > > minimum, > > > > here on the mailing lists where an Apache project is supposed to have > > such > > > > discussions. > > > > > > > > - The PR to remove this capability was created 5 days ago. [1] > > > > - The github PR was accepted and merged 3 days ago, on July 4th, a US > > > > national holiday no less. [2] > > > > - The deprecated components page was updated to reflect this change > > > > *retroactively* 1 day ago. [3] > > > > > > > > Granted, I might not have seen additional mailing list discussions on > > this > > > > topic. I grepped my inbox, but maybe I missed it. But still, for a > > security > > > > feature to be removed in the timeline outlined above, even if it was > > > > brought to the mailing list, would have been aggressive. > > > > > > > > So yes, there's a smell here. Clearly there needs to be a balance of > > doing > > > > small/normal changes without a lot (or any) needed discussion on the > > > > mailing lists, using Jira as the main project driver. But likewise, > > there > > > > has to be a sense of when to promote a discussion (or even awareness) > > to > > > > the mailing list level. A removed feature that has any sort of > > touchpoint > > > > to information security should most definitely be brought forward here. > > > > > > > > I'm supportive of the removal, to be clear. But I'm not supportive of > > how > > > > it was handled. And saying we should need "*specific examples where > > > > something looks like it was handled poorly*" is a good way to close off > > > > conversation. That's a lot of work looking back at a ship that has > > already > > > > sailed. It's better to trust that an impacting feature will be raised > > to > > > > the larger audience than to hunt out and find surprises after the fact. > > > > Community trust is an essential aspect of an Apache OSS project. > > > > > > > > [1] https://issues.apache.org/jira/browse/NIFI-13494 > > > > [2] https://github.com/apache/nifi/pull/9039/commits > > > > [3] > > > > > > > > > > https://cwiki.apache.org/confluence/pages/viewpreviousversions.action?pageId=235834208 > > > > > > > > On Sun, Jul 7, 2024 at 1:34 PM Joe Witt <joe.w...@gmail.com> wrote: > > > > > > > > > Pierre, > > > > > > > > > > We are seeing active maintenance on the 1.x line and it is by the > > same > > > > > people active on the 2.x line. Is there a specific concern to > > highlight > > > > > and discuss? > > > > > > > > > > From the previous email the reference to things being removed > > quickly and > > > > > without discussion is something we need to ensure is being handled > > well. > > > > > If there are specific examples where something looks like it was > > handled > > > > > poorly then let's surface them and address them. > > > > > > > > > > The items you noted in your latest email specifically having concerns > > > > with: > > > > > > > > > > Kafka 2.6 parity concern - Can you share more on what is missing? > > > > > Obviously supporting Kafka users within NiFi is quite important but I > > > > think > > > > > we're making the right steps here. Whatever gap we have now let's > > > > identify > > > > > and see who can knock it out. > > > > > > > > > > Kudu: Releases look very infrequent for Kudu. We're on the > > latest. We > > > > > have vulnerable library hits and they've been there for a very long > > time. > > > > > This is an ideal candidate for a repository for components not > > likely to > > > > > see active changes. > > > > > > > > > > Repository Encryption: Such a component is both highly security > > sensitive > > > > > but also a tremendous code/maintenance issue. Considering how key > > > > > management for it worked to this point we should collaborate with > > users > > > > to > > > > > understand how to better achieve the desired outcome. > > > > > > > > > > Legacy Kafka and Kudu are good candidates for an extensions repo for > > > > things > > > > > which will likely not see active maintenance. Establishing such a > > > > > repository and the build process and so on for it is a considerable > > > > effort. > > > > > Just needs a volunteer to build that infra/process out. > > > > > > > > > > Thanks > > > > > > > > > > > > > > > > > > > > On Sun, Jul 7, 2024 at 11:04 AM Pierre Villard < > > > > > pierre.villard...@gmail.com> > > > > > wrote: > > > > > > > > > > > I'm not discussing the motivations behind the removal of what has > > been > > > > > > removed this week. It makes sense. But we can't expect to have > > users > > > > > > quickly move to 2.x when the amount of things users will have to > > take > > > > > care > > > > > > of when moving to 2.x keeps growing and is very significant. > > > > > > > > > > > > For the extensions, I'm a bit surprised by the removal of some > > > > extensions > > > > > > such as Kudu, that we know is used a lot by NiFi users, and has > > been > > > > > > actively maintained over the last few years. The one thing that > > > > concerns > > > > > me > > > > > > the most is the removal of the Kafka 2.6 components knowing that we > > > > don't > > > > > > have feature parity, yet, with the new approach. I understand that > > we > > > > > have > > > > > > to do the cut at some point and there is no easy solution but > > again it > > > > > > means that we should likely actively maintain 1.x for a longer > > period > > > > of > > > > > > time. > > > > > > > > > > > > On the framework side, I'm a bit concerned by the removal of > > repository > > > > > > encryption which is also something many users are using. Not saying > > > > this > > > > > is > > > > > > perfect and should not be removed but we can't just say "switch to > > OS > > > > > level > > > > > > encryption / cloud provider encryption". Again, this will take a > > lot of > > > > > > time for users using all of those things to adjust. > > > > > > > > > > > > We are putting more and more expectations on users to move to 2.x > > when > > > > > they > > > > > > have been using NiFi for many many years and have systems running > > > > > smoothly. > > > > > > I'm not saying we should not clean things up, but by taking this > > > > > approach, > > > > > > I think we owe our community an active maintenance of the 1.x > > branch as > > > > > > many users will need time to upgrade. > > > > > > > > > > > > Le dim. 7 juil. 2024 à 15:35, Joe Witt <joe.w...@gmail.com> a > > écrit : > > > > > > > > > > > > > Pierre > > > > > > > > > > > > > > Which things that have been removed are problematic and which > > bits > > > > got > > > > > > > removed too fast? There is no intent to make migration harder > > but > > > > > there > > > > > > is > > > > > > > to make it more sustainable. > > > > > > > > > > > > > > The focus is getting things with less known usage but highest > > tech > > > > debt > > > > > > > removed. These are things with problematic socket code, limited > > > > > security > > > > > > > features, capabilities we made new versions for and ultimately > > which > > > > > have > > > > > > > minimal maintenance. > > > > > > > > > > > > > > If there is something controversial getting removed lets discuss > > > > it. I > > > > > > > dont think keeping any of this in the main codebase is workable > > but > > > > it > > > > > > can > > > > > > > prompt having an extensions repository for lesser maintained > > > > > components. > > > > > > > This would help communicate these components have limited > > maintenance > > > > > but > > > > > > > may still be useful. > > > > > > > > > > > > > > If the bar to clean things up is higher than the bar to add new > > we > > > > > have a > > > > > > > known quality problem. We either have a similar bar or we need > > other > > > > > > > solutions. > > > > > > > > > > > > > > If there is a desire to see some (all?) decomissioned components > > kept > > > > > and > > > > > > > placed in an extensions repo to ease migration or just end user > > needs > > > > > is > > > > > > > there anybody available and interested to do that work? > > > > > > > > > > > > > > Thanks > > > > > > > > > > > > > > On Sun, Jul 7, 2024 at 5:42 AM Pierre Villard < > > > > > > pierre.villard...@gmail.com > > > > > > > > > > > > > > > wrote: > > > > > > > > > > > > > > > Given all the things that are being removed in 2.x without even > > > > > having > > > > > > a > > > > > > > > single discussion about it (PR opened and merged within 48 > > hours), > > > > we > > > > > > > > should not expect users (especially very large ones) to move > > from > > > > 1.x > > > > > > to > > > > > > > > 2.x any time soon. Things that have been removed over the last > > few > > > > > days > > > > > > > are > > > > > > > > going to be extremely impactful and will require users to do a > > > > > > > significant > > > > > > > > amount of work / re-architecturing to move to 2.x. It's a bit > > sad > > > > to > > > > > > see > > > > > > > so > > > > > > > > many things being done without any discussion in the community. > > > > > > > > > > > > > > > > Le ven. 5 juil. 2024 à 20:11, Michael Moser < > > moser...@gmail.com> a > > > > > > > écrit : > > > > > > > > > > > > > > > > > My opinion is that the NiFi 1.x line is already in > > maintenance > > > > and > > > > > > > > doesn't > > > > > > > > > need new features or APIs, but bug fixes are still important > > to > > > > get > > > > > > in, > > > > > > > > and > > > > > > > > > security fixes are still critical. > > > > > > > > > > > > > > > > > > That said, this is an open source community-driven project, > > so if > > > > > you > > > > > > > can > > > > > > > > > find contributors and committers that want to put in extra > > work > > > > to > > > > > > > > support > > > > > > > > > 1.x, then why not? I'm sure many of us have seen something > > new > > > > in > > > > > > NiFi > > > > > > > > and > > > > > > > > > thought "I wouldn't have done that". But others in the > > community > > > > > > > thought > > > > > > > > > it was a good idea, so why not? > > > > > > > > > > > > > > > > > > I don't really agree with the argument that putting too much > > work > > > > > > into > > > > > > > > 1.x > > > > > > > > > will delay people's transition to 2.0. People will > > transition to > > > > > 2.0 > > > > > > > on > > > > > > > > > their own schedule, with myriad reasons for that schedule. > > As a > > > > > > > > community, > > > > > > > > > we can simply make recommendations and provide solutions that > > > > help > > > > > > > with a > > > > > > > > > preferred direction. > > > > > > > > > > > > > > > > > > Kind regards, > > > > > > > > > -- Mike > > > > > > > > > > > > > > > > > > > > > > > > > > > On Wed, Jul 3, 2024 at 1:27 PM Joe Witt <joe.w...@gmail.com> > > > > > wrote: > > > > > > > > > > > > > > > > > > > Judith, > > > > > > > > > > > > > > > > > > > > The Apache NiFi 2.x line is built on and requires Java 21 > > and > > > > > will > > > > > > > not > > > > > > > > > > support any versions prior. > > > > > > > > > > > > > > > > > > > > NiFi 1.x line is built on Java 8 and requires either Java > > 8, > > > > 11, > > > > > or > > > > > > > 17. > > > > > > > > > > > > > > > > > > > > The dates you mention which extend to 2030/etc.. for a > > > > particular > > > > > > > > > > distributor of JVMs is a function of what sort of support > > that > > > > > > > > commercial > > > > > > > > > > vendor is making available to customers and it is different > > > > from > > > > > > what > > > > > > > > > that > > > > > > > > > > means for the public generally. > > > > > > > > > > > > > > > > > > > > Notably though it is also a very different concern from > > > > critical > > > > > > > > > > dependencies we have and how they evolve. For example we > > rely > > > > on > > > > > > > things > > > > > > > > > > like Spring and Jetty and so on. And these all choose to > > adopt > > > > > > > > language > > > > > > > > > > features or discontinue key lines which tie to certain Java > > > > > > versions, > > > > > > > > > > etc.. We can't control whether they choose to move to new > > > > major > > > > > > > lines > > > > > > > > > when > > > > > > > > > > they fix vulnerabilities or whether they backport, etc.. > > We > > > > held > > > > > > the > > > > > > > > > line > > > > > > > > > > on Java 8 support far longer than I imagined we could but > > the > > > > > > current > > > > > > > > > > confluence of events/scenarios means we made the jump all > > the > > > > way > > > > > > to > > > > > > > > Java > > > > > > > > > > 21 (an LTS) release with the hopes that we can set a good > > clock > > > > > for > > > > > > > > > people > > > > > > > > > > to work with for some time. > > > > > > > > > > > > > > > > > > > > The Java 1.x line will continue to be available for users > > to > > > > > > download > > > > > > > > and > > > > > > > > > > will still see general maintenance to the extent there are > > > > > > > contributors > > > > > > > > > > available to do that. You also have access to vendor > > supported > > > > > > paths > > > > > > > > to > > > > > > > > > > consider there which is similar to the stated 'Extended > > Support > > > > > > > > > > Availability' of Java. But they too will have to navigate > > the > > > > > > > > complexity > > > > > > > > > > of the reported vulnerabilities. > > > > > > > > > > > > > > > > > > > > My experience in the enterprise customer space is that > > > > tolerance > > > > > > for > > > > > > > > > > components which contain reported vulnerabilities is far > > far > > > > > lower > > > > > > > than > > > > > > > > > > ever before. This in turn means the focus shifts to giving > > > > > people > > > > > > > > strong > > > > > > > > > > upgrade paths to consider. > > > > > > > > > > > > > > > > > > > > Thanks > > > > > > > > > > Joe > > > > > > > > > > > > > > > > > > > > On Wed, Jul 3, 2024 at 10:10 AM Maucieri, Judith < > > > > > copos...@ctc.com > > > > > > > > > > > > > > > > wrote: > > > > > > > > > > > > > > > > > > > > > If I may: One large obstacle to "our" shift to v2.x is > > the > > > > > > absence > > > > > > > > of > > > > > > > > > > > Java 8 support (unless I overlooked updates to the plan > > > > stated > > > > > in > > > > > > > > > > November > > > > > > > > > > > 2022 during release of version 1.19.0, Java 8 only > > remains in > > > > > > NiFi > > > > > > > > 1.x > > > > > > > > > > > releases, which you hinted at remaining accurate). > > > > > > > > > > > > > > > > > > > > > > I make this statement in support of multiple scenarios > > where > > > > we > > > > > > > > employ > > > > > > > > > > > Apache NiFi. CVEs that are not addressed in v1.x would > > be a > > > > > > major > > > > > > > > > > > concern. In our case, per requirements levied upon us, > > we > > > > must > > > > > > > > > maintain > > > > > > > > > > > compatibility with all active Long Term Support (LTS) > > > > versions > > > > > of > > > > > > > > Java. > > > > > > > > > > I > > > > > > > > > > > feel this is reinforced by LTS of RHEL 7, which just > > began > > > > and > > > > > > > > extends > > > > > > > > > > into > > > > > > > > > > > 2028 and employs (by default) Java 8. > > > > > > > > > > > > > > > > > > > > > > Note the LTS dates currently indicated (reference > > > > > > > > > > > https://en.wikipedia.org/wiki/Java_version_history): > > > > > > > > > > > - Java 8 December 2030 > > > > > > > > > > > - Java 11 January 2032 > > > > > > > > > > > - Java 17 September 2029 > > > > > > > > > > > - Java 21 September 2031 > > > > > > > > > > > > > > > > > > > > > > Thank you, > > > > > > > > > > > JM > > > > > > > > > > > > > > > > > > > > > > -----Original Message----- > > > > > > > > > > > From: Matt Burgess <mattyb...@apache.org> > > > > > > > > > > > Sent: Tuesday, July 2, 2024 4:05 PM > > > > > > > > > > > To: dev@nifi.apache.org > > > > > > > > > > > Subject: [DISCUSS] 1.x Maintenance > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > !-------------------------------------------------------------------| > > > > > > > > > > > This Message Is From an External Sender > > > > > > > > > > > Please use caution when clicking links or opening > > > > > > > > > > > attachments. > > > > > > > > > > > > > > > > > > > > |-------------------------------------------------------------------! > > > > > > > > > > > > > > > > > > > > > > There have been some ongoing discussions [1,2] about > > what to > > > > > > bring > > > > > > > > back > > > > > > > > > > > for PRs to 1.x vs trying to push forward with 2.x. There > > are > > > > of > > > > > > > > course > > > > > > > > > > > great points from everyone. On the 2.x front, namely > > that 2.x > > > > > has > > > > > > > > many > > > > > > > > > > > improvements not just to components but the framework > > and UI > > > > as > > > > > > > well, > > > > > > > > > and > > > > > > > > > > > that we've seen less contributions to the maintenance on > > the > > > > > 1.x > > > > > > > > line. > > > > > > > > > On > > > > > > > > > > > the 1.x front that community members need to support 1.x > > for > > > > > > their > > > > > > > > > users > > > > > > > > > > > for the time being. > > > > > > > > > > > > > > > > > > > > > > I'm opening this discussion thread so we can collect > > > > everyone's > > > > > > > > > thoughts > > > > > > > > > > > so the PMC can make a sensible recommendation/decision > > moving > > > > > > > > forward. > > > > > > > > > > For > > > > > > > > > > > myself, I think all bug PRs should be backported where > > > > > > > > > prudent/possible, > > > > > > > > > > > and even new features (although that can be a difficult > > > > > backport > > > > > > > due > > > > > > > > to > > > > > > > > > > > moving the extensions in [3], but I recommend a separate > > PR > > > > > > against > > > > > > > > > 1.x, > > > > > > > > > > > hopefully a simple copy-paste if there are no Java > > > > 21-specific > > > > > > code > > > > > > > > > > issues, > > > > > > > > > > > but please run contrib-check against Java 8 first). > > > > > > > > > > > > > > > > > > > > > > I disagree with the "atrophy" sentiment from [2], a > > mature > > > > > > release > > > > > > > > line > > > > > > > > > > > normally experiences less contributions because it is > > mostly > > > > > > stable > > > > > > > > in > > > > > > > > > > its > > > > > > > > > > > own right. Guiding users to 2.x IMO is the right call but > > > > many > > > > > of > > > > > > > us > > > > > > > > > have > > > > > > > > > > > to deal with the fact that it doesn't usually happen > > > > overnight, > > > > > > > > > > especially > > > > > > > > > > > without a GA release. > > > > > > > > > > > > > > > > > > > > > > I opened this discussion with my opinions but if I may > > humbly > > > > > > speak > > > > > > > > for > > > > > > > > > > > the PMC, we need your voice, and we look forward to all > > of > > > > your > > > > > > > > > thoughts, > > > > > > > > > > > opinions, and questions. > > > > > > > > > > > > > > > > > > > > > > Thank you, > > > > > > > > > > > Matty B > > > > > > > > > > > > > > > > > > > > > > [1] > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > https://urldefense.com/v3/__https://issues.apache.org/jira/browse/NIFI-13196__;!!HkW_WPl1peM!oK4J-OlEsDT4Hl0lVpbgtfPr1qvI-MyLLzjIjPmf0O8cfZFlSIaP7B8Ei8u6ou8_hDUuBxGEIQDtUKArfA$ > > > > > > > > > > > [2] > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > https://urldefense.com/v3/__https://github.com/apache/nifi/pull/9018__;!!HkW_WPl1peM!oK4J-OlEsDT4Hl0lVpbgtfPr1qvI-MyLLzjIjPmf0O8cfZFlSIaP7B8Ei8u6ou8_hDUuBxGEIQD2THE6MA$ > > > > > > > > > > > [3] > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > https://urldefense.com/v3/__https://issues.apache.org/jira/browse/NIFI-12998__;!!HkW_WPl1peM!oK4J-OlEsDT4Hl0lVpbgtfPr1qvI-MyLLzjIjPmf0O8cfZFlSIaP7B8Ei8u6ou8_hDUuBxGEIQD3D-iGiA$ > > > > > > > > > > > > > > > > > > > > > > > > > > > ----------------------------------------------------------------- > > > > > > > > > > > This message and any files transmitted within are > > intended > > > > > > > > > > > solely for the addressee or its representative and may > > > > contain > > > > > > > > > > > company proprietary information. If you are not the > > intended > > > > > > > > > > > recipient, notify the sender immediately and delete this > > > > > > > > > > > message. Publication, reproduction, forwarding, or > > content > > > > > > > > > > > disclosure is prohibited without the consent of the > > original > > > > > > > > > > > sender and may be unlawful. > > > > > > > > > > > > > > > > > > > > > > Concurrent Technologies Corporation and its Affiliates. > > > > > > > > > > > www.ctc.com 1-800-282-4392 > > > > > > > > > > > > > > > > ----------------------------------------------------------------- > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > >