[GitHub] nifi pull request #3155: NIFI-5784 Edit Admin Guide to remove duplicate cont...

2018-11-07 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi/pull/3155

NIFI-5784 Edit Admin Guide to remove duplicate content that is in new…

… Toolkit Guide

Edited Toolkit Guide as needed for links.

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi NIFI-5784

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi/pull/3155.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #3155


commit 77ef84a01eb198482fb01bd4c6a4937bddd10136
Author: Andrew Lim 
Date:   2018-11-07T16:20:59Z

NIFI-5784 Edit Admin Guide to remove duplicate content that is in new 
Toolkit Guide




---


[GitHub] nifi issue #3124: NIFI-5767 Added NiFi Toolkit Guide to docs

2018-11-05 Thread andrewmlim
Github user andrewmlim commented on the issue:

https://github.com/apache/nifi/pull/3124
  
@pvillard31 I think with my latest changes, ready to merge unless you see 
any other issues. Thanks!


---


[GitHub] nifi pull request #3124: NIFI-5767 Added NiFi Toolkit Guide to docs

2018-11-05 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/3124#discussion_r230881754
  
--- Diff: nifi-docs/src/main/asciidoc/toolkit-guide.adoc ---
@@ -0,0 +1,1257 @@
+//
+// Licensed to the Apache Software Foundation (ASF) under one or more
+// contributor license agreements.  See the NOTICE file distributed with
+// this work for additional information regarding copyright ownership.
+// The ASF licenses this file to You under the Apache License, Version 2.0
+// (the "License"); you may not use this file except in compliance with
+// the License.  You may obtain a copy of the License at
+//
+// http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License.
+//
+= Apache NiFi Toolkit Guide
+Apache NiFi Team 
+:homepage: http://nifi.apache.org
+:linkattrs:
+
+== Overview
+The NiFi Toolkit contains several command line utilities to setup and 
support NiFi in standalone and clustered environments.  The utilities include:
+
+* CLI -- The `cli` tool enables administrators to interact with NiFi and 
NiFi Registry instances to automate tasks such as deploying versioned flows and 
managing process groups and cluster nodes.
+* Encrypt Config -- The `encrypt-config` tool encrypts the sensitive keys 
in the _nifi.properties_ file to facilitate the setup of a secure NiFi instance.
+* File Manager -- The `file-manager` tool enables administrators to 
backup, install or restore a NiFi installation from backup.
+* Flow Analyzer -- The `flow-analyzer` tool produces a report that helps 
administrators understand the max amount of data which can be stored in 
backpressure for a given flow.
+* Node Manager -- The `node-manager` tool enables administrators to 
perform status checks on nodes as well as the ability to connect, disconnect, 
or remove nodes from the cluster.
+* Notify -- The `notify` tool enables administrators to send bulletins to 
the NiFi UI.
+* S2S -- The `s2s` tool enables administrators to send data into or out of 
NiFi flows over site-to-site.
+* TLS Toolkit -- The `tls-toolkit` utility generates the required 
keystores, truststore, and relevant configuration files to facilitate the setup 
of a secure NiFi instance.
+* ZooKeeper Migrator -- The `zk-migrator` tool enables administrators to:
+** move ZooKeeper information from one ZooKeeper cluster to another
+** migrate ZooKeeper node ownership
+
+The utilities are executed with scripts found in the `bin` folder of your 
NiFi Toolkit installation.
+
+NOTE: The NiFi Toolkit is downloaded separately from NiFi (see the 
link:https://nifi.apache.org/download.html[Apache NiFi downloads page^]).
+
+=== Prerequisites for Running in a Secure Environment
+For secured nodes and clusters, two policies should be configured in 
advance:
+
+* Access the controller – A user that will have access to these 
utilities should be authorized in NiFi by creating an “access the 
controller” policy (`/controller`) with both view and modify rights
+* Proxy user request – If not previously set, node’s identity (the DN 
value of the node’s certificate) should be authorized to proxy requests on 
behalf of a user
+
+When executing either the Notify or Node Manager tools in a secured 
environment the `proxyDN` flag option should be used in order to properly 
identify the user that was authorized to execute these commands. In non-secure 
environments, or if running the status operation on the Node Manager tool, the 
flag is ignored.
+
+== NiFi CLI
+This tool offers a CLI focused on interacting with NiFi and NiFi Registry 
in order to automate tasks, such as deploying flows from a NIFi Registy to a 
NiFi instance or managing process groups and cluster nodes.
+
+=== Usage
+The CLI toolkit can be executed in standalone mode to execute a single 
command, or interactive mode to enter an interactive shell.
+
+To execute a single command:
+
+ ./bin/cli.sh  
+
+To launch the interactive shell:
+
+ ./bin/cli.sh
+
+To show help:
+
+ cli.sh -h
+
+The following are available options:
+
+ demo quick-import
+ nifi current-user
+ nifi cluster-summary
+ nifi connect-node
+ nifi delete-node
+ nifi disconnect-node
+ nifi get-root-id
+ nifi get-node
+ nifi get-nodes
+ nifi offload-node
+ nifi list-reg-clients
+ nifi create-reg-client
+ nifi update-reg-client
+ nifi get-reg-client-id

[GitHub] nifi pull request #3124: NIFI-5767 Added NiFi Toolkit Guide to docs

2018-11-05 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/3124#discussion_r230881702
  
--- Diff: nifi-docs/src/main/asciidoc/toolkit-guide.adoc ---
@@ -0,0 +1,1257 @@
+//
+// Licensed to the Apache Software Foundation (ASF) under one or more
+// contributor license agreements.  See the NOTICE file distributed with
+// this work for additional information regarding copyright ownership.
+// The ASF licenses this file to You under the Apache License, Version 2.0
+// (the "License"); you may not use this file except in compliance with
+// the License.  You may obtain a copy of the License at
+//
+// http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License.
+//
+= Apache NiFi Toolkit Guide
+Apache NiFi Team 
+:homepage: http://nifi.apache.org
+:linkattrs:
+
+== Overview
+The NiFi Toolkit contains several command line utilities to setup and 
support NiFi in standalone and clustered environments.  The utilities include:
+
+* CLI -- The `cli` tool enables administrators to interact with NiFi and 
NiFi Registry instances to automate tasks such as deploying versioned flows and 
managing process groups and cluster nodes.
+* Encrypt Config -- The `encrypt-config` tool encrypts the sensitive keys 
in the _nifi.properties_ file to facilitate the setup of a secure NiFi instance.
+* File Manager -- The `file-manager` tool enables administrators to 
backup, install or restore a NiFi installation from backup.
+* Flow Analyzer -- The `flow-analyzer` tool produces a report that helps 
administrators understand the max amount of data which can be stored in 
backpressure for a given flow.
+* Node Manager -- The `node-manager` tool enables administrators to 
perform status checks on nodes as well as the ability to connect, disconnect, 
or remove nodes from the cluster.
+* Notify -- The `notify` tool enables administrators to send bulletins to 
the NiFi UI.
+* S2S -- The `s2s` tool enables administrators to send data into or out of 
NiFi flows over site-to-site.
+* TLS Toolkit -- The `tls-toolkit` utility generates the required 
keystores, truststore, and relevant configuration files to facilitate the setup 
of a secure NiFi instance.
+* ZooKeeper Migrator -- The `zk-migrator` tool enables administrators to:
+** move ZooKeeper information from one ZooKeeper cluster to another
+** migrate ZooKeeper node ownership
+
+The utilities are executed with scripts found in the `bin` folder of your 
NiFi Toolkit installation.
+
+NOTE: The NiFi Toolkit is downloaded separately from NiFi (see the 
link:https://nifi.apache.org/download.html[Apache NiFi downloads page^]).
+
+=== Prerequisites for Running in a Secure Environment
+For secured nodes and clusters, two policies should be configured in 
advance:
+
+* Access the controller – A user that will have access to these 
utilities should be authorized in NiFi by creating an “access the 
controller” policy (`/controller`) with both view and modify rights
+* Proxy user request – If not previously set, node’s identity (the DN 
value of the node’s certificate) should be authorized to proxy requests on 
behalf of a user
+
+When executing either the Notify or Node Manager tools in a secured 
environment the `proxyDN` flag option should be used in order to properly 
identify the user that was authorized to execute these commands. In non-secure 
environments, or if running the status operation on the Node Manager tool, the 
flag is ignored.
+
+== NiFi CLI
+This tool offers a CLI focused on interacting with NiFi and NiFi Registry 
in order to automate tasks, such as deploying flows from a NIFi Registy to a 
NiFi instance or managing process groups and cluster nodes.
+
+=== Usage
+The CLI toolkit can be executed in standalone mode to execute a single 
command, or interactive mode to enter an interactive shell.
+
+To execute a single command:
+
+ ./bin/cli.sh  
+
+To launch the interactive shell:
+
+ ./bin/cli.sh
+
+To show help:
+
+ cli.sh -h
--- End diff --

Updated all help examples accordingly.


---


[GitHub] nifi pull request #3125: NIFI-5677 Added note to clarify why modifying/creat...

2018-11-05 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/3125#discussion_r230824217
  
--- Diff: nifi-docs/src/main/asciidoc/user-guide.adoc ---
@@ -1928,7 +1928,9 @@ The following actions are not considered local 
changes:
 * modifying sensitive property values
 * modifying remote process group URLs
 * updating a processor that was referencing a non-existent controller 
service to reference an externally available controller service
-* modifying variables
+* creating or modifying variables
--- End diff --

Added "deleting variables" scenario.  PR read for review/merge if no other 
issues raised. Thanks @ijokarumawak !


---


[GitHub] nifi pull request #3125: NIFI-5677 Added note to clarify why modifying/creat...

2018-11-05 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/3125#discussion_r230820448
  
--- Diff: nifi-docs/src/main/asciidoc/user-guide.adoc ---
@@ -1928,7 +1928,9 @@ The following actions are not considered local 
changes:
 * modifying sensitive property values
 * modifying remote process group URLs
 * updating a processor that was referencing a non-existent controller 
service to reference an externally available controller service
-* modifying variables
+* creating or modifying variables
--- End diff --

That's a good point.  Will add that scenario.


---


[GitHub] nifi issue #3124: NIFI-5767 Added NiFi Toolkit Guide to docs

2018-11-02 Thread andrewmlim
Github user andrewmlim commented on the issue:

https://github.com/apache/nifi/pull/3124
  
I will file a Jira to edit the other docs that have duplicate content.  The 
other docs can refer to the Toolkit Guide as needed.


---


[GitHub] nifi pull request #3124: NIFI-5767 Added NiFi Toolkit Guide to docs

2018-11-02 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/3124#discussion_r230381765
  
--- Diff: nifi-docs/src/main/asciidoc/toolkit-guide.adoc ---
@@ -0,0 +1,1257 @@
+//
+// Licensed to the Apache Software Foundation (ASF) under one or more
+// contributor license agreements.  See the NOTICE file distributed with
+// this work for additional information regarding copyright ownership.
+// The ASF licenses this file to You under the Apache License, Version 2.0
+// (the "License"); you may not use this file except in compliance with
+// the License.  You may obtain a copy of the License at
+//
+// http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License.
+//
+= Apache NiFi Toolkit Guide
+Apache NiFi Team 
+:homepage: http://nifi.apache.org
+:linkattrs:
+
+== Overview
+The NiFi Toolkit contains several command line utilities to setup and 
support NiFi in standalone and clustered environments.  The utilities include:
+
+* CLI -- The `cli` tool enables administrators to interact with NiFi and 
NiFi Registry instances to automate tasks such as deploying versioned flows and 
managing process groups and cluster nodes.
+* Encrypt Config -- The `encrypt-config` tool encrypts the sensitive keys 
in the _nifi.properties_ file to facilitate the setup of a secure NiFi instance.
+* File Manager -- The `file-manager` tool enables administrators to 
backup, install or restore a NiFi installation from backup.
+* Flow Analyzer -- The `flow-analyzer` tool produces a report that helps 
administrators understand the max amount of data which can be stored in 
backpressure for a given flow.
+* Node Manager -- The `node-manager` tool enables administrators to 
perform status checks on nodes as well as the ability to connect, disconnect, 
or remove nodes from the cluster.
+* Notify -- The `notify` tool enables administrators to send bulletins to 
the NiFi UI.
+* S2S -- The `s2s` tool enables administrators to send data into or out of 
NiFi flows over site-to-site.
+* TLS Toolkit -- The `tls-toolkit` utility generates the required 
keystores, truststore, and relevant configuration files to facilitate the setup 
of a secure NiFi instance.
+* ZooKeeper Migrator -- The `zk-migrator` tool enables administrators to:
+** move ZooKeeper information from one ZooKeeper cluster to another
+** migrate ZooKeeper node ownership
+
+The utilities are executed with scripts found in the `bin` folder of your 
NiFi Toolkit installation.
+
+NOTE: The NiFi Toolkit is downloaded separately from NiFi (see the 
link:https://nifi.apache.org/download.html[Apache NiFi downloads page^]).
+
+=== Prerequisites for Running in a Secure Environment
+For secured nodes and clusters, two policies should be configured in 
advance:
+
+* Access the controller – A user that will have access to these 
utilities should be authorized in NiFi by creating an “access the 
controller” policy (`/controller`) with both view and modify rights
+* Proxy user request – If not previously set, node’s identity (the DN 
value of the node’s certificate) should be authorized to proxy requests on 
behalf of a user
+
+When executing either the Notify or Node Manager tools in a secured 
environment the `proxyDN` flag option should be used in order to properly 
identify the user that was authorized to execute these commands. In non-secure 
environments, or if running the status operation on the Node Manager tool, the 
flag is ignored.
+
+== NiFi CLI
+This tool offers a CLI focused on interacting with NiFi and NiFi Registry 
in order to automate tasks, such as deploying flows from a NIFi Registy to a 
NiFi instance or managing process groups and cluster nodes.
+
+=== Usage
+The CLI toolkit can be executed in standalone mode to execute a single 
command, or interactive mode to enter an interactive shell.
+
+To execute a single command:
+
+ ./bin/cli.sh  
+
+To launch the interactive shell:
+
+ ./bin/cli.sh
+
+To show help:
+
+ cli.sh -h
+
+The following are available options:
+
+ demo quick-import
+ nifi current-user
+ nifi cluster-summary
+ nifi connect-node
+ nifi delete-node
+ nifi disconnect-node
+ nifi get-root-id
+ nifi get-node
+ nifi get-nodes
+ nifi offload-node
+ nifi list-reg-clients
+ nifi create-reg-client
+ nifi update-reg-client
+ nifi get-reg-client-id

[GitHub] nifi pull request #3124: NIFI-5767 Added NiFi Toolkit Guide to docs

2018-11-02 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/3124#discussion_r230381451
  
--- Diff: nifi-docs/src/main/asciidoc/toolkit-guide.adoc ---
@@ -0,0 +1,1257 @@
+//
+// Licensed to the Apache Software Foundation (ASF) under one or more
+// contributor license agreements.  See the NOTICE file distributed with
+// this work for additional information regarding copyright ownership.
+// The ASF licenses this file to You under the Apache License, Version 2.0
+// (the "License"); you may not use this file except in compliance with
+// the License.  You may obtain a copy of the License at
+//
+// http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License.
+//
+= Apache NiFi Toolkit Guide
+Apache NiFi Team 
+:homepage: http://nifi.apache.org
+:linkattrs:
+
+== Overview
+The NiFi Toolkit contains several command line utilities to setup and 
support NiFi in standalone and clustered environments.  The utilities include:
+
+* CLI -- The `cli` tool enables administrators to interact with NiFi and 
NiFi Registry instances to automate tasks such as deploying versioned flows and 
managing process groups and cluster nodes.
+* Encrypt Config -- The `encrypt-config` tool encrypts the sensitive keys 
in the _nifi.properties_ file to facilitate the setup of a secure NiFi instance.
+* File Manager -- The `file-manager` tool enables administrators to 
backup, install or restore a NiFi installation from backup.
+* Flow Analyzer -- The `flow-analyzer` tool produces a report that helps 
administrators understand the max amount of data which can be stored in 
backpressure for a given flow.
+* Node Manager -- The `node-manager` tool enables administrators to 
perform status checks on nodes as well as the ability to connect, disconnect, 
or remove nodes from the cluster.
+* Notify -- The `notify` tool enables administrators to send bulletins to 
the NiFi UI.
+* S2S -- The `s2s` tool enables administrators to send data into or out of 
NiFi flows over site-to-site.
+* TLS Toolkit -- The `tls-toolkit` utility generates the required 
keystores, truststore, and relevant configuration files to facilitate the setup 
of a secure NiFi instance.
+* ZooKeeper Migrator -- The `zk-migrator` tool enables administrators to:
+** move ZooKeeper information from one ZooKeeper cluster to another
+** migrate ZooKeeper node ownership
+
+The utilities are executed with scripts found in the `bin` folder of your 
NiFi Toolkit installation.
+
+NOTE: The NiFi Toolkit is downloaded separately from NiFi (see the 
link:https://nifi.apache.org/download.html[Apache NiFi downloads page^]).
+
+=== Prerequisites for Running in a Secure Environment
+For secured nodes and clusters, two policies should be configured in 
advance:
+
+* Access the controller – A user that will have access to these 
utilities should be authorized in NiFi by creating an “access the 
controller” policy (`/controller`) with both view and modify rights
+* Proxy user request – If not previously set, node’s identity (the DN 
value of the node’s certificate) should be authorized to proxy requests on 
behalf of a user
+
+When executing either the Notify or Node Manager tools in a secured 
environment the `proxyDN` flag option should be used in order to properly 
identify the user that was authorized to execute these commands. In non-secure 
environments, or if running the status operation on the Node Manager tool, the 
flag is ignored.
+
+== NiFi CLI
+This tool offers a CLI focused on interacting with NiFi and NiFi Registry 
in order to automate tasks, such as deploying flows from a NIFi Registy to a 
NiFi instance or managing process groups and cluster nodes.
+
+=== Usage
+The CLI toolkit can be executed in standalone mode to execute a single 
command, or interactive mode to enter an interactive shell.
+
+To execute a single command:
+
+ ./bin/cli.sh  
+
+To launch the interactive shell:
+
+ ./bin/cli.sh
+
+To show help:
+
+ cli.sh -h
--- End diff --

Do you think we should preface every help command example in the doc with 
"./bin/"?  I can make those changes.


---


[GitHub] nifi-registry pull request #145: NIFIREG-210 Corrected incorrect document-li...

2018-11-01 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi-registry/pull/145

NIFIREG-210 Corrected incorrect document-links



You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi-registry NIFIREG-210

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi-registry/pull/145.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #145


commit 3013d5f6fe498a42f0f3d943f3ca3d0695be3d50
Author: Andrew Lim 
Date:   2018-11-01T20:23:11Z

NIFIREG-210 Corrected incorrect document-links




---


[GitHub] nifi pull request #3124: NIFI-5767 Added NiFi Toolkit Guide to docs

2018-11-01 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi/pull/3124

NIFI-5767 Added NiFi Toolkit Guide to docs



You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi NIFI-5767

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi/pull/3124.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #3124


commit 060a4c5ccaf1b30f01dc3374edb2b69bb0f8833a
Author: Andrew Lim 
Date:   2018-11-01T18:36:38Z

NIFI-5767 Added NiFi Toolkit Guide to docs




---


[GitHub] nifi pull request #3115: NIFI-5766 Make formatting in User Guide consistent ...

2018-10-30 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi/pull/3115

NIFI-5766 Make formatting in User Guide consistent with Admin Guide

Also added a new image for the Export a Template section.
Improved iconDetails.png.

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi NIFI-5766

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi/pull/3115.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #3115


commit 13a879725c301e35d9ad6fcc3f73569cf728197b
Author: Andrew Lim 
Date:   2018-10-30T15:46:32Z

NIFI-5766 Make formatting in User Guide consistent with Admin Guide




---


[GitHub] nifi-minifi pull request #140: MINIFI-473 Formatted Admin Guide and Java Qui...

2018-10-29 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi-minifi/pull/140

MINIFI-473 Formatted Admin Guide and Java Quick Start Guide to be con…

…sistent with NiFi docs

Also made some edits for readability and minor errors

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi-minifi MINIFI-473

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi-minifi/pull/140.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #140


commit ee99654ddaf6cea4aba78992f86107606c0dfc74
Author: Andrew Lim 
Date:   2018-10-29T15:51:54Z

MINIFI-473 Formatted Admin Guide and Java Quick Start Guide to be 
consistent with NiFi docs




---


[GitHub] nifi pull request #3089: NIFI-5653 Added default NiFi and Embedded Zookeeper...

2018-10-17 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/3089#discussion_r226055225
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -73,9 +73,38 @@ When NiFi first starts up, the following files and 
directories are created:
 
 See the <> section of this guide for more information 
about configuring NiFi repositories and configuration files.
 
+== Port Configuration
+
+=== NiFi
+The following table lists the default ports used by NiFi and the 
corresponding property in the _nifi.properties_ file.
+
+[options="header,footer"]

+|==
+| Function|  Property 
| Default Value
+|HTTP Port| `nifi.web.http.port`  
| `8080`
+|HTTPS Port*  | `nifi.web.https.port` 
| `9443`
+|Remote Input Socket Port*| `nifi.remote.input.socket.port`   
| `10443`
+|Cluster Node Protocol Port*  | `nifi.cluster.node.protocol.port` 
| `11443`
+|Cluster Node Load Balancing Port | `nifi.cluster.node.load.balance.port` 
| `6342`
+|Web HTTP Forwarding Port | `nifi.web.http.port.forwarding`   
| blank

+|==
+
+NOTE: The ports marked with an asterisk (*) have property values that are 
blank by default in _nifi.properties_.  The values shown in the table are the 
default values for these ports when <> is used to 
generate _nifi.properties_ for a secured NiFi instance.  The default 
Certificate Authority Port used by TLS Toolkit is `8443`.
--- End diff --

Yup, will make _none_ in the tables.


---


[GitHub] nifi pull request #3089: NIFI-5653 Added default NiFi and Embedded Zookeeper...

2018-10-17 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/3089#discussion_r226053244
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -73,9 +73,38 @@ When NiFi first starts up, the following files and 
directories are created:
 
 See the <> section of this guide for more information 
about configuring NiFi repositories and configuration files.
 
+== Port Configuration
+
+=== NiFi
+The following table lists the default ports used by NiFi and the 
corresponding property in the _nifi.properties_ file.
+
+[options="header,footer"]

+|==
+| Function|  Property 
| Default Value
+|HTTP Port| `nifi.web.http.port`  
| `8080`
+|HTTPS Port*  | `nifi.web.https.port` 
| `9443`
+|Remote Input Socket Port*| `nifi.remote.input.socket.port`   
| `10443`
+|Cluster Node Protocol Port*  | `nifi.cluster.node.protocol.port` 
| `11443`
+|Cluster Node Load Balancing Port | `nifi.cluster.node.load.balance.port` 
| `6342`
+|Web HTTP Forwarding Port | `nifi.web.http.port.forwarding`   
| blank
--- End diff --

As discussed in other comment threads, changing blank to _none_.


---


[GitHub] nifi pull request #3089: NIFI-5653 Added default NiFi and Embedded Zookeeper...

2018-10-17 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/3089#discussion_r226053061
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -73,9 +73,38 @@ When NiFi first starts up, the following files and 
directories are created:
 
 See the <> section of this guide for more information 
about configuring NiFi repositories and configuration files.
 
+== Port Configuration
+
+=== NiFi
+The following table lists the default ports used by NiFi and the 
corresponding property in the _nifi.properties_ file.
+
+[options="header,footer"]

+|==
+| Function|  Property 
| Default Value
+|HTTP Port| `nifi.web.http.port`  
| `8080`
+|HTTPS Port*  | `nifi.web.https.port` 
| `9443`
+|Remote Input Socket Port*| `nifi.remote.input.socket.port`   
| `10443`
+|Cluster Node Protocol Port*  | `nifi.cluster.node.protocol.port` 
| `11443`
+|Cluster Node Load Balancing Port | `nifi.cluster.node.load.balance.port` 
| `6342`
+|Web HTTP Forwarding Port | `nifi.web.http.port.forwarding`   
| blank

+|==
+
+NOTE: The ports marked with an asterisk (*) have property values that are 
blank by default in _nifi.properties_.  The values shown in the table are the 
default values for these ports when <> is used to 
generate _nifi.properties_ for a secured NiFi instance.  The default 
Certificate Authority Port used by TLS Toolkit is `8443`.
+
+=== Embedded Zookeeper
+The following table lists the default ports used by an 
<> and the corresponding property in the 
_zookeeper.properties_ file.
+
+[options="header,footer"]

+|==
+| Function | Property   | 
Default Value
+|Zookeeper Client Port | `clientPort`   | 
`2181`
+|Zookeeper Server Quorum and Leader Election Ports | `server.1` | 
`localhost:2888:3888`
--- End diff --

Thanks, will make this change also.


---


[GitHub] nifi pull request #3089: NIFI-5653 Added default NiFi and Embedded Zookeeper...

2018-10-17 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/3089#discussion_r226045546
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -73,9 +73,38 @@ When NiFi first starts up, the following files and 
directories are created:
 
 See the <> section of this guide for more information 
about configuring NiFi repositories and configuration files.
 
+== Port Configuration
+
+=== NiFi
+The following table lists the default ports used by NiFi and the 
corresponding property in the _nifi.properties_ file.
+
+[options="header,footer"]

+|==
+| Function|  Property 
| Default Value
+|HTTP Port| `nifi.web.http.port`  
| `8080`
+|HTTPS Port*  | `nifi.web.https.port` 
| `9443`
+|Remote Input Socket Port*| `nifi.remote.input.socket.port`   
| `10443`
+|Cluster Node Protocol Port*  | `nifi.cluster.node.protocol.port` 
| `11443`
+|Cluster Node Load Balancing Port | `nifi.cluster.node.load.balance.port` 
| `6342`
+|Web HTTP Forwarding Port | `nifi.web.http.port.forwarding`   
| blank

+|==
+
+NOTE: The ports marked with an asterisk (*) have property values that are 
blank by default in _nifi.properties_.  The values shown in the table are the 
default values for these ports when <> is used to 
generate _nifi.properties_ for a secured NiFi instance.  The default 
Certificate Authority Port used by TLS Toolkit is `8443`.
+
+=== Embedded Zookeeper
+The following table lists the default ports used by an 
<> and the corresponding property in the 
_zookeeper.properties_ file.
+
+[options="header,footer"]

+|==
+| Function | Property   | 
Default Value
+|Zookeeper Client Port | `clientPort`   | 
`2181`
+|Zookeeper Server Quorum and Leader Election Ports | `server.1` | 
`localhost:2888:3888`
--- End diff --

I see your point.  We could change the table and following note to this:

| Function | Property   | 
Default Value
|Zookeeper Client Port | `clientPort`   | `2181`
|Zookeeper Server Quorum and Leader Election Ports | `server.1` | blank

NOTE:  Commented examples for the Zookeeper server ports are included in 
the _zookeeper.properties_ file in the form 
server.N=nifi-nodeN-hostname:2888:3888.


---


[GitHub] nifi pull request #3089: NIFI-5653 Added default NiFi and Embedded Zookeeper...

2018-10-17 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/3089#discussion_r226042799
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -73,9 +73,38 @@ When NiFi first starts up, the following files and 
directories are created:
 
 See the <> section of this guide for more information 
about configuring NiFi repositories and configuration files.
 
+== Port Configuration
+
+=== NiFi
+The following table lists the default ports used by NiFi and the 
corresponding property in the _nifi.properties_ file.
+
+[options="header,footer"]

+|==
+| Function|  Property 
| Default Value
+|HTTP Port| `nifi.web.http.port`  
| `8080`
+|HTTPS Port*  | `nifi.web.https.port` 
| `9443`
+|Remote Input Socket Port*| `nifi.remote.input.socket.port`   
| `10443`
+|Cluster Node Protocol Port*  | `nifi.cluster.node.protocol.port` 
| `11443`
+|Cluster Node Load Balancing Port | `nifi.cluster.node.load.balance.port` 
| `6342`
+|Web HTTP Forwarding Port | `nifi.web.http.port.forwarding`   
| blank

+|==
+
+NOTE: The ports marked with an asterisk (*) have property values that are 
blank by default in _nifi.properties_.  The values shown in the table are the 
default values for these ports when <> is used to 
generate _nifi.properties_ for a secured NiFi instance.  The default 
Certificate Authority Port used by TLS Toolkit is `8443`.
--- End diff --

Similar to comment above about "blank", but happy to make this change since 
it reads better.


---


[GitHub] nifi pull request #3089: NIFI-5653 Added default NiFi and Embedded Zookeeper...

2018-10-17 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/3089#discussion_r226042448
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -73,9 +73,38 @@ When NiFi first starts up, the following files and 
directories are created:
 
 See the <> section of this guide for more information 
about configuring NiFi repositories and configuration files.
 
+== Port Configuration
+
+=== NiFi
+The following table lists the default ports used by NiFi and the 
corresponding property in the _nifi.properties_ file.
+
+[options="header,footer"]

+|==
+| Function|  Property 
| Default Value
+|HTTP Port| `nifi.web.http.port`  
| `8080`
+|HTTPS Port*  | `nifi.web.https.port` 
| `9443`
+|Remote Input Socket Port*| `nifi.remote.input.socket.port`   
| `10443`
+|Cluster Node Protocol Port*  | `nifi.cluster.node.protocol.port` 
| `11443`
+|Cluster Node Load Balancing Port | `nifi.cluster.node.load.balance.port` 
| `6342`
+|Web HTTP Forwarding Port | `nifi.web.http.port.forwarding`   
| blank
--- End diff --

I was thinking about that also, but figured "blank" would be OK since we 
reference this throughout the Admin Guide  (e.g. "The default value is blank").


---


[GitHub] nifi pull request #3089: NIFI-5653 Added default NiFi and Embedded Zookeeper...

2018-10-17 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi/pull/3089

NIFI-5653 Added default NiFi and Embedded Zookeeper port tables to Ad…

…min Guide

Also added a new referenced tag/anchor for TLS Generation Toolkit section 
and removed an unnecessary NOTE.

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi NIFI-5653

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi/pull/3089.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #3089


commit 56281924149503e84117dc377d94490f953c99f2
Author: Andrew Lim 
Date:   2018-10-17T17:43:39Z

NIFI-5653 Added default NiFi and Embedded Zookeeper port tables to Admin 
Guide




---


[GitHub] nifi pull request #3080: NIFI-5701 Add documentation for Load Balancing conn...

2018-10-16 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/3080#discussion_r225687626
  
--- Diff: nifi-docs/src/main/asciidoc/user-guide.adoc ---
@@ -986,13 +991,11 @@ automatically be 'cloned', and a copy will be sent to 
each of those Connections.
 
  Settings
 
-The Settings Tab provides the ability to configure the Connection's name, 
FlowFile expiration, Back Pressure thresholds, and
-Prioritization:
+The Settings Tab provides the ability to configure the Connection's Name, 
FlowFile Expiration, Back Pressure Thresholds, Load Balance Strategy and 
Prioritization:
--- End diff --

Sounds good


---


[GitHub] nifi pull request #3080: NIFI-5701 Add documentation for Load Balancing conn...

2018-10-16 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/3080#discussion_r225685340
  
--- Diff: nifi-docs/src/main/asciidoc/user-guide.adoc ---
@@ -986,13 +991,11 @@ automatically be 'cloned', and a copy will be sent to 
each of those Connections.
 
  Settings
 
-The Settings Tab provides the ability to configure the Connection's name, 
FlowFile expiration, Back Pressure thresholds, and
-Prioritization:
+The Settings Tab provides the ability to configure the Connection's Name, 
FlowFile Expiration, Back Pressure Thresholds, Load Balance Strategy and 
Prioritization:
--- End diff --

There are other instances in the doc where tab is capitalized similarly:

-Line 641 "Scheduling Tab"
-Line 680 "Properties Tab"
-Line 681 "Properties Tab"
-Line 981 "Details Tab"

But other instances where it is not capitalized:

-Lines 716 & 717 "Comments tab"

I'm OK with either style, but we should be consistent.  So if you like the 
non-capitalized versions, we need to edit the 4 other instances I noted above.


---


[GitHub] nifi pull request #3080: NIFI-5701 Add documentation for Load Balancing conn...

2018-10-16 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi/pull/3080

NIFI-5701 Add documentation for Load Balancing connections to User Gu…

…ide and add additional properties to Admin Guide

Also updated some existing screenshots and did some reformatting of some 
titles.

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi NIFI-5701

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi/pull/3080.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #3080


commit 652146287bd7c6ea8fc73fef8755d3b91fa87413
Author: Andrew Lim 
Date:   2018-10-16T16:06:31Z

NIFI-5701 Add documentation for Load Balancing connections to User Guide 
and add additional properties to Admin Guide




---


[GitHub] nifi pull request #3056: NIFI-5659 Add documentation for Offloading Nodes fu...

2018-10-15 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/3056#discussion_r225181107
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -3939,8 +3976,7 @@ to the cluster. It provides an additional layer of 
security. This value is blank
 |`nifi.cluster.flow.election.max.candidates`|Specifies the number of Nodes 
required in the cluster to cause early election of Flows. This allows the Nodes 
in the cluster to avoid having to wait a
 long time before starting processing if we reach at least this number of 
nodes in the cluster.
 |`nifi.cluster.load.balance.port`|Specifies the port to listen on for 
incoming connections for load balancing data across the cluster. The default 
value is `6342`.
--- End diff --

Just noting that the default value is 6342 not 6432.


---


[GitHub] nifi pull request #3056: NIFI-5659 Add documentation for Offloading Nodes fu...

2018-10-10 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/3056#discussion_r224161590
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -2393,19 +2395,53 @@ When the DFM makes changes to the dataflow, the 
node that receives the request t
 nodes and waits for each node to respond, indicating that it has made the 
change on its local flow.
 
 
-*Dealing with Disconnected Nodes* +
+=== Managing Nodes
+
+ Disconnect Nodes
+
+A DFM may manually disconnect a node from the cluster. A node may also 
become disconnected for other reasons, such as due to a lack of heartbeat. The 
Cluster Coordinator will show a bulletin on the User Interface when a node is 
disconnected. The DFM will not be able to make any changes to the dataflow 
until the issue of the disconnected node is resolved. The DFM or the 
Administrator will need to troubleshoot the issue with the node and resolve it 
before any new changes can be made to the dataflow. However, it is worth noting 
that just because a node is disconnected does not mean that it is not working.  
This may happen for a few reasons, for example when the node is unable to 
communicate with the Cluster Coordinator due to network problems.
+
+To manually disconnect a node, select the "Disconnect" icon 
(image:iconDisconnect.png["Disconnect Icon"]) from the node's row.
+
+image::disconnected-node-cluster-mgt.png["Disconnected Node in Cluster 
Management UI"]
+
+A disconnected node can be connected (image:iconConnect.png["Connect 
Icon"]), offloaded (image:iconOffload.png["Offload Icon"]) or deleted 
(image:iconDelete.png["Delete Icon"]).
--- End diff --

I like your version.  Let's run with that.


---


[GitHub] nifi pull request #3056: NIFI-5659 Add documentation for Offloading Nodes fu...

2018-10-10 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/3056#discussion_r224156171
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -2393,19 +2395,53 @@ When the DFM makes changes to the dataflow, the 
node that receives the request t
 nodes and waits for each node to respond, indicating that it has made the 
change on its local flow.
 
 
-*Dealing with Disconnected Nodes* +
+=== Managing Nodes
+
+ Disconnect Nodes
+
+A DFM may manually disconnect a node from the cluster. A node may also 
become disconnected for other reasons, such as due to a lack of heartbeat. The 
Cluster Coordinator will show a bulletin on the User Interface when a node is 
disconnected. The DFM will not be able to make any changes to the dataflow 
until the issue of the disconnected node is resolved. The DFM or the 
Administrator will need to troubleshoot the issue with the node and resolve it 
before any new changes can be made to the dataflow. However, it is worth noting 
that just because a node is disconnected does not mean that it is not working.  
This may happen for a few reasons, for example when the node is unable to 
communicate with the Cluster Coordinator due to network problems.
+
+To manually disconnect a node, select the "Disconnect" icon 
(image:iconDisconnect.png["Disconnect Icon"]) from the node's row.
+
+image::disconnected-node-cluster-mgt.png["Disconnected Node in Cluster 
Management UI"]
+
+A disconnected node can be connected (image:iconConnect.png["Connect 
Icon"]), offloaded (image:iconOffload.png["Offload Icon"]) or deleted 
(image:iconDelete.png["Delete Icon"]).
--- End diff --

OK.  How about this then for the note:

NOTE: Not all nodes in a "Disconnected" state can be offloaded. If the node 
is disconnected because the node died/lack of heartbeat, the offload operation 
will be unable to reach the node to start the offloading. Additionally, 
offloading may also be interrupted or prevented due to firewall issues.


---


[GitHub] nifi pull request #3056: NIFI-5659 Add documentation for Offloading Nodes fu...

2018-10-10 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/3056#discussion_r224134708
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -2393,19 +2395,53 @@ When the DFM makes changes to the dataflow, the 
node that receives the request t
 nodes and waits for each node to respond, indicating that it has made the 
change on its local flow.
 
 
-*Dealing with Disconnected Nodes* +
+=== Managing Nodes
+
+ Disconnect Nodes
+
+A DFM may manually disconnect a node from the cluster. A node may also 
become disconnected for other reasons, such as due to a lack of heartbeat. The 
Cluster Coordinator will show a bulletin on the User Interface when a node is 
disconnected. The DFM will not be able to make any changes to the dataflow 
until the issue of the disconnected node is resolved. The DFM or the 
Administrator will need to troubleshoot the issue with the node and resolve it 
before any new changes can be made to the dataflow. However, it is worth noting 
that just because a node is disconnected does not mean that it is not working.  
This may happen for a few reasons, for example when the node is unable to 
communicate with the Cluster Coordinator due to network problems.
+
+To manually disconnect a node, select the "Disconnect" icon 
(image:iconDisconnect.png["Disconnect Icon"]) from the node's row.
+
+image::disconnected-node-cluster-mgt.png["Disconnected Node in Cluster 
Management UI"]
+
+A disconnected node can be connected (image:iconConnect.png["Connect 
Icon"]), offloaded (image:iconOffload.png["Offload Icon"]) or deleted 
(image:iconDelete.png["Delete Icon"]).
--- End diff --

Good points.  My intent was to present the available choices provided by 
the UI for a disconnected node.  Perhaps we can add a note to the end of this 
section that provides more of this error handling/troubleshooting information.

NOTE: Not all nodes in a "Disconnected" state can be offloaded.  If the 
node is disconnected because the node died/lack of heartbeat, the offload 
operation will be unable to reach the node to start the offloading.  
Additionally, offloading may also be interrupted or prevented due to firewall 
issues (e.g., if the load balancing port is blocked).


---


[GitHub] nifi pull request #3056: NIFI-5659 Add documentation for Offloading Nodes fu...

2018-10-10 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/3056#discussion_r224099820
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -2393,19 +2395,53 @@ When the DFM makes changes to the dataflow, the 
node that receives the request t
 nodes and waits for each node to respond, indicating that it has made the 
change on its local flow.
 
 
-*Dealing with Disconnected Nodes* +
+=== Managing Nodes
+
+ Disconnect Nodes
+
+A DFM may manually disconnect a node from the cluster. A node may also 
become disconnected for other reasons, such as due to a lack of heartbeat. The 
Cluster Coordinator will show a bulletin on the User Interface when a node is 
disconnected. The DFM will not be able to make any changes to the dataflow 
until the issue of the disconnected node is resolved. The DFM or the 
Administrator will need to troubleshoot the issue with the node and resolve it 
before any new changes can be made to the dataflow. However, it is worth noting 
that just because a node is disconnected does not mean that it is not working.  
This may happen for a few reasons, for example when the node is unable to 
communicate with the Cluster Coordinator due to network problems.
+
+To manually disconnect a node, select the "Disconnect" icon 
(image:iconDisconnect.png["Disconnect Icon"]) from the node's row.
+
+image::disconnected-node-cluster-mgt.png["Disconnected Node in Cluster 
Management UI"]
+
+A disconnected node can be connected (image:iconConnect.png["Connect 
Icon"]), offloaded (image:iconOffload.png["Offload Icon"]) or deleted 
(image:iconDelete.png["Delete Icon"]).
+
+ Offload Nodes
+
+Flowfiles that remain on a disconnected node can be rebalanced to other 
active nodes in the cluster via offloading.  In the Cluster Management dialog, 
select the "Offload" icon (image:iconOffload.png["Offload Icon"]) for a 
Disconnected node. This will stop all processors, terminate all processors, 
stop transmitting on all remote process groups and rebalance flowfiles to the 
other connected nodes in the cluster.
+
+image::offloading-node-cluster-mgt.png["Offloading Node in Cluster 
Management UI"]
+
+Nodes that remain in "Offloading" state due to errors encountered (out of 
memory, no network connection, etc.) can be reconnected to the cluster by 
restarting NiFi on the node. Offloaded nodes can be either reconnected to the 
cluster (by selecting Connect or restarting NiFi on the node) or deleted from 
the cluster.
+
+image::offloaded-node-cluster-mgt.png["Offloaded Node in Cluster 
Management UI"]
+
+ Delete Nodes
+
+There are cases where a DFM may wish to continue making changes to the 
flow, even though a node is not connected to the cluster. In this case, the DFM 
may elect to delete the node from the cluster entirely. In the Cluster 
Management dialog, select the "Delete" icon (image:iconDelete.png["Delete 
Icon"]) for a Disconnected or Offloaded node. Once deleted, the node cannot be 
rejoined to the cluster until it has been restarted.
+
+ Decommission Nodes
+
+The steps to decommission a node and remove it from a cluster are as 
follows:
+
+1. Disconnect the node.
+2. Once disconnect completes, offload the node.
+3. Once offload completes, delete the node.
+4. Once the delete request has finished, stop/remove the NiFi service on 
the host.
+
+ NiFi Toolkit Node Commands
 
-A DFM may manually disconnect a node from the cluster. But if a node 
becomes disconnected for any other reason (such as due to lack of heartbeat),
-the Cluster Coordinator will show a bulletin on the User Interface. The 
DFM will not be able to make any changes to the dataflow until the issue
-of the disconnected node is resolved. The DFM or the Administrator will 
need to troubleshoot the issue with the node and resolve it before any
-new changes may be made to the dataflow. However, it is worth noting that 
just because a node is disconnected does not mean that it is not working;
-this may happen for a few reasons, including that the node is unable to 
communicate with the Cluster Coordinator due to network problems.
+As an alternative to the UI, the following NiFi Toolkit CLI commands can 
be used for retrieving a single node, retrieving a list of nodes, and 
connecting/disconnecting/offloading/deleting nodes:
 
-There are cases where a DFM may wish to continue making changes to the 
flow, even though a node is not connected to the cluster.
-In this case, they DFM may elect to remove the node from the cluster 
entirely through the Cluster Management dialog. Once removed,
-the node cannot be rejoined to the cluster un

[GitHub] nifi pull request #3056: NIFI-5659 Add documentation for Offloading Nodes fu...

2018-10-09 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/3056#discussion_r223917872
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -2393,19 +2395,53 @@ When the DFM makes changes to the dataflow, the 
node that receives the request t
 nodes and waits for each node to respond, indicating that it has made the 
change on its local flow.
 
 
-*Dealing with Disconnected Nodes* +
+=== Managing Nodes
+
+ Disconnect Nodes
+
+A DFM may manually disconnect a node from the cluster. A node may also 
become disconnected for other reasons, such as due to a lack of heartbeat. The 
Cluster Coordinator will show a bulletin on the User Interface when a node is 
disconnected. The DFM will not be able to make any changes to the dataflow 
until the issue of the disconnected node is resolved. The DFM or the 
Administrator will need to troubleshoot the issue with the node and resolve it 
before any new changes can be made to the dataflow. However, it is worth noting 
that just because a node is disconnected does not mean that it is not working.  
This may happen for a few reasons, for example when the node is unable to 
communicate with the Cluster Coordinator due to network problems.
+
+To manually disconnect a node, select the "Disconnect" icon 
(image:iconDisconnect.png["Disconnect Icon"]) from the node's row.
+
+image::disconnected-node-cluster-mgt.png["Disconnected Node in Cluster 
Management UI"]
+
+A disconnected node can be connected (image:iconConnect.png["Connect 
Icon"]), offloaded (image:iconOffload.png["Offload Icon"]) or deleted 
(image:iconDelete.png["Delete Icon"]).
+
+ Offload Nodes
+
+Flowfiles that remain on a disconnected node can be rebalanced to other 
active nodes in the cluster via offloading.  In the Cluster Management dialog, 
select the "Offload" icon (image:iconOffload.png["Offload Icon"]) for a 
Disconnected node. This will stop all processors, terminate all processors, 
stop transmitting on all remote process groups and rebalance flowfiles to the 
other connected nodes in the cluster.
+
+image::offloading-node-cluster-mgt.png["Offloading Node in Cluster 
Management UI"]
+
+Nodes that remain in "Offloading" state due to errors encountered (out of 
memory, no network connection, etc.) can be reconnected to the cluster by 
restarting NiFi on the node. Offloaded nodes can be either reconnected to the 
cluster (by selecting Connect or restarting NiFi on the node) or deleted from 
the cluster.
+
+image::offloaded-node-cluster-mgt.png["Offloaded Node in Cluster 
Management UI"]
+
+ Delete Nodes
+
+There are cases where a DFM may wish to continue making changes to the 
flow, even though a node is not connected to the cluster. In this case, the DFM 
may elect to delete the node from the cluster entirely. In the Cluster 
Management dialog, select the "Delete" icon (image:iconDelete.png["Delete 
Icon"]) for a Disconnected or Offloaded node. Once deleted, the node cannot be 
rejoined to the cluster until it has been restarted.
+
+ Decommission Nodes
+
+The steps to decommission a node and remove it from a cluster are as 
follows:
+
+1. Disconnect the node.
+2. Once disconnect completes, offload the node.
+3. Once offload completes, delete the node.
+4. Once the delete request has finished, stop/remove the NiFi service on 
the host.
+
+ NiFi Toolkit Node Commands
 
-A DFM may manually disconnect a node from the cluster. But if a node 
becomes disconnected for any other reason (such as due to lack of heartbeat),
-the Cluster Coordinator will show a bulletin on the User Interface. The 
DFM will not be able to make any changes to the dataflow until the issue
-of the disconnected node is resolved. The DFM or the Administrator will 
need to troubleshoot the issue with the node and resolve it before any
-new changes may be made to the dataflow. However, it is worth noting that 
just because a node is disconnected does not mean that it is not working;
-this may happen for a few reasons, including that the node is unable to 
communicate with the Cluster Coordinator due to network problems.
+As an alternative to the UI, the following NiFi Toolkit CLI commands can 
be used for retrieving a single node, retrieving a list of nodes, and 
connecting/disconnecting/offloading/deleting nodes:
 
-There are cases where a DFM may wish to continue making changes to the 
flow, even though a node is not connected to the cluster.
-In this case, they DFM may elect to remove the node from the cluster 
entirely through the Cluster Management dialog. Once removed,
-the node cannot be rejoined to the clu

[GitHub] nifi pull request #3056: NIFI-5659 Add documentation for Offloading Nodes fu...

2018-10-09 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi/pull/3056

NIFI-5659 Add documentation for Offloading Nodes functionality and ne…

…w Node related CLI commands

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi NIFI-5659

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi/pull/3056.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #3056


commit 80d49e2f15b84fd59ae83229bc05af5c9d8d1f5d
Author: Andrew Lim 
Date:   2018-10-09T20:31:56Z

NIFI-5659 Add documentation for Offloading Nodes functionality and new Node 
related CLI commands




---


[GitHub] nifi pull request #2947: [WIP] NIFI-5516: Implement Load-Balanced Connection...

2018-10-03 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2947#discussion_r222402579
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -3929,6 +3929,13 @@ from the remote node before considering the 
communication with the node a failur
 to the cluster. It provides an additional layer of security. This value is 
blank by default, meaning that no firewall file is to be used.
 |`nifi.cluster.flow.election.max.wait.time`|Specifies the amount of time 
to wait before electing a Flow as the "correct" Flow. If the number of Nodes 
that have voted is equal to the number specified by the 
`nifi.cluster.flow.election.max.candidates` property, the cluster will not wait 
this long. The default value is `5 mins`. Note that the time starts as soon as 
the first vote is cast.
 |`nifi.cluster.flow.election.max.candidates`|Specifies the number of Nodes 
required in the cluster to cause early election of Flows. This allows the Nodes 
in the cluster to avoid having to wait a long time before starting processing 
if we reach at least this number of nodes in the cluster.
+|`nifi.cluster.flow.election.max.wait.time`|Specifies the amount of time 
to wait before electing a Flow as the "correct" Flow. If the number of Nodes 
that have voted is equal to the number specified
+ by the `nifi.cluster.flow.election.max.candidates` property, the cluster 
will not wait this long. The default value is `5 mins`. Note that the time 
starts as soon as the first vote is cast.
+|`nifi.cluster.flow.election.max.candidates`|Specifies the number of Nodes 
required in the cluster to cause early election of Flows. This allows the Nodes 
in the cluster to avoid having to wait a
+long time before starting processing if we reach at least this number of 
nodes in the cluster.
+|`nifi.cluster.load.balance.port`|Specifies the port to listen on for 
incoming connections for load balancing data across the cluster. The default 
value is `6342`.|
--- End diff --

Should remove the "|" at the end of line 3936.  Causes incorrect formatting 
of the property following it.


---


[GitHub] nifi pull request #3010: [WIP] NIFI-5585

2018-10-03 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/3010#discussion_r222397907
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -3929,6 +3929,13 @@ from the remote node before considering the 
communication with the node a failur
 to the cluster. It provides an additional layer of security. This value is 
blank by default, meaning that no firewall file is to be used.
 |`nifi.cluster.flow.election.max.wait.time`|Specifies the amount of time 
to wait before electing a Flow as the "correct" Flow. If the number of Nodes 
that have voted is equal to the number specified by the 
`nifi.cluster.flow.election.max.candidates` property, the cluster will not wait 
this long. The default value is `5 mins`. Note that the time starts as soon as 
the first vote is cast.
 |`nifi.cluster.flow.election.max.candidates`|Specifies the number of Nodes 
required in the cluster to cause early election of Flows. This allows the Nodes 
in the cluster to avoid having to wait a long time before starting processing 
if we reach at least this number of nodes in the cluster.
+|`nifi.cluster.flow.election.max.wait.time`|Specifies the amount of time 
to wait before electing a Flow as the "correct" Flow. If the number of Nodes 
that have voted is equal to the number specified
+ by the `nifi.cluster.flow.election.max.candidates` property, the cluster 
will not wait this long. The default value is `5 mins`. Note that the time 
starts as soon as the first vote is cast.
+|`nifi.cluster.flow.election.max.candidates`|Specifies the number of Nodes 
required in the cluster to cause early election of Flows. This allows the Nodes 
in the cluster to avoid having to wait a
+long time before starting processing if we reach at least this number of 
nodes in the cluster.
+|`nifi.cluster.load.balance.port`|Specifies the port to listen on for 
incoming connections for load balancing data across the cluster. The default 
value is `6342`.|
+|`nifi.cluster.load.balance.host`|Specifies the hostname to listen on for 
incoming connections for load balancing data across the cluster. If not 
specified, will default to the value used by the `nifi
--- End diff --

The formatting in the table is off because the "|" at the end of line 3936 
is not needed.


---


[GitHub] nifi pull request #3017: NIFI-5578 Correct errors in EL Guide including Date...

2018-09-20 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi/pull/3017

NIFI-5578 Correct errors in EL Guide including Date Manipulation and …

…Escaping EL examples

Also fixed some formatting typos

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi NIFI-5578

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi/pull/3017.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #3017


commit efe3d1928c0b3c25754789dc6683606051e5aa2e
Author: Andrew Lim 
Date:   2018-09-20T14:40:49Z

NIFI-5578 Correct errors in EL Guide including Date Manipulation and 
Escaping EL examples




---


[GitHub] nifi pull request #2975: NIFI-5526 Improve PutS3Object processor documentati...

2018-08-29 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi/pull/2975

NIFI-5526 Improve PutS3Object processor documentation




You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi NIFI-5526

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi/pull/2975.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #2975


commit 4e0d9e6f3826f68cfc33082079475e86f1640f63
Author: Andrew Lim 
Date:   2018-08-29T17:24:22Z

NIFI-5526 Improve PutS3Object processor documentation




---


[GitHub] nifi-site pull request #29: NIFIREG-195 Add GitFlowPersistenceProvider video...

2018-08-15 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi-site/pull/29

NIFIREG-195 Add GitFlowPersistenceProvider video to Registry home page



You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi-site NIFIREG-195

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi-site/pull/29.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #29


commit d39b57602c5545a4dee2c7094c9bd6dc83316816
Author: Andrew Lim 
Date:   2018-03-13T15:04:51Z

NIFIREG-151 Add tutorial videos to Registry home page

commit a11dd344ff09ed1cb9589ca8d025d45f3e5a392b
Author: Andrew Lim 
Date:   2018-08-15T18:34:06Z

Merge branch 'master' of https://git-wip-us.apache.org/repos/asf/nifi-site

commit 10b5572228ea476c5bbe6849a1fe41487ebc8407
Author: Andrew Lim 
Date:   2018-08-15T18:50:14Z

NIFIREG-195 Add GitFlowPersistenceProvider video to Registry home page




---


[GitHub] nifi-registry pull request #137: NIFIREG-191 Make formatting consistent in R...

2018-08-15 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi-registry/pull/137

NIFIREG-191 Make formatting consistent in Registry docs and minor fixes



You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi-registry NIFIREG-191

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi-registry/pull/137.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #137


commit ba83adf06a1f4920fda7143e2e6791dd23b04790
Author: Andrew Lim 
Date:   2018-08-15T18:17:51Z

NIFIREG-191 Make formatting consistent in Registry docs and minor fixes




---


[GitHub] nifi pull request #2925: NIFI-5469 Additional italics and code formatting co...

2018-08-10 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2925#discussion_r209305557
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -3256,9 +3361,9 @@ stream {
 
 image:s2s-rproxy-portnumber.svg["Port number to Node mapping"]
--- End diff --

Thanks @zenfenan .  Added a commit with that fix.


---


[GitHub] nifi pull request #2925: NIFI-5469 Additional italics and code formatting co...

2018-08-07 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2925#discussion_r208248950
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -3256,9 +3361,9 @@ stream {
 
 image:s2s-rproxy-portnumber.svg["Port number to Node mapping"]
--- End diff --

While editing a doc (administration-guide.adoc, overview.adoc, etc.), the 
screenshots won't load unless the image files are in the same directory as the 
doc.  But, once the docs are build the screenshots will be referenced properly:


![generated_doc](https://user-images.githubusercontent.com/18287533/43781527-165ebef4-9a2b-11e8-83d3-0df58973005e.jpg)
 


---


[GitHub] nifi issue #2925: NIFI-5469 Additional italics and code formatting correctio...

2018-08-06 Thread andrewmlim
Github user andrewmlim commented on the issue:

https://github.com/apache/nifi/pull/2925
  
Thanks for reviewing @zenfenan !


---


[GitHub] nifi pull request #2925: NIFI-5469 Additional italics and code formatting co...

2018-08-06 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2925#discussion_r208012356
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -1486,35 +1588,35 @@ If no administrator action is taken, the 
configuration values remain unencrypted
 [[encrypt-config_tool]]
 === Encrypt-Config Tool
 
-The `encrypt-config` command line tool (invoked as 
`./bin/encrypt-config.sh` or `bin\encrypt-config.bat`) reads from a 
'nifi.properties' file with plaintext sensitive configuration values, prompts 
for a master password or raw hexadecimal key, and encrypts each value. It 
replaces the plain values with the protected value in the same file, or writes 
to a new 'nifi.properties' file if specified.
+The `encrypt-config` command line tool (invoked as 
`./bin/encrypt-config.sh` or `bin\encrypt-config.bat`) reads from a 
_nifi.properties_ file with plaintext sensitive configuration values, prompts 
for a master password or raw hexadecimal key, and encrypts each value. It 
replaces the plain values with the protected value in the same file, or writes 
to a new _nifi.properties_ file if specified.
--- End diff --

Good catch.  Will update.


---


[GitHub] nifi pull request #2925: NIFI-5469 Additional italics and code formatting co...

2018-08-06 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2925#discussion_r208012302
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -3256,9 +3361,9 @@ stream {
 
 image:s2s-rproxy-portnumber.svg["Port number to Node mapping"]
--- End diff --

Hi @zenfenan,
Can you clarify what you mean by "aren't loading properly"?  I'm trying to 
understand what is broken since the screenshots are properly displayed in the 
generated docs.


---


[GitHub] nifi pull request #2927: NIFI-5473 Added section on using external signed CA...

2018-07-31 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2927#discussion_r206707072
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -281,6 +281,272 @@ After running the client you will have the CA’s 
certificate, a keystore, a tru
 
 For a client certificate that can be easily imported into the browser, 
specify: `-T PKCS12`
 
+ Using An Existing Intermediate Certificate Authority (CA)
+
+In some enterprise scenarios, a security/IT team may provide a signing 
certificate that has already been signed by the organization's certificate 
authority (CA). This *intermediate CA* can be used to sign the *node* 
(sometimes referred to as *leaf*) certificates that will be installed on each 
NiFi node. In order to inject the existing signing certificate into the toolkit 
process, follow these steps:
+
+. Generate or obtain the signed intermediate CA keys in the following 
format (see additional commands below):
+  * Public certificate in PEM format: `nifi-cert.pem`
+  * Private key in PEM format: `nifi-key.key`
+. Place the files in the *toolkit directory*. This is the directory where 
the tool binary (usually called via the invoking script `tls-toolkit.sh` or 
`tls-toolkit.bat`) is configured to output the signed certificates. *This is 
not necessarily the directory where the binary is located or invoked*. 
+  * For example, given the following scenario, the toolkit command can be 
run from its location as long as the output directory `-o` is `../hardcoded/`, 
and the existing `nifi-cert.pem` and `nifi-key.key` will be used.  
+  ** e.g. `$ ./toolkit/bin/tls-toolkit.sh standalone -o ./hardcoded/ -n 
'node4.nifi.apache.org' -P thisIsABadPassword -S thisIsABadPassword -O` will 
result in a new directory at `./hardcoded/node4.nifi.apache.org` with a 
keystore and truststore containing a certificate signed by 
`./hardcoded/nifi-key.key`  
+  * If the `-o` argument is not provided, the default working directory 
(`.`) must contain `nifi-cert.pem` and `nifi-key.key`
+  ** e.g. `$ cd ./hardcoded/ && ../toolkit/bin/tls-toolkit.sh standalone 
-n 'node5.nifi.apache.org' -P thisIsABadPassword -S thisIsABadPassword -O` 
+
+```
+🔓 0s @ 18:07:58 $ tree -L 2
+.
+├── hardcoded
+│   ├── CN=myusername.hardcoded_OU=NiFi.p12
+│   ├── CN=myusername.hardcoded_OU=NiFi.password
+│   ├── nifi-cert.pem
+│   ├── nifi-key.key
+│   ├── node1.nifi.apache.org
+│   ├── node2.nifi.apache.org
+│   └── node3.nifi.apache.org
+└── toolkit
+    ├── LICENSE
+    ├── NOTICE
+    ├── README
+    ├── bin
+    ├── conf
+    ├── docs
+    └── lib
+```
+
+= Additional Commands
+
+The `nifi-cert.pem` and `nifi-key.key` files should be ASCII-armored 
(Base64-encoded ASCII) files containing the CA public certificate and private 
key respectively. Examples:
--- End diff --

No, I just meant elaborate so "Examples" is a quick sentence summarizing 
what they show.  Not critical.


---


[GitHub] nifi issue #2927: NIFI-5473 Added section on using external signed CA for TL...

2018-07-31 Thread andrewmlim
Github user andrewmlim commented on the issue:

https://github.com/apache/nifi/pull/2927
  
Reviewed and added my comments.  Looks good overall.  +1 to changing the 
TOC level to 3.


---


[GitHub] nifi pull request #2927: NIFI-5473 Added section on using external signed CA...

2018-07-31 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2927#discussion_r206591826
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -166,7 +166,7 @@ In order to facilitate the secure setup of NiFi, you 
can use the `tls-toolkit` c
 
 Wildcard certificates (i.e. two nodes `node1.nifi.apache.org` and 
`node2.nifi.apache.org` being assigned the same certificate with a CN or SAN 
entry of +*.nifi.apache.org+) are *not officially supported* and *not 
recommended*. There are numerous disadvantages to using wildcard certificates, 
and a cluster working with wildcard certificates has occurred in previous 
versions out of lucky accidents, not intentional support. Wildcard SAN entries 
are acceptable *if* each cert maintains an additional unique SAN entry and CN 
entry. 
 
-Potential issues with wildcard certificates:
+ Potential issues with wildcard certificates:
--- End diff --

With the TOC Level Set to 3, should change this to:

Potential Issues with Wildcard Certificates


---


[GitHub] nifi pull request #2927: NIFI-5473 Added section on using external signed CA...

2018-07-31 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2927#discussion_r206584091
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -281,6 +281,272 @@ After running the client you will have the CA’s 
certificate, a keystore, a tru
 
 For a client certificate that can be easily imported into the browser, 
specify: `-T PKCS12`
 
+ Using An Existing Intermediate Certificate Authority (CA)
+
+In some enterprise scenarios, a security/IT team may provide a signing 
certificate that has already been signed by the organization's certificate 
authority (CA). This *intermediate CA* can be used to sign the *node* 
(sometimes referred to as *leaf*) certificates that will be installed on each 
NiFi node. In order to inject the existing signing certificate into the toolkit 
process, follow these steps:
+
+. Generate or obtain the signed intermediate CA keys in the following 
format (see additional commands below):
+  * Public certificate in PEM format: `nifi-cert.pem`
+  * Private key in PEM format: `nifi-key.key`
+. Place the files in the *toolkit directory*. This is the directory where 
the tool binary (usually called via the invoking script `tls-toolkit.sh` or 
`tls-toolkit.bat`) is configured to output the signed certificates. *This is 
not necessarily the directory where the binary is located or invoked*. 
+  * For example, given the following scenario, the toolkit command can be 
run from its location as long as the output directory `-o` is `../hardcoded/`, 
and the existing `nifi-cert.pem` and `nifi-key.key` will be used.  
+  ** e.g. `$ ./toolkit/bin/tls-toolkit.sh standalone -o ./hardcoded/ -n 
'node4.nifi.apache.org' -P thisIsABadPassword -S thisIsABadPassword -O` will 
result in a new directory at `./hardcoded/node4.nifi.apache.org` with a 
keystore and truststore containing a certificate signed by 
`./hardcoded/nifi-key.key`  
+  * If the `-o` argument is not provided, the default working directory 
(`.`) must contain `nifi-cert.pem` and `nifi-key.key`
+  ** e.g. `$ cd ./hardcoded/ && ../toolkit/bin/tls-toolkit.sh standalone 
-n 'node5.nifi.apache.org' -P thisIsABadPassword -S thisIsABadPassword -O` 
+
+```
+🔓 0s @ 18:07:58 $ tree -L 2
+.
+├── hardcoded
+│   ├── CN=myusername.hardcoded_OU=NiFi.p12
+│   ├── CN=myusername.hardcoded_OU=NiFi.password
+│   ├── nifi-cert.pem
+│   ├── nifi-key.key
+│   ├── node1.nifi.apache.org
+│   ├── node2.nifi.apache.org
+│   └── node3.nifi.apache.org
+└── toolkit
+    ├── LICENSE
+    ├── NOTICE
+    ├── README
+    ├── bin
+    ├── conf
+    ├── docs
+    └── lib
+```
+
+= Additional Commands
+
+The `nifi-cert.pem` and `nifi-key.key` files should be ASCII-armored 
(Base64-encoded ASCII) files containing the CA public certificate and private 
key respectively. Examples:
+
+```
+# The first command shows the actual content of the encoded file, and the 
second parses it and shows the internal values
+
+.../certs $ more nifi-cert.pem
+-BEGIN CERTIFICATE-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+-END CERTIFICATE-
+.../certs $ openssl x509 -in nifi-cert.pem -text -noout
+Certificate:
+Data:
+Version: 3 (0x2)
+Serial Number:
+01:64:de:33:79:03:00:00:00:00
+Signature Algorithm: sha256WithRSAEncryption
+Issuer: OU=NIFI, CN=nifi-ca.nifi.ap

[GitHub] nifi pull request #2927: NIFI-5473 Added section on using external signed CA...

2018-07-31 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2927#discussion_r206583792
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -281,6 +281,272 @@ After running the client you will have the CA’s 
certificate, a keystore, a tru
 
 For a client certificate that can be easily imported into the browser, 
specify: `-T PKCS12`
 
+ Using An Existing Intermediate Certificate Authority (CA)
+
+In some enterprise scenarios, a security/IT team may provide a signing 
certificate that has already been signed by the organization's certificate 
authority (CA). This *intermediate CA* can be used to sign the *node* 
(sometimes referred to as *leaf*) certificates that will be installed on each 
NiFi node. In order to inject the existing signing certificate into the toolkit 
process, follow these steps:
+
+. Generate or obtain the signed intermediate CA keys in the following 
format (see additional commands below):
+  * Public certificate in PEM format: `nifi-cert.pem`
+  * Private key in PEM format: `nifi-key.key`
+. Place the files in the *toolkit directory*. This is the directory where 
the tool binary (usually called via the invoking script `tls-toolkit.sh` or 
`tls-toolkit.bat`) is configured to output the signed certificates. *This is 
not necessarily the directory where the binary is located or invoked*. 
+  * For example, given the following scenario, the toolkit command can be 
run from its location as long as the output directory `-o` is `../hardcoded/`, 
and the existing `nifi-cert.pem` and `nifi-key.key` will be used.  
+  ** e.g. `$ ./toolkit/bin/tls-toolkit.sh standalone -o ./hardcoded/ -n 
'node4.nifi.apache.org' -P thisIsABadPassword -S thisIsABadPassword -O` will 
result in a new directory at `./hardcoded/node4.nifi.apache.org` with a 
keystore and truststore containing a certificate signed by 
`./hardcoded/nifi-key.key`  
+  * If the `-o` argument is not provided, the default working directory 
(`.`) must contain `nifi-cert.pem` and `nifi-key.key`
+  ** e.g. `$ cd ./hardcoded/ && ../toolkit/bin/tls-toolkit.sh standalone 
-n 'node5.nifi.apache.org' -P thisIsABadPassword -S thisIsABadPassword -O` 
+
+```
+🔓 0s @ 18:07:58 $ tree -L 2
+.
+├── hardcoded
+│   ├── CN=myusername.hardcoded_OU=NiFi.p12
+│   ├── CN=myusername.hardcoded_OU=NiFi.password
+│   ├── nifi-cert.pem
+│   ├── nifi-key.key
+│   ├── node1.nifi.apache.org
+│   ├── node2.nifi.apache.org
+│   └── node3.nifi.apache.org
+└── toolkit
+    ├── LICENSE
+    ├── NOTICE
+    ├── README
+    ├── bin
+    ├── conf
+    ├── docs
+    └── lib
+```
+
+= Additional Commands
+
+The `nifi-cert.pem` and `nifi-key.key` files should be ASCII-armored 
(Base64-encoded ASCII) files containing the CA public certificate and private 
key respectively. Examples:
+
--- End diff --

Add a section title?

== nifi-cert.pem


---


[GitHub] nifi pull request #2927: NIFI-5473 Added section on using external signed CA...

2018-07-31 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2927#discussion_r206582621
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -281,6 +281,272 @@ After running the client you will have the CA’s 
certificate, a keystore, a tru
 
 For a client certificate that can be easily imported into the browser, 
specify: `-T PKCS12`
 
+ Using An Existing Intermediate Certificate Authority (CA)
+
+In some enterprise scenarios, a security/IT team may provide a signing 
certificate that has already been signed by the organization's certificate 
authority (CA). This *intermediate CA* can be used to sign the *node* 
(sometimes referred to as *leaf*) certificates that will be installed on each 
NiFi node. In order to inject the existing signing certificate into the toolkit 
process, follow these steps:
+
+. Generate or obtain the signed intermediate CA keys in the following 
format (see additional commands below):
+  * Public certificate in PEM format: `nifi-cert.pem`
+  * Private key in PEM format: `nifi-key.key`
+. Place the files in the *toolkit directory*. This is the directory where 
the tool binary (usually called via the invoking script `tls-toolkit.sh` or 
`tls-toolkit.bat`) is configured to output the signed certificates. *This is 
not necessarily the directory where the binary is located or invoked*. 
+  * For example, given the following scenario, the toolkit command can be 
run from its location as long as the output directory `-o` is `../hardcoded/`, 
and the existing `nifi-cert.pem` and `nifi-key.key` will be used.  
+  ** e.g. `$ ./toolkit/bin/tls-toolkit.sh standalone -o ./hardcoded/ -n 
'node4.nifi.apache.org' -P thisIsABadPassword -S thisIsABadPassword -O` will 
result in a new directory at `./hardcoded/node4.nifi.apache.org` with a 
keystore and truststore containing a certificate signed by 
`./hardcoded/nifi-key.key`  
+  * If the `-o` argument is not provided, the default working directory 
(`.`) must contain `nifi-cert.pem` and `nifi-key.key`
+  ** e.g. `$ cd ./hardcoded/ && ../toolkit/bin/tls-toolkit.sh standalone 
-n 'node5.nifi.apache.org' -P thisIsABadPassword -S thisIsABadPassword -O` 
+
+```
+🔓 0s @ 18:07:58 $ tree -L 2
+.
+├── hardcoded
+│   ├── CN=myusername.hardcoded_OU=NiFi.p12
+│   ├── CN=myusername.hardcoded_OU=NiFi.password
+│   ├── nifi-cert.pem
+│   ├── nifi-key.key
+│   ├── node1.nifi.apache.org
+│   ├── node2.nifi.apache.org
+│   └── node3.nifi.apache.org
+└── toolkit
+    ├── LICENSE
+    ├── NOTICE
+    ├── README
+    ├── bin
+    ├── conf
+    ├── docs
+    └── lib
+```
+
+= Additional Commands
+
+The `nifi-cert.pem` and `nifi-key.key` files should be ASCII-armored 
(Base64-encoded ASCII) files containing the CA public certificate and private 
key respectively. Examples:
--- End diff --

Perhaps elaborate on what the "Examples" demonstrate.


---


[GitHub] nifi issue #2922: NIFI-5469 Update Kerberos and LDAP login identity provider...

2018-07-31 Thread andrewmlim
Github user andrewmlim commented on the issue:

https://github.com/apache/nifi/pull/2922
  
Closing this PR as https://github.com/apache/nifi/pull/2925 is the complete 
PR.


---


[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-31 Thread andrewmlim
Github user andrewmlim closed the pull request at:

https://github.com/apache/nifi/pull/2922


---


[GitHub] nifi issue #2927: NIFI-5473 Added section on using external signed CA for TL...

2018-07-30 Thread andrewmlim
Github user andrewmlim commented on the issue:

https://github.com/apache/nifi/pull/2927
  
Will review and provide feedback.


---


[GitHub] nifi pull request #2925: NIFI-5469 Additional italics and code formatting co...

2018-07-30 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi/pull/2925

NIFI-5469 Additional italics and code formatting corrections for cons…

…istency

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi NIFI-5469-2

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi/pull/2925.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #2925


commit ac62417eaede596d4f33c37aa12a048d197d08d1
Author: Andrew Lim 
Date:   2018-07-30T20:17:19Z

NIFI-5469 Additional italics and code formatting corrections for consistency




---


[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-30 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2922#discussion_r206166816
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -2434,82 +2538,82 @@ Before you begin, confirm that:
 +
 |
 |*Required Information*|*Description*
-|Source ZooKeeper hostname (*sourceHostname*)|The hostname must be one of 
the hosts running in the ZooKeeper ensemble, which can be found in /conf/zookeeper.properties.  Any of the hostnames declared in 
the *server.N* properties can be used.
-|Destination ZooKeeper hostname (*destinationHostname*)|The hostname must 
be one of the hosts running in the ZooKeeper ensemble, which can be found in 
/conf/zookeeper.properties.  Any of the hostnames 
declared in the *server.N* properties can be used.
-|Source ZooKeeper port (*sourceClientPort*)|This can be found in 
*zookeeper.properties* of the /conf/zookeeper.properties.  The port is specified in the *clientPort* 
property.
-|Destination ZooKeeper port (*destinationClientPort*)|This can be found in 
*zookeeper.properties* of the /conf/zookeeper.properties.  The port is specified in the *clientPort* 
property.
+|Source ZooKeeper hostname (*sourceHostname*)|The hostname must be one of 
the hosts running in the ZooKeeper ensemble, which can be found in _/conf/zookeeper.properties_.  Any of the hostnames declared in 
the *server.N* properties can be used.
--- End diff --

Going to also remove the double reference to zookeeper.properties:

This can be found in zookeeper.properties of the /conf/zookeeper.properties.


---


[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2922#discussion_r205892652
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -2944,95 +3048,95 @@ at this time.
 
 |
 |*Property*|*Description*
-|nifi.provenance.repository.directory.default*|The location of the 
Provenance Repository. The default value is `./provenance_repository`. +
+|`nifi.provenance.repository.directory.default`*|The location of the 
Provenance Repository. The default value is `./provenance_repository`. +
  +
 *NOTE*: Multiple provenance repositories can be specified by using the 
*_nifi.provenance.repository.directory._* prefix with unique suffixes and 
separate paths as values. +
  +
 For example, to provide two additional locations to act as part of the 
provenance repository, a user could also specify additional properties with 
keys of: +
  +
-nifi.provenance.repository.directory.provenance1=/repos/provenance1 +
-nifi.provenance.repository.directory.provenance2=/repos/provenance2 +
+`nifi.provenance.repository.directory.provenance1=/repos/provenance1` +
+`nifi.provenance.repository.directory.provenance2=/repos/provenance2` +
  +
 Providing three total locations, including 
`nifi.provenance.repository.directory.default`.
-|nifi.provenance.repository.max.storage.time|The maximum amount of time to 
keep data provenance information. The default value is `24 hours`.
-|nifi.provenance.repository.max.storage.size|The maximum amount of data 
provenance information to store at a time. The default value is `1 GB`.
-|nifi.provenance.repository.rollover.time|The amount of time to wait 
before rolling over the latest data provenance information so that it is 
available in the User Interface. The default value is `30 secs`.
-|nifi.provenance.repository.rollover.size|The amount of information to 
roll over at a time. The default value is `100 MB`.
-|nifi.provenance.repository.query.threads|The number of threads to use for 
Provenance Repository queries. The default value is `2`.
-|nifi.provenance.repository.index.threads|The number of threads to use for 
indexing Provenance events so that they are searchable. The default value is 
`2`.
+|`nifi.provenance.repository.max.storage.time`|The maximum amount of time 
to keep data provenance information. The default value is `24 hours`.
+|`nifi.provenance.repository.max.storage.size`|The maximum amount of data 
provenance information to store at a time. The default value is `1 GB`.
+|`nifi.provenance.repository.rollover.time`|The amount of time to wait 
before rolling over the latest data provenance information so that it is 
available in the User Interface. The default value is `30 secs`.
+|`nifi.provenance.repository.rollover.size`|The amount of information to 
roll over at a time. The default value is `100 MB`.
+|`nifi.provenance.repository.query.threads`|The number of threads to use 
for Provenance Repository queries. The default value is `2`.
+|`nifi.provenance.repository.index.threads`|The number of threads to use 
for indexing Provenance events so that they are searchable. The default value 
is `2`.
For flows that operate on a very high number of FlowFiles, the indexing 
of Provenance events could become a bottleneck. If this is the case, a bulletin 
will appear, indicating that
"The rate of the dataflow is exceeding the provenance recording rate. 
Slowing down flow to accommodate." If this happens, increasing the value of 
this property
may increase the rate at which the Provenance Repository is able to 
process these records, resulting in better overall throughput.
-|nifi.provenance.repository.compress.on.rollover|Indicates whether to 
compress the provenance information when rolling it over. The default value is 
`true`.
-|nifi.provenance.repository.always.sync|If set to `true`, any change to 
the repository will be synchronized to the disk, meaning that NiFi will ask the 
operating system not to cache the information. This is very expensive and can 
significantly reduce NiFi performance. However, if it is `false`, there could 
be the potential for data loss if either there is a sudden power loss or the 
operating system crashes. The default value is `false`.
-|nifi.provenance.repository.journal.count|The number of journal files that 
should be used to serialize Provenance Event data. Increasing this value will 
allow more tasks to simultaneously update the repository but will result in 
more expensive merging of the journal files later. This value should ideally be 
equal to the number of threads that are expected to update the repository 
simultaneously, but 16 tends to work well in must environments. The default 
value is `16`.
-|nifi.provenance.repository.indexed.fields|This is a comma-separated list 
of the fields that should be indexe

[GitHub] nifi issue #2922: NIFI-5469 Update Kerberos and LDAP login identity provider...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on the issue:

https://github.com/apache/nifi/pull/2922
  
Thanks @alopresto for the detailed review.  Definitely needed your extra 
sets of eyes.  Will make the suggested changes.


---


[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2922#discussion_r205890860
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -3074,69 +3178,69 @@ 
nifi.provenance.repository.encryption.key=0123456789ABCDEFFEDCBA9876543210012345
 The Component Status Repository contains the information for the Component 
Status History tool in the User Interface. These
 properties govern how that tool works.
 
-The buffer.size and snapshot.frequency work together to determine the 
amount of historical data to retain. As an example to
+The `buffer.size` and `snapshot.frequency` work together to determine the 
amount of historical data to retain. As an example to
 configure two days worth of historical data with a data point snapshot 
occurring every 5 minutes you would configure
 snapshot.frequency to be "5 mins" and the buffer.size to be "576". To 
further explain this example for every 60 minutes there
 are 12 (60 / 5) snapshot windows for that time period. To keep that data 
for 48 hours (12 * 48) you end up with a buffer size
 of 576.
 
 |
 |*Property*|*Description*
-|nifi.components.status.repository.implementation|The Component Status 
Repository implementation. The default value is 
`org.apache.nifi.controller.status.history.VolatileComponentStatusRepository` 
and should not be changed.
-|nifi.components.status.repository.buffer.size|Specifies the buffer size 
for the Component Status Repository. The default value is `1440`.
-|nifi.components.status.snapshot.frequency|This value indicates how often 
to present a snapshot of the components' status history. The default value is 
`1 min`.
+|`nifi.components.status.repository.implementation`|The Component Status 
Repository implementation. The default value is 
`org.apache.nifi.controller.status.history.VolatileComponentStatusRepository` 
and should not be changed.
+|`nifi.components.status.repository.buffer.size`|Specifies the buffer size 
for the Component Status Repository. The default value is `1440`.
+|`nifi.components.status.snapshot.frequency`|This value indicates how 
often to present a snapshot of the components' status history. The default 
value is `1 min`.
 |
 
 
 [[site_to_site_properties]]
 === Site to Site Properties
 
 These properties govern how this instance of NiFi communicates with remote 
instances of NiFi when Remote Process Groups are configured in the dataflow.
-Remote Process Groups can choose transport protocol from RAW and HTTP. 
Properties named with _nifi.remote.input.socket.*_ are RAW transport protocol 
specific. Similarly, _nifi.remote.input.http.*_ are HTTP transport protocol 
specific properties.
+Remote Process Groups can choose transport protocol from RAW and HTTP. 
Properties named with `nifi.remote.input.socket.`* are RAW transport protocol 
specific. Similarly, `nifi.remote.input.http.`* are HTTP transport protocol 
specific properties.
--- End diff --

Will make these changes.  There are other trailing asterisks as noted in 
the comments below that should NOT be formatted as they are meant to designate 
properties that require upgrade considerations.


---


[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2922#discussion_r205890227
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -3074,69 +3178,69 @@ 
nifi.provenance.repository.encryption.key=0123456789ABCDEFFEDCBA9876543210012345
 The Component Status Repository contains the information for the Component 
Status History tool in the User Interface. These
 properties govern how that tool works.
 
-The buffer.size and snapshot.frequency work together to determine the 
amount of historical data to retain. As an example to
+The `buffer.size` and `snapshot.frequency` work together to determine the 
amount of historical data to retain. As an example to
 configure two days worth of historical data with a data point snapshot 
occurring every 5 minutes you would configure
 snapshot.frequency to be "5 mins" and the buffer.size to be "576". To 
further explain this example for every 60 minutes there
 are 12 (60 / 5) snapshot windows for that time period. To keep that data 
for 48 hours (12 * 48) you end up with a buffer size
 of 576.
 
 |
 |*Property*|*Description*
-|nifi.components.status.repository.implementation|The Component Status 
Repository implementation. The default value is 
`org.apache.nifi.controller.status.history.VolatileComponentStatusRepository` 
and should not be changed.
-|nifi.components.status.repository.buffer.size|Specifies the buffer size 
for the Component Status Repository. The default value is `1440`.
-|nifi.components.status.snapshot.frequency|This value indicates how often 
to present a snapshot of the components' status history. The default value is 
`1 min`.
+|`nifi.components.status.repository.implementation`|The Component Status 
Repository implementation. The default value is 
`org.apache.nifi.controller.status.history.VolatileComponentStatusRepository` 
and should not be changed.
+|`nifi.components.status.repository.buffer.size`|Specifies the buffer size 
for the Component Status Repository. The default value is `1440`.
+|`nifi.components.status.snapshot.frequency`|This value indicates how 
often to present a snapshot of the components' status history. The default 
value is `1 min`.
 |
 
 
 [[site_to_site_properties]]
 === Site to Site Properties
 
 These properties govern how this instance of NiFi communicates with remote 
instances of NiFi when Remote Process Groups are configured in the dataflow.
-Remote Process Groups can choose transport protocol from RAW and HTTP. 
Properties named with _nifi.remote.input.socket.*_ are RAW transport protocol 
specific. Similarly, _nifi.remote.input.http.*_ are HTTP transport protocol 
specific properties.
+Remote Process Groups can choose transport protocol from RAW and HTTP. 
Properties named with `nifi.remote.input.socket.`* are RAW transport protocol 
specific. Similarly, `nifi.remote.input.http.`* are HTTP transport protocol 
specific properties.
--- End diff --

Agreed.


---


[GitHub] nifi issue #2922: NIFI-5469 Update Kerberos and LDAP login identity provider...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on the issue:

https://github.com/apache/nifi/pull/2922
  
Those trailing asterisks refer to the following sections.

From the System Properties section (line 2860-2861):

Consider configuring items below marked with an asterisk (*) in such a way 
that upgrading will be easier.

From the Warning at the end of the Guide (line 3687):

Take care when configuring the properties above that are marked with an 
asterisk (*).


---


[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2922#discussion_r205887314
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -2944,95 +3048,95 @@ at this time.
 
 |
 |*Property*|*Description*
-|nifi.provenance.repository.directory.default*|The location of the 
Provenance Repository. The default value is `./provenance_repository`. +
+|`nifi.provenance.repository.directory.default`*|The location of the 
Provenance Repository. The default value is `./provenance_repository`. +
  +
 *NOTE*: Multiple provenance repositories can be specified by using the 
*_nifi.provenance.repository.directory._* prefix with unique suffixes and 
separate paths as values. +
  +
 For example, to provide two additional locations to act as part of the 
provenance repository, a user could also specify additional properties with 
keys of: +
  +
-nifi.provenance.repository.directory.provenance1=/repos/provenance1 +
-nifi.provenance.repository.directory.provenance2=/repos/provenance2 +
+`nifi.provenance.repository.directory.provenance1=/repos/provenance1` +
+`nifi.provenance.repository.directory.provenance2=/repos/provenance2` +
  +
 Providing three total locations, including 
`nifi.provenance.repository.directory.default`.
-|nifi.provenance.repository.max.storage.time|The maximum amount of time to 
keep data provenance information. The default value is `24 hours`.
-|nifi.provenance.repository.max.storage.size|The maximum amount of data 
provenance information to store at a time. The default value is `1 GB`.
-|nifi.provenance.repository.rollover.time|The amount of time to wait 
before rolling over the latest data provenance information so that it is 
available in the User Interface. The default value is `30 secs`.
-|nifi.provenance.repository.rollover.size|The amount of information to 
roll over at a time. The default value is `100 MB`.
-|nifi.provenance.repository.query.threads|The number of threads to use for 
Provenance Repository queries. The default value is `2`.
-|nifi.provenance.repository.index.threads|The number of threads to use for 
indexing Provenance events so that they are searchable. The default value is 
`2`.
+|`nifi.provenance.repository.max.storage.time`|The maximum amount of time 
to keep data provenance information. The default value is `24 hours`.
+|`nifi.provenance.repository.max.storage.size`|The maximum amount of data 
provenance information to store at a time. The default value is `1 GB`.
+|`nifi.provenance.repository.rollover.time`|The amount of time to wait 
before rolling over the latest data provenance information so that it is 
available in the User Interface. The default value is `30 secs`.
+|`nifi.provenance.repository.rollover.size`|The amount of information to 
roll over at a time. The default value is `100 MB`.
+|`nifi.provenance.repository.query.threads`|The number of threads to use 
for Provenance Repository queries. The default value is `2`.
+|`nifi.provenance.repository.index.threads`|The number of threads to use 
for indexing Provenance events so that they are searchable. The default value 
is `2`.
For flows that operate on a very high number of FlowFiles, the indexing 
of Provenance events could become a bottleneck. If this is the case, a bulletin 
will appear, indicating that
"The rate of the dataflow is exceeding the provenance recording rate. 
Slowing down flow to accommodate." If this happens, increasing the value of 
this property
may increase the rate at which the Provenance Repository is able to 
process these records, resulting in better overall throughput.
-|nifi.provenance.repository.compress.on.rollover|Indicates whether to 
compress the provenance information when rolling it over. The default value is 
`true`.
-|nifi.provenance.repository.always.sync|If set to `true`, any change to 
the repository will be synchronized to the disk, meaning that NiFi will ask the 
operating system not to cache the information. This is very expensive and can 
significantly reduce NiFi performance. However, if it is `false`, there could 
be the potential for data loss if either there is a sudden power loss or the 
operating system crashes. The default value is `false`.
-|nifi.provenance.repository.journal.count|The number of journal files that 
should be used to serialize Provenance Event data. Increasing this value will 
allow more tasks to simultaneously update the repository but will result in 
more expensive merging of the journal files later. This value should ideally be 
equal to the number of threads that are expected to update the repository 
simultaneously, but 16 tends to work well in must environments. The default 
value is `16`.
-|nifi.provenance.repository.indexed.fields|This is a comma-separated list 
of the fields that should be indexe

[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2922#discussion_r205885953
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -3074,69 +3178,69 @@ 
nifi.provenance.repository.encryption.key=0123456789ABCDEFFEDCBA9876543210012345
 The Component Status Repository contains the information for the Component 
Status History tool in the User Interface. These
 properties govern how that tool works.
 
-The buffer.size and snapshot.frequency work together to determine the 
amount of historical data to retain. As an example to
+The `buffer.size` and `snapshot.frequency` work together to determine the 
amount of historical data to retain. As an example to
 configure two days worth of historical data with a data point snapshot 
occurring every 5 minutes you would configure
 snapshot.frequency to be "5 mins" and the buffer.size to be "576". To 
further explain this example for every 60 minutes there
 are 12 (60 / 5) snapshot windows for that time period. To keep that data 
for 48 hours (12 * 48) you end up with a buffer size
 of 576.
 
 |
 |*Property*|*Description*
-|nifi.components.status.repository.implementation|The Component Status 
Repository implementation. The default value is 
`org.apache.nifi.controller.status.history.VolatileComponentStatusRepository` 
and should not be changed.
-|nifi.components.status.repository.buffer.size|Specifies the buffer size 
for the Component Status Repository. The default value is `1440`.
-|nifi.components.status.snapshot.frequency|This value indicates how often 
to present a snapshot of the components' status history. The default value is 
`1 min`.
+|`nifi.components.status.repository.implementation`|The Component Status 
Repository implementation. The default value is 
`org.apache.nifi.controller.status.history.VolatileComponentStatusRepository` 
and should not be changed.
+|`nifi.components.status.repository.buffer.size`|Specifies the buffer size 
for the Component Status Repository. The default value is `1440`.
+|`nifi.components.status.snapshot.frequency`|This value indicates how 
often to present a snapshot of the components' status history. The default 
value is `1 min`.
 |
 
 
 [[site_to_site_properties]]
 === Site to Site Properties
 
 These properties govern how this instance of NiFi communicates with remote 
instances of NiFi when Remote Process Groups are configured in the dataflow.
-Remote Process Groups can choose transport protocol from RAW and HTTP. 
Properties named with _nifi.remote.input.socket.*_ are RAW transport protocol 
specific. Similarly, _nifi.remote.input.http.*_ are HTTP transport protocol 
specific properties.
+Remote Process Groups can choose transport protocol from RAW and HTTP. 
Properties named with `nifi.remote.input.socket.`* are RAW transport protocol 
specific. Similarly, `nifi.remote.input.http.`* are HTTP transport protocol 
specific properties.
 
 |
 |*Property*|*Description*
-|nifi.remote.input.host|The host name that will be given out to clients to 
connect to this NiFi instance for Site-to-Site communication. By default, it is 
the value from InetAddress.getLocalHost().getHostName(). On UNIX-like operating 
systems, this is typically the output from the `hostname` command.
-|nifi.remote.input.secure|This indicates whether communication between 
this instance of NiFi and remote NiFi instances should be secure. By default, 
it is set to `false`. In order for secure site-to-site to work, set the 
property to `true`.   Many other Security Properties (below) must also be 
configured.
-|nifi.remote.input.socket.port|The remote input socket port for 
Site-to-Site communication. By default, it is blank, but it must have a value 
in order to use RAW socket as transport protocol for Site-to-Site.
-|nifi.remote.input.http.enabled|Specifies whether HTTP Site-to-Site should 
be enabled on this host.  By default, it is set to `true`. +
+|`nifi.remote.input.host`|The host name that will be given out to clients 
to connect to this NiFi instance for Site-to-Site communication. By default, it 
is the value from InetAddress.getLocalHost().getHostName(). On UNIX-like 
operating systems, this is typically the output from the `hostname` command.
+|`nifi.remote.input.secure`|This indicates whether communication between 
this instance of NiFi and remote NiFi instances should be secure. By default, 
it is set to `false`. In order for secure site-to-site to work, set the 
property to `true`.   Many other Security Properties (below) must also be 
configured.
+|`nifi.remote.input.socket.port`|The remote input socket port for 
Site-to-Site communication. By default, it is blank, but it must have a value 
in order to use RAW socket as transport protocol for Site-to-Site.
+|`nifi.remote.input.htt

[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2922#discussion_r205885877
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -3074,69 +3178,69 @@ 
nifi.provenance.repository.encryption.key=0123456789ABCDEFFEDCBA9876543210012345
 The Component Status Repository contains the information for the Component 
Status History tool in the User Interface. These
 properties govern how that tool works.
 
-The buffer.size and snapshot.frequency work together to determine the 
amount of historical data to retain. As an example to
+The `buffer.size` and `snapshot.frequency` work together to determine the 
amount of historical data to retain. As an example to
 configure two days worth of historical data with a data point snapshot 
occurring every 5 minutes you would configure
 snapshot.frequency to be "5 mins" and the buffer.size to be "576". To 
further explain this example for every 60 minutes there
 are 12 (60 / 5) snapshot windows for that time period. To keep that data 
for 48 hours (12 * 48) you end up with a buffer size
 of 576.
 
 |
 |*Property*|*Description*
-|nifi.components.status.repository.implementation|The Component Status 
Repository implementation. The default value is 
`org.apache.nifi.controller.status.history.VolatileComponentStatusRepository` 
and should not be changed.
-|nifi.components.status.repository.buffer.size|Specifies the buffer size 
for the Component Status Repository. The default value is `1440`.
-|nifi.components.status.snapshot.frequency|This value indicates how often 
to present a snapshot of the components' status history. The default value is 
`1 min`.
+|`nifi.components.status.repository.implementation`|The Component Status 
Repository implementation. The default value is 
`org.apache.nifi.controller.status.history.VolatileComponentStatusRepository` 
and should not be changed.
+|`nifi.components.status.repository.buffer.size`|Specifies the buffer size 
for the Component Status Repository. The default value is `1440`.
+|`nifi.components.status.snapshot.frequency`|This value indicates how 
often to present a snapshot of the components' status history. The default 
value is `1 min`.
 |
 
 
 [[site_to_site_properties]]
 === Site to Site Properties
 
 These properties govern how this instance of NiFi communicates with remote 
instances of NiFi when Remote Process Groups are configured in the dataflow.
-Remote Process Groups can choose transport protocol from RAW and HTTP. 
Properties named with _nifi.remote.input.socket.*_ are RAW transport protocol 
specific. Similarly, _nifi.remote.input.http.*_ are HTTP transport protocol 
specific properties.
+Remote Process Groups can choose transport protocol from RAW and HTTP. 
Properties named with `nifi.remote.input.socket.`* are RAW transport protocol 
specific. Similarly, `nifi.remote.input.http.`* are HTTP transport protocol 
specific properties.
 
 |
 |*Property*|*Description*
-|nifi.remote.input.host|The host name that will be given out to clients to 
connect to this NiFi instance for Site-to-Site communication. By default, it is 
the value from InetAddress.getLocalHost().getHostName(). On UNIX-like operating 
systems, this is typically the output from the `hostname` command.
-|nifi.remote.input.secure|This indicates whether communication between 
this instance of NiFi and remote NiFi instances should be secure. By default, 
it is set to `false`. In order for secure site-to-site to work, set the 
property to `true`.   Many other Security Properties (below) must also be 
configured.
-|nifi.remote.input.socket.port|The remote input socket port for 
Site-to-Site communication. By default, it is blank, but it must have a value 
in order to use RAW socket as transport protocol for Site-to-Site.
-|nifi.remote.input.http.enabled|Specifies whether HTTP Site-to-Site should 
be enabled on this host.  By default, it is set to `true`. +
+|`nifi.remote.input.host`|The host name that will be given out to clients 
to connect to this NiFi instance for Site-to-Site communication. By default, it 
is the value from InetAddress.getLocalHost().getHostName(). On UNIX-like 
operating systems, this is typically the output from the `hostname` command.
+|`nifi.remote.input.secure`|This indicates whether communication between 
this instance of NiFi and remote NiFi instances should be secure. By default, 
it is set to `false`. In order for secure site-to-site to work, set the 
property to `true`.   Many other Security Properties (below) must also be 
configured.
+|`nifi.remote.input.socket.port`|The remote input socket port for 
Site-to-Site communication. By default, it is blank, but it must have a value 
in order to use RAW socket as transport protocol for Site-to-Site.
+|`nifi.remote.input.htt

[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2922#discussion_r205885566
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -3074,69 +3178,69 @@ 
nifi.provenance.repository.encryption.key=0123456789ABCDEFFEDCBA9876543210012345
 The Component Status Repository contains the information for the Component 
Status History tool in the User Interface. These
 properties govern how that tool works.
 
-The buffer.size and snapshot.frequency work together to determine the 
amount of historical data to retain. As an example to
+The `buffer.size` and `snapshot.frequency` work together to determine the 
amount of historical data to retain. As an example to
 configure two days worth of historical data with a data point snapshot 
occurring every 5 minutes you would configure
 snapshot.frequency to be "5 mins" and the buffer.size to be "576". To 
further explain this example for every 60 minutes there
 are 12 (60 / 5) snapshot windows for that time period. To keep that data 
for 48 hours (12 * 48) you end up with a buffer size
 of 576.
 
 |
 |*Property*|*Description*
-|nifi.components.status.repository.implementation|The Component Status 
Repository implementation. The default value is 
`org.apache.nifi.controller.status.history.VolatileComponentStatusRepository` 
and should not be changed.
-|nifi.components.status.repository.buffer.size|Specifies the buffer size 
for the Component Status Repository. The default value is `1440`.
-|nifi.components.status.snapshot.frequency|This value indicates how often 
to present a snapshot of the components' status history. The default value is 
`1 min`.
+|`nifi.components.status.repository.implementation`|The Component Status 
Repository implementation. The default value is 
`org.apache.nifi.controller.status.history.VolatileComponentStatusRepository` 
and should not be changed.
+|`nifi.components.status.repository.buffer.size`|Specifies the buffer size 
for the Component Status Repository. The default value is `1440`.
+|`nifi.components.status.snapshot.frequency`|This value indicates how 
often to present a snapshot of the components' status history. The default 
value is `1 min`.
 |
 
 
 [[site_to_site_properties]]
 === Site to Site Properties
 
 These properties govern how this instance of NiFi communicates with remote 
instances of NiFi when Remote Process Groups are configured in the dataflow.
-Remote Process Groups can choose transport protocol from RAW and HTTP. 
Properties named with _nifi.remote.input.socket.*_ are RAW transport protocol 
specific. Similarly, _nifi.remote.input.http.*_ are HTTP transport protocol 
specific properties.
+Remote Process Groups can choose transport protocol from RAW and HTTP. 
Properties named with `nifi.remote.input.socket.`* are RAW transport protocol 
specific. Similarly, `nifi.remote.input.http.`* are HTTP transport protocol 
specific properties.
 
 |
 |*Property*|*Description*
-|nifi.remote.input.host|The host name that will be given out to clients to 
connect to this NiFi instance for Site-to-Site communication. By default, it is 
the value from InetAddress.getLocalHost().getHostName(). On UNIX-like operating 
systems, this is typically the output from the `hostname` command.
-|nifi.remote.input.secure|This indicates whether communication between 
this instance of NiFi and remote NiFi instances should be secure. By default, 
it is set to `false`. In order for secure site-to-site to work, set the 
property to `true`.   Many other Security Properties (below) must also be 
configured.
-|nifi.remote.input.socket.port|The remote input socket port for 
Site-to-Site communication. By default, it is blank, but it must have a value 
in order to use RAW socket as transport protocol for Site-to-Site.
-|nifi.remote.input.http.enabled|Specifies whether HTTP Site-to-Site should 
be enabled on this host.  By default, it is set to `true`. +
+|`nifi.remote.input.host`|The host name that will be given out to clients 
to connect to this NiFi instance for Site-to-Site communication. By default, it 
is the value from InetAddress.getLocalHost().getHostName(). On UNIX-like 
operating systems, this is typically the output from the `hostname` command.
+|`nifi.remote.input.secure`|This indicates whether communication between 
this instance of NiFi and remote NiFi instances should be secure. By default, 
it is set to `false`. In order for secure site-to-site to work, set the 
property to `true`.   Many other Security Properties (below) must also be 
configured.
--- End diff --

Good idea.


---


[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2922#discussion_r205884822
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -2944,95 +3048,95 @@ at this time.
 
 |
 |*Property*|*Description*
-|nifi.provenance.repository.directory.default*|The location of the 
Provenance Repository. The default value is `./provenance_repository`. +
+|`nifi.provenance.repository.directory.default`*|The location of the 
Provenance Repository. The default value is `./provenance_repository`. +
  +
 *NOTE*: Multiple provenance repositories can be specified by using the 
*_nifi.provenance.repository.directory._* prefix with unique suffixes and 
separate paths as values. +
  +
 For example, to provide two additional locations to act as part of the 
provenance repository, a user could also specify additional properties with 
keys of: +
  +
-nifi.provenance.repository.directory.provenance1=/repos/provenance1 +
-nifi.provenance.repository.directory.provenance2=/repos/provenance2 +
+`nifi.provenance.repository.directory.provenance1=/repos/provenance1` +
+`nifi.provenance.repository.directory.provenance2=/repos/provenance2` +
  +
 Providing three total locations, including 
`nifi.provenance.repository.directory.default`.
-|nifi.provenance.repository.max.storage.time|The maximum amount of time to 
keep data provenance information. The default value is `24 hours`.
-|nifi.provenance.repository.max.storage.size|The maximum amount of data 
provenance information to store at a time. The default value is `1 GB`.
-|nifi.provenance.repository.rollover.time|The amount of time to wait 
before rolling over the latest data provenance information so that it is 
available in the User Interface. The default value is `30 secs`.
-|nifi.provenance.repository.rollover.size|The amount of information to 
roll over at a time. The default value is `100 MB`.
-|nifi.provenance.repository.query.threads|The number of threads to use for 
Provenance Repository queries. The default value is `2`.
-|nifi.provenance.repository.index.threads|The number of threads to use for 
indexing Provenance events so that they are searchable. The default value is 
`2`.
+|`nifi.provenance.repository.max.storage.time`|The maximum amount of time 
to keep data provenance information. The default value is `24 hours`.
+|`nifi.provenance.repository.max.storage.size`|The maximum amount of data 
provenance information to store at a time. The default value is `1 GB`.
+|`nifi.provenance.repository.rollover.time`|The amount of time to wait 
before rolling over the latest data provenance information so that it is 
available in the User Interface. The default value is `30 secs`.
+|`nifi.provenance.repository.rollover.size`|The amount of information to 
roll over at a time. The default value is `100 MB`.
+|`nifi.provenance.repository.query.threads`|The number of threads to use 
for Provenance Repository queries. The default value is `2`.
+|`nifi.provenance.repository.index.threads`|The number of threads to use 
for indexing Provenance events so that they are searchable. The default value 
is `2`.
For flows that operate on a very high number of FlowFiles, the indexing 
of Provenance events could become a bottleneck. If this is the case, a bulletin 
will appear, indicating that
"The rate of the dataflow is exceeding the provenance recording rate. 
Slowing down flow to accommodate." If this happens, increasing the value of 
this property
may increase the rate at which the Provenance Repository is able to 
process these records, resulting in better overall throughput.
-|nifi.provenance.repository.compress.on.rollover|Indicates whether to 
compress the provenance information when rolling it over. The default value is 
`true`.
-|nifi.provenance.repository.always.sync|If set to `true`, any change to 
the repository will be synchronized to the disk, meaning that NiFi will ask the 
operating system not to cache the information. This is very expensive and can 
significantly reduce NiFi performance. However, if it is `false`, there could 
be the potential for data loss if either there is a sudden power loss or the 
operating system crashes. The default value is `false`.
-|nifi.provenance.repository.journal.count|The number of journal files that 
should be used to serialize Provenance Event data. Increasing this value will 
allow more tasks to simultaneously update the repository but will result in 
more expensive merging of the journal files later. This value should ideally be 
equal to the number of threads that are expected to update the repository 
simultaneously, but 16 tends to work well in must environments. The default 
value is `16`.
-|nifi.provenance.repository.indexed.fields|This is a comma-separated list 
of the fields that should be indexe

[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2922#discussion_r205884528
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -2944,95 +3048,95 @@ at this time.
 
 |
 |*Property*|*Description*
-|nifi.provenance.repository.directory.default*|The location of the 
Provenance Repository. The default value is `./provenance_repository`. +
+|`nifi.provenance.repository.directory.default`*|The location of the 
Provenance Repository. The default value is `./provenance_repository`. +
  +
 *NOTE*: Multiple provenance repositories can be specified by using the 
*_nifi.provenance.repository.directory._* prefix with unique suffixes and 
separate paths as values. +
  +
 For example, to provide two additional locations to act as part of the 
provenance repository, a user could also specify additional properties with 
keys of: +
  +
-nifi.provenance.repository.directory.provenance1=/repos/provenance1 +
-nifi.provenance.repository.directory.provenance2=/repos/provenance2 +
+`nifi.provenance.repository.directory.provenance1=/repos/provenance1` +
+`nifi.provenance.repository.directory.provenance2=/repos/provenance2` +
  +
 Providing three total locations, including 
`nifi.provenance.repository.directory.default`.
-|nifi.provenance.repository.max.storage.time|The maximum amount of time to 
keep data provenance information. The default value is `24 hours`.
-|nifi.provenance.repository.max.storage.size|The maximum amount of data 
provenance information to store at a time. The default value is `1 GB`.
-|nifi.provenance.repository.rollover.time|The amount of time to wait 
before rolling over the latest data provenance information so that it is 
available in the User Interface. The default value is `30 secs`.
-|nifi.provenance.repository.rollover.size|The amount of information to 
roll over at a time. The default value is `100 MB`.
-|nifi.provenance.repository.query.threads|The number of threads to use for 
Provenance Repository queries. The default value is `2`.
-|nifi.provenance.repository.index.threads|The number of threads to use for 
indexing Provenance events so that they are searchable. The default value is 
`2`.
+|`nifi.provenance.repository.max.storage.time`|The maximum amount of time 
to keep data provenance information. The default value is `24 hours`.
+|`nifi.provenance.repository.max.storage.size`|The maximum amount of data 
provenance information to store at a time. The default value is `1 GB`.
+|`nifi.provenance.repository.rollover.time`|The amount of time to wait 
before rolling over the latest data provenance information so that it is 
available in the User Interface. The default value is `30 secs`.
+|`nifi.provenance.repository.rollover.size`|The amount of information to 
roll over at a time. The default value is `100 MB`.
+|`nifi.provenance.repository.query.threads`|The number of threads to use 
for Provenance Repository queries. The default value is `2`.
+|`nifi.provenance.repository.index.threads`|The number of threads to use 
for indexing Provenance events so that they are searchable. The default value 
is `2`.
For flows that operate on a very high number of FlowFiles, the indexing 
of Provenance events could become a bottleneck. If this is the case, a bulletin 
will appear, indicating that
"The rate of the dataflow is exceeding the provenance recording rate. 
Slowing down flow to accommodate." If this happens, increasing the value of 
this property
may increase the rate at which the Provenance Repository is able to 
process these records, resulting in better overall throughput.
-|nifi.provenance.repository.compress.on.rollover|Indicates whether to 
compress the provenance information when rolling it over. The default value is 
`true`.
-|nifi.provenance.repository.always.sync|If set to `true`, any change to 
the repository will be synchronized to the disk, meaning that NiFi will ask the 
operating system not to cache the information. This is very expensive and can 
significantly reduce NiFi performance. However, if it is `false`, there could 
be the potential for data loss if either there is a sudden power loss or the 
operating system crashes. The default value is `false`.
-|nifi.provenance.repository.journal.count|The number of journal files that 
should be used to serialize Provenance Event data. Increasing this value will 
allow more tasks to simultaneously update the repository but will result in 
more expensive merging of the journal files later. This value should ideally be 
equal to the number of threads that are expected to update the repository 
simultaneously, but 16 tends to work well in must environments. The default 
value is `16`.
-|nifi.provenance.repository.indexed.fields|This is a comma-separated list 
of the fields that should be indexe

[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2922#discussion_r205884200
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -2944,95 +3048,95 @@ at this time.
 
--- End diff --

I saw that and didn't want to change it, not knowing the author's intent.  
But, if you agree that this is worthy to change for consistency, then I am in 
agreement also.


---


[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2922#discussion_r205883727
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -2876,40 +2980,40 @@ FlowFile Repository, if also on that disk, could 
become corrupt. To avoid this s
 
 |
 |*Property*|*Description*
-|nifi.content.repository.implementation|The Content Repository 
implementation. The default value is 
`org.apache.nifi.controller.repository.FileSystemRepository` and should only be 
changed with caution. To store flowfile content in memory instead of on disk 
(at the risk of data loss in the event of power/machine failure), set this 
property to `org.apache.nifi.controller.repository.VolatileContentRepository`.
+|`nifi.content.repository.implementation`|The Content Repository 
implementation. The default value is 
`org.apache.nifi.controller.repository.FileSystemRepository` and should only be 
changed with caution. To store flowfile content in memory instead of on disk 
(at the risk of data loss in the event of power/machine failure), set this 
property to `org.apache.nifi.controller.repository.VolatileContentRepository`.
 |
 
 === File System Content Repository Properties
 
 |
 |*Property*|*Description*
-|nifi.content.repository.implementation|The Content Repository 
implementation. The default value is 
`org.apache.nifi.controller.repository.FileSystemRepository` and should only be 
changed with caution. To store flowfile content in memory instead of on disk 
(at the risk of data loss in the event of power/machine failure), set this 
property to `org.apache.nifi.controller.repository.VolatileContentRepository`.
-|nifi.content.claim.max.appendable.size|The maximum size for a content 
claim. The default value is `1 MB`.
-|nifi.content.claim.max.flow.files|The maximum number of FlowFiles to 
assign to one content claim. The default value is `100`.
-|nifi.content.repository.directory.default*|The location of the Content 
Repository. The default value is `./content_repository`. +
+|`nifi.content.repository.implementation`|The Content Repository 
implementation. The default value is 
`org.apache.nifi.controller.repository.FileSystemRepository` and should only be 
changed with caution. To store flowfile content in memory instead of on disk 
(at the risk of data loss in the event of power/machine failure), set this 
property to `org.apache.nifi.controller.repository.VolatileContentRepository`.
+|`nifi.content.claim.max.appendable.size`|The maximum size for a content 
claim. The default value is `1 MB`.
+|`nifi.content.claim.max.flow.files`|The maximum number of FlowFiles to 
assign to one content claim. The default value is `100`.
+|`nifi.content.repository.directory.default`*|The location of the Content 
Repository. The default value is `./content_repository`. +
  +
 *NOTE*: Multiple content repositories can be specified by using the 
*_nifi.content.repository.directory._* prefix with unique suffixes and separate 
paths as values. +
  +
 For example, to provide two additional locations to act as part of the 
content repository, a user could also specify additional properties with keys 
of: +
  +
-nifi.content.repository.directory.content1=/repos/content1 +
-nifi.content.repository.directory.content2=/repos/content2 +
+`nifi.content.repository.directory.content1=/repos/content1` +
+`nifi.content.repository.directory.content2=/repos/content2` +
  +
 Providing three total locations, including  
`nifi.content.repository.directory.default`.
-|nifi.content.repository.archive.max.retention.period|If archiving is 
enabled (see nifi.content.repository.archive.enabled below), then
+|`nifi.content.repository.archive.max.retention.period`|If archiving is 
enabled (see `nifi.content.repository.archive.enabled` below), then
 this property specifies the maximum amount of time to keep the archived 
data. The default value is `12 hours`.
-|nifi.content.repository.archive.max.usage.percentage|If archiving is 
enabled (see nifi.content.repository.archive.enabled below), then this property 
must have a value that indicates the content repository disk usage percentage 
at which archived data begins to be removed. If the archive is empty and 
content repository disk usage is above this percentage, then archiving is 
temporarily disabled. Archiving will resume when disk usage is below this 
percentage. The default value is `50%`.
-|nifi.content.repository.archive.enabled|To enable content archiving, set 
this to _true_ and specify a value for the 
`nifi.content.repository.archive.max.usage.percentage` property above. Content 
archiving enables the provenance UI to view or replay content that is no longer 
in a dataflow queue. By default, archiving is enabled.
-|nifi.content.repository.always.sync|If set to `true`, any change

[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2922#discussion_r205883620
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -2876,40 +2980,40 @@ FlowFile Repository, if also on that disk, could 
become corrupt. To avoid this s
 
 |
 |*Property*|*Description*
-|nifi.content.repository.implementation|The Content Repository 
implementation. The default value is 
`org.apache.nifi.controller.repository.FileSystemRepository` and should only be 
changed with caution. To store flowfile content in memory instead of on disk 
(at the risk of data loss in the event of power/machine failure), set this 
property to `org.apache.nifi.controller.repository.VolatileContentRepository`.
+|`nifi.content.repository.implementation`|The Content Repository 
implementation. The default value is 
`org.apache.nifi.controller.repository.FileSystemRepository` and should only be 
changed with caution. To store flowfile content in memory instead of on disk 
(at the risk of data loss in the event of power/machine failure), set this 
property to `org.apache.nifi.controller.repository.VolatileContentRepository`.
 |
 
 === File System Content Repository Properties
 
 |
 |*Property*|*Description*
-|nifi.content.repository.implementation|The Content Repository 
implementation. The default value is 
`org.apache.nifi.controller.repository.FileSystemRepository` and should only be 
changed with caution. To store flowfile content in memory instead of on disk 
(at the risk of data loss in the event of power/machine failure), set this 
property to `org.apache.nifi.controller.repository.VolatileContentRepository`.
-|nifi.content.claim.max.appendable.size|The maximum size for a content 
claim. The default value is `1 MB`.
-|nifi.content.claim.max.flow.files|The maximum number of FlowFiles to 
assign to one content claim. The default value is `100`.
-|nifi.content.repository.directory.default*|The location of the Content 
Repository. The default value is `./content_repository`. +
+|`nifi.content.repository.implementation`|The Content Repository 
implementation. The default value is 
`org.apache.nifi.controller.repository.FileSystemRepository` and should only be 
changed with caution. To store flowfile content in memory instead of on disk 
(at the risk of data loss in the event of power/machine failure), set this 
property to `org.apache.nifi.controller.repository.VolatileContentRepository`.
+|`nifi.content.claim.max.appendable.size`|The maximum size for a content 
claim. The default value is `1 MB`.
+|`nifi.content.claim.max.flow.files`|The maximum number of FlowFiles to 
assign to one content claim. The default value is `100`.
+|`nifi.content.repository.directory.default`*|The location of the Content 
Repository. The default value is `./content_repository`. +
  +
 *NOTE*: Multiple content repositories can be specified by using the 
*_nifi.content.repository.directory._* prefix with unique suffixes and separate 
paths as values. +
  +
 For example, to provide two additional locations to act as part of the 
content repository, a user could also specify additional properties with keys 
of: +
  +
-nifi.content.repository.directory.content1=/repos/content1 +
-nifi.content.repository.directory.content2=/repos/content2 +
+`nifi.content.repository.directory.content1=/repos/content1` +
+`nifi.content.repository.directory.content2=/repos/content2` +
  +
 Providing three total locations, including  
`nifi.content.repository.directory.default`.
-|nifi.content.repository.archive.max.retention.period|If archiving is 
enabled (see nifi.content.repository.archive.enabled below), then
+|`nifi.content.repository.archive.max.retention.period`|If archiving is 
enabled (see `nifi.content.repository.archive.enabled` below), then
 this property specifies the maximum amount of time to keep the archived 
data. The default value is `12 hours`.
-|nifi.content.repository.archive.max.usage.percentage|If archiving is 
enabled (see nifi.content.repository.archive.enabled below), then this property 
must have a value that indicates the content repository disk usage percentage 
at which archived data begins to be removed. If the archive is empty and 
content repository disk usage is above this percentage, then archiving is 
temporarily disabled. Archiving will resume when disk usage is below this 
percentage. The default value is `50%`.
-|nifi.content.repository.archive.enabled|To enable content archiving, set 
this to _true_ and specify a value for the 
`nifi.content.repository.archive.max.usage.percentage` property above. Content 
archiving enables the provenance UI to view or replay content that is no longer 
in a dataflow queue. By default, archiving is enabled.
-|nifi.content.repository.always.sync|If set to `true`, any change

[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2922#discussion_r205883526
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -2749,7 +2853,7 @@ root@kdc:~#
 
 [[system_properties]]
 == System Properties
-The _nifi.properties_ file in the _conf_ directory is the main 
configuration file for controlling how NiFi runs. This section provides an 
overview of the properties in this file and includes some notes on how to 
configure it in a way that will make upgrading easier. *After making changes to 
this file, restart NiFi in order
+The _nifi.properties_ file in the `conf` directory is the main 
configuration file for controlling how NiFi runs. This section provides an 
overview of the properties in this file and includes some notes on how to 
configure it in a way that will make upgrading easier. *After making changes to 
this file, restart NiFi in order
--- End diff --

I saw a mixture of both throughout the doc.  I went with code formatted for 
the new standard.


---


[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2922#discussion_r205883351
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -2434,82 +2538,82 @@ Before you begin, confirm that:
 +
 |
 |*Required Information*|*Description*
-|Source ZooKeeper hostname (*sourceHostname*)|The hostname must be one of 
the hosts running in the ZooKeeper ensemble, which can be found in /conf/zookeeper.properties.  Any of the hostnames declared in 
the *server.N* properties can be used.
-|Destination ZooKeeper hostname (*destinationHostname*)|The hostname must 
be one of the hosts running in the ZooKeeper ensemble, which can be found in 
/conf/zookeeper.properties.  Any of the hostnames 
declared in the *server.N* properties can be used.
-|Source ZooKeeper port (*sourceClientPort*)|This can be found in 
*zookeeper.properties* of the /conf/zookeeper.properties.  The port is specified in the *clientPort* 
property.
-|Destination ZooKeeper port (*destinationClientPort*)|This can be found in 
*zookeeper.properties* of the /conf/zookeeper.properties.  The port is specified in the *clientPort* 
property.
+|Source ZooKeeper hostname (*sourceHostname*)|The hostname must be one of 
the hosts running in the ZooKeeper ensemble, which can be found in _/conf/zookeeper.properties_.  Any of the hostnames declared in 
the *server.N* properties can be used.
+|Destination ZooKeeper hostname (*destinationHostname*)|The hostname must 
be one of the hosts running in the ZooKeeper ensemble, which can be found in 
_/conf/zookeeper.properties_.  Any of the hostnames 
declared in the *server.N* properties can be used.
+|Source ZooKeeper port (*sourceClientPort*)|This can be found in 
*zookeeper.properties* of the _/conf/zookeeper.properties_.  The port is specified in the *clientPort* 
property.
+|Destination ZooKeeper port (*destinationClientPort*)|This can be found in 
*zookeeper.properties* of the _/conf/zookeeper.properties_.  The port is specified in the *clientPort* 
property.
 |Export data path|Determine the path that will store a json file 
containing the export of data from ZooKeeper.  It must be readable and writable 
by the user running the zk-migrator tool.
-|Source ZooKeeper Authentication Information|This information is in /conf/state-management.xml. For NiFi 0.x, if Creator Only is 
specified in state-management.xml, you need to supply authentication 
information using the `-a,--auth` argument with the values from the Username 
and Password properties in state-management.xml. For NiFi 1.x, supply 
authentication information using the `-k,--krb-conf` argument.
-+
-If the state-management.xml specifies Open, no authentication is required.
-|Destination ZooKeeper Authentication Information|This information is in 
/conf/state-management.xml. For NiFi 0.x, if Creator 
Only is specified in state-management.xml, you need to supply authentication 
information using the `-a,--auth` argument with the values from the Username 
and Password properties in state-management.xml. For NiFi 1.x, supply 
authentication information using the `-k,--krb-conf` argument.
-+
-If the state-management.xml specifies Open, no authentication is required.
-|Root path to which NiFi writes data in Source ZooKeeper 
(*sourceRootPath*)|This information can be found in /conf/state-management.xml under the Root Node property in the 
cluster-provider element. (default: /nifi)
-|Root path to which NiFi writes data in Destination ZooKeeper 
(*destinationRootPath*)|This information can be found in /conf/state-management.xml under the Root Node property in the 
cluster-provider element.
+|Source ZooKeeper Authentication Information|This information is in _/conf/state-management.xml_. For NiFi 0.x, if Creator Only is 
specified in _state-management.xml_, you need to supply authentication 
information using the `-a,--auth` argument with the values from the Username 
and Password properties in _state-management.xml_. For NiFi 1.x, supply 
authentication information using the `-k,--krb-conf` argument.
+
+If the _state-management.xml_ specifies Open, no authentication is 
required.
+|Destination ZooKeeper Authentication Information|This information is in 
_/conf/state-management.xml_. For NiFi 0.x, if Creator 
Only is specified in _state-management.xml_, you need to supply authentication 
information using the `-a,--auth` argument with the values from the Username 
and Password properties in state-management.xml. For NiFi 1.x, supply 
authentication information using the `-k,--krb-conf` argument.
+
+If the _state-management.xml_ specifies Open, no authentication is 
required.
+|Root path to which NiFi writes data in Source ZooKeeper 
(*sourceRootPath*)|This information can be found in `/conf/state-management.xml` under the Root Node property in the 
cluster-provider element. (default

[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2922#discussion_r205883302
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -2434,82 +2538,82 @@ Before you begin, confirm that:
 +
 |
 |*Required Information*|*Description*
-|Source ZooKeeper hostname (*sourceHostname*)|The hostname must be one of 
the hosts running in the ZooKeeper ensemble, which can be found in /conf/zookeeper.properties.  Any of the hostnames declared in 
the *server.N* properties can be used.
-|Destination ZooKeeper hostname (*destinationHostname*)|The hostname must 
be one of the hosts running in the ZooKeeper ensemble, which can be found in 
/conf/zookeeper.properties.  Any of the hostnames 
declared in the *server.N* properties can be used.
-|Source ZooKeeper port (*sourceClientPort*)|This can be found in 
*zookeeper.properties* of the /conf/zookeeper.properties.  The port is specified in the *clientPort* 
property.
-|Destination ZooKeeper port (*destinationClientPort*)|This can be found in 
*zookeeper.properties* of the /conf/zookeeper.properties.  The port is specified in the *clientPort* 
property.
+|Source ZooKeeper hostname (*sourceHostname*)|The hostname must be one of 
the hosts running in the ZooKeeper ensemble, which can be found in _/conf/zookeeper.properties_.  Any of the hostnames declared in 
the *server.N* properties can be used.
--- End diff --

I wasn't sure about the intent for the bold.  But, I could see them being 
code formatted as you suggested.


---


[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2922#discussion_r205882931
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -2338,15 +2442,15 @@ We add the following line anywhere in this file in 
order to tell the NiFi JVM to
 [source]
 java.arg.15=-Djava.security.auth.login.config=./conf/zookeeper-jaas.conf
 
-Finally we need to update `nifi.properties` to ensure that NiFi knows to 
apply SASL specific ACLs for the Znodes it will create in Zookeeper for cluster 
management.
+Finally we need to update _nifi.properties_ to ensure that NiFi knows to 
apply SASL specific ACLs for the Znodes it will create in Zookeeper for cluster 
management.
 To enable this, in the `$NIFI_HOME/conf/nifi.properties` file and edit the 
following properties as shown below:
--- End diff --

yes


---


[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2922#discussion_r205883004
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -2364,7 +2468,7 @@ in the following locations:
 
- _conf/zookeeper.properties_ file should use FQDN for `server.1`, 
`server.2`, ..., `server.N` values.
- The `Connect String` property of the ZooKeeperStateProvider
-   - The /etc/hosts file should also resolve the FQDN to an IP address 
that is *not* _127.0.0.1_.
+   - The /etc/hosts file should also resolve the FQDN to an IP address 
that is *not* `127.0.0.1`.
--- End diff --

yes


---


[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2922#discussion_r205882868
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -2315,7 +2419,7 @@ kadmin: xst -k nifi.keytab n...@example.com
 
 This keytab file can be copied to the other NiFi nodes with embedded 
zookeeper servers.
 
-This will create a file in the current directory named `nifi.keytab`. We 
can now copy that file into the _$NIFI_HOME/conf/_ directory. We should ensure
+This will create a file in the current directory named `nifi.keytab`. We 
can now copy that file into the `$NIFI_HOME/conf/` directory. We should ensure
--- End diff --

I've been going with this convention:  filenames in italics, directory 
paths/directories in code formatting.


---


[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2922#discussion_r205881424
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -2434,82 +2538,82 @@ Before you begin, confirm that:
 +
 |
 |*Required Information*|*Description*
-|Source ZooKeeper hostname (*sourceHostname*)|The hostname must be one of 
the hosts running in the ZooKeeper ensemble, which can be found in /conf/zookeeper.properties.  Any of the hostnames declared in 
the *server.N* properties can be used.
-|Destination ZooKeeper hostname (*destinationHostname*)|The hostname must 
be one of the hosts running in the ZooKeeper ensemble, which can be found in 
/conf/zookeeper.properties.  Any of the hostnames 
declared in the *server.N* properties can be used.
-|Source ZooKeeper port (*sourceClientPort*)|This can be found in 
*zookeeper.properties* of the /conf/zookeeper.properties.  The port is specified in the *clientPort* 
property.
-|Destination ZooKeeper port (*destinationClientPort*)|This can be found in 
*zookeeper.properties* of the /conf/zookeeper.properties.  The port is specified in the *clientPort* 
property.
+|Source ZooKeeper hostname (*sourceHostname*)|The hostname must be one of 
the hosts running in the ZooKeeper ensemble, which can be found in _/conf/zookeeper.properties_.  Any of the hostnames declared in 
the *server.N* properties can be used.
+|Destination ZooKeeper hostname (*destinationHostname*)|The hostname must 
be one of the hosts running in the ZooKeeper ensemble, which can be found in 
_/conf/zookeeper.properties_.  Any of the hostnames 
declared in the *server.N* properties can be used.
+|Source ZooKeeper port (*sourceClientPort*)|This can be found in 
*zookeeper.properties* of the _/conf/zookeeper.properties_.  The port is specified in the *clientPort* 
property.
+|Destination ZooKeeper port (*destinationClientPort*)|This can be found in 
*zookeeper.properties* of the _/conf/zookeeper.properties_.  The port is specified in the *clientPort* 
property.
 |Export data path|Determine the path that will store a json file 
containing the export of data from ZooKeeper.  It must be readable and writable 
by the user running the zk-migrator tool.
-|Source ZooKeeper Authentication Information|This information is in /conf/state-management.xml. For NiFi 0.x, if Creator Only is 
specified in state-management.xml, you need to supply authentication 
information using the `-a,--auth` argument with the values from the Username 
and Password properties in state-management.xml. For NiFi 1.x, supply 
authentication information using the `-k,--krb-conf` argument.
-+
-If the state-management.xml specifies Open, no authentication is required.
-|Destination ZooKeeper Authentication Information|This information is in 
/conf/state-management.xml. For NiFi 0.x, if Creator 
Only is specified in state-management.xml, you need to supply authentication 
information using the `-a,--auth` argument with the values from the Username 
and Password properties in state-management.xml. For NiFi 1.x, supply 
authentication information using the `-k,--krb-conf` argument.
-+
-If the state-management.xml specifies Open, no authentication is required.
-|Root path to which NiFi writes data in Source ZooKeeper 
(*sourceRootPath*)|This information can be found in /conf/state-management.xml under the Root Node property in the 
cluster-provider element. (default: /nifi)
-|Root path to which NiFi writes data in Destination ZooKeeper 
(*destinationRootPath*)|This information can be found in /conf/state-management.xml under the Root Node property in the 
cluster-provider element.
+|Source ZooKeeper Authentication Information|This information is in _/conf/state-management.xml_. For NiFi 0.x, if Creator Only is 
specified in _state-management.xml_, you need to supply authentication 
information using the `-a,--auth` argument with the values from the Username 
and Password properties in _state-management.xml_. For NiFi 1.x, supply 
authentication information using the `-k,--krb-conf` argument.
+
+If the _state-management.xml_ specifies Open, no authentication is 
required.
+|Destination ZooKeeper Authentication Information|This information is in 
_/conf/state-management.xml_. For NiFi 0.x, if Creator 
Only is specified in _state-management.xml_, you need to supply authentication 
information using the `-a,--auth` argument with the values from the Username 
and Password properties in state-management.xml. For NiFi 1.x, supply 
authentication information using the `-k,--krb-conf` argument.
+
+If the _state-management.xml_ specifies Open, no authentication is 
required.
+|Root path to which NiFi writes data in Source ZooKeeper 
(*sourceRootPath*)|This information can be found in `/conf/state-management.xml` under the Root Node property in the 
cluster-provider element. (default

[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-27 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi/pull/2922#discussion_r205880453
  
--- Diff: nifi-docs/src/main/asciidoc/administration-guide.adoc ---
@@ -2083,11 +2187,11 @@ Once these State Providers have been configured in 
the _state-management.xml_ fi
 referenced by their identifiers.
 
 By default, the Local State Provider is configured to be a 
`WriteAheadLocalStateProvider` that persists the data to the
-_$NIFI_HOME/state/local_ directory. The default Cluster State Provider is 
configured to be a `ZooKeeperStateProvider`. The default
+`$NIFI_HOME/state/local` directory. The default Cluster State Provider is 
configured to be a `ZooKeeperStateProvider`. The default
 ZooKeeper-based provider must have its `Connect String` property populated 
before it can be used. It is also advisable, if multiple NiFi instances
 will use the same ZooKeeper instance, that the value of the `Root Node` 
property be changed. For instance, one might set the value to
 `/nifi//production`. A `Connect String` takes the form of comma 
separated : tuples, such as
-my-zk-server1:2181,my-zk-server2:2181,my-zk-server3:2181. In the event a 
port is not specified for any of the hosts, the ZooKeeper default of
+my-zk-server1:2181,`my-zk-server2:2181,my-zk-server3:2181`. In the event a 
port is not specified for any of the hosts, the ZooKeeper default of
--- End diff --

Good catch.


---


[GitHub] nifi pull request #2922: NIFI-5469 Update Kerberos and LDAP login identity p...

2018-07-27 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi/pull/2922

NIFI-5469 Update Kerberos and LDAP login identity provider sections …

…and correct formatting inconsistencies


You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi NIFI-5469

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi/pull/2922.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #2922


commit 1055d3b0626a55f5f8d6bcfe5ba56fdaed9907ee
Author: Andrew Lim 
Date:   2018-07-27T18:34:00Z

NIFI-5469 Update Kerberors and LDAP login identity provider sections and 
correct formatting inconsistencies




---


[GitHub] nifi-registry pull request #130: NIFIREG-185 Added element id's to facilitat...

2018-07-12 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi-registry/pull/130

NIFIREG-185 Added element id's to facilitate User testing use cases



You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi-registry NIFIREG-185

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi-registry/pull/130.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #130


commit e6a765f4a80530787b0391708197ca820136cf06
Author: Andrew Lim 
Date:   2018-07-12T20:03:29Z

NIFIREG-185 Added elment id's to facilitate User testing use cases




---


[GitHub] nifi-site pull request #27: Added GPG Guide

2018-07-11 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi-site/pull/27#discussion_r201812727
  
--- Diff: src/pages/markdown/gpg.md ---
@@ -0,0 +1,524 @@
+---
+title: GPG (Gnu Privacy Guard / Open PGP) Signatures
+---
+
+# Apache NiFi Release Signatures and Code Signing
+
+The purpose of this document is to capture and describe the steps involved 
in generating and verifying cryptographic signatures of official releases of 
Apache NiFi, as well as configuring cryptographic signatures of individual code 
commits.  It is written for contributors, committers, and users of Apache NiFi 
(and related applications).  
+
+## Table of Contents
+  * [The Objective](#the-objective)
+  * [Background Material](#background-material)
+  * [Terms](#terms)
+  * [Variable Reference Substitutions](#variable-reference-substitutions)
+  * [Download GPG](#download-gpg)
+  * [Set up a GPG key](#set-up-a-gpg-key)
+  * [Sign your GPG key](#sign-your-gpg-key)
+  * [Publish your key](#publish-your-key)
+  * [Import another GPG key](#import-another-gpg-key)
+  * [Verify a key](#verify-a-key)
+  * [Sign an external key](#sign-an-external-key)
+  * [Web of trust](#web-of-trust)
+  * [Set up git with your key](#set-up-git-with-your-key)
+  * [Signing code](#signing-code)
+  * [Verifying a signature](#verifying-a-signature)
+  * [Set up GitHub with your key](#set-up-github-with-your-key)
+  * [Signing a release artifact](#signing-a-release-artifact)
+  * [Verifying a release signature](#verifying-a-release-signature)
+
+## The Objective
+
+Our aim is to instruct users on how to sign their commits, verify other's 
signatures, and do the same for official releases of Apache NiFi. 
+  
+## Background Material
+
+  - These documents are helpful for general environmental setup to perform 
GPG signing and signature verification
+- [Apache PGP Info][apache-pgp]
+- [Apache Release Signing][apache-release-signing]
+- [Git Ready: Signing Releases with GPG][git-sign-tag-instructs]
+- [RFC 4880: IETF Standard Spec for OpenPGP][rfc-4880]
+- [GitHub Blog: GPG Signature Verification][github-gpg-signing]
+- [Git Ready: gpg-sign releases][git-sign-tag-instructs]
+- [GitHub Help: Signing Commits Using GPG][github-help-gpg]
+- [GitHub Help: Telling Git About Your GPG Key][git-config-gpg]
+- [Git Docs: Git Tools Signing Your Work][git-gpg]
+- [PGP Web of Trust][web-of-trust]
+
+## Terms
+
+ * **Asymmetric Cryptography** - a type of cryptography which relies on 
*key pairs* -- a *public* and *private* key which are mathematically-related 
such that no other component key matches. This cryptography offers the 
following actions: **encrypt**, **decrypt**, **sign**, and **verify**
+ * **Cryptographic Signature** - a series of bytes which are the result of 
a signing operation such that only the possessor of a specific private key 
could have generated this signature. A valid signature indicates that the 
possessor of said key performed the operation (non-repudiable)
+
+## Variable Reference 
Substitutions
+
+Throughout this guide, references must be made to names and values that 
will vary from release to release.  For clarity
+those variable values have been written like Bash variable references.  
When a term like
+"```/tmp/src/nifi-${NIFI_VERSION}```" is seen in an instruction or email 
template it should be replaced with
+"```/tmp/src/nifi-1.7.0```" when working the release of "Apache NiFi 
1.7.0".
+
+ * Substitutions used in tasks and email templates
+
+ReferenceExample value   Description
+===  ===
+${BRANCH}master  the development branch on 
which the release is based.
+${NIFI_VERSION}  1.7.0   the version currently in 
development on the release branch.
+${NEXT_VERSION}  1.8.0-SNAPSHOT  the future version for 
development on the release branch.
+${JIRA_TICKET}   NIFI-2112   the JIRA ticket created by 
the release manager for the release tasks.
+${RC}2   the Release Candidate index 
start at 1 for the first release candidate.
+${RC_TAG_COMMIT_ID}  the 40 byte commit ID of the 
RC tag created during the Maven release process.
+${STAGING_REPO_ID}   orgapachenifi-1088  the temporary repository ID 
where staged artifacts have been placed.
+${RM_USERID} johndoe the Apache account ID of 
Release Manager.
+${RELEASE_TAG}   rel/nifi-1.7.0  the Git repository tag for 
the source code as released.
+${VOTE_THREAD_

[GitHub] nifi-site pull request #27: Added GPG Guide

2018-07-11 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi-site/pull/27#discussion_r201812213
  
--- Diff: src/pages/markdown/gpg.md ---
@@ -0,0 +1,524 @@
+---
+title: GPG (Gnu Privacy Guard / Open PGP) Signatures
+---
+
+# Apache NiFi Release Signatures and Code Signing
+
+The purpose of this document is to capture and describe the steps involved 
in generating and verifying cryptographic signatures of official releases of 
Apache NiFi, as well as configuring cryptographic signatures of individual code 
commits.  It is written for contributors, committers, and users of Apache NiFi 
(and related applications).  
+
+## Table of Contents
+  * [The Objective](#the-objective)
+  * [Background Material](#background-material)
+  * [Terms](#terms)
+  * [Variable Reference Substitutions](#variable-reference-substitutions)
+  * [Download GPG](#download-gpg)
+  * [Set up a GPG key](#set-up-a-gpg-key)
+  * [Sign your GPG key](#sign-your-gpg-key)
+  * [Publish your key](#publish-your-key)
+  * [Import another GPG key](#import-another-gpg-key)
+  * [Verify a key](#verify-a-key)
+  * [Sign an external key](#sign-an-external-key)
+  * [Web of trust](#web-of-trust)
+  * [Set up git with your key](#set-up-git-with-your-key)
+  * [Signing code](#signing-code)
+  * [Verifying a signature](#verifying-a-signature)
+  * [Set up GitHub with your key](#set-up-github-with-your-key)
+  * [Signing a release artifact](#signing-a-release-artifact)
+  * [Verifying a release signature](#verifying-a-release-signature)
+
+## The Objective
+
+Our aim is to instruct users on how to sign their commits, verify other's 
signatures, and do the same for official releases of Apache NiFi. 
+  
+## Background Material
+
+  - These documents are helpful for general environmental setup to perform 
GPG signing and signature verification
+- [Apache PGP Info][apache-pgp]
+- [Apache Release Signing][apache-release-signing]
+- [Git Ready: Signing Releases with GPG][git-sign-tag-instructs]
+- [RFC 4880: IETF Standard Spec for OpenPGP][rfc-4880]
+- [GitHub Blog: GPG Signature Verification][github-gpg-signing]
+- [Git Ready: gpg-sign releases][git-sign-tag-instructs]
+- [GitHub Help: Signing Commits Using GPG][github-help-gpg]
+- [GitHub Help: Telling Git About Your GPG Key][git-config-gpg]
+- [Git Docs: Git Tools Signing Your Work][git-gpg]
+- [PGP Web of Trust][web-of-trust]
+
+## Terms
+
+ * **Asymmetric Cryptography** - a type of cryptography which relies on 
*key pairs* -- a *public* and *private* key which are mathematically-related 
such that no other component key matches. This cryptography offers the 
following actions: **encrypt**, **decrypt**, **sign**, and **verify**
+ * **Cryptographic Signature** - a series of bytes which are the result of 
a signing operation such that only the possessor of a specific private key 
could have generated this signature. A valid signature indicates that the 
possessor of said key performed the operation (non-repudiable)
+
+## Variable Reference 
Substitutions
+
+Throughout this guide, references must be made to names and values that 
will vary from release to release.  For clarity
+those variable values have been written like Bash variable references.  
When a term like
+"```/tmp/src/nifi-${NIFI_VERSION}```" is seen in an instruction or email 
template it should be replaced with
+"```/tmp/src/nifi-1.7.0```" when working the release of "Apache NiFi 
1.7.0".
+
+ * Substitutions used in tasks and email templates
+
+ReferenceExample value   Description
+===  ===
+${BRANCH}master  the development branch on 
which the release is based.
+${NIFI_VERSION}  1.7.0   the version currently in 
development on the release branch.
+${NEXT_VERSION}  1.8.0-SNAPSHOT  the future version for 
development on the release branch.
+${JIRA_TICKET}   NIFI-2112   the JIRA ticket created by 
the release manager for the release tasks.
+${RC}2   the Release Candidate index 
start at 1 for the first release candidate.
+${RC_TAG_COMMIT_ID}  the 40 byte commit ID of the 
RC tag created during the Maven release process.
+${STAGING_REPO_ID}   orgapachenifi-1088  the temporary repository ID 
where staged artifacts have been placed.
+${RM_USERID} johndoe the Apache account ID of 
Release Manager.
+${RELEASE_TAG}   rel/nifi-1.7.0  the Git repository tag for 
the source code as released.
+${VOTE_THREAD_

[GitHub] nifi-site pull request #27: Added GPG Guide

2018-07-11 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi-site/pull/27#discussion_r201810673
  
--- Diff: src/pages/markdown/gpg.md ---
@@ -0,0 +1,524 @@
+---
+title: GPG (Gnu Privacy Guard / Open PGP) Signatures
+---
+
+# Apache NiFi Release Signatures and Code Signing
+
+The purpose of this document is to capture and describe the steps involved 
in generating and verifying cryptographic signatures of official releases of 
Apache NiFi, as well as configuring cryptographic signatures of individual code 
commits.  It is written for contributors, committers, and users of Apache NiFi 
(and related applications).  
+
+## Table of Contents
+  * [The Objective](#the-objective)
+  * [Background Material](#background-material)
+  * [Terms](#terms)
+  * [Variable Reference Substitutions](#variable-reference-substitutions)
+  * [Download GPG](#download-gpg)
+  * [Set up a GPG key](#set-up-a-gpg-key)
+  * [Sign your GPG key](#sign-your-gpg-key)
+  * [Publish your key](#publish-your-key)
+  * [Import another GPG key](#import-another-gpg-key)
+  * [Verify a key](#verify-a-key)
+  * [Sign an external key](#sign-an-external-key)
+  * [Web of trust](#web-of-trust)
+  * [Set up git with your key](#set-up-git-with-your-key)
+  * [Signing code](#signing-code)
+  * [Verifying a signature](#verifying-a-signature)
+  * [Set up GitHub with your key](#set-up-github-with-your-key)
+  * [Signing a release artifact](#signing-a-release-artifact)
+  * [Verifying a release signature](#verifying-a-release-signature)
+
+## The Objective
+
+Our aim is to instruct users on how to sign their commits, verify other's 
signatures, and do the same for official releases of Apache NiFi. 
+  
+## Background Material
+
+  - These documents are helpful for general environmental setup to perform 
GPG signing and signature verification
+- [Apache PGP Info][apache-pgp]
+- [Apache Release Signing][apache-release-signing]
+- [Git Ready: Signing Releases with GPG][git-sign-tag-instructs]
+- [RFC 4880: IETF Standard Spec for OpenPGP][rfc-4880]
+- [GitHub Blog: GPG Signature Verification][github-gpg-signing]
+- [Git Ready: gpg-sign releases][git-sign-tag-instructs]
+- [GitHub Help: Signing Commits Using GPG][github-help-gpg]
+- [GitHub Help: Telling Git About Your GPG Key][git-config-gpg]
+- [Git Docs: Git Tools Signing Your Work][git-gpg]
+- [PGP Web of Trust][web-of-trust]
+
+## Terms
+
+ * **Asymmetric Cryptography** - a type of cryptography which relies on 
*key pairs* -- a *public* and *private* key which are mathematically-related 
such that no other component key matches. This cryptography offers the 
following actions: **encrypt**, **decrypt**, **sign**, and **verify**
+ * **Cryptographic Signature** - a series of bytes which are the result of 
a signing operation such that only the possessor of a specific private key 
could have generated this signature. A valid signature indicates that the 
possessor of said key performed the operation (non-repudiable)
+
+## Variable Reference 
Substitutions
+
+Throughout this guide, references must be made to names and values that 
will vary from release to release.  For clarity
+those variable values have been written like Bash variable references.  
When a term like
+"```/tmp/src/nifi-${NIFI_VERSION}```" is seen in an instruction or email 
template it should be replaced with
+"```/tmp/src/nifi-1.7.0```" when working the release of "Apache NiFi 
1.7.0".
+
+ * Substitutions used in tasks and email templates
+
+ReferenceExample value   Description
+===  ===
+${BRANCH}master  the development branch on 
which the release is based.
+${NIFI_VERSION}  1.7.0   the version currently in 
development on the release branch.
+${NEXT_VERSION}  1.8.0-SNAPSHOT  the future version for 
development on the release branch.
+${JIRA_TICKET}   NIFI-2112   the JIRA ticket created by 
the release manager for the release tasks.
+${RC}2   the Release Candidate index 
start at 1 for the first release candidate.
+${RC_TAG_COMMIT_ID}  the 40 byte commit ID of the 
RC tag created during the Maven release process.
+${STAGING_REPO_ID}   orgapachenifi-1088  the temporary repository ID 
where staged artifacts have been placed.
+${RM_USERID} johndoe the Apache account ID of 
Release Manager.
+${RELEASE_TAG}   rel/nifi-1.7.0  the Git repository tag for 
the source code as released.
+${VOTE_THREAD_

[GitHub] nifi-site pull request #27: Added GPG Guide

2018-07-11 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi-site/pull/27#discussion_r201810221
  
--- Diff: src/pages/markdown/gpg.md ---
@@ -0,0 +1,524 @@
+---
+title: GPG (Gnu Privacy Guard / Open PGP) Signatures
+---
+
+# Apache NiFi Release Signatures and Code Signing
+
+The purpose of this document is to capture and describe the steps involved 
in generating and verifying cryptographic signatures of official releases of 
Apache NiFi, as well as configuring cryptographic signatures of individual code 
commits.  It is written for contributors, committers, and users of Apache NiFi 
(and related applications).  
+
+## Table of Contents
+  * [The Objective](#the-objective)
+  * [Background Material](#background-material)
+  * [Terms](#terms)
+  * [Variable Reference Substitutions](#variable-reference-substitutions)
+  * [Download GPG](#download-gpg)
+  * [Set up a GPG key](#set-up-a-gpg-key)
+  * [Sign your GPG key](#sign-your-gpg-key)
+  * [Publish your key](#publish-your-key)
+  * [Import another GPG key](#import-another-gpg-key)
+  * [Verify a key](#verify-a-key)
+  * [Sign an external key](#sign-an-external-key)
+  * [Web of trust](#web-of-trust)
+  * [Set up git with your key](#set-up-git-with-your-key)
+  * [Signing code](#signing-code)
+  * [Verifying a signature](#verifying-a-signature)
+  * [Set up GitHub with your key](#set-up-github-with-your-key)
+  * [Signing a release artifact](#signing-a-release-artifact)
+  * [Verifying a release signature](#verifying-a-release-signature)
+
+## The Objective
+
+Our aim is to instruct users on how to sign their commits, verify other's 
signatures, and do the same for official releases of Apache NiFi. 
+  
+## Background Material
+
+  - These documents are helpful for general environmental setup to perform 
GPG signing and signature verification
+- [Apache PGP Info][apache-pgp]
+- [Apache Release Signing][apache-release-signing]
+- [Git Ready: Signing Releases with GPG][git-sign-tag-instructs]
+- [RFC 4880: IETF Standard Spec for OpenPGP][rfc-4880]
+- [GitHub Blog: GPG Signature Verification][github-gpg-signing]
+- [Git Ready: gpg-sign releases][git-sign-tag-instructs]
+- [GitHub Help: Signing Commits Using GPG][github-help-gpg]
+- [GitHub Help: Telling Git About Your GPG Key][git-config-gpg]
+- [Git Docs: Git Tools Signing Your Work][git-gpg]
+- [PGP Web of Trust][web-of-trust]
+
+## Terms
+
+ * **Asymmetric Cryptography** - a type of cryptography which relies on 
*key pairs* -- a *public* and *private* key which are mathematically-related 
such that no other component key matches. This cryptography offers the 
following actions: **encrypt**, **decrypt**, **sign**, and **verify**
+ * **Cryptographic Signature** - a series of bytes which are the result of 
a signing operation such that only the possessor of a specific private key 
could have generated this signature. A valid signature indicates that the 
possessor of said key performed the operation (non-repudiable)
+
+## Variable Reference 
Substitutions
+
+Throughout this guide, references must be made to names and values that 
will vary from release to release.  For clarity
+those variable values have been written like Bash variable references.  
When a term like
+"```/tmp/src/nifi-${NIFI_VERSION}```" is seen in an instruction or email 
template it should be replaced with
+"```/tmp/src/nifi-1.7.0```" when working the release of "Apache NiFi 
1.7.0".
+
+ * Substitutions used in tasks and email templates
+
+ReferenceExample value   Description
+===  ===
+${BRANCH}master  the development branch on 
which the release is based.
+${NIFI_VERSION}  1.7.0   the version currently in 
development on the release branch.
+${NEXT_VERSION}  1.8.0-SNAPSHOT  the future version for 
development on the release branch.
+${JIRA_TICKET}   NIFI-2112   the JIRA ticket created by 
the release manager for the release tasks.
+${RC}2   the Release Candidate index 
start at 1 for the first release candidate.
+${RC_TAG_COMMIT_ID}  the 40 byte commit ID of the 
RC tag created during the Maven release process.
+${STAGING_REPO_ID}   orgapachenifi-1088  the temporary repository ID 
where staged artifacts have been placed.
+${RM_USERID} johndoe the Apache account ID of 
Release Manager.
+${RELEASE_TAG}   rel/nifi-1.7.0  the Git repository tag for 
the source code as released.
+${VOTE_THREAD_

[GitHub] nifi-site pull request #27: Added GPG Guide

2018-07-11 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi-site/pull/27#discussion_r201807293
  
--- Diff: src/pages/markdown/gpg.md ---
@@ -0,0 +1,524 @@
+---
+title: GPG (Gnu Privacy Guard / Open PGP) Signatures
+---
+
+# Apache NiFi Release Signatures and Code Signing
+
+The purpose of this document is to capture and describe the steps involved 
in generating and verifying cryptographic signatures of official releases of 
Apache NiFi, as well as configuring cryptographic signatures of individual code 
commits.  It is written for contributors, committers, and users of Apache NiFi 
(and related applications).  
+
+## Table of Contents
+  * [The Objective](#the-objective)
+  * [Background Material](#background-material)
+  * [Terms](#terms)
+  * [Variable Reference Substitutions](#variable-reference-substitutions)
+  * [Download GPG](#download-gpg)
+  * [Set up a GPG key](#set-up-a-gpg-key)
+  * [Sign your GPG key](#sign-your-gpg-key)
+  * [Publish your key](#publish-your-key)
+  * [Import another GPG key](#import-another-gpg-key)
+  * [Verify a key](#verify-a-key)
+  * [Sign an external key](#sign-an-external-key)
+  * [Web of trust](#web-of-trust)
+  * [Set up git with your key](#set-up-git-with-your-key)
+  * [Signing code](#signing-code)
+  * [Verifying a signature](#verifying-a-signature)
+  * [Set up GitHub with your key](#set-up-github-with-your-key)
+  * [Signing a release artifact](#signing-a-release-artifact)
+  * [Verifying a release signature](#verifying-a-release-signature)
+
+## The Objective
+
+Our aim is to instruct users on how to sign their commits, verify other's 
signatures, and do the same for official releases of Apache NiFi. 
+  
+## Background Material
+
+  - These documents are helpful for general environmental setup to perform 
GPG signing and signature verification
+- [Apache PGP Info][apache-pgp]
+- [Apache Release Signing][apache-release-signing]
+- [Git Ready: Signing Releases with GPG][git-sign-tag-instructs]
+- [RFC 4880: IETF Standard Spec for OpenPGP][rfc-4880]
+- [GitHub Blog: GPG Signature Verification][github-gpg-signing]
+- [Git Ready: gpg-sign releases][git-sign-tag-instructs]
+- [GitHub Help: Signing Commits Using GPG][github-help-gpg]
+- [GitHub Help: Telling Git About Your GPG Key][git-config-gpg]
+- [Git Docs: Git Tools Signing Your Work][git-gpg]
+- [PGP Web of Trust][web-of-trust]
+
+## Terms
+
+ * **Asymmetric Cryptography** - a type of cryptography which relies on 
*key pairs* -- a *public* and *private* key which are mathematically-related 
such that no other component key matches. This cryptography offers the 
following actions: **encrypt**, **decrypt**, **sign**, and **verify**
+ * **Cryptographic Signature** - a series of bytes which are the result of 
a signing operation such that only the possessor of a specific private key 
could have generated this signature. A valid signature indicates that the 
possessor of said key performed the operation (non-repudiable)
+
+## Variable Reference 
Substitutions
+
+Throughout this guide, references must be made to names and values that 
will vary from release to release.  For clarity
+those variable values have been written like Bash variable references.  
When a term like
+"```/tmp/src/nifi-${NIFI_VERSION}```" is seen in an instruction or email 
template it should be replaced with
+"```/tmp/src/nifi-1.7.0```" when working the release of "Apache NiFi 
1.7.0".
+
+ * Substitutions used in tasks and email templates
+
+ReferenceExample value   Description
+===  ===
+${BRANCH}master  the development branch on 
which the release is based.
+${NIFI_VERSION}  1.7.0   the version currently in 
development on the release branch.
+${NEXT_VERSION}  1.8.0-SNAPSHOT  the future version for 
development on the release branch.
+${JIRA_TICKET}   NIFI-2112   the JIRA ticket created by 
the release manager for the release tasks.
+${RC}2   the Release Candidate index 
start at 1 for the first release candidate.
+${RC_TAG_COMMIT_ID}  the 40 byte commit ID of the 
RC tag created during the Maven release process.
+${STAGING_REPO_ID}   orgapachenifi-1088  the temporary repository ID 
where staged artifacts have been placed.
+${RM_USERID} johndoe the Apache account ID of 
Release Manager.
+${RELEASE_TAG}   rel/nifi-1.7.0  the Git repository tag for 
the source code as released.
+${VOTE_THREAD_

[GitHub] nifi-site pull request #27: Added GPG Guide

2018-07-11 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi-site/pull/27#discussion_r201806357
  
--- Diff: src/pages/markdown/gpg.md ---
@@ -0,0 +1,524 @@
+---
+title: GPG (Gnu Privacy Guard / Open PGP) Signatures
+---
+
+# Apache NiFi Release Signatures and Code Signing
+
+The purpose of this document is to capture and describe the steps involved 
in generating and verifying cryptographic signatures of official releases of 
Apache NiFi, as well as configuring cryptographic signatures of individual code 
commits.  It is written for contributors, committers, and users of Apache NiFi 
(and related applications).  
+
+## Table of Contents
+  * [The Objective](#the-objective)
+  * [Background Material](#background-material)
+  * [Terms](#terms)
+  * [Variable Reference Substitutions](#variable-reference-substitutions)
+  * [Download GPG](#download-gpg)
+  * [Set up a GPG key](#set-up-a-gpg-key)
+  * [Sign your GPG key](#sign-your-gpg-key)
+  * [Publish your key](#publish-your-key)
+  * [Import another GPG key](#import-another-gpg-key)
+  * [Verify a key](#verify-a-key)
+  * [Sign an external key](#sign-an-external-key)
+  * [Web of trust](#web-of-trust)
+  * [Set up git with your key](#set-up-git-with-your-key)
+  * [Signing code](#signing-code)
+  * [Verifying a signature](#verifying-a-signature)
+  * [Set up GitHub with your key](#set-up-github-with-your-key)
+  * [Signing a release artifact](#signing-a-release-artifact)
+  * [Verifying a release signature](#verifying-a-release-signature)
+
+## The Objective
+
+Our aim is to instruct users on how to sign their commits, verify other's 
signatures, and do the same for official releases of Apache NiFi. 
+  
+## Background Material
+
+  - These documents are helpful for general environmental setup to perform 
GPG signing and signature verification
+- [Apache PGP Info][apache-pgp]
+- [Apache Release Signing][apache-release-signing]
+- [Git Ready: Signing Releases with GPG][git-sign-tag-instructs]
+- [RFC 4880: IETF Standard Spec for OpenPGP][rfc-4880]
+- [GitHub Blog: GPG Signature Verification][github-gpg-signing]
+- [Git Ready: gpg-sign releases][git-sign-tag-instructs]
+- [GitHub Help: Signing Commits Using GPG][github-help-gpg]
+- [GitHub Help: Telling Git About Your GPG Key][git-config-gpg]
+- [Git Docs: Git Tools Signing Your Work][git-gpg]
+- [PGP Web of Trust][web-of-trust]
+
+## Terms
+
+ * **Asymmetric Cryptography** - a type of cryptography which relies on 
*key pairs* -- a *public* and *private* key which are mathematically-related 
such that no other component key matches. This cryptography offers the 
following actions: **encrypt**, **decrypt**, **sign**, and **verify**
+ * **Cryptographic Signature** - a series of bytes which are the result of 
a signing operation such that only the possessor of a specific private key 
could have generated this signature. A valid signature indicates that the 
possessor of said key performed the operation (non-repudiable)
+
+## Variable Reference 
Substitutions
+
+Throughout this guide, references must be made to names and values that 
will vary from release to release.  For clarity
+those variable values have been written like Bash variable references.  
When a term like
+"```/tmp/src/nifi-${NIFI_VERSION}```" is seen in an instruction or email 
template it should be replaced with
+"```/tmp/src/nifi-1.7.0```" when working the release of "Apache NiFi 
1.7.0".
+
+ * Substitutions used in tasks and email templates
+
+ReferenceExample value   Description
+===  ===
+${BRANCH}master  the development branch on 
which the release is based.
+${NIFI_VERSION}  1.7.0   the version currently in 
development on the release branch.
+${NEXT_VERSION}  1.8.0-SNAPSHOT  the future version for 
development on the release branch.
+${JIRA_TICKET}   NIFI-2112   the JIRA ticket created by 
the release manager for the release tasks.
+${RC}2   the Release Candidate index 
start at 1 for the first release candidate.
+${RC_TAG_COMMIT_ID}  the 40 byte commit ID of the 
RC tag created during the Maven release process.
+${STAGING_REPO_ID}   orgapachenifi-1088  the temporary repository ID 
where staged artifacts have been placed.
+${RM_USERID} johndoe the Apache account ID of 
Release Manager.
+${RELEASE_TAG}   rel/nifi-1.7.0  the Git repository tag for 
the source code as released.
+${VOTE_THREAD_

[GitHub] nifi-site pull request #27: Added GPG Guide

2018-07-11 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi-site/pull/27#discussion_r20170
  
--- Diff: src/pages/markdown/gpg.md ---
@@ -0,0 +1,524 @@
+---
+title: GPG (Gnu Privacy Guard / Open PGP) Signatures
+---
+
+# Apache NiFi Release Signatures and Code Signing
+
+The purpose of this document is to capture and describe the steps involved 
in generating and verifying cryptographic signatures of official releases of 
Apache NiFi, as well as configuring cryptographic signatures of individual code 
commits.  It is written for contributors, committers, and users of Apache NiFi 
(and related applications).  
+
+## Table of Contents
+  * [The Objective](#the-objective)
+  * [Background Material](#background-material)
+  * [Terms](#terms)
+  * [Variable Reference Substitutions](#variable-reference-substitutions)
+  * [Download GPG](#download-gpg)
+  * [Set up a GPG key](#set-up-a-gpg-key)
+  * [Sign your GPG key](#sign-your-gpg-key)
+  * [Publish your key](#publish-your-key)
+  * [Import another GPG key](#import-another-gpg-key)
+  * [Verify a key](#verify-a-key)
+  * [Sign an external key](#sign-an-external-key)
+  * [Web of trust](#web-of-trust)
+  * [Set up git with your key](#set-up-git-with-your-key)
+  * [Signing code](#signing-code)
+  * [Verifying a signature](#verifying-a-signature)
+  * [Set up GitHub with your key](#set-up-github-with-your-key)
+  * [Signing a release artifact](#signing-a-release-artifact)
+  * [Verifying a release signature](#verifying-a-release-signature)
+
+## The Objective
+
+Our aim is to instruct users on how to sign their commits, verify other's 
signatures, and do the same for official releases of Apache NiFi. 
+  
+## Background Material
+
+  - These documents are helpful for general environmental setup to perform 
GPG signing and signature verification
+- [Apache PGP Info][apache-pgp]
+- [Apache Release Signing][apache-release-signing]
+- [Git Ready: Signing Releases with GPG][git-sign-tag-instructs]
+- [RFC 4880: IETF Standard Spec for OpenPGP][rfc-4880]
+- [GitHub Blog: GPG Signature Verification][github-gpg-signing]
+- [Git Ready: gpg-sign releases][git-sign-tag-instructs]
+- [GitHub Help: Signing Commits Using GPG][github-help-gpg]
+- [GitHub Help: Telling Git About Your GPG Key][git-config-gpg]
+- [Git Docs: Git Tools Signing Your Work][git-gpg]
+- [PGP Web of Trust][web-of-trust]
+
+## Terms
+
+ * **Asymmetric Cryptography** - a type of cryptography which relies on 
*key pairs* -- a *public* and *private* key which are mathematically-related 
such that no other component key matches. This cryptography offers the 
following actions: **encrypt**, **decrypt**, **sign**, and **verify**
+ * **Cryptographic Signature** - a series of bytes which are the result of 
a signing operation such that only the possessor of a specific private key 
could have generated this signature. A valid signature indicates that the 
possessor of said key performed the operation (non-repudiable)
+
+## Variable Reference 
Substitutions
+
+Throughout this guide, references must be made to names and values that 
will vary from release to release.  For clarity
+those variable values have been written like Bash variable references.  
When a term like
+"```/tmp/src/nifi-${NIFI_VERSION}```" is seen in an instruction or email 
template it should be replaced with
+"```/tmp/src/nifi-1.7.0```" when working the release of "Apache NiFi 
1.7.0".
+
+ * Substitutions used in tasks and email templates
+
+ReferenceExample value   Description
+===  ===
+${BRANCH}master  the development branch on 
which the release is based.
+${NIFI_VERSION}  1.7.0   the version currently in 
development on the release branch.
+${NEXT_VERSION}  1.8.0-SNAPSHOT  the future version for 
development on the release branch.
+${JIRA_TICKET}   NIFI-2112   the JIRA ticket created by 
the release manager for the release tasks.
+${RC}2   the Release Candidate index 
start at 1 for the first release candidate.
+${RC_TAG_COMMIT_ID}  the 40 byte commit ID of the 
RC tag created during the Maven release process.
+${STAGING_REPO_ID}   orgapachenifi-1088  the temporary repository ID 
where staged artifacts have been placed.
+${RM_USERID} johndoe the Apache account ID of 
Release Manager.
+${RELEASE_TAG}   rel/nifi-1.7.0  the Git repository tag for 
the source code as released.
+${VOTE_THREAD_

[GitHub] nifi-site pull request #27: Added GPG Guide

2018-07-11 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi-site/pull/27#discussion_r201777645
  
--- Diff: src/pages/markdown/gpg.md ---
@@ -0,0 +1,524 @@
+---
+title: GPG (Gnu Privacy Guard / Open PGP) Signatures
+---
+
+# Apache NiFi Release Signatures and Code Signing
+
+The purpose of this document is to capture and describe the steps involved 
in generating and verifying cryptographic signatures of official releases of 
Apache NiFi, as well as configuring cryptographic signatures of individual code 
commits.  It is written for contributors, committers, and users of Apache NiFi 
(and related applications).  
+
+## Table of Contents
+  * [The Objective](#the-objective)
+  * [Background Material](#background-material)
+  * [Terms](#terms)
+  * [Variable Reference Substitutions](#variable-reference-substitutions)
+  * [Download GPG](#download-gpg)
+  * [Set up a GPG key](#set-up-a-gpg-key)
+  * [Sign your GPG key](#sign-your-gpg-key)
+  * [Publish your key](#publish-your-key)
+  * [Import another GPG key](#import-another-gpg-key)
+  * [Verify a key](#verify-a-key)
+  * [Sign an external key](#sign-an-external-key)
+  * [Web of trust](#web-of-trust)
+  * [Set up git with your key](#set-up-git-with-your-key)
+  * [Signing code](#signing-code)
+  * [Verifying a signature](#verifying-a-signature)
+  * [Set up GitHub with your key](#set-up-github-with-your-key)
+  * [Signing a release artifact](#signing-a-release-artifact)
+  * [Verifying a release signature](#verifying-a-release-signature)
+
+## The Objective
+
+Our aim is to instruct users on how to sign their commits, verify other's 
signatures, and do the same for official releases of Apache NiFi. 
+  
+## Background Material
+
+  - These documents are helpful for general environmental setup to perform 
GPG signing and signature verification
+- [Apache PGP Info][apache-pgp]
+- [Apache Release Signing][apache-release-signing]
+- [Git Ready: Signing Releases with GPG][git-sign-tag-instructs]
+- [RFC 4880: IETF Standard Spec for OpenPGP][rfc-4880]
+- [GitHub Blog: GPG Signature Verification][github-gpg-signing]
+- [Git Ready: gpg-sign releases][git-sign-tag-instructs]
+- [GitHub Help: Signing Commits Using GPG][github-help-gpg]
+- [GitHub Help: Telling Git About Your GPG Key][git-config-gpg]
+- [Git Docs: Git Tools Signing Your Work][git-gpg]
+- [PGP Web of Trust][web-of-trust]
+
+## Terms
+
+ * **Asymmetric Cryptography** - a type of cryptography which relies on 
*key pairs* -- a *public* and *private* key which are mathematically-related 
such that no other component key matches. This cryptography offers the 
following actions: **encrypt**, **decrypt**, **sign**, and **verify**
+ * **Cryptographic Signature** - a series of bytes which are the result of 
a signing operation such that only the possessor of a specific private key 
could have generated this signature. A valid signature indicates that the 
possessor of said key performed the operation (non-repudiable)
+
+## Variable Reference 
Substitutions
+
+Throughout this guide, references must be made to names and values that 
will vary from release to release.  For clarity
+those variable values have been written like Bash variable references.  
When a term like
+"```/tmp/src/nifi-${NIFI_VERSION}```" is seen in an instruction or email 
template it should be replaced with
+"```/tmp/src/nifi-1.7.0```" when working the release of "Apache NiFi 
1.7.0".
+
+ * Substitutions used in tasks and email templates
+
+ReferenceExample value   Description
+===  ===
+${BRANCH}master  the development branch on 
which the release is based.
+${NIFI_VERSION}  1.7.0   the version currently in 
development on the release branch.
+${NEXT_VERSION}  1.8.0-SNAPSHOT  the future version for 
development on the release branch.
+${JIRA_TICKET}   NIFI-2112   the JIRA ticket created by 
the release manager for the release tasks.
+${RC}2   the Release Candidate index 
start at 1 for the first release candidate.
+${RC_TAG_COMMIT_ID}  the 40 byte commit ID of the 
RC tag created during the Maven release process.
+${STAGING_REPO_ID}   orgapachenifi-1088  the temporary repository ID 
where staged artifacts have been placed.
+${RM_USERID} johndoe the Apache account ID of 
Release Manager.
+${RELEASE_TAG}   rel/nifi-1.7.0  the Git repository tag for 
the source code as released.
+${VOTE_THREAD_

[GitHub] nifi-site pull request #27: Added GPG Guide

2018-07-11 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi-site/pull/27#discussion_r201772672
  
--- Diff: src/pages/markdown/gpg.md ---
@@ -0,0 +1,524 @@
+---
+title: GPG (Gnu Privacy Guard / Open PGP) Signatures
+---
+
+# Apache NiFi Release Signatures and Code Signing
+
+The purpose of this document is to capture and describe the steps involved 
in generating and verifying cryptographic signatures of official releases of 
Apache NiFi, as well as configuring cryptographic signatures of individual code 
commits.  It is written for contributors, committers, and users of Apache NiFi 
(and related applications).  
+
+## Table of Contents
+  * [The Objective](#the-objective)
+  * [Background Material](#background-material)
+  * [Terms](#terms)
+  * [Variable Reference Substitutions](#variable-reference-substitutions)
+  * [Download GPG](#download-gpg)
+  * [Set up a GPG key](#set-up-a-gpg-key)
+  * [Sign your GPG key](#sign-your-gpg-key)
+  * [Publish your key](#publish-your-key)
+  * [Import another GPG key](#import-another-gpg-key)
+  * [Verify a key](#verify-a-key)
+  * [Sign an external key](#sign-an-external-key)
+  * [Web of trust](#web-of-trust)
+  * [Set up git with your key](#set-up-git-with-your-key)
+  * [Signing code](#signing-code)
+  * [Verifying a signature](#verifying-a-signature)
+  * [Set up GitHub with your key](#set-up-github-with-your-key)
+  * [Signing a release artifact](#signing-a-release-artifact)
+  * [Verifying a release signature](#verifying-a-release-signature)
+
+## The Objective
+
+Our aim is to instruct users on how to sign their commits, verify other's 
signatures, and do the same for official releases of Apache NiFi. 
+  
+## Background Material
+
+  - These documents are helpful for general environmental setup to perform 
GPG signing and signature verification
--- End diff --

Consider adding a colon at the end or adding more space before the bulleted 
list.


---


[GitHub] nifi-site pull request #27: Added GPG Guide

2018-07-11 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi-site/pull/27#discussion_r201770983
  
--- Diff: src/pages/markdown/gpg.md ---
@@ -0,0 +1,524 @@
+---
+title: GPG (Gnu Privacy Guard / Open PGP) Signatures
+---
+
+# Apache NiFi Release Signatures and Code Signing
+
+The purpose of this document is to capture and describe the steps involved 
in generating and verifying cryptographic signatures of official releases of 
Apache NiFi, as well as configuring cryptographic signatures of individual code 
commits.  It is written for contributors, committers, and users of Apache NiFi 
(and related applications).  
+
+## Table of Contents
+  * [The Objective](#the-objective)
+  * [Background Material](#background-material)
+  * [Terms](#terms)
+  * [Variable Reference Substitutions](#variable-reference-substitutions)
+  * [Download GPG](#download-gpg)
+  * [Set up a GPG key](#set-up-a-gpg-key)
+  * [Sign your GPG key](#sign-your-gpg-key)
+  * [Publish your key](#publish-your-key)
+  * [Import another GPG key](#import-another-gpg-key)
+  * [Verify a key](#verify-a-key)
+  * [Sign an external key](#sign-an-external-key)
+  * [Web of trust](#web-of-trust)
+  * [Set up git with your key](#set-up-git-with-your-key)
--- End diff --

Capitalize "Git" for consistency


---


[GitHub] nifi-site pull request #27: Added GPG Guide

2018-07-11 Thread andrewmlim
Github user andrewmlim commented on a diff in the pull request:

https://github.com/apache/nifi-site/pull/27#discussion_r201770601
  
--- Diff: src/pages/markdown/gpg.md ---
@@ -0,0 +1,524 @@
+---
+title: GPG (Gnu Privacy Guard / Open PGP) Signatures
+---
+
+# Apache NiFi Release Signatures and Code Signing
+
+The purpose of this document is to capture and describe the steps involved 
in generating and verifying cryptographic signatures of official releases of 
Apache NiFi, as well as configuring cryptographic signatures of individual code 
commits.  It is written for contributors, committers, and users of Apache NiFi 
(and related applications).  
+
+## Table of Contents
--- End diff --

The following links are broken:

Set up a GPG key
Sign your GPG key
Sign an external key
Signing code


---


[GitHub] nifi pull request #2810: NIFI-5330 Fixed broken image in Variables in Versio...

2018-06-25 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi/pull/2810

NIFI-5330 Fixed broken image in Variables in Versioned Flows section …

…of User Guide

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi NIFI-5330

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi/pull/2810.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #2810


commit 57c2bc47251c69f58665cd76e905db6cfe30938c
Author: Andrew Lim 
Date:   2018-06-25T14:56:27Z

NIFI-5330 Fixed broken image in Variables in Versioned Flows section of 
User Guide




---


[GitHub] nifi-registry pull request #120: NIFIREG-56: Added element ids to facilitate...

2018-05-31 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi-registry/pull/120

NIFIREG-56: Added element ids to facilitate bucket testing use cases

These are the ids I needed to do some automated UI testing around Bucket 
test cases (Bucket creation/deletion/duplicates etc.).  If more ids are needed 
for other test cases, will file separate more specific Jiras.

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi-registry NIFIREG-56

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi-registry/pull/120.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #120


commit cdb2cb81650b0f04e3390397725e92b57ef0579e
Author: Andrew Lim 
Date:   2018-05-31T17:55:48Z

NIFIREG-56: Added element ids to facilitate bucket testing use cases




---


[GitHub] nifi pull request #2719: NIFI-4585 Add nifi.cluster.node.max.concurrent.requ...

2018-05-18 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi/pull/2719

NIFI-4585 Add nifi.cluster.node.max.concurrent.requests to Cluster No…

…de Properties section of Admin Guide

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi NIFI-4585

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi/pull/2719.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #2719


commit d4f63af1b2b0243d65f30043a0d52dbd38d35b14
Author: Andrew Lim <andrewlim.apache@...>
Date:   2018-05-18T16:40:23Z

NIFI-4585 Add nifi.cluster.node.max.concurrent.requests to Cluster Node 
Properties section of Admin Guide




---


[GitHub] nifi pull request #2716: NIFI-5205 Updated default value for nifi.content.cl...

2018-05-17 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi/pull/2716

NIFI-5205 Updated default value for nifi.content.claim.max.appendable…

….size in Admin Guide

Also fixed the formatting of some default values while I was in there.

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi NIFI-5205

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi/pull/2716.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #2716


commit 5fafedc07742af5cd71afca073b0062d3202c4cf
Author: Andrew Lim <andrewlim.apache@...>
Date:   2018-05-17T19:00:04Z

NIFI-5205 Updated default value for nifi.content.claim.max.appendable.size 
in Admin Guide




---


[GitHub] nifi pull request #2710: NIFI-2966 Add policy resources to Access Policies t...

2018-05-16 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi/pull/2710

NIFI-2966 Add policy resources to Access Policies tables in Admin Guide



You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi NIFI-2966

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi/pull/2710.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #2710


commit 7e68b74e92d1d63c27663c38236b299ebaba0975
Author: Andrew Lim <andrewlim.apache@...>
Date:   2018-05-16T18:13:45Z

NIFI-2966 Add policy resources to Access Policies tables in Admin Guide




---


[GitHub] nifi-registry pull request #113: NIFIREG-163 Added JDK information to System...

2018-04-17 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi-registry/pull/113

NIFIREG-163 Added JDK information to System Requirements section of A…

…dmin Guide

Also added formatting to a default system property to be consistent with 
others.

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi-registry NIFIREG-163

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi-registry/pull/113.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #113


commit 64e72cd494d70d07c8ea9a63b7248fa16017dbc0
Author: Andrew Lim <andrewlim.apache@...>
Date:   2018-04-17T17:44:48Z

NIFIREG-163 Added JDK information to System Requirements section of Admin 
Guide




---


[GitHub] nifi issue #2633: NIFI-5066: Allow global enable/disable component requests

2018-04-16 Thread andrewmlim
Github user andrewmlim commented on the issue:

https://github.com/apache/nifi/pull/2633
  
Changes look good.  Enable/disable and start/stop buttons behave 
consistently.  This is minor, but it would be nice if all of these buttons were 
greyed out (or unavailable in the context menu) when there were no components 
available i.e. when the process group is empty.


---


[GitHub] nifi pull request #2627: NIFI-5074 Added section Variables in Versioned Flow...

2018-04-11 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi/pull/2627

NIFI-5074 Added section Variables in Versioned Flows to User Guide



You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi NIFI-5074

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi/pull/2627.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #2627


commit a75876f3b353caa56bd83f4198ac1be0dd32
Author: Andrew Lim <andrewlim.apache@...>
Date:   2018-04-11T16:24:16Z

NIFI-5074 Added section Variables in Versioned Flows to User Guide




---


[GitHub] nifi pull request #2624: NIFI-5063 Added screenshots and supporting text for...

2018-04-10 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi/pull/2624

NIFI-5063 Added screenshots and supporting text for Primary Node proc…

…essors

Also, fixed some single quote formatting inconsistencies throughout the 
User Guide.

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi NIFI-5063

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi/pull/2624.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #2624


commit b320d142ab09ac00a64b26cabc8a9bb158d7fd05
Author: Andrew Lim <andrewlim.apache@...>
Date:   2018-04-10T17:30:19Z

NIFI-5063 Added screenshots and supporting text for Primary Node processors




---


[GitHub] nifi pull request #2620: NIFI-4941 Updated nifi.sensitive.props.additional.k...

2018-04-09 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi/pull/2620

NIFI-4941 Updated nifi.sensitive.props.additional.keys description to…

… refer to nifi.properties

Also corrected formatting for a reference to bootstrap.conf file

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi NIFI-4941

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi/pull/2620.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #2620


commit a4c5bc5cd58cf39f715732750a813d227d261da7
Author: Andrew Lim <andrewlim.apache@...>
Date:   2018-04-09T20:12:37Z

NIFI-4941 Updated nifi.sensitive.props.additional.keys description to refer 
to nifi.properties




---


[GitHub] nifi pull request #2612: NIFI-5048 Corrected typo in KeytabCredentialsServic...

2018-04-06 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi/pull/2612

NIFI-5048 Corrected typo in KeytabCredentialsService controller servi…

…ce description


You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi NIFI-5048

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi/pull/2612.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #2612


commit 28fcfa6fc8e28b145ed899b5bd55c25ed632cab5
Author: Andrew Lim <andrewlim.apache@...>
Date:   2018-04-06T18:20:20Z

NIFI-5048 Corrected typo in KeytabCredentialsService controller service 
description




---


[GitHub] nifi pull request #2610: NIFI-5042 Added section Restricted Components in Ve...

2018-04-06 Thread andrewmlim
GitHub user andrewmlim opened a pull request:

https://github.com/apache/nifi/pull/2610

NIFI-5042 Added section Restricted Components in Versioned Flows and …

…edited related section in Adding Components to the Canvas


You can merge this pull request into a Git repository by running:

$ git pull https://github.com/andrewmlim/nifi NIFI-5042

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/nifi/pull/2610.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #2610


commit 10321b9dd09b6b70036b4be58b6514465e0dc250
Author: Andrew Lim <andrewlim.apache@...>
Date:   2018-04-06T15:05:46Z

NIFI-5042 Added section Restricted Components in Versioned Flows and edited 
related section in Adding Components to the Canvas




---


[GitHub] nifi issue #2515: NIFI-4885: Granular component restrictions

2018-03-08 Thread andrewmlim
Github user andrewmlim commented on the issue:

https://github.com/apache/nifi/pull/2515
  
@mcgilman Looks good!  Thanks for including a fix for MoveHDFS.


---


  1   2   3   >