Thanks a lot Matt, I had left out that step.
Having put those entries in the authorizers.xml file and deleted the
authorizations.xml file , I now get the following exception on the
Proposed Authorizer is not inheritable by the flow controller because
of Authorizer differences: Proposed Authorizations do not match current
Authorizations
Is something out of sync here?
Gard
> 13. sep. 2016 kl. 15.45 skrev Matt Gilman <[email protected]>:
>
> Gard,
>
> In your conf/authorizers.xml configuration file you'll see entries which need
> to be populated with the nodes in your cluster. With zero master clustering,
> the nodes in the cluster may be replicating requests to the other nodes in
> the cluster. In order for the node to trust the end user, each machine along
> the way needs to be authorized for proxying. Configuring that part of the
> authorizers.xml will establish these policies.
>
> Note, the policies are only created when the authorizations.xml is not
> present or empty (containing just the empty root element) so you may need to
> modify/removing this file prior to restarting.
>
> Thanks.
>
> Matt
>
> On Tue, Sep 13, 2016 at 9:37 AM, Gard Skauge <[email protected]
> <mailto:[email protected]>> wrote:
> Hello,
>
>
> I am setting up a secure NiFi cluster with 3 nodes, using keystone and
> truststores generated with the tls-toolkit:
>
> tls-toolkit.sh standalone -n '<hostname>' -C 'CN=<hostname>’
>
> All three nodes start and inter-node communication is working fine fromwhat I
> can see in the logs. However, after logging in, I get the message
>
>
> Access denied - Untrusted proxy CN=<hostname>, OU=NIFI
>
>
> If I start only one node, I do not get this error, it´s only after the next
> node joins the cluster that this happens. Any ideas?
>
>
> Thanks,
> Gard
>