Dan,

Does the proposal I submitted meet your requirements?

Andy LoPresto
alopre...@apache.org
alopresto.apa...@gmail.com
PGP Fingerprint: 70EC B3E5 98A6 5A3F D3C4  BACE 3C6E F65B 2F7D EF69

> On Sep 5, 2018, at 4:09 PM, dan young <danoyo...@gmail.com> wrote:
> 
> We're using it as well, in the same/similar fashion as being discussed in the 
> thread...
> 
> Dano
> 
> On Wed, Sep 5, 2018, 10:07 AM Brandon DeVries <b...@jhu.edu 
> <mailto:b...@jhu.edu>> wrote:
> Andy,
> 
> We use it pretty much how Joe is... to create a unique composite key.  It 
> seems as though that shouldn't be a difficult functionality to add.  
> Possibly, you could flip your current dynamic key/value properties.  Make the 
> key the name of the attribute you want to create, and the value is the 
> attribute / attributes (newline delimited) that you want to include in the 
> hash.  This does mean you can't use "${algorithm.name 
> <http://algorithm.name/>}" in the name of the created hash attribute, but I 
> don't know if you'd consider that a big loss.  In any case, I'm sure there 
> are other solutions, this is just a thought.
> 
> Brandon
> 
> On Wed, Sep 5, 2018 at 10:27 AM Joe Percivall <jperciv...@apache.org 
> <mailto:jperciv...@apache.org>> wrote:
> Hey Andy,
> 
> We're currently using the HashAttribute processor. The use-case is that we 
> have various events that come in but sometimes those events are just updates 
> of previous ones. We store everything in ElasticSearch. So for certain 
> events, we'll calculate a hash based on a couple of attributes in order to 
> have a composite unique key to upsert as the ES _id. This allows us to easily 
> just insert/update events that are the same (as determined by the hashed 
> composite key).
> 
> As for the configuration of the processors, we're essentially just specifying 
> exact attributes as dynamic properties of HashAttribute. Then passing that FF 
> to PutElasticSearchHttp with the resulting attribute from HashAttribute as 
> the "Identifier Attribute".
> 
> Joe
> 
> On Mon, Sep 3, 2018 at 9:52 PM Andy LoPresto <alopre...@apache.org 
> <mailto:alopre...@apache.org>> wrote:
> I opened PRs for 2980 [1] and 2983 [2] which add more performant, consistent, 
> and full-featured processors to calculate cryptographic hashes of flowfile 
> content and flowfile attributes. I would like to deprecate and drop support 
> for HashAttribute, as it performs a convoluted calculation that was probably 
> useful in an old scenario, but doesn’t “hash attributes” like the name 
> implies. As it blocks the new implementation from using that name and 
> following our naming convention, I am hoping to find anyone still using the 
> old implementation and understand their use case. Thanks for your help.
> 
> [1] https://github.com/apache/nifi/pull/2980 
> <https://github.com/apache/nifi/pull/2980>
> [2] https://github.com/apache/nifi/pull/2983 
> <https://github.com/apache/nifi/pull/2983>
> 
> 
> 
> Andy LoPresto
> alopre...@apache.org <mailto:alopre...@apache.org>
> alopresto.apa...@gmail.com <mailto:alopresto.apa...@gmail.com>
> PGP Fingerprint: 70EC B3E5 98A6 5A3F D3C4  BACE 3C6E F65B 2F7D EF69
> 
> 
> 
> --
> Joe Percivall
> linkedin.com/in/Percivall <http://linkedin.com/in/Percivall>
> e: jperciv...@apache.com <mailto:jperciv...@apache.com>

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

Reply via email to