Install and configure Apache NiFi

Stig Sandbeck Mathisen



1,330 latest version

5.0 quality score

Version information

  • 0.3.1 (latest)
  • 0.3.0
  • 0.2.0
  • 0.1.0
released Jul 9th 2020
This version is compatible with:
  • Puppet Enterprise 2019.8.x, 2019.7.x, 2019.5.x, 2019.4.x, 2019.3.x, 2019.2.x, 2019.1.x, 2019.0.x, 2018.1.x, 2017.3.x, 2017.2.x, 2016.4.x
  • Puppet >= 4.10.0 < 7.0.0
  • CentOS

Start using this module


ssm/nifi — version 0.3.1 Jul 9th 2020


Table of Contents

  1. Description
  2. Setup - The basics of getting started with nifi
  3. Usage - Configuration options and additional functionality
  4. Limitations - OS compatibility, etc.
  5. Development - Guide for contributing to the module


Install and configure the Apache NiFi dataflow automation software.


What nifi affects

This module will download the Apache NiFi tarball to /var/tmp/. Please make sure you have space for this file.

The tarball will be unpacked to /opt/nifi by default, where it will require about the same disk space.

The module will create /var/opt/nifi, for persistent storage outside the software install root. This will also configure the following nifi properties to create directories under this path.


Setup Requirements

NiFi requires Java Runtime Environment. Nifi 1.10.1 runs on Java 8 or Java 11.

NiFi requires ~ 1.3 GiB download, temporary storage and unpacked storage. Ensure /opt/nifi and /var/tmp has room for the downloaded and unpacked software.

When installing on local infrastructure, consider download the distribution tarballs, validate them with the Apache distribution keys, and store it on a local repository. Adjust the configuration variables to point to your local repository. The NiFi download page also documents how to verify the integrity and authenticity of the downloaded files.

Beginning with nifi

Add dependency modules to your puppet environment:

  • camptocamp/systemd
  • puppet/archive
  • puppetlabs/inifile
  • puppetlabs/stdlib

You need to ensure java 8 or 11 is installed. If in doubt, use this module:

  • puppetlabs/java

Follow the NiFi administration guide for configuration.


To download and install NiFi, include the module. This will download nifi, unpack it under /opt/nifi/nifi-<version>, and start the service with default configuration and storage locations.

include nifi

To host the file locally, add a nifi::download_url variable for the module.

nifi::download_url: ""

Please keep nifi::download_url, nifi::download_checksum and nifi::version in sync. The URL, checksum and version should match. Otherwise, Puppet will become confused.

To set nifi properties, like the 'sensitive properties key', add them to the nifi_properties class parameter. Example:

class { 'nifi':
  nifi_properties => {
    'nifi.sensitive.props.key' =>  'keep it secret, keep it safe',

(I recommend you use hiera-eyaml to store this somewhat securely.)

Using the Puppet CA for TLS

NiFi can use TLS certificates for authentication between nodes and for users. While NiFi provides a CA in the nifi-toolkit package, we can use the Puppet CA for this.

Managing this is on the roadmap for this module. For now, this can be handled in the profile which loads the nifi class.


Add the puppetlabs-java_ks module to your environment to manage the Java keystore and truststore used by NiFi.


Make a nifi profile, which glues everything toghether.

In this example the TLS key and certificate are class parameters. You can use Hiera for this, but I encourage you to make a fact for this. It will be useful for all other managed infrastructure that uses TLS, like metrics and logging.

class profile::nifi (
  Stdlib::Absolutepath $truststore = '/var/opt/nifi/nifi.ts',
  Stdlib::Absolutepath $keystore = '/var/opt/nifi/nifi.ks',
  Stdlib::Absolutepath $hostprivkey = '/var/lib/puppet/ssl/private_keys/',
  Stdlib::Absolutepath $hostcert = '/var/lib/puppet/ssl/certs/',
  Stdlib::Absolutepath $localcacert = '/var/lib/puppet/ssl/certs/ca.pem',
  String $storepassword = 'puppet',
) {

  $url = "${version}/nifi-${version}-bin.tar.gz"
  $toolkit_url = "${version}/nifi-toolkit-${version}-bin.tar.gz"

  class { 'java': }
  class { 'nifi':
    download_checksum => $checksum,
    download_url      => $url,
    version           => $version,
    nifi_properties => {

      # Site to Site properties
      ''          => $trusted['certname'],
      ''        => 'true',
      'nifi.remote.input.socket.port'   => '10443',

      # Web properties
      ''             => $trusted['certname'],
      'nifi.web.https.port'             => '9443',
      'nifi.web.http.port'              => '',

      # Security properties
      ''          => $keystore,
      ''    => $storepassword,
      ''      => 'jks',
      ''        => $truststore,
      ''  => $storepassword,
      ''    => 'jks',
      '' => 'true',

      # Host properties
      'nifi.cluster.node.address'       => $trusted['certname'],
      'nifi.cluster.node.protocol.port' => '11443',

  # DIY part. You can use one of:
  # - just a static file
  # - template with data from hiera
  # - puppetlabs-concat with exported concat::fragments from your nodes
  # - augeas XML lens
  # - something else
  # see authorizers.xml for suggested contents below.
  file { '/opt/nifi/current/conf/authorizers.xml':
    notify  => Service['nifi.service'],
    content => epp('profile/nifi/authorizers.xml.epp', { 'foo' => 'bar' } )

  class { 'nifi_toolkit':
    download_url      => $toolkit_url,
    download_checksum => $toolkit_checksum,
    version           => $version,

  Package['java'] -> Service['nifi.service']

  Java_ks {
    ensure   => latest,
    password => $storepassword,
    require  => Class['nifi::config'],
    before   => Class['nifi::service'],

  java_ks { 'nifi:truststore':
    target       => $truststore,
    certificate  => $localcacert,
    trustcacerts => true,

  java_ks { 'nifi:keystore':
    target      => $keystore,
    certificate => $hostcert,
    private_key => $hostprivkey,

As soon as this is active, nifi will listens on TLS on port 9443, and anonymous access to NiFi is disabled. You will need to generate a key on the puppet master for your initial administrative user.

Generate a user certificate

Generate a certificate to use from your web browser.

The name of this certificate will be added to the authorization file.

[root@puppet ~]# puppetserver ca generate --certname

Note that puppetserver has limitations on what the certificate name can contain. If you make it look like a hostname, it will work. If you make it look like an email address, it will not.

Create a PKCS12 bundle from the key and certificate, download it to your workstation, and add it to your web browser.

Authorization rules

Provision a /opt/nifi/current/conf/authorizers.xml configuration files to your NiFi nodes

This file adds the certificates of the cluster nodes, as well as the certificate for the initial admin. Once the initial admin logs in, they can manage users and roles in the web interface.

<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
    This file lists the userGroupProviders, accessPolicyProviders, and authorizers to use when running securely. In order
    to use a specific authorizer it must be configured here and it's identifier must be specified in the file.
    If the authorizer is a managedAuthorizer, it may need to be configured with an accessPolicyProvider and an userGroupProvider.
    This file allows for configuration of them, but they must be configured in order:

    all userGroupProviders
    all accessPolicyProviders
    all Authorizers

        <property name="Users File">./conf/users.xml</property>
        <property name="Legacy Authorized Users File"></property>

        <property name="Initial User Identity 1"></property>
        <property name="Node identity 1"></property>
        <property name="Node identity 2"></property>

        <property name="User Group Provider">file-user-group-provider</property>
        <property name="Authorizations File">./conf/authorizations.xml</property>
        <property name="Initial Admin Identity"></property>
        <property name="Legacy Authorized Users File"></property>
        <property name="Node identity 1"></property>
        <property name="Node identity 1"></property>
        <property name="Node Group"></property>

        <property name="Access Policy Provider">file-access-policy-provider</property>


This module is under development, and therefore somewhat light on functionality.

Configuration outside are not managed yet. These can be managed outside the module with file resources.


In the Development section, tell other users the ground rules for contributing to your project and how they should submit their work.