Known Issues

Summarizes known issues for this release.

  • NiFi UI Performance considerations: A known issue in Chrome 92.x causes significant slowness in the NiFi UI and may lead to high CPU consumption. For more information, see the Chrome Known Issues documentation at 1235045.

    Workaround: Use another version of Chrome or a different browser.

  • JDK limitation: JDK 8u271, JDK 8u281, and JDK 8u291 may cause socket leak issues in NiFi due to JDK-8245417 and JDK-8256818. Pay attention to the build version of your JDK because some later builds are fixed as described in JDK-8256818.

    Workaround: Consider using a more recent version of the JDK like 8u282, or builds of the JDK where the issue is fixed.

  • NIFI-8387: UI - render bulletins for referencing components from new data model
  • NIFI-8386: When fetching Parameter Context/Variable Registry/Controller Services, referencing components should include bulletins
  • NIFI-8330: JythonScriptEngineConfigurator needs to recompile on init()
  • NIFI-8326: KafkaRecordSink puts multiple records in one message
  • NIFI-7912: Site to Site may fail if data exchange takes more than 30 seconds

Technical Service Bulletins

TSB 2022-580: NiFi Processors cannot write to content repository
If the content repository disk is filled more than 50% (or any other value that is set in nifi.properties for nifi.content.repository.archive.max.usage.percentage), and if there is no data in the content repository archive, the following warning message can be found in the logs: "Unable to write flowfile content to content repository container default due to archive file size constraints; waiting for archive cleanup". This would block the processors and no more data is processed.

This appears to only happen if there is already data in the content repository on startup that needs to be archived, or if the following message is logged: “Found unknown file XYZ in the File System Repository; archiving file”.

Upstream JIRA
Knowledge article
For the latest update on this issue see the corresponding Knowledge article: TSB 2022-580: NiFi Processors cannot write to content repository
TSB 2022-589: CVE-2022-33140 Apache NiFi ShellUserGroupProvider Vulnerability
The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration. Command injection requires ShellUserGroupProvider to be one of the enabled User Group Providers (UGP) in the Authorizers configuration. Command injection also requires an authenticated user with elevated privileges. Apache NiFi requires an authenticated user with authorization to modify access policies in order to execute the command. Apache NiFi Registry requires an authenticated user with authorization to read user groups in order to execute the command. The resolution removes command formatting based on user-provided arguments.
Knowledge article
For the latest update on this issue see the corresponding Knowledge article: TSB 2022-589: CVE-2022-33140 Apache NiFi ShellUserGroupProvider Vulnerability