techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.6K
active users

#apachenifi

0 posts0 participants0 posts today
pkbentum<p>So I said I was gonna be posting Data Engineering stuff here and this is my first attempt at that, hehehe.</p><p><a href="https://buildingblocks.hashnode.dev/getting-started-with-apache-nifipart-1" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">buildingblocks.hashnode.dev/ge</span><span class="invisible">tting-started-with-apache-nifipart-1</span></a></p><p><a href="https://mastodon.social/tags/apachenifi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apachenifi</span></a> <a href="https://mastodon.social/tags/dataengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataengineering</span></a></p>
ottO<p>New release of the python Apache Nifi library NiPyApi: <a href="https://github.com/Chaffelson/nipyapi/releases/tag/v0.21.0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/Chaffelson/nipyapi/</span><span class="invisible">releases/tag/v0.21.0</span></a><br><a href="https://fosstodon.org/tags/nifi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nifi</span></a> <a href="https://fosstodon.org/tags/apachenifi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apachenifi</span></a></p>
Caio<p>Recentemente, tenho avaliado escrever e gravar alguns conteúdos sobre tratamento de dados, automação, integração com pacotes de escritório e boas práticas no geral. Trabalhei por 3,5 anos numa consultoria (um escritório de planejamento urbano e regional) e percebi que há muitas lacunas, mesmo quando o <a href="https://bolha.us/tags/QGIS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QGIS</span></a> está presente. Em matéria de tratamento de dados e automação, sou usuário do <a href="https://bolha.us/tags/KNIME" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KNIME</span></a>, logo, decidi dar uma olhada em alternativas, como <a href="https://bolha.us/tags/Pentaho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pentaho</span></a> (PDI, que já conhecia de outros carnavais) e <a href="https://bolha.us/tags/ApacheHop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ApacheHop</span></a>, mas a que mais achei curiosa foi o <a href="https://bolha.us/tags/ApacheNiFi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ApacheNiFi</span></a>.</p>
Matt Hayes<p>In my second blog post on Apache NiFi we run it up in a container to have a play: <a href="https://mattjhayes.com/2023/12/04/experimenting-with-nifi/" target="_blank" rel="nofollow noopener" translate="no"><span class="invisible">https://</span><span class="ellipsis">mattjhayes.com/2023/12/04/expe</span><span class="invisible">rimenting-with-nifi/</span></a> <a href="https://techhub.social/tags/NiFi" class="mention hashtag" rel="tag">#<span>NiFi</span></a> <a href="https://techhub.social/tags/ApacheNiFi" class="mention hashtag" rel="tag">#<span>ApacheNiFi</span></a></p>
🛡 H3lium@infosec.exchange/:~# :blinking_cursor:​<p>"🚨 Critical RCE Vulnerability Uncovered in Apache NiFi 🚨"</p><p>A critical Remote Code Execution (RCE) vulnerability has been identified in Apache NiFi, a widely utilized data integration tool, posing a severe threat by enabling attackers to exfiltrate sensitive data, compromise data integrity, and gain unauthorized access. The flaw, tracked as CVE-2023-34468, has a high CVSS Severity Score of 8.8 and can be exploited using specially crafted H2 database connection strings. Apache NiFi’s maintainers have released patches and upgrades to mitigate this significant security issue. 🛡️🌐</p><p>Source: <a href="https://cybersecuritynews.com/apache-nifi-rce-vulnerability/" rel="nofollow noopener" target="_blank">Cyber Security News</a> by Dhivya</p><p>Tags: <a href="https://infosec.exchange/tags/ApacheNiFi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ApacheNiFi</span></a> <a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/DataExfiltration" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataExfiltration</span></a> <a href="https://infosec.exchange/tags/CVE202334468" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE202334468</span></a> <a href="https://infosec.exchange/tags/PatchUpdate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchUpdate</span></a> <a href="https://infosec.exchange/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttack</span></a> <a href="https://infosec.exchange/tags/DataIntegrity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataIntegrity</span></a> <a href="https://infosec.exchange/tags/UnauthorizedAccess" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UnauthorizedAccess</span></a> 🌍🔐🛠️</p><p>🔗 <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34468" rel="nofollow noopener" target="_blank">MITRE CVE-2023-34468 Details</a></p><p>🛑 Mitigation Measures:</p><ul><li>Apply patches and upgrades promptly.</li><li>Implement network segmentation to limit Apache NiFi instances’ exposure to untrusted networks.</li><li>Monitor Apache NiFi systems for unusual activities or indicators of compromise.</li><li>Enforce strict access controls and authentication protocols.</li></ul>
ottO<p>Getting ready for Apache Nifi 2.0 by Pierre Villard</p><p><a href="https://medium.com/cloudera-inc/getting-ready-for-apache-nifi-2-0-5a5e6a67f450" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/cloudera-inc/gettin</span><span class="invisible">g-ready-for-apache-nifi-2-0-5a5e6a67f450</span></a></p><p><a href="https://fosstodon.org/tags/apache" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apache</span></a> <a href="https://fosstodon.org/tags/apachenifi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apachenifi</span></a> <a href="https://fosstodon.org/tags/nifi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nifi</span></a></p>
Zeljka Zorz<p>If you’re running an Apache NiFi instance exposed on the internet and you have not secured access to it, the underlying host may already be covertly cryptomining on someone else’s behalf.</p><p><a href="https://www.helpnetsecurity.com/2023/05/31/apache-nifi-cryptomining/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2023/05/31</span><span class="invisible">/apache-nifi-cryptomining/</span></a></p><p><span class="h-card"><a href="https://infosec.exchange/@sans_isc" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sans_isc</span></a></span> <span class="h-card"><a href="https://infosec.exchange/@jullrich" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jullrich</span></a></span> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/ApacheNiFi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ApacheNiFi</span></a></p>
David G. Simmons<p>Great to be in NYC, even better to get to present at the Meetup! <br>---<br>RT @PaaSDev<br>Thanks to the <a href="https://tty0.social/tags/ApachePinot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ApachePinot</span></a> @startreedata developer relations and community teams Thanks! @davidgsIoT <a href="https://tty0.social/tags/IoT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IoT</span></a> <a href="https://tty0.social/tags/ApachePulsar" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ApachePulsar</span></a> <a href="https://tty0.social/tags/NYC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NYC</span></a> <a href="https://tty0.social/tags/Meetup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meetup</span></a> @PulsarMeetup We had some Pizza, Pulsar and Pinot. Now it's on to Princeton for the next one <a href="https://tty0.social/tags/ApacheNiFi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ApacheNiFi</span></a>. <a href="https://www.meetup.com/new-york-city-apache-pulsar-meetup/events/289674210/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">meetup.com/new-york-city-apach</span><span class="invisible">e-pulsar-meetup/events/289674210/</span></a> <br><a href="https://twitter.com/PaaSDev/status/1603464100549459968" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">twitter.com/PaaSDev/status/160</span><span class="invisible">3464100549459968</span></a></p>