> it is always connected to external systems, and mostly exposed to the
Internet by connecting to many systems.

Depending on what you mean by this, I think this could be a very bad thing
for a company akin to exposing something like Kibana without going through
a VPN.

On Tue, Nov 5, 2024 at 3:00 PM ski n <raymondmees...@gmail.com> wrote:

> I think this is a good proposal.
>
> I would also like to share my experience as an integration consultant
> implementing various integration systems for large enterprises.
>
> In general, these organizations are very conservative. The milestone
> releases (like those for 2.0) are completely ignored. It doesn't matter if
> they are already running in production in other organizations. The first GA
> release of a new major release isn't trusted either. Only after a couple of
> minor releases and when there is a new long-term support release, they
> start to think.
>
> Upgrading often disrupts day-to-day operations, business requirements, and
> consumes resources. Only when an LTS arrives, the pressure from the
> security/dev team is high enough, the project budget is available, it fits
> into the company roadmap, and so on... does a migration/upgrade begin. With
> thousands of flows and daily operations, all the migration and retesting
> can take a long time.
>
> I think most organizations expect that version 1.x will be supported for
> many years, next to the new major that has just arrived. I'm not saying
> it's good, or possible, or safe, etc., but those are just the timelines and
> expectations in large organizations. Companies like Microsoft and Oracle
> understand this very well. They often offer (and charge for) very long
> timelines for their operating systems and software.
>
> An open source project relies mostly on other open source projects. These
> may or may not have an EOL. The problem on top of this with integration
> software like NiFi is that, by its nature, it is always connected to
> external systems, and mostly exposed to the Internet by connecting to many
> systems.
>
> Thus make it very clear what the risks are, but still offer bug fixes for
> some time, is probably the best way forward.
>
> Raymond
>
>
>
>
>
>
>
>
>
>
>
>
> On Tue, Nov 5, 2024 at 8:31 PM Joe Witt <joe.w...@gmail.com> wrote:
>
> > To be actionable and concrete here is a proposal:
> >
> > 1. Declare the NiFi 1.28.x line as the 'End of Life/End of Support' line.
> > This means we may still do periodic bug fixes or when possible/reasonable
> > bump vulnerable libs.  But we will not be doing further analysis/triage
> of
> > security reports nor adding features.
> >
> > 2. Add a DISCLAIMER to the source and key binaries of the 1.x/1.28 line
> > [1].
> >
> > 3. Update the downloads page making the links for nifi source and the
> main
> > nifi assembly of whatever is the latest NiFi 1.28.x release there but
> > clearly articulated as the end of support line for which bug fixes and
> some
> > narrow dependency updates may occur.  Advise users of the 1.x line of the
> > importance of planning to migrate to the 2.x line.
> >
> > 4. Conduct a VOTE to codify this.
> >
> > 5. Conduct an Apache NiFi 1.28.1 release to pickle up (2) and the bug
> fixes
> > already available.
> >
> > 6. As we gather more user input on things which are helpful to them we
> > factor these into migration guidance/tooling as appropriate on the 2.x
> > line.
> >
> > Thanks
> >
> > [1] https://github.com/apache/nifi/pull/9491
> >
> > On Tue, Nov 5, 2024 at 9:04 AM Joe Witt <joe.w...@gmail.com> wrote:
> >
> > > Team,
> > >
> > > I will start a discussion thread on the users list so we can hear more
> > > inputs from them and from that perspective.
> > >
> > > This thread needs to focus on what the contributors/committers/PMC in
> the
> > > community can/will/should do and the PMC in particular as we're
> obligated
> > > to ensure we're putting out software for which we can stand behind its
> > > security posture.
> > >
> > > We do not need to get worried about customers.  They have vendors that
> > > support them.  What we need to worry about and continue to do an
> > excellent
> > > job caring for is the apache nifi user base and we need to ensure they
> > > don't have the belief that the NiFi 1.x line will be fixed in the
> > presence
> > > of vulnerability reports.  I'll ask on the users list how folks would
> > like
> > > us to communicate about the state of things.
> > >
> > > What I think we need to ask here is more in the spirit of what this
> > thread
> > > was started about.  When do we as a contributor/committer/PMC base want
> > to
> > > make it official in our own sense that we will not be producing
> releases
> > > for the 1.x line?  How we best communicate/help the user base then
> > follows
> > > from that.  Stated another way those who feel they will be in a good
> > > position to do security reviews, vulnerability scans and remediation,
> > > conduct releases for some period of time please share what you think
> > you'll
> > > be able to do and roughly for how long.
> > >
> > > Thanks
> > >
> > > On Tue, Nov 5, 2024 at 3:36 AM Pierre Villard <
> > pierre.villard...@gmail.com>
> > > wrote:
> > >
> > >> Hi all,
> > >>
> > >> While I think we could set an EOL date a bit further in the future, it
> > is
> > >> important to keep in mind what EOL means. It only means we won't be
> > >> providing security fixes / bug fixes through new releases. It does not
> > >> mean that NiFi 1.x is gone. If that is a big concern for some users
> when
> > >> running EOL software then we should remind those users that they've
> been
> > >> doing it for 2+ years already when using NiFi 1.x (taking Jetty as an
> > >> example here). And Joe is definitely right when saying that we have a
> > >> smaller and smaller group of people willing to spend an extensive
> amount
> > >> of
> > >> time taking care of PR/reviews, of release candidates,
> > testing/validating
> > >> RCs, etc, for the 1.x line.
> > >>
> > >> I also agree that, even if many users are already using NiFi 2 in
> > >> production, many places have strict policies to not adopt a new major
> > >> release. I don't want to start a debate whether this is making sense
> or
> > >> not
> > >> but we know those rules exist in many places :) And the fact that we
> had
> > >> milestone releases for one year is not going to be enough of an
> > argument.
> > >>
> > >> Given what we've seen in the past, we usually make a new release
> every 3
> > >> months or so. It's probably fair to assume a 2.1.0 release will happen
> > >> early next year. With that in mind, I tend to agree with Michael
> > >> suggesting
> > >> an EOL date at the end of January (3 months from now). We could also
> say
> > >> that 1.28.1 will happen at this time and will be the last one in the
> > >> community.
> > >>
> > >> Vendors have already announced support for NiFi 1.x for multiple
> > >> additional
> > >> years so this approach follows what we see in other projects where
> > >> extended
> > >> support is only provided through paid options with specific companies.
> > >>
> > >> It is awesome to finally see 2.0 out and this decision will help drive
> > >> users to that new release, which is much better in so many ways...
> > >>
> > >> Thanks,
> > >> Pierre
> > >>
> > >>
> > >> Le mar. 5 nov. 2024 à 10:36, Isha Lamboo <
> > isha.lam...@virtualsciences.nl>
> > >> a
> > >> écrit :
> > >>
> > >> > Hi all,
> > >> >
> > >> > I understand the reasons to declare an EOL quickly, given the
> external
> > >> > dependencies, but like Russell said before the short notice is going
> > to
> > >> > cause trouble with our bigger corporate customers. It would have
> been
> > >> nice
> > >> > to have the EOL date announced about a year ago, even if it had
> been a
> > >> > provisional one. The more you can delay it now, the less
> credibility I
> > >> (and
> > >> > NiFi itself) lose :-\
> > >> >
> > >> > I've been pushing since the first announcement of NiFi 2.0 for our
> > >> > customers to prepare. The smaller NiFi instances are all prepared.
> But
> > >> > there are also big customers with hundreds of flows that depend on
> > >> > variables and XML templates, and as you can imagine this was never a
> > >> > priority for them without either a NiFi 2.0 GA to move to or an
> actual
> > >> EOL
> > >> > date to get security officers upping the priority.
> > >> >
> > >> > Now we have a GA release finally, but corporate Q4 plans are set in
> > >> stone
> > >> > and Q1 2025 plans are already filling up. Telling the customers'
> > >> > development teams to upend their plans and tell their business
> > >> customers to
> > >> > forget deliveries because NiFi needs to be fixed ASAP is probably
> not
> > >> going
> > >> > to fly and instead going to seriously dent NiFi's reputation and
> > >> position.
> > >> > Unless we can automate the flow migration process it's going to be a
> > >> > year-long migration at least.
> > >> >
> > >> > That said, are there any tools or scripts to make the migration
> > >> smoother?
> > >> > Configuring multiple levels of parameter contexts with inheritance
> is
> > a
> > >> > labor-intensive process if we are to mirror the current setup with
> > >> > variables being inherited from main canvas, team PG, subject PG and
> > flow
> > >> > PG, etc. Anything that could go through the process groups and
> > configure
> > >> > this automatically would be greatly appreciated. I will look into
> that
> > >> > myself too, but anything helps really.
> > >> >
> > >> > Regards,
> > >> >
> > >> > Isha
> > >> >
> > >> > -----Oorspronkelijk bericht-----
> > >> > Van: Joe Witt <joe.w...@gmail.com>
> > >> > Verzonden: maandag 4 november 2024 23:44
> > >> > Aan: dev@nifi.apache.org
> > >> > Onderwerp: Re: [DISCUSS] End-of-life timing for NiFi 1
> > >> >
> > >> > The EOL discussion is not here because we have a new problem.  It is
> > >> here
> > >> > because we finally have an answer.
> > >> >
> > >> > The inability to address reported vulnerabilities or fundamental end
> > of
> > >> > life status for key underlying components in the 1.x line is a
> problem
> > >> that
> > >> > was fully recognized three years ago.
> > >> >
> > >> > In that time we created a plan for what NiFi 2.0 would be and how
> we'd
> > >> > manage both maintaining the 1.x line while building to the 2.x GA.
> In
> > >> the
> > >> > past year we've conducted four milestone releases of NiFi 2.x and
> > we've
> > >> > continued putting out feature, bug fix, and security improvement
> > >> releases
> > >> > of 1.x.
> > >> >
> > >> > Feature bearing releases of 1.x are no longer appropriate as 2.x is
> > here
> > >> > and GA and that was the plan all along.
> > >> >
> > >> > Bug fixes are still reasonable in spirit but you need people to
> submit
> > >> the
> > >> > JIRAs, fix the JIRAs, peer review the changes, and to conduct
> releases
> > >> and
> > >> > make votes.  That is in increasingly short supply as it has been
> quite
> > >> the
> > >> > task splitting attention across two major lines and naturally
> > developers
> > >> > and users will gravitate toward the go forward path.
> > >> >
> > >> > Vulnerability/Security related considerations are where things are
> > >> > fundamentally problematic.  We had a security report today about the
> > >> super
> > >> > old/outdated front-end libraries we use in 1.x.  That won't change.
> > We
> > >> had
> > >> > a report last week about Spring libraries needing updated except you
> > >> can't
> > >> > unless you have Pivotal support so not an option.  Those won't
> change.
> > >> We
> > >> > have had questions around Jetty changes but that is tied to Java 8.
> > >> We've
> > >> > had questions about Java 8 being end of life and even Java 11 and
> even
> > >> now
> > >> > Java 17 in terms of its codebase permissive licensing changing.  The
> > >> things
> > >> > we can reasonably address in the 1.x line are getting smaller and
> > >> smaller
> > >> > and the time required to address any new thing is higher and higher.
> > >> >
> > >> > We as a community, regardless of good intentions, cannot fix the
> > >> illities
> > >> > of the 1.x line and thus the 2.x line is here.  The 1.x line will
> > >> > absolutely continue to atrophy and it will accelerate.  If we do not
> > >> signal
> > >> > EOL on 1.x that means we're saying we can keep fixing problems.
> While
> > >> that
> > >> > is true for bugs, that is not true for vulnerabilities broadly and
> for
> > >> our
> > >> > most critical components.
> > >> >
> > >> > If you still fix bugs people assume this means you still reasonably
> > fix
> > >> > vulnerabilities/etc..  And unless we declare EOL on the 1.x line we
> > will
> > >> > continue to get non-serviceable reports and mislead the user base.
> > >> >
> > >> > The answer is to clearly signal that users should transition to the
> > 2.x
> > >> > line and focus our help on answering questions people might have on
> > how
> > >> to
> > >> > do that.
> > >> >
> > >> > I am supportive of EOL for the 1.x line.  I also like the poetic
> > nature
> > >> of
> > >> > the decade timing.
> > >> >
> > >> > On Mon, Nov 4, 2024 at 2:47 PM David Handermann <
> > >> > exceptionfact...@apache.org>
> > >> > wrote:
> > >> >
> > >>
> > >
> >
>

Reply via email to