Author: elserj
Date: Thu Aug 11 03:03:38 2016
New Revision: 1755899
URL: http://svn.apache.org/viewvc?rev=1755899&view=rev
Log:
PHOENIX-3171 Stub release notes for 4.8.0
Modified:
phoenix/site/publish/release_notes.html
phoenix/site/source/src/site/markdown/release_notes.md
Modified: phoenix/site/publish/release_notes.html
URL:
http://svn.apache.org/viewvc/phoenix/site/publish/release_notes.html?rev=1755899&r1=1755898&r2=1755899&view=diff
==============================================================================
--- phoenix/site/publish/release_notes.html (original)
+++ phoenix/site/publish/release_notes.html Thu Aug 11 03:03:38 2016
@@ -1,7 +1,7 @@
<!DOCTYPE html>
<!--
- Generated by Apache Maven Doxia at 2016-07-18
+ Generated by Apache Maven Doxia at 2016-08-10
Rendered using Reflow Maven Skin 1.1.0
(http://andriusvelykis.github.io/reflow-maven-skin)
-->
<html xml:lang="en" lang="en">
@@ -152,6 +152,11 @@
<p>Release notes provide details on issues and their fixes which may have an
impact on prior Phoenix behavior. For some issues an upgrade may be required to
be performed for a fix to take affect. See below for directions specific to a
particular release.</p>
<div class="section">
<div class="section">
+ <h3 id="Phoenix-4.8.0_Release_Notes"><u>Phoenix-4.8.0 Release Notes</u></h3>
+ <p><a class="externalLink"
href="https://issues.apache.org/jira/browse/PHOENIX-3164">PHOENIX-3164</a> is a
relatively serious bug that affects the <a class="externalLink"
href="http://phoenix.apache.org/server.html">Phoenix Query Server</a> deployed
with âsecurity enabledâ (Kerberos or Active Directory). Due to another
late-game change in the 4.8.0 release as well as an issue with the use of
Hadoopâs UserGroupInformation class, every âclient sessionâ to the
Phoenix Query Server with security enabled will result in a new instance of the
Phoenix JDBC driver <tt>PhoenixConnection</tt> (and other related classes).
This ultimately results in a new connection to ZooKeeper for each âclient
sessionâ.</p>
+ <p>Within a short amount of time of active use with the Phoenix Query Server
creating a new ZooKeeper connection for each âclient sessionâ, the number
of ZooKeeper connections will have grown rapidly likely triggering
ZooKeeperâs built-in denial of service protection (<a class="externalLink"
href="https://zookeeper.apache.org/doc/r3.4.8/zookeeperAdmin.html">maxClientCnxns</a>).
This will cause all future connections to ZooKeeper by the host running the
Phoenix Query Server to be dropped. This would prevent all HBase client API
calls which need to access ZooKeeper from completing.</p>
+ </div>
+ <div class="section">
<h3 id="Phoenix-4.5.0_Release_Notes"><u>Phoenix-4.5.0 Release Notes</u></h3>
<p>Both <a class="externalLink"
href="https://issues.apache.org/jira/browse/PHOENIX-2067">PHOENIX-2067</a> and
<a class="externalLink"
href="https://issues.apache.org/jira/browse/PHOENIX-2120">PHOENIX-2120</a>
cause rows to not be ordered correctly for the following types of columns:</p>
<ul>
Modified: phoenix/site/source/src/site/markdown/release_notes.md
URL:
http://svn.apache.org/viewvc/phoenix/site/source/src/site/markdown/release_notes.md?rev=1755899&r1=1755898&r2=1755899&view=diff
==============================================================================
--- phoenix/site/source/src/site/markdown/release_notes.md (original)
+++ phoenix/site/source/src/site/markdown/release_notes.md Thu Aug 11 03:03:38
2016
@@ -4,6 +4,23 @@ Release notes provide details on issues
Phoenix behavior. For some issues an upgrade may be required to be performed
for a fix to
take affect. See below for directions specific to a particular release.
+###<u>Phoenix-4.8.0 Release Notes</u>
+
+[PHOENIX-3164](https://issues.apache.org/jira/browse/PHOENIX-3164) is a
relatively serious
+bug that affects the [Phoenix Query
Server](http://phoenix.apache.org/server.html)
+deployed with "security enabled" (Kerberos or Active Directory). Due to
another late-game
+change in the 4.8.0 release as well as an issue with the use of Hadoop's
UserGroupInformation
+class, every "client session" to the Phoenix Query Server with security
enabled will
+result in a new instance of the Phoenix JDBC driver `PhoenixConnection` (and
other related
+classes). This ultimately results in a new connection to ZooKeeper for each
"client session".
+
+Within a short amount of time of active use with the Phoenix Query Server
creating a new ZooKeeper
+connection for each "client session", the number of ZooKeeper connections will
have grown rapidly
+likely triggering ZooKeeper's built-in denial of service protection
+([maxClientCnxns](https://zookeeper.apache.org/doc/r3.4.8/zookeeperAdmin.html)).
This
+will cause all future connections to ZooKeeper by the host running the Phoenix
Query Server to
+be dropped. This would prevent all HBase client API calls which need to access
ZooKeeper
+from completing.
###<u>Phoenix-4.5.0 Release Notes</u>
Both [PHOENIX-2067](https://issues.apache.org/jira/browse/PHOENIX-2067) and