In the zkCli.sh utility, you would add the appropriate auths like this: > addauth digest accumulo:passwd
Where passwd is the value configured for instance.secret. -Eric On Sun, Aug 5, 2012 at 10:58 PM, Josh Elser <[email protected]> wrote: > In regards to ACCUMULO-716, I'm having some issues "gracefully" recovering > from a corrupt WAL file (read-as, I don't want to blow away ZK and > reinitialize). > > I moved the bad file in HDFS out of ${instance.dfs.dir}/wal and then > attempted to update zookeeper to remove the entry for that bad file, e.g. > /accumulo/${instance.id}/root_**tablet/walogs/bad-file. I couldn't get > around the lack of authorization to delete the file via zkCli nor could I > replicate the deletion logic piecing together Accumulo code. > > Is there a utility I missed somewhere that launches a ZK shell with the > correct credentials with which I could actually manipulate the protected > data? > > If memory serves me, the ZK authorization I was missing is related to the > root username/password for the instance. Is this actually the case or did I > dream that up? If so, something like `addauth digest root:mypassword`? > > Thanks! >
