[
https://issues.apache.org/jira/browse/KNOX-844?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15872590#comment-15872590
]
Shi Wang commented on KNOX-844:
-------------------------------
I added -Djavax.net.ssl.trustStore -Djavax.net.ssl.trustStorePassword in
PHOENIX_OPTS, the ssl handshake success, but then it throws 401 error
java.lang.RuntimeException: Failed to execute HTTP Request, got HTTP/401
at
org.apache.calcite.avatica.remote.AvaticaCommonsHttpClientImpl.send(AvaticaCommonsHttpClientImpl.java:138)
at
org.apache.calcite.avatica.remote.RemoteProtobufService._apply(RemoteProtobufService.java:44)
at
org.apache.calcite.avatica.remote.ProtobufService.apply(ProtobufService.java:81)
at org.apache.calcite.avatica.remote.Driver.connect(Driver.java:175)
at sqlline.DatabaseConnection.connect(DatabaseConnection.java:157)
at sqlline.DatabaseConnection.getConnection(DatabaseConnection.java:203)
at sqlline.Commands.connect(Commands.java:1064)
at sqlline.Commands.connect(Commands.java:996)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at
sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at
sqlline.ReflectiveCommandHandler.execute(ReflectiveCommandHandler.java:36)
at sqlline.SqlLine.dispatch(SqlLine.java:803)
at sqlline.SqlLine.initArgs(SqlLine.java:588)
at sqlline.SqlLine.begin(SqlLine.java:656)
at sqlline.SqlLine.start(SqlLine.java:398)
at sqlline.SqlLine.main(SqlLine.java:292)
at
org.apache.phoenix.queryserver.client.SqllineWrapper.main(SqllineWrapper.java:83)
sqlline version 1.1.9
I was wondering if user guest or knox need to be added in some acl?
> Add documentation for support of Apache Phoenix via Knox
> --------------------------------------------------------
>
> Key: KNOX-844
> URL: https://issues.apache.org/jira/browse/KNOX-844
> Project: Apache Knox
> Issue Type: Improvement
> Components: Site
> Affects Versions: 0.11.0
> Reporter: John McParland
> Assignee: Josh Elser
> Fix For: 0.11.0
>
> Attachments: KNOX-844.001.patch, KNOX-844.002.patch, Knox_Phoenix.png
>
>
> We would like to access data stored in Hadoop (especially HBase) using
> traditional tools which rely on ODBC connections and SQL.
> Phoenix provides the SQL interface to HBase, and Hortonworks have an [ODBC
> Connector for
> Phoenix|http://hortonworks.com/hadoop-tutorial/bi-apache-phoenix-odbc/]
> However this is unsecured - in so far as accessing from outside of the
> perimeter of the Big Data Platform.
> This ticket should address that by allowing the ODBC connection to Phoenix to
> be proxied through Knox, to enforce perimeter level security.
> h4. Acceptance Criteria
> - Connections to Phoenix via Knox are only allowed with valid credentials, as
> enforced by Knox
> - Connections to Phoenix via Knox are NOT allowed if Knox finds invalid
> credentials.
> - Connection to Phoenix via Knox can are made via an ODBC connector
--
This message was sent by Atlassian JIRA
(v6.3.15#6346)