[
https://issues.apache.org/jira/browse/PHOENIX-4688?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16633029#comment-16633029
]
Lev Bronshtein edited comment on PHOENIX-4688 at 9/29/18 2:22 PM:
------------------------------------------------------------------
[~elserj]
Using requests-gssapi or unhacked requests kerberos should cause you to see the
following
{quote}2018-09-12 12:44:26,548 DEBUG [RedundancyMonitor]
blockmanagement.BlockManager(1880): BLOCK* neededReconstruction = 0
pendingReconstruction = 0
2018-09-12 12:44:26,551 WARN [qtp1281394403-467]
security.SpnegoLoginService(162):
*GSSException: No credential found for: 1.2.840.113554.1.2.2 usage: Accept*
at sun.security.jgss.GSSCredentialImpl.getElement(GSSCredentialImpl.java:600)
{quote}
This is what CALCITE-1922 attempts to fix. This would show up in failsafe
output log
The output you posted looks strange as MIT should try to fallback to TCP or
that was my impression. From
[https://web.mit.edu/kerberos/krb5-1.12/doc/admin/conf_files/krb5_conf.html]
{quote}*udp_preference_limit*When sending a message to the KDC, the library
will try using TCP before UDP if the size of the message is above
*udp_preference_limit*. If the message is smaller than*udp_preference_limit*,
then UDP will be tried before TCP. *Regardless of the size, both protocols will
be tried if the first attempt fails.*
{quote}
was (Author: lbronshtein):
[~elserj]
Using requests-gssapi or unhacked requests kerberos should cause you to see the
following
{quote}2018-09-12 12:44:26,548 DEBUG [RedundancyMonitor]
blockmanagement.BlockManager(1880): BLOCK* neededReconstruction = 0
pendingReconstruction = 0
2018-09-12 12:44:26,551 WARN [qtp1281394403-467]
security.SpnegoLoginService(162):
GSSException: No credential found for: 1.2.840.113554.1.2.2 usage: Accept
at sun.security.jgss.GSSCredentialImpl.getElement(GSSCredentialImpl.java:600)
{quote}
This is what CALCITE-1922 attempts to fix. This would show up in failsafe
output log
The output you posted looks strange as MIT should try to fallback to TCP or
that was my impression. From
[https://web.mit.edu/kerberos/krb5-1.12/doc/admin/conf_files/krb5_conf.html]
{quote}*udp_preference_limit*When sending a message to the KDC, the library
will try using TCP before UDP if the size of the message is above
*udp_preference_limit*. If the message is smaller than*udp_preference_limit*,
then UDP will be tried before TCP. *Regardless of the size, both protocols will
be tried if the first attempt fails.*
{quote}
> Add kerberos authentication to python-phoenixdb
> -----------------------------------------------
>
> Key: PHOENIX-4688
> URL: https://issues.apache.org/jira/browse/PHOENIX-4688
> Project: Phoenix
> Issue Type: Improvement
> Reporter: Lev Bronshtein
> Priority: Minor
>
> In its current state python-phoenixdv does not support support kerberos
> authentication. Using a modern python http library such as requests or
> urllib it would be simple (if not trivial) to add this support.
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)