[
https://issues.apache.org/jira/browse/PHOENIX-5006?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16709508#comment-16709508
]
Josh Elser commented on PHOENIX-5006:
-------------------------------------
{quote}The intention for the snippet provided in the file is to show that the
change we need to make is probably on {{Phoenix}} and not on the {{HBase}} side
which you were planning to dig in based on earlier comment
{quote}
I think you're conflating a few different issues into one which is why I've
been struggling to keep up :)
# Phoenix doesn't always get configuration properties provided via the JDBC
url included in the Hadoop Configuration (it does eventually get them, but
after we do Kerberos login based on provided credentials)
# Phoenix won't automatically pick up Kerberos credentials from a ticket cache
(needs a Java wrapper to "prime" UGI, I think)
# Having to provide extra files on the classpath for a JDBC application is a
"smell" (similar to #1 but extends much farther – e.g. HDFS HA namenodes
requires core-site and hdfs-site on the classpath to even talk to HA NN's
properly, at least the last time I check).
#1 is something we can definitely make happen. #2 is what I was surprised
didn't automagically work via HBase – it might be that HBase will only pick it
up if a login via UGI happened already, not just from a local ticket cache (as
JAAS would do). #3 is really difficult and not something I think Phoenix can
solve. We should make sure that #1 is only done for exceptional cases, not
something absurd like someone serializing all of their hadoop configs into a
Phoenix JDBC url...
Does that help? (and did I get it all?)
> jdbc connection to secure cluster should be able to use Kerberos ticket of
> user
> -------------------------------------------------------------------------------
>
> Key: PHOENIX-5006
> URL: https://issues.apache.org/jira/browse/PHOENIX-5006
> Project: Phoenix
> Issue Type: Bug
> Reporter: Biju Nair
> Priority: Minor
> Attachments: PHOENIX-5006.possiblefix
>
>
> Currently JDBC connection against a secure Phoenix cluster requires a
> Kerberos principal and keytab to be passed in as part of the connection
> string. But in many instances users may not have a {{Keytab}} especially
> during development. It would be good to support using the logged in users
> Kerberos ticket.
>
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)