[GitHub] asfgit commented on issue #230: KYLIN-3525 Reserve intermediate flat table data if kylin.source.hive.keep-flat-table set to true
asfgit commented on issue #230: KYLIN-3525 Reserve intermediate flat table data if kylin.source.hive.keep-flat-table set to true URL: https://github.com/apache/kylin/pull/230#issuecomment-420481505 Can one of the admins verify this patch? This is an automated message from the Apache Git Service. To respond to the message, please log on GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services
[GitHub] hit-lacus opened a new pull request #230: KYLIN-3525 Reserve intermediate flat table data if kylin.source.hive.keep-flat-table set to true
hit-lacus opened a new pull request #230: KYLIN-3525 Reserve intermediate flat table data if kylin.source.hive.keep-flat-table set to true URL: https://github.com/apache/kylin/pull/230 Reserve intermediate flat table data if kylin.source.hive.keep-flat-table set to true This is an automated message from the Apache Git Service. To respond to the message, please log on GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services
[jira] [Created] (KYLIN-3557) PreparedStatement should be closed in JDBCResourceDAO#checkTableExists
Ted Yu created KYLIN-3557: - Summary: PreparedStatement should be closed in JDBCResourceDAO#checkTableExists Key: KYLIN-3557 URL: https://issues.apache.org/jira/browse/KYLIN-3557 Project: Kylin Issue Type: Bug Reporter: Ted Yu {code} final PreparedStatement ps = connection.prepareStatement(getCheckTableExistsSql(tableName)); final ResultSet rs = ps.executeQuery(); {code} {{ps}} should be closed upon return. -- This message was sent by Atlassian JIRA (v7.6.3#76005)
[jira] [Created] (KYLIN-3556) Interned string should not be used as lock object
Ted Yu created KYLIN-3556: - Summary: Interned string should not be used as lock object Key: KYLIN-3556 URL: https://issues.apache.org/jira/browse/KYLIN-3556 Project: Kylin Issue Type: Bug Reporter: Ted Yu In JDBCResourceDAO : {code} public void execute(Connection connection) throws SQLException { synchronized (resPath.intern()) { {code} Locking on an interned string can cause unexpected locking collisions with other part of code. -- This message was sent by Atlassian JIRA (v7.6.3#76005)
Speakers needed for Apache DC Roadshow
We need your help to make the Apache Washington DC Roadshow on Dec 4th a success. What do we need most? Speakers! We're bringing a unique DC flavor to this event by mixing Open Source Software with talks about Apache projects as well as OSS CyberSecurity, OSS in Government and and OSS Career advice. Please take a look at: http://www.apachecon.com/usroadshow18/ (Note: You are receiving this message because you are subscribed to one or more mailing lists at The Apache Software Foundation.) Rich, for the ApacheCon Planners -- rbo...@apache.org http://apachecon.com @ApacheCon
[jira] [Created] (KYLIN-3555) Garbage collection on HBase step fails with S3 selected as storage
Iñigo Martinez created KYLIN-3555: - Summary: Garbage collection on HBase step fails with S3 selected as storage Key: KYLIN-3555 URL: https://issues.apache.org/jira/browse/KYLIN-3555 Project: Kylin Issue Type: Bug Components: Job Engine Affects Versions: v2.4.1 Reporter: Iñigo Martinez Attachments: Screenshot from 2018-09-11 12-31-25.png When building a cube with S3 selected has storage, build process fails at latest step. Although s3 has been defined as storage, cleanup task tries to delete from HDFS and, of course, there is no file at HDFS. {code:java} 2018-09-11 12:27:56,311 DEBUG [Scheduler 1407846257 Job f8416975-eea6-4500-9cb7-4374f28451dc-237] steps.HDFSPathGarbageCollectionStep:78 : Drop HDFS path on FileSystem: s3://XXX-emr-kylin 2018-09-11 12:27:57,364 DEBUG [Scheduler 1407846257 Job f8416975-eea6-4500-9cb7-4374f28451dc-237] steps.HDFSPathGarbageCollectionStep:87 : HDFS path /kylin/kylin_metadata/kylin-f8416975-eea6-4500-9cb7-4374f28451dc/plataforma_transacciones_cubo_v1/fact_distinct_columns is dropped. 2018-09-11 12:27:58,104 DEBUG [Scheduler 1407846257 Job f8416975-eea6-4500-9cb7-4374f28451dc-237] steps.HDFSPathGarbageCollectionStep:87 : HDFS path /kylin/kylin_metadata/kylin-f8416975-eea6-4500-9cb7-4374f28451dc/plataforma_transacciones_cubo_v1/hfile is dropped. 2018-09-11 12:27:58,140 DEBUG [Scheduler 1407846257 Job f8416975-eea6-4500-9cb7-4374f28451dc-237] steps.HDFSPathGarbageCollectionStep:78 : Drop HDFS path on FileSystem: hdfs://ip-10-0-1-63.eu-west-1.compute.internal:8020 2018-09-11 12:27:58,142 DEBUG [Scheduler 1407846257 Job f8416975-eea6-4500-9cb7-4374f28451dc-237] steps.HDFSPathGarbageCollectionStep:90 : HDFS path /kylin/kylin_metadata/kylin-f8416975-eea6-4500-9cb7-4374f28451dc/plataforma_transacciones_cubo_v1/fact_distinct_columns not exists. 2018-09-11 12:27:58,147 ERROR [Scheduler 1407846257 Job f8416975-eea6-4500-9cb7-4374f28451dc-237] steps.HDFSPathGarbageCollectionStep:68 : job:f8416975-eea6-4500-9cb7-4374f28451dc-15 execute finished with exception java.io.FileNotFoundException: File /kylin/kylin_metadata/kylin-f8416975-eea6-4500-9cb7-4374f28451dc/plataforma_transacciones_cubo_v1 does not exist. at org.apache.hadoop.hdfs.DistributedFileSystem.listStatusInternal(DistributedFileSystem.java:904) at org.apache.hadoop.hdfs.DistributedFileSystem.access$600(DistributedFileSystem.java:114) at org.apache.hadoop.hdfs.DistributedFileSystem$22.doCall(DistributedFileSystem.java:964) at org.apache.hadoop.hdfs.DistributedFileSystem$22.doCall(DistributedFileSystem.java:961) at org.apache.hadoop.fs.FileSystemLinkResolver.resolve(FileSystemLinkResolver.java:81) at org.apache.hadoop.hdfs.DistributedFileSystem.listStatus(DistributedFileSystem.java:971) at org.apache.kylin.storage.hbase.steps.HDFSPathGarbageCollectionStep.dropHdfsPathOnCluster(HDFSPathGarbageCollectionStep.java:95) at org.apache.kylin.storage.hbase.steps.HDFSPathGarbageCollectionStep.doWork(HDFSPathGarbageCollectionStep.java:65) at org.apache.kylin.job.execution.AbstractExecutable.execute(AbstractExecutable.java:162) at org.apache.kylin.job.execution.DefaultChainedExecutable.doWork(DefaultChainedExecutable.java:69) at org.apache.kylin.job.execution.AbstractExecutable.execute(AbstractExecutable.java:162) at org.apache.kylin.job.impl.threadpool.DefaultScheduler$JobRunner.run(DefaultScheduler.java:113) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) at java.lang.Thread.run(Thread.java:748){code} -- This message was sent by Atlassian JIRA (v7.6.3#76005)
[GitHub] shaofengshi closed pull request #226: KYLIN-3547 add boolean DataTypeOrder
shaofengshi closed pull request #226: KYLIN-3547 add boolean DataTypeOrder URL: https://github.com/apache/kylin/pull/226 This is a PR merged from a forked repository. As GitHub hides the original diff on merge, it is displayed below for the sake of provenance: As this is a foreign pull request (from a fork), the diff is supplied below (as it won't show otherwise due to GitHub magic): diff --git a/core-metadata/src/main/java/org/apache/kylin/metadata/datatype/DataType.java b/core-metadata/src/main/java/org/apache/kylin/metadata/datatype/DataType.java index 2fe1667cd5..7580ad0202 100644 --- a/core-metadata/src/main/java/org/apache/kylin/metadata/datatype/DataType.java +++ b/core-metadata/src/main/java/org/apache/kylin/metadata/datatype/DataType.java @@ -314,6 +314,10 @@ public boolean isDecimal() { return name.equals("decimal"); } +public boolean isBoolean() { +return name.equals("boolean"); +} + public String getName() { return name; } diff --git a/core-metadata/src/main/java/org/apache/kylin/metadata/datatype/DataTypeOrder.java b/core-metadata/src/main/java/org/apache/kylin/metadata/datatype/DataTypeOrder.java index 091e2ae7e1..44921786d0 100644 --- a/core-metadata/src/main/java/org/apache/kylin/metadata/datatype/DataTypeOrder.java +++ b/core-metadata/src/main/java/org/apache/kylin/metadata/datatype/DataTypeOrder.java @@ -36,6 +36,7 @@ public static final DataTypeOrder DECIMAL_ORDER = new DecimalOrder(); public static final DataTypeOrder DATETIME_ORDER = new DateTimeOrder(); public static final DataTypeOrder STRING_ORDER = new StringOrder(); +public static final DataTypeOrder BOOLEAN_ORDER = new BooleanOrder(); // package private, access via DataType.getOrder() static DataTypeOrder getInstance(DataType type) throws IllegalArgumentException { @@ -49,6 +50,8 @@ else if (type.isFloat() || type.isDouble()) return DOUBLE_ORDER; else if (type.isDecimal()) return DECIMAL_ORDER; +else if (type.isBoolean()) +return BOOLEAN_ORDER; else throw new IllegalArgumentException("Unsupported data type " + type); } @@ -151,5 +154,11 @@ public Long toComparable(String s) { return DateFormat.stringToMillis(s); } } - + +private static class BooleanOrder extends DataTypeOrder { +@Override +public String toComparable(String s) { +return s; +} +} } This is an automated message from the Apache Git Service. To respond to the message, please log on GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services
[GitHub] shaofengshi closed pull request #227: KYLIN-3551 check spark counter path exists
shaofengshi closed pull request #227: KYLIN-3551 check spark counter path exists URL: https://github.com/apache/kylin/pull/227 This is a PR merged from a forked repository. As GitHub hides the original diff on merge, it is displayed below for the sake of provenance: As this is a foreign pull request (from a fork), the diff is supplied below (as it won't show otherwise due to GitHub magic): diff --git a/engine-spark/src/main/java/org/apache/kylin/engine/spark/SparkExecutable.java b/engine-spark/src/main/java/org/apache/kylin/engine/spark/SparkExecutable.java index c49f8a0cad..f4f06be299 100644 --- a/engine-spark/src/main/java/org/apache/kylin/engine/spark/SparkExecutable.java +++ b/engine-spark/src/main/java/org/apache/kylin/engine/spark/SparkExecutable.java @@ -31,6 +31,7 @@ import java.util.concurrent.Future; import org.apache.commons.lang.StringUtils; +import org.apache.hadoop.fs.Path; import org.apache.hadoop.util.Shell; import org.apache.kylin.common.KylinConfig; import org.apache.kylin.common.KylinConfigExt; @@ -311,24 +312,25 @@ public void onLogEvent(String infoKey, Map info) { throw new IllegalStateException(); } -// done, update all properties -Map joblogInfo = patternedLogger.getInfo(); - -// read counter from hdfs -String counterOutput = getParam(BatchConstants.ARG_COUNTER_OUPUT); -if (counterOutput != null) { -Map counterMap = HadoopUtil.readFromSequenceFile(counterOutput); -joblogInfo.putAll(counterMap); -} - -readCounters(joblogInfo); -getManager().addJobInfo(getId(), joblogInfo); if (result == null) { result = future.get(); } - if (result != null && result.getFirst() == 0) { +// done, update all properties +Map joblogInfo = patternedLogger.getInfo(); +// read counter from hdfs +String counterOutput = getParam(BatchConstants.ARG_COUNTER_OUPUT); +if (counterOutput != null) { +if (HadoopUtil.getWorkingFileSystem().exists(new Path(counterOutput))) { +Map counterMap = HadoopUtil.readFromSequenceFile(counterOutput); +joblogInfo.putAll(counterMap); +} else { +logger.warn("Spark counter output path not exists"); +} +} +readCounters(joblogInfo); +getManager().addJobInfo(getId(), joblogInfo); return new ExecuteResult(ExecuteResult.State.SUCCEED, patternedLogger.getBufferedLog()); } This is an automated message from the Apache Git Service. To respond to the message, please log on GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services
[GitHub] shaofengshi closed pull request #229: KYLIN-3553 Tomcat Security Vulnerability Alert. The version of the tomcat for kylin should upgrade to 7.0.90.
shaofengshi closed pull request #229: KYLIN-3553 Tomcat Security Vulnerability Alert. The version of the tomcat for kylin should upgrade to 7.0.90. URL: https://github.com/apache/kylin/pull/229 This is a PR merged from a forked repository. As GitHub hides the original diff on merge, it is displayed below for the sake of provenance: As this is a foreign pull request (from a fork), the diff is supplied below (as it won't show otherwise due to GitHub magic): diff --git a/build/script/download-tomcat.sh b/build/script/download-tomcat.sh index beda172412..54617a0a6d 100755 --- a/build/script/download-tomcat.sh +++ b/build/script/download-tomcat.sh @@ -27,8 +27,8 @@ if [[ `uname -a` =~ "Darwin" ]]; then alias md5cmd="md5 -q" fi -tomcat_pkg_version="7.0.85" -tomcat_pkg_md5="1ad4760080164bb08e924c330703c94d" +tomcat_pkg_version="7.0.90" +tomcat_pkg_md5="cd4890e4e6a212dafd970da37d040877" if [ ! -f "build/apache-tomcat-${tomcat_pkg_version}.tar.gz" ] then diff --git a/pom.xml b/pom.xml index a01b41e8ca..5324a65526 100644 --- a/pom.xml +++ b/pom.xml @@ -120,7 +120,7 @@ 3.2.4 2.4.0 2.5 -7.0.85 +7.0.90 3.1 2.3.23 5.9.2 This is an automated message from the Apache Git Service. To respond to the message, please log on GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services
[GitHub] xingpeng1 opened a new pull request #229: KYLIN-3553 Tomcat Security Vulnerability Alert. The version of the tomcat for kylin should upgrade to 7.0.90.
xingpeng1 opened a new pull request #229: KYLIN-3553 Tomcat Security Vulnerability Alert. The version of the tomcat for kylin should upgrade to 7.0.90. URL: https://github.com/apache/kylin/pull/229 [SECURITY] CVE-2018-1336 Severity: High Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.7, 8.5.0 to 8.5.30, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86. Description: An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. CVE-2018-8014 Description: The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue. CVE-2018-8034 Description: The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88. This is an automated message from the Apache Git Service. To respond to the message, please log on GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services
[GitHub] asfgit commented on issue #229: KYLIN-3553 Tomcat Security Vulnerability Alert. The version of the tomcat for kylin should upgrade to 7.0.90.
asfgit commented on issue #229: KYLIN-3553 Tomcat Security Vulnerability Alert. The version of the tomcat for kylin should upgrade to 7.0.90. URL: https://github.com/apache/kylin/pull/229#issuecomment-420178649 Can one of the admins verify this patch? This is an automated message from the Apache Git Service. To respond to the message, please log on GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services
[jira] [Created] (KYLIN-3554) Spark job failed but Yarn shows SUCCEED, causing Kylin move to next step
Shaofeng SHI created KYLIN-3554: --- Summary: Spark job failed but Yarn shows SUCCEED, causing Kylin move to next step Key: KYLIN-3554 URL: https://issues.apache.org/jira/browse/KYLIN-3554 Project: Kylin Issue Type: Bug Components: Spark Engine Reporter: Shaofeng SHI -- This message was sent by Atlassian JIRA (v7.6.3#76005)
[GitHub] xingpeng1 closed pull request #228: KYLIN-3553 Tomcat Security Vulnerability Alert. The version of the tomcat for kylin should upgrade to 7.0.90.
xingpeng1 closed pull request #228: KYLIN-3553 Tomcat Security Vulnerability Alert. The version of the tomcat for kylin should upgrade to 7.0.90. URL: https://github.com/apache/kylin/pull/228 This is a PR merged from a forked repository. As GitHub hides the original diff on merge, it is displayed below for the sake of provenance: As this is a foreign pull request (from a fork), the diff is supplied below (as it won't show otherwise due to GitHub magic): diff --git a/build/script/download-tomcat.sh b/build/script/download-tomcat.sh index beda172412..54617a0a6d 100755 --- a/build/script/download-tomcat.sh +++ b/build/script/download-tomcat.sh @@ -27,8 +27,8 @@ if [[ `uname -a` =~ "Darwin" ]]; then alias md5cmd="md5 -q" fi -tomcat_pkg_version="7.0.85" -tomcat_pkg_md5="1ad4760080164bb08e924c330703c94d" +tomcat_pkg_version="7.0.90" +tomcat_pkg_md5="cd4890e4e6a212dafd970da37d040877" if [ ! -f "build/apache-tomcat-${tomcat_pkg_version}.tar.gz" ] then diff --git a/pom.xml b/pom.xml index a01b41e8ca..5324a65526 100644 --- a/pom.xml +++ b/pom.xml @@ -120,7 +120,7 @@ 3.2.4 2.4.0 2.5 -7.0.85 +7.0.90 3.1 2.3.23 5.9.2 This is an automated message from the Apache Git Service. To respond to the message, please log on GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services
[GitHub] xingpeng1 opened a new pull request #228: KYLIN-3553 Tomcat Security Vulnerability Alert. The version of the tomcat for kylin should upgrade to 7.0.90.
xingpeng1 opened a new pull request #228: KYLIN-3553 Tomcat Security Vulnerability Alert. The version of the tomcat for kylin should upgrade to 7.0.90. URL: https://github.com/apache/kylin/pull/228 [SECURITY] CVE-2018-1336 Severity: High Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.7, 8.5.0 to 8.5.30, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86. Description: An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. CVE-2018-8014 Description: The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue. CVE-2018-8034 Description: The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88. This is an automated message from the Apache Git Service. To respond to the message, please log on GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services
[GitHub] asfgit commented on issue #228: KYLIN-3553 Tomcat Security Vulnerability Alert. The version of the tomcat for kylin should upgrade to 7.0.90.
asfgit commented on issue #228: KYLIN-3553 Tomcat Security Vulnerability Alert. The version of the tomcat for kylin should upgrade to 7.0.90. URL: https://github.com/apache/kylin/pull/228#issuecomment-420176745 Can one of the admins verify this patch? This is an automated message from the Apache Git Service. To respond to the message, please log on GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services
[GitHub] Wayne1c opened a new pull request #227: KYLIN-3551 check spark counter path exists
Wayne1c opened a new pull request #227: KYLIN-3551 check spark counter path exists URL: https://github.com/apache/kylin/pull/227 This is an automated message from the Apache Git Service. To respond to the message, please log on GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services
[GitHub] asfgit commented on issue #227: KYLIN-3551 check spark counter path exists
asfgit commented on issue #227: KYLIN-3551 check spark counter path exists URL: https://github.com/apache/kylin/pull/227#issuecomment-420176129 Can one of the admins verify this patch? This is an automated message from the Apache Git Service. To respond to the message, please log on GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: us...@infra.apache.org With regards, Apache Git Services
[jira] [Created] (KYLIN-3553) Tomcat Security Vulnerability Alert. The version of the tomcat for kylin should upgrade to 7.0.90.
Peng Xing created KYLIN-3553: Summary: Tomcat Security Vulnerability Alert. The version of the tomcat for kylin should upgrade to 7.0.90. Key: KYLIN-3553 URL: https://issues.apache.org/jira/browse/KYLIN-3553 Project: Kylin Issue Type: Bug Components: Security Affects Versions: v2.4.0 Reporter: Peng Xing Assignee: Peng Xing [SECURITY] CVE-2018-1336 Severity: High Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.7, 8.5.0 to 8.5.30, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86. Description: An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. CVE-2018-8014 Description: The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue. CVE-2018-8034 Description: The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88. -- This message was sent by Atlassian JIRA (v7.6.3#76005)
[jira] [Created] (KYLIN-3552) Provide a sdk to support different data sources
youcheng.zhang created KYLIN-3552: - Summary: Provide a sdk to support different data sources Key: KYLIN-3552 URL: https://issues.apache.org/jira/browse/KYLIN-3552 Project: Kylin Issue Type: New Feature Components: Query Engine, RDBMS Source Reporter: youcheng.zhang Fix For: v2.6.0 Kylin already supports JDBC source, but it takes much efforts to develop an implementation to a new source engine, like supporting metadata sync, cube build and query pushdown. It’s mainly because the SQL dialects and jdbc implementations between source engines are quite different. We propose to develop a data source sdk, which provides APIs to help developers handle these dialect differences and easily implement an adaptor for one source engine. With this SDK, users can achieve followings from a JDBC source: # synchronize metadata and data from jdbc source. # Build cube from jdbc source. # query pushdown to jdbc source engine when cube is unmatched. The SDK will define some interfaces of adaptors. To implement a new source, developers only need to implement an adaptor for the source. To keep compatibly, we will keep the existing JDBC sources, and implement a new JDBC source as the caller of the SDK. Besides, we will also provide a pushdown implementation class as the caller of SDK for pushdown scenarios. -- This message was sent by Atlassian JIRA (v7.6.3#76005)
Re: Need Suggestion for a usecase where my hive table schema changes periodically.
Hi Neethu, You're correct; If need new dimension/measure be available for history data, then hybrid doesn't fit; You need to clone to a new Cube, add the dimension/measures, and then rebuild it. mvneethu 于2018年9月11日周二 下午12:28写道: > Hi, > > Thanks for your response. But in hybrid model, it says that the cube 1 will > not be built anymore and will only be queried. But in my usecase the new > measures and dimensions has to built for the historical period also. In > that > case, hybrid doesn't fit right? Please clarify > > Thanks, > Neethu > > -- > Sent from: http://apache-kylin.74782.x6.nabble.com/ > -- Best regards, Shaofeng Shi 史少锋
[jira] [Created] (KYLIN-3551) Spark job failed with "FileNotFoundException"
Shaofeng SHI created KYLIN-3551: --- Summary: Spark job failed with "FileNotFoundException" Key: KYLIN-3551 URL: https://issues.apache.org/jira/browse/KYLIN-3551 Project: Kylin Issue Type: Bug Components: Spark Engine Reporter: Shaofeng SHI java.io.FileNotFoundException: File does not exist: hdfs://sandbox.hortonworks.com:8020/kylin/kylin_default_instance/kylin-a3e39298-8dc3-21f2-cf16-0aa5e451c777/kylin_sales_cube_clone_clone/counter at org.apache.hadoop.hdfs.DistributedFileSystem$22.doCall(DistributedFileSystem.java:1319) at org.apache.hadoop.hdfs.DistributedFileSystem$22.doCall(DistributedFileSystem.java:1311) at org.apache.hadoop.fs.FileSystemLinkResolver.resolve(FileSystemLinkResolver.java:81) at org.apache.hadoop.hdfs.DistributedFileSystem.getFileStatus(DistributedFileSystem.java:1311) at org.apache.hadoop.io.SequenceFile$Reader.(SequenceFile.java:1752) at org.apache.hadoop.io.SequenceFile$Reader.(SequenceFile.java:1776) at org.apache.kylin.common.util.HadoopUtil.readFromSequenceFile(HadoopUtil.java:218) at org.apache.kylin.common.util.HadoopUtil.readFromSequenceFile(HadoopUtil.java:233) at org.apache.kylin.engine.spark.SparkExecutable.doWork(SparkExecutable.java:319) at org.apache.kylin.job.execution.AbstractExecutable.execute(AbstractExecutable.java:163) at org.apache.kylin.job.execution.DefaultChainedExecutable.doWork(DefaultChainedExecutable.java:69) at org.apache.kylin.job.execution.AbstractExecutable.execute(AbstractExecutable.java:163) at org.apache.kylin.job.impl.threadpool.DefaultScheduler$JobRunner.run(DefaultScheduler.java:113) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) at java.lang.Thread.run(Thread.java:748) -- This message was sent by Atlassian JIRA (v7.6.3#76005)