[jira] [Updated] (HBASE-8710) The balancer shouldn't try balancing one node

2013-10-01 Thread James Kinley (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-8710?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Kinley updated HBASE-8710:


Attachment: HBASE-8710-3.patch

> The balancer shouldn't try balancing one node
> -
>
> Key: HBASE-8710
> URL: https://issues.apache.org/jira/browse/HBASE-8710
> Project: HBase
>  Issue Type: Bug
>Affects Versions: 0.95.1
>Reporter: Jean-Daniel Cryans
>Assignee: James Kinley
>Priority: Minor
> Fix For: 0.96.0
>
> Attachments: HBASE-8710-1.patch, HBASE-8710-2.patch, 
> HBASE-8710-3.patch
>
>
> In my logs, testing 0.95.1 RC1, I see:
> {noformat}
> 2013-06-07 17:31:47,377 DEBUG 
> [ip-10-20-46-44.novalocal,48569,1370640098134-BalancerChore] 
> balancer.StochasticLoadBalancer: Could not find a better load balance plan.  
> Tried 3200 different configurations in 27ms, and did not find anything with a 
> computed cost less than 25.0
> {noformat}
> Ideally we'd not even try one configuration, let alone 3.2k.



--
This message was sent by Atlassian JIRA
(v6.1#6144)


[jira] [Commented] (HBASE-8710) The balancer shouldn't try balancing one node

2013-09-29 Thread James Kinley (JIRA)

[ 
https://issues.apache.org/jira/browse/HBASE-8710?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13781572#comment-13781572
 ] 

James Kinley commented on HBASE-8710:
-

needsBalance() uses an instance of ClusterLoadState to determine how many 
servers are active in the cluster. By default, 
"hbase.master.loadbalance.bytable" is false and therefore ClusterLoadState has 
a global view of the cluster and how many servers there are. If 
"hbase.master.loadbalance.bytable" was set to true then ClusterLoadState will 
only have a per table view of the cluster. In this case, if the logic was moved 
to needsBalance() then the balancer may or may not run for each table, it will 
definitely not run when the cluster has a single server, but needsBalance() 
will be called for each table. Is this what you would expect?

Is there any reason why ClusterLoadState and ClusterStatus cannot be merged? At 
the moment, a new instance of both is created every time the balancer is run 
and ClusterStatus is only used by StochasticLoadBalancer. Wouldn't it be better 
to have a single ClusterStatus object that also contains load information, and 
to call balancer.needsBalance() from HMaster#balance() before 
balancer.balanceCluster()?

The two other checks in HMaster#balance() could also be moved into 
balancer.needsBalance() - isRegionsInTransition() and 
areDeadServersInProgress().

> The balancer shouldn't try balancing one node
> -
>
> Key: HBASE-8710
> URL: https://issues.apache.org/jira/browse/HBASE-8710
> Project: HBase
>  Issue Type: Bug
>Affects Versions: 0.95.1
>Reporter: Jean-Daniel Cryans
>Assignee: James Kinley
>Priority: Minor
> Fix For: 0.96.0
>
> Attachments: HBASE-8710-1.patch, HBASE-8710-2.patch
>
>
> In my logs, testing 0.95.1 RC1, I see:
> {noformat}
> 2013-06-07 17:31:47,377 DEBUG 
> [ip-10-20-46-44.novalocal,48569,1370640098134-BalancerChore] 
> balancer.StochasticLoadBalancer: Could not find a better load balance plan.  
> Tried 3200 different configurations in 27ms, and did not find anything with a 
> computed cost less than 25.0
> {noformat}
> Ideally we'd not even try one configuration, let alone 3.2k.



--
This message was sent by Atlassian JIRA
(v6.1#6144)


[jira] [Updated] (HBASE-8710) The balancer shouldn't try balancing one node

2013-09-27 Thread James Kinley (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-8710?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Kinley updated HBASE-8710:


Attachment: HBASE-8710-1.patch

> The balancer shouldn't try balancing one node
> -
>
> Key: HBASE-8710
> URL: https://issues.apache.org/jira/browse/HBASE-8710
> Project: HBase
>  Issue Type: Bug
>Affects Versions: 0.95.1
>Reporter: Jean-Daniel Cryans
>Assignee: James Kinley
>Priority: Minor
> Fix For: 0.96.0
>
> Attachments: HBASE-8710-1.patch
>
>
> In my logs, testing 0.95.1 RC1, I see:
> {noformat}
> 2013-06-07 17:31:47,377 DEBUG 
> [ip-10-20-46-44.novalocal,48569,1370640098134-BalancerChore] 
> balancer.StochasticLoadBalancer: Could not find a better load balance plan.  
> Tried 3200 different configurations in 27ms, and did not find anything with a 
> computed cost less than 25.0
> {noformat}
> Ideally we'd not even try one configuration, let alone 3.2k.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Assigned] (HBASE-8710) The balancer shouldn't try balancing one node

2013-09-27 Thread James Kinley (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-8710?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Kinley reassigned HBASE-8710:
---

Assignee: James Kinley

> The balancer shouldn't try balancing one node
> -
>
> Key: HBASE-8710
> URL: https://issues.apache.org/jira/browse/HBASE-8710
> Project: HBase
>  Issue Type: Bug
>Affects Versions: 0.95.1
>Reporter: Jean-Daniel Cryans
>Assignee: James Kinley
>Priority: Minor
> Fix For: 0.96.0
>
>
> In my logs, testing 0.95.1 RC1, I see:
> {noformat}
> 2013-06-07 17:31:47,377 DEBUG 
> [ip-10-20-46-44.novalocal,48569,1370640098134-BalancerChore] 
> balancer.StochasticLoadBalancer: Could not find a better load balance plan.  
> Tried 3200 different configurations in 27ms, and did not find anything with a 
> computed cost less than 25.0
> {noformat}
> Ideally we'd not even try one configuration, let alone 3.2k.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-9656) Remove decimal places from Requests Per Second stats

2013-09-25 Thread James Kinley (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-9656?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Kinley updated HBASE-9656:


Attachment: HBASE-9656-1.patch

> Remove decimal places from Requests Per Second stats
> 
>
> Key: HBASE-9656
> URL: https://issues.apache.org/jira/browse/HBASE-9656
> Project: HBase
>  Issue Type: Improvement
>  Components: UI
>Affects Versions: 0.95.2
>Reporter: James Kinley
>Assignee: James Kinley
>Priority: Trivial
> Attachments: HBASE-9656-1.patch
>
>
> The Requests Per Second stats on the Master and RegionServer UI pages would 
> look better without decimal places.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-9656) Remove decimal places from Requests Per Second stats

2013-09-25 Thread James Kinley (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-9656?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Kinley updated HBASE-9656:


Status: Patch Available  (was: Open)

> Remove decimal places from Requests Per Second stats
> 
>
> Key: HBASE-9656
> URL: https://issues.apache.org/jira/browse/HBASE-9656
> Project: HBase
>  Issue Type: Improvement
>  Components: UI
>Affects Versions: 0.95.2
>Reporter: James Kinley
>Assignee: James Kinley
>Priority: Trivial
> Attachments: HBASE-9656-1.patch
>
>
> The Requests Per Second stats on the Master and RegionServer UI pages would 
> look better without decimal places.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Created] (HBASE-9656) Remove decimal places from Requests Per Second stats

2013-09-25 Thread James Kinley (JIRA)
James Kinley created HBASE-9656:
---

 Summary: Remove decimal places from Requests Per Second stats
 Key: HBASE-9656
 URL: https://issues.apache.org/jira/browse/HBASE-9656
 Project: HBase
  Issue Type: Improvement
  Components: UI
Affects Versions: 0.95.2
Reporter: James Kinley
Assignee: James Kinley
Priority: Trivial


The Requests Per Second stats on the Master and RegionServer UI pages would 
look better without decimal places.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-8711) Requests count is completely off

2013-09-25 Thread James Kinley (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-8711?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Kinley updated HBASE-8711:


Attachment: HBASE-8711-1.patch

Attached patch to make regionserver metric period configurable, and to lower 
the default period to 5 seconds.

> Requests count is completely off
> 
>
> Key: HBASE-8711
> URL: https://issues.apache.org/jira/browse/HBASE-8711
> Project: HBase
>  Issue Type: Bug
>  Components: UI
>Affects Versions: 0.95.1
>Reporter: Jean-Daniel Cryans
>Assignee: James Kinley
> Fix For: 0.96.0
>
> Attachments: HBASE-8711-1.patch, RPS-TEST-1.log, RPS-TEST-2.log
>
>
> I tried 0.95.1 RC1 in standalone, and the requests count in both the master 
> and RS web UIs are wrong. I haven't dug too much in but it seems too low when 
> I'm sending load, and it takes >10 seconds to clear up when the cluster 
> becomes completely idle.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-8711) Requests count is completely off

2013-09-25 Thread James Kinley (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-8711?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Kinley updated HBASE-8711:


Attachment: RPS-TEST-1.log
RPS-TEST-2.log

> Requests count is completely off
> 
>
> Key: HBASE-8711
> URL: https://issues.apache.org/jira/browse/HBASE-8711
> Project: HBase
>  Issue Type: Bug
>  Components: UI
>Affects Versions: 0.95.1
>Reporter: Jean-Daniel Cryans
>Assignee: James Kinley
> Fix For: 0.96.0
>
> Attachments: RPS-TEST-1.log, RPS-TEST-2.log
>
>
> I tried 0.95.1 RC1 in standalone, and the requests count in both the master 
> and RS web UIs are wrong. I haven't dug too much in but it seems too low when 
> I'm sending load, and it takes >10 seconds to clear up when the cluster 
> becomes completely idle.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (HBASE-8711) Requests count is completely off

2013-09-25 Thread James Kinley (JIRA)

[ 
https://issues.apache.org/jira/browse/HBASE-8711?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13777370#comment-13777370
 ] 

James Kinley commented on HBASE-8711:
-


There are a couple of things going on here. The first issue is that the point 
in time metrics for a region server are only computed every 15 seconds and 
therefore requestsPerSecond is actually an average for the previous interval:

{code}
requestsPerSecond = (numberRequestsSinceLastRun / secondsSinceLastRun)
{code}

The client write buffer also confuses things because the writes are delayed 
reaching the server, then the server can take up to 15 seconds to include them 
in the metrics, and another 15 seconds to clear them down.

The second issue is that the requestCount counter used to compute 
requestsPerSecond is incremented for every region server operation (i.e. 
including requests for region info and not just for mutations) and is therefore 
higher than expected.

I've attached the results of two tests to show whats happening. The same client 
was used in both tests to generate 100 req/sec for 60 seconds (6000 writes):

In the first test (RPS-TEST-1.log) the client write buffer was enabled and you 
can see that it took 52 seconds before the writes appeared in the metrics, and 
because they were all sent at once requestsPerSecond was skewed at 09:07:28 
(requestsPerSecond: 602.7862951606452). It took a further 30 seconds before 
requestsPerSecond returned to 0. Also, writeRequestsCount was only incremented 
once for each flush, and the individual writes were not counted 
(tempWriteRequestsCount = 4).

In the second test (RPS-TEST-2.log) the client write buffer was disabled and 
you can see that the writes started to appear in the metrics after the next 
metric computation was run (15 seconds), and requestsPerSecond hovered at ~170 
for the duration of the test. The writes were also counted individually 
(tempWriteRequestsCount = 6004).

Both tests show an increase of over 12000 requests for 6000 writes.

Computing requestsPerSecond from the requestCount counter makes sense, but the 
interval should at least be configurable and be lower by default (maybe 5 
seconds).

> Requests count is completely off
> 
>
> Key: HBASE-8711
> URL: https://issues.apache.org/jira/browse/HBASE-8711
> Project: HBase
>  Issue Type: Bug
>  Components: UI
>Affects Versions: 0.95.1
>Reporter: Jean-Daniel Cryans
>Assignee: James Kinley
> Fix For: 0.96.0
>
>
> I tried 0.95.1 RC1 in standalone, and the requests count in both the master 
> and RS web UIs are wrong. I haven't dug too much in but it seems too low when 
> I'm sending load, and it takes >10 seconds to clear up when the cluster 
> becomes completely idle.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (HBASE-6973) Trim trailing whitespace from configuration values

2013-08-17 Thread James Kinley (JIRA)

[ 
https://issues.apache.org/jira/browse/HBASE-6973?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13743035#comment-13743035
 ] 

James Kinley commented on HBASE-6973:
-

Can this be closed now that HADOOP-9855 has been resolved?

> Trim trailing whitespace from configuration values
> --
>
> Key: HBASE-6973
> URL: https://issues.apache.org/jira/browse/HBASE-6973
> Project: HBase
>  Issue Type: Bug
>Affects Versions: 0.92.1
>Reporter: James Kinley
>Priority: Minor
>
> If the following properties have a whitespace at the end of the value it 
> causes problems with Kerberos authentication...
> {code}
> 
> hbase.regionserver.keytab.file
> /etc/hbase/conf/hbase.krb5 
> 
> 
> hbase.master.keytab.file
> /etc/hbase/conf/hbase.krb5 
> 
> {code}
> I'm guessing this can affect other properties as well, so can the values be 
> trimmed when read?

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (HBASE-8711) Requests count is completely off

2013-08-12 Thread James Kinley (JIRA)

[ 
https://issues.apache.org/jira/browse/HBASE-8711?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13736812#comment-13736812
 ] 

James Kinley commented on HBASE-8711:
-

Hey Elliott. Are you working on this at the moment? If not, I was going to take 
a look if thats ok with you?

> Requests count is completely off
> 
>
> Key: HBASE-8711
> URL: https://issues.apache.org/jira/browse/HBASE-8711
> Project: HBase
>  Issue Type: Bug
>  Components: UI
>Affects Versions: 0.95.1
>Reporter: Jean-Daniel Cryans
>Assignee: Elliott Clark
> Fix For: 0.95.2
>
>
> I tried 0.95.1 RC1 in standalone, and the requests count in both the master 
> and RS web UIs are wrong. I haven't dug too much in but it seems too low when 
> I'm sending load, and it takes >10 seconds to clear up when the cluster 
> becomes completely idle.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (HBASE-6973) Trim trailing whitespace from configuration values

2013-08-09 Thread James Kinley (JIRA)

[ 
https://issues.apache.org/jira/browse/HBASE-6973?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13734593#comment-13734593
 ] 

James Kinley commented on HBASE-6973:
-

bq. In any case, I think Hadoop should have the backport done on branch-1 so 
that HBase does not have to take care of this.

I agree, I think this should be fixed in Hadoop branch-1 too. I've opened 
HADOOP-9855 for the backport.

> Trim trailing whitespace from configuration values
> --
>
> Key: HBASE-6973
> URL: https://issues.apache.org/jira/browse/HBASE-6973
> Project: HBase
>  Issue Type: Bug
>Affects Versions: 0.92.1
>Reporter: James Kinley
>Priority: Minor
>
> If the following properties have a whitespace at the end of the value it 
> causes problems with Kerberos authentication...
> {code}
> 
> hbase.regionserver.keytab.file
> /etc/hbase/conf/hbase.krb5 
> 
> 
> hbase.master.keytab.file
> /etc/hbase/conf/hbase.krb5 
> 
> {code}
> I'm guessing this can affect other properties as well, so can the values be 
> trimmed when read?

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Assigned] (HBASE-7482) Port HBASE-7442 HBase remote CopyTable not working when security enabled to trunk

2013-03-07 Thread James Kinley (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-7482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Kinley reassigned HBASE-7482:
---

Assignee: Gary Helmling  (was: James Kinley)

> Port HBASE-7442 HBase remote CopyTable not working when security enabled to 
> trunk
> -
>
> Key: HBASE-7482
> URL: https://issues.apache.org/jira/browse/HBASE-7482
> Project: HBase
>  Issue Type: Bug
>Reporter: Ted Yu
>Assignee: Gary Helmling
>Priority: Critical
> Fix For: 0.95.0
>
> Attachments: HBASE-7482-trunk.patch, HBASE-7482-v2.patch
>
>
> Excerpt about the choice of solution from :
> The first option was actually quite messy to implement. {{clusterId}} and 
> {{conf}} are fixed in *{{HBaseClient}}* when it's created and cached by 
> *{{SecureRpcEngine}}*, so to implement the fix here I would have had to pass 
> the different cluster {{confs}} up through *{{HConnectionManager}}* and 
> *{{HBaseRPC}}* in order to override the clusterId in 
> *{{SecureClient#SecureConnection}}*.
> I've gone with the second option of creating and caching different 
> *{{SecureClients}}* for the local and remote clusters in 
> *{{SecureRpcEngine}}* - keyed off of the {{clusterId}} instead of the default 
> *{{SocketFactory}}*. I think this is a cleaner solution.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (HBASE-7482) Port HBASE-7442 HBase remote CopyTable not working when security enabled to trunk

2013-03-07 Thread James Kinley (JIRA)

[ 
https://issues.apache.org/jira/browse/HBASE-7482?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13595772#comment-13595772
 ] 

James Kinley commented on HBASE-7482:
-

+1

It's better not having to muck around with the configuration. V2 patch looks 
good and copytable works on my secure clusters.
 

> Port HBASE-7442 HBase remote CopyTable not working when security enabled to 
> trunk
> -
>
> Key: HBASE-7482
> URL: https://issues.apache.org/jira/browse/HBASE-7482
> Project: HBase
>  Issue Type: Bug
>Reporter: Ted Yu
>Assignee: James Kinley
>Priority: Critical
> Fix For: 0.95.0
>
> Attachments: HBASE-7482-trunk.patch, HBASE-7482-v2.patch
>
>
> Excerpt about the choice of solution from :
> The first option was actually quite messy to implement. {{clusterId}} and 
> {{conf}} are fixed in *{{HBaseClient}}* when it's created and cached by 
> *{{SecureRpcEngine}}*, so to implement the fix here I would have had to pass 
> the different cluster {{confs}} up through *{{HConnectionManager}}* and 
> *{{HBaseRPC}}* in order to override the clusterId in 
> *{{SecureClient#SecureConnection}}*.
> I've gone with the second option of creating and caching different 
> *{{SecureClients}}* for the local and remote clusters in 
> *{{SecureRpcEngine}}* - keyed off of the {{clusterId}} instead of the default 
> *{{SocketFactory}}*. I think this is a cleaner solution.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-7482) Port HBASE-7442 HBase remote CopyTable not working when security enabled to trunk

2013-03-05 Thread James Kinley (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-7482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Kinley updated HBASE-7482:


Attachment: HBASE-7482-trunk.patch

> Port HBASE-7442 HBase remote CopyTable not working when security enabled to 
> trunk
> -
>
> Key: HBASE-7482
> URL: https://issues.apache.org/jira/browse/HBASE-7482
> Project: HBase
>  Issue Type: Bug
>Reporter: Ted Yu
>Assignee: James Kinley
>Priority: Critical
> Fix For: 0.95.0
>
> Attachments: HBASE-7482-trunk.patch
>
>
> Excerpt about the choice of solution from :
> The first option was actually quite messy to implement. {{clusterId}} and 
> {{conf}} are fixed in *{{HBaseClient}}* when it's created and cached by 
> *{{SecureRpcEngine}}*, so to implement the fix here I would have had to pass 
> the different cluster {{confs}} up through *{{HConnectionManager}}* and 
> *{{HBaseRPC}}* in order to override the clusterId in 
> *{{SecureClient#SecureConnection}}*.
> I've gone with the second option of creating and caching different 
> *{{SecureClients}}* for the local and remote clusters in 
> *{{SecureRpcEngine}}* - keyed off of the {{clusterId}} instead of the default 
> *{{SocketFactory}}*. I think this is a cleaner solution.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-7482) Port HBASE-7442 HBase remote CopyTable not working when security enabled to trunk

2013-03-05 Thread James Kinley (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-7482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Kinley updated HBASE-7482:


Attachment: (was: HBASE-7482-trunk.patch)

> Port HBASE-7442 HBase remote CopyTable not working when security enabled to 
> trunk
> -
>
> Key: HBASE-7482
> URL: https://issues.apache.org/jira/browse/HBASE-7482
> Project: HBase
>  Issue Type: Bug
>Reporter: Ted Yu
>Assignee: James Kinley
>Priority: Critical
> Fix For: 0.95.0
>
>
> Excerpt about the choice of solution from :
> The first option was actually quite messy to implement. {{clusterId}} and 
> {{conf}} are fixed in *{{HBaseClient}}* when it's created and cached by 
> *{{SecureRpcEngine}}*, so to implement the fix here I would have had to pass 
> the different cluster {{confs}} up through *{{HConnectionManager}}* and 
> *{{HBaseRPC}}* in order to override the clusterId in 
> *{{SecureClient#SecureConnection}}*.
> I've gone with the second option of creating and caching different 
> *{{SecureClients}}* for the local and remote clusters in 
> *{{SecureRpcEngine}}* - keyed off of the {{clusterId}} instead of the default 
> *{{SocketFactory}}*. I think this is a cleaner solution.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-7482) Port HBASE-7442 HBase remote CopyTable not working when security enabled to trunk

2013-03-05 Thread James Kinley (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-7482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Kinley updated HBASE-7482:


Status: Patch Available  (was: Open)

> Port HBASE-7442 HBase remote CopyTable not working when security enabled to 
> trunk
> -
>
> Key: HBASE-7482
> URL: https://issues.apache.org/jira/browse/HBASE-7482
> Project: HBase
>  Issue Type: Bug
>Reporter: Ted Yu
>Assignee: James Kinley
>Priority: Critical
> Fix For: 0.95.0
>
> Attachments: HBASE-7482-trunk.patch
>
>
> Excerpt about the choice of solution from :
> The first option was actually quite messy to implement. {{clusterId}} and 
> {{conf}} are fixed in *{{HBaseClient}}* when it's created and cached by 
> *{{SecureRpcEngine}}*, so to implement the fix here I would have had to pass 
> the different cluster {{confs}} up through *{{HConnectionManager}}* and 
> *{{HBaseRPC}}* in order to override the clusterId in 
> *{{SecureClient#SecureConnection}}*.
> I've gone with the second option of creating and caching different 
> *{{SecureClients}}* for the local and remote clusters in 
> *{{SecureRpcEngine}}* - keyed off of the {{clusterId}} instead of the default 
> *{{SocketFactory}}*. I think this is a cleaner solution.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (HBASE-7482) Port HBASE-7442 HBase remote CopyTable not working when security enabled to trunk

2013-03-04 Thread James Kinley (JIRA)

[ 
https://issues.apache.org/jira/browse/HBASE-7482?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13592500#comment-13592500
 ] 

James Kinley commented on HBASE-7482:
-

In addition to the TableMapReduceUtil change, 'hbase.cluster.id' has to be 
reset in HConnectionImplementation to ensure that it's HBaseClient instance has 
the correct 'clusterId' set and therefore the correct token is selected when 
setting up the Connection.

> Port HBASE-7442 HBase remote CopyTable not working when security enabled to 
> trunk
> -
>
> Key: HBASE-7482
> URL: https://issues.apache.org/jira/browse/HBASE-7482
> Project: HBase
>  Issue Type: Bug
>Reporter: Ted Yu
>Assignee: James Kinley
>Priority: Critical
> Fix For: 0.95.0
>
> Attachments: HBASE-7482-trunk.patch
>
>
> Excerpt about the choice of solution from :
> The first option was actually quite messy to implement. {{clusterId}} and 
> {{conf}} are fixed in *{{HBaseClient}}* when it's created and cached by 
> *{{SecureRpcEngine}}*, so to implement the fix here I would have had to pass 
> the different cluster {{confs}} up through *{{HConnectionManager}}* and 
> *{{HBaseRPC}}* in order to override the clusterId in 
> *{{SecureClient#SecureConnection}}*.
> I've gone with the second option of creating and caching different 
> *{{SecureClients}}* for the local and remote clusters in 
> *{{SecureRpcEngine}}* - keyed off of the {{clusterId}} instead of the default 
> *{{SocketFactory}}*. I think this is a cleaner solution.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-7482) Port HBASE-7442 HBase remote CopyTable not working when security enabled to trunk

2013-03-04 Thread James Kinley (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-7482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Kinley updated HBASE-7482:


Attachment: HBASE-7482-trunk.patch

> Port HBASE-7442 HBase remote CopyTable not working when security enabled to 
> trunk
> -
>
> Key: HBASE-7482
> URL: https://issues.apache.org/jira/browse/HBASE-7482
> Project: HBase
>  Issue Type: Bug
>Reporter: Ted Yu
>Assignee: James Kinley
>Priority: Critical
> Fix For: 0.95.0
>
> Attachments: HBASE-7482-trunk.patch
>
>
> Excerpt about the choice of solution from :
> The first option was actually quite messy to implement. {{clusterId}} and 
> {{conf}} are fixed in *{{HBaseClient}}* when it's created and cached by 
> *{{SecureRpcEngine}}*, so to implement the fix here I would have had to pass 
> the different cluster {{confs}} up through *{{HConnectionManager}}* and 
> *{{HBaseRPC}}* in order to override the clusterId in 
> *{{SecureClient#SecureConnection}}*.
> I've gone with the second option of creating and caching different 
> *{{SecureClients}}* for the local and remote clusters in 
> *{{SecureRpcEngine}}* - keyed off of the {{clusterId}} instead of the default 
> *{{SocketFactory}}*. I think this is a cleaner solution.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (HBASE-7482) Port HBASE-7442 HBase remote CopyTable not working when security enabled to trunk

2013-03-04 Thread James Kinley (JIRA)

[ 
https://issues.apache.org/jira/browse/HBASE-7482?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13592401#comment-13592401
 ] 

James Kinley commented on HBASE-7482:
-

Hi Gary. Yes, I have 2 secure clusters which I setup for HBASE-7442. I've been 
testing a patch this afternoon and had to make an additional change to 
HConnectionImplementation to get it to work. I'll attach it for review.

> Port HBASE-7442 HBase remote CopyTable not working when security enabled to 
> trunk
> -
>
> Key: HBASE-7482
> URL: https://issues.apache.org/jira/browse/HBASE-7482
> Project: HBase
>  Issue Type: Bug
>Reporter: Ted Yu
>Assignee: James Kinley
>Priority: Critical
> Fix For: 0.95.0
>
>
> Excerpt about the choice of solution from :
> The first option was actually quite messy to implement. {{clusterId}} and 
> {{conf}} are fixed in *{{HBaseClient}}* when it's created and cached by 
> *{{SecureRpcEngine}}*, so to implement the fix here I would have had to pass 
> the different cluster {{confs}} up through *{{HConnectionManager}}* and 
> *{{HBaseRPC}}* in order to override the clusterId in 
> *{{SecureClient#SecureConnection}}*.
> I've gone with the second option of creating and caching different 
> *{{SecureClients}}* for the local and remote clusters in 
> *{{SecureRpcEngine}}* - keyed off of the {{clusterId}} instead of the default 
> *{{SocketFactory}}*. I think this is a cleaner solution.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Assigned] (HBASE-7482) Port HBASE-7442 HBase remote CopyTable not working when security enabled to trunk

2013-03-04 Thread James Kinley (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-7482?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Kinley reassigned HBASE-7482:
---

Assignee: James Kinley  (was: Gary Helmling)

> Port HBASE-7442 HBase remote CopyTable not working when security enabled to 
> trunk
> -
>
> Key: HBASE-7482
> URL: https://issues.apache.org/jira/browse/HBASE-7482
> Project: HBase
>  Issue Type: Bug
>Reporter: Ted Yu
>Assignee: James Kinley
>Priority: Critical
> Fix For: 0.95.0
>
>
> Excerpt about the choice of solution from :
> The first option was actually quite messy to implement. {{clusterId}} and 
> {{conf}} are fixed in *{{HBaseClient}}* when it's created and cached by 
> *{{SecureRpcEngine}}*, so to implement the fix here I would have had to pass 
> the different cluster {{confs}} up through *{{HConnectionManager}}* and 
> *{{HBaseRPC}}* in order to override the clusterId in 
> *{{SecureClient#SecureConnection}}*.
> I've gone with the second option of creating and caching different 
> *{{SecureClients}}* for the local and remote clusters in 
> *{{SecureRpcEngine}}* - keyed off of the {{clusterId}} instead of the default 
> *{{SocketFactory}}*. I think this is a cleaner solution.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (HBASE-6626) Add a chapter on HDFS in the troubleshooting section of the HBase reference guide.

2013-02-18 Thread James Kinley (JIRA)

[ 
https://issues.apache.org/jira/browse/HBASE-6626?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13580500#comment-13580500
 ] 

James Kinley commented on HBASE-6626:
-

This is really useful. A couple of suggestions: it might be easier to digest if 
you describe the various HDFS communication points along the lines of the write 
path. For example:

* Client issues Put to a region server, which writes the edit to the WAL, which 
appends to HLog in HDFS
** This uses DFSClient
** HLog writes are pipelined to X number of datanodes - based on replication 
factor
** HLogs are rolled at intervals (60 minutes), which requires interaction with 
HDFS
** Indicate which timeout and retry options apply here
** ...
* Same for HFiles...

In addition to this, and the typical error messages, it would also be great to 
describe what to look out for in certain scenarios. For example:

* What happens when a datanode goes bad (you've touched on this already)
** How does this affect a region server?
** What to look out for in the logs?
** What configuration options apply?
* What happens when the active namenode goes bad, and what happens during 
namenode failover?
** A region server needs to communicate with the namenode when it rolls it's 
WAL, flushes it's store files, etc
** In between, it only communicates with the datanodes to append to the WAL
** What configuration options apply?
** What to look out for in the logs?

Thanks,
James.

> Add a chapter on HDFS in the troubleshooting section of the HBase reference 
> guide.
> --
>
> Key: HBASE-6626
> URL: https://issues.apache.org/jira/browse/HBASE-6626
> Project: HBase
>  Issue Type: Improvement
>  Components: documentation
>Affects Versions: 0.96.0
>Reporter: nkeywal
>Assignee: Doug Meil
>Priority: Blocker
> Attachments: troubleshooting.txt
>
>
> I looked mainly at the major failure case, but here is what I have:
> New sub chapter in the existing chapter "Troubleshooting and Debugging 
> HBase": "HDFS & HBASE"
> 1) HDFS & HBase
> 2) Connection related settings
> 2.1) Number of retries
> 2.2) Timeouts
> 3) Log samples
> 1) HDFS & HBase
> HBase uses HDFS to store its HFile, i.e. the core HBase files and the 
> Write-Ahead-Logs, i.e. the files that will be used to restore the data after 
> a crash.
> In both cases, the reliability of HBase comes from the fact that HDFS writes 
> the data to multiple locations. To be efficient, HBase needs the data to be 
> available locally, hence it's highly recommended to have the HDFS datanode on 
> the same machines as the HBase Region Servers.
> Detailed information on how HDFS works can be found at [1].
> Important features are:
>  - HBase is a client application of HDFS, i.e. uses the HDFS DFSClient class. 
> This class can appears in HBase logs with other HDFS client related logs.
>  - Some HDFS settings are HDFS-server-side, i.e. must be set on the HDFS 
> side, while some other are HDFS-client-side, i.e. must be set in HBase, while 
> some other must be set in both places.
>  - the HDFS writes are pipelined from one datanode to another. When writing, 
> there are communications between:
> - HBase and HDFS namenode, through the HDFS client classes.
> - HBase and HDFS datanodes, through the HDFS client classes.
> - HDFS datanode between themselves: issues on these communications are in 
> HDFS logs, not HBase. HDFS writes are always local when possible. As a 
> consequence, there should not be much write error in HBase Region Servers: 
> they write to the local datanode. If this datanode can't replicate the 
> blocks, it will appear in its logs, not in the region servers logs.
>  - datanodes can be contacted through the ipc.Client interface (once again 
> this class can shows up in HBase logs) and the data transfer interface 
> (usually shows up as the DataNode class in the HBase logs). There are on 
> different ports (defaults being: 50010 and 50020).
>  - To understand exactly what's going on, you must look that the HDFS log 
> files as well: HBase logs represent the client side.
>  - With the default setting, HDFS needs 630s to mark a datanode as dead. For 
> this reason, this node will still be tried by HBase or by other datanodes 
> when writing and reading until HDFS definitively decides it's dead. This will 
> add some extras lines in the logs. This monitoring is performed by the 
> NameNode.
>  - The HDFS clients (i.e. HBase using HDFS client code) don't fully rely on 
> the NameNode, but can mark temporally a node as dead if they had an error 
> when they tried to use it.
> 2) Settings for retries and timeouts
> 2.1) Retries
> ipc.client.connect.max.retries
> Default 10
> Indicates the number of retries a client will make to establish

[jira] [Updated] (HBASE-7442) HBase remote CopyTable not working when security enabled

2012-12-29 Thread James Kinley (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-7442?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Kinley updated HBASE-7442:


Attachment: HBASE-7442-0.94.patch

It works :)

You're correct, the 0.94 patch is identical (attached). Trunk is different so 
this will take me a little longer.

> HBase remote CopyTable not working when security enabled
> 
>
> Key: HBASE-7442
> URL: https://issues.apache.org/jira/browse/HBASE-7442
> Project: HBase
>  Issue Type: Bug
>  Components: IPC/RPC, mapreduce, security
>Affects Versions: 0.92.1
>Reporter: James Kinley
> Fix For: 0.92.3, 0.96.0, 0.94.5
>
> Attachments: attempt_201212271546_0001_m_00_0.log, 
> HBASE-7442-0.92.1.patch, HBASE-7442-0.94.patch
>
>
> When security is enabled, HBase CopyTable fails with Kerberos exception:
> {code}
> FATAL org.apache.hadoop.ipc.SecureClient: SASL authentication failed. The 
> most likely cause is missing or invalid credentials. Consider 'kinit'.
> javax.security.sasl.SaslException: GSS initiate failed [Caused by 
> GSSException: No valid credentials provided (Mechanism level: Failed to find 
> any Kerberos tgt)]
> {code}
> This is only when copying to remote HBase cluster (using either MRv1 or 
> YARN), local copy works fine.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (HBASE-7442) HBase remote CopyTable not working when security enabled

2012-12-28 Thread James Kinley (JIRA)

[ 
https://issues.apache.org/jira/browse/HBASE-7442?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13540618#comment-13540618
 ] 

James Kinley commented on HBASE-7442:
-

Agreed, this would be a short term fix and more refactoring work is required to 
get it right. I agree with Ted that this work warrants its own JIRA.

> HBase remote CopyTable not working when security enabled
> 
>
> Key: HBASE-7442
> URL: https://issues.apache.org/jira/browse/HBASE-7442
> Project: HBase
>  Issue Type: Bug
>  Components: IPC/RPC, mapreduce, security
>Affects Versions: 0.92.1
>Reporter: James Kinley
> Fix For: 0.96.0, 0.94.5
>
> Attachments: attempt_201212271546_0001_m_00_0.log, 
> HBASE-7442-0.92.1.patch
>
>
> When security is enabled, HBase CopyTable fails with Kerberos exception:
> {code}
> FATAL org.apache.hadoop.ipc.SecureClient: SASL authentication failed. The 
> most likely cause is missing or invalid credentials. Consider 'kinit'.
> javax.security.sasl.SaslException: GSS initiate failed [Caused by 
> GSSException: No valid credentials provided (Mechanism level: Failed to find 
> any Kerberos tgt)]
> {code}
> This is only when copying to remote HBase cluster (using either MRv1 or 
> YARN), local copy works fine.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (HBASE-7442) HBase remote CopyTable not working when security enabled

2012-12-28 Thread James Kinley (JIRA)

[ 
https://issues.apache.org/jira/browse/HBASE-7442?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13540472#comment-13540472
 ] 

James Kinley commented on HBASE-7442:
-

Please see attached patch.

The first option was actually quite messy to implement. {{clusterId}} and 
{{conf}} are fixed in *{{HBaseClient}}* when it's created and cached by 
*{{SecureRpcEngine}}*, so to implement the fix here I would have had to pass 
the different cluster {{confs}} up through *{{HConnectionManager}}* and 
*{{HBaseRPC}}* in order to override the clusterId in 
*{{SecureClient#SecureConnection}}*.

I've gone with the second option of creating and caching different 
*{{SecureClients}}* for the local and remote clusters in *{{SecureRpcEngine}}* 
- keyed off of the {{clusterId}} instead of the default *{{SocketFactory}}*. I 
think this is a cleaner solution.

Please let me know what you think.

> HBase remote CopyTable not working when security enabled
> 
>
> Key: HBASE-7442
> URL: https://issues.apache.org/jira/browse/HBASE-7442
> Project: HBase
>  Issue Type: Bug
>  Components: IPC/RPC, mapreduce, security
>Affects Versions: 0.92.1
>Reporter: James Kinley
> Fix For: 0.96.0, 0.94.5
>
> Attachments: attempt_201212271546_0001_m_00_0.log, 
> HBASE-7442-0.92.1.patch
>
>
> When security is enabled, HBase CopyTable fails with Kerberos exception:
> {code}
> FATAL org.apache.hadoop.ipc.SecureClient: SASL authentication failed. The 
> most likely cause is missing or invalid credentials. Consider 'kinit'.
> javax.security.sasl.SaslException: GSS initiate failed [Caused by 
> GSSException: No valid credentials provided (Mechanism level: Failed to find 
> any Kerberos tgt)]
> {code}
> This is only when copying to remote HBase cluster (using either MRv1 or 
> YARN), local copy works fine.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-7442) HBase remote CopyTable not working when security enabled

2012-12-28 Thread James Kinley (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-7442?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Kinley updated HBASE-7442:


Attachment: HBASE-7442-0.92.1.patch

> HBase remote CopyTable not working when security enabled
> 
>
> Key: HBASE-7442
> URL: https://issues.apache.org/jira/browse/HBASE-7442
> Project: HBase
>  Issue Type: Bug
>  Components: IPC/RPC, mapreduce, security
>Affects Versions: 0.92.1
>Reporter: James Kinley
> Fix For: 0.96.0, 0.94.5
>
> Attachments: attempt_201212271546_0001_m_00_0.log, 
> HBASE-7442-0.92.1.patch
>
>
> When security is enabled, HBase CopyTable fails with Kerberos exception:
> {code}
> FATAL org.apache.hadoop.ipc.SecureClient: SASL authentication failed. The 
> most likely cause is missing or invalid credentials. Consider 'kinit'.
> javax.security.sasl.SaslException: GSS initiate failed [Caused by 
> GSSException: No valid credentials provided (Mechanism level: Failed to find 
> any Kerberos tgt)]
> {code}
> This is only when copying to remote HBase cluster (using either MRv1 or 
> YARN), local copy works fine.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (HBASE-7442) HBase remote CopyTable not working when security enabled

2012-12-27 Thread James Kinley (JIRA)

[ 
https://issues.apache.org/jira/browse/HBASE-7442?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13540031#comment-13540031
 ] 

James Kinley commented on HBASE-7442:
-

I noticed that *{{CopyTable#createSubmittableJob}}*, and specifically 
*{{TableMapReduceUtil#initCredentials}}* was only acquiring a delegation token 
for the local HBase cluster so I added the following to 
*{{TableMapReduceUtil#initCredentials}}*:

{code}
String quorumAddress = 
job.getConfiguration().get(TableOutputFormat.QUORUM_ADDRESS);
if (quorumAddress != null) {
  String[] parts = ZKUtil.transformClusterKey(quorumAddress);  
  Configuration peerConf = HBaseConfiguration.create(job.getConfiguration());
  peerConf.set(HConstants.ZOOKEEPER_QUORUM, parts[0]);
  peerConf.set("hbase.zookeeper.client.port", parts[1]);
  peerConf.set(HConstants.ZOOKEEPER_ZNODE_PARENT, parts[2]);
  User.getCurrent().obtainAuthTokenForJob(peerConf, job);
}
{code}

The user now has the correct tokens:

Cluster 1 ID = 7bb01c84-3c66-49ca-82d2-2f9218f13dad
Cluster 2 ID = d4653a37-83df-4929-b950-e03987c3b4e8

{code}
INFO token.TokenUtil: Obtained token HBASE_AUTH_TOKEN for user 
kinley/ad...@kinley.com on cluster 7bb01c84-3c66-49ca-82d2-2f9218f13dad
INFO token.TokenUtil: Obtained token HBASE_AUTH_TOKEN for user 
kinley/ad...@kinley.com on cluster d4653a37-83df-4929-b950-e03987c3b4e8
{code}

But when initialising the *{{HTable}}* connection in the mapper, the 
*{{TokenSelector}}* in *{{SecureClient#SecureConnection}}* returns the wrong 
token from the user's token cache. This is because the token cache is keyed on 
{{clusterId}}, and despite the token for the local cluster existing in the 
cache ({{key=7bb01c84-3c66-49ca-82d2-2f9218f13dad}}), the {{clusterId}} is 
fixed at this point in *{{HBaseClient}}* to the remote cluster's ID 
({{key=d4653a37-83df-4929-b950-e03987c3b4e8}}), and it is this ID that is 
always passed to the *{{TokenSelector}}*.

I can think of a couple of possible solutions:
1. Either pass the {{clusterId}} into *{{SecureClient#SecureConnection}}* as 
part of the *{{ConnectionId}}*. This way it can be used by the 
*{{TokenSelector}}* instead of the fixed ID in the parent class 
*{{HBaseClient}}*?, or 
2. *{{SecureRpcEngine}}* caches multiple clients based on a 
*{{SocketFactory}}*, so we could maintain separate clients for both the local 
and remote clusters here?

> HBase remote CopyTable not working when security enabled
> 
>
> Key: HBASE-7442
> URL: https://issues.apache.org/jira/browse/HBASE-7442
> Project: HBase
>  Issue Type: Bug
>  Components: IPC/RPC, mapreduce, security
>Affects Versions: 0.92.1
>Reporter: James Kinley
> Attachments: attempt_201212271546_0001_m_00_0.log
>
>
> When security is enabled, HBase CopyTable fails with Kerberos exception:
> {code}
> FATAL org.apache.hadoop.ipc.SecureClient: SASL authentication failed. The 
> most likely cause is missing or invalid credentials. Consider 'kinit'.
> javax.security.sasl.SaslException: GSS initiate failed [Caused by 
> GSSException: No valid credentials provided (Mechanism level: Failed to find 
> any Kerberos tgt)]
> {code}
> This is only when copying to remote HBase cluster (using either MRv1 or 
> YARN), local copy works fine.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-7442) HBase remote CopyTable not working when security enabled

2012-12-27 Thread James Kinley (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-7442?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Kinley updated HBASE-7442:


Attachment: attempt_201212271546_0001_m_00_0.log

> HBase remote CopyTable not working when security enabled
> 
>
> Key: HBASE-7442
> URL: https://issues.apache.org/jira/browse/HBASE-7442
> Project: HBase
>  Issue Type: Bug
>  Components: IPC/RPC, mapreduce, security
>Affects Versions: 0.92.1
>Reporter: James Kinley
> Attachments: attempt_201212271546_0001_m_00_0.log
>
>
> When security is enabled, HBase CopyTable fails with Kerberos exception:
> {code}
> FATAL org.apache.hadoop.ipc.SecureClient: SASL authentication failed. The 
> most likely cause is missing or invalid credentials. Consider 'kinit'.
> javax.security.sasl.SaslException: GSS initiate failed [Caused by 
> GSSException: No valid credentials provided (Mechanism level: Failed to find 
> any Kerberos tgt)]
> {code}
> This is only when copying to remote HBase cluster (using either MRv1 or 
> YARN), local copy works fine.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (HBASE-7442) HBase remote CopyTable not working when security enabled

2012-12-27 Thread James Kinley (JIRA)

[ 
https://issues.apache.org/jira/browse/HBASE-7442?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13540007#comment-13540007
 ] 

James Kinley commented on HBASE-7442:
-

To give some context for the attached log 
({{attempt_201212271546_0001_m_00_0.log}}).

I have setup 2 clusters:

Cluster 1 has two nodes running the following services:
one.kinley.com: HDFS, MRv1
two.kinley.com: HBase, ZK

Cluster 2 has a single node running the following:
three.kinley.com: HDFS, HBase, ZK

Security is enabled on both clusters and all principals are in the same realm 
(so cross-realm support is not required).

I'm trying to copy an HBase table from cluster 1 to cluster 2:

{code}
two.kinley.com:~$ hbase org.apache.hadoop.hbase.mapreduce.CopyTable 
-Dmapred.child.java.opts="-Dsun.security.krb5.debug=true" 
-Dmapred.map.child.log.level=DEBUG --peer.adr=three.kinley.com:2181:/hbase 
--new.name=Converged-headers Converged-headers
{code}

Running a local2local CopyTable on cluster 1 and 2 works ok.

> HBase remote CopyTable not working when security enabled
> 
>
> Key: HBASE-7442
> URL: https://issues.apache.org/jira/browse/HBASE-7442
> Project: HBase
>  Issue Type: Bug
>  Components: IPC/RPC, mapreduce, security
>Affects Versions: 0.92.1
>Reporter: James Kinley
>
> When security is enabled, HBase CopyTable fails with Kerberos exception:
> {code}
> FATAL org.apache.hadoop.ipc.SecureClient: SASL authentication failed. The 
> most likely cause is missing or invalid credentials. Consider 'kinit'.
> javax.security.sasl.SaslException: GSS initiate failed [Caused by 
> GSSException: No valid credentials provided (Mechanism level: Failed to find 
> any Kerberos tgt)]
> {code}
> This is only when copying to remote HBase cluster (using either MRv1 or 
> YARN), local copy works fine.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Created] (HBASE-7442) HBase remote CopyTable not working when security enabled

2012-12-27 Thread James Kinley (JIRA)
James Kinley created HBASE-7442:
---

 Summary: HBase remote CopyTable not working when security enabled
 Key: HBASE-7442
 URL: https://issues.apache.org/jira/browse/HBASE-7442
 Project: HBase
  Issue Type: Bug
  Components: IPC/RPC, mapreduce, security
Affects Versions: 0.92.1
Reporter: James Kinley


When security is enabled, HBase CopyTable fails with Kerberos exception:

{code}
FATAL org.apache.hadoop.ipc.SecureClient: SASL authentication failed. The most 
likely cause is missing or invalid credentials. Consider 'kinit'.
javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: 
No valid credentials provided (Mechanism level: Failed to find any Kerberos 
tgt)]
{code}

This is only when copying to remote HBase cluster (using either MRv1 or YARN), 
local copy works fine.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Created] (HBASE-7059) Add Region Server ID to metrics

2012-10-29 Thread James Kinley (JIRA)
James Kinley created HBASE-7059:
---

 Summary: Add Region Server ID to metrics
 Key: HBASE-7059
 URL: https://issues.apache.org/jira/browse/HBASE-7059
 Project: HBase
  Issue Type: Improvement
  Components: metrics, regionserver
Affects Versions: 0.92.1
Reporter: James Kinley


When running multiple Region Servers on a single node monitoring tools are 
unable to distinguish between the metrics, because they group them by hostname. 
E.g. Ganglia shows accumulated metrics for "hbase.regionserver.blockCacheCount" 
for all Region Servers running on the same node. 

If a Region Server ID was added to the metric, e.g. 
"hbase.regionserver001.blockCacheCount", then Ganglia will be able to display 
the metrics for each Region Server separately.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HBASE-6973) Trim whitespace from configuration values

2012-10-10 Thread James Kinley (JIRA)

 [ 
https://issues.apache.org/jira/browse/HBASE-6973?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Kinley updated HBASE-6973:


Description: 
If the following properties have a whitespace at the end of the value it causes 
problems with Kerberos authentication...

{code}

hbase.regionserver.keytab.file
/etc/hbase/conf/hbase.krb5 


hbase.master.keytab.file
/etc/hbase/conf/hbase.krb5 

{code}

I'm guessing this can affect other properties as well, so can the values be 
trimmed when read?

  was:
If the following properties have a whitespace at the end of the value it causes 
problems with Kerberos authentication...


hbase.regionserver.keytab.file
/etc/hbase/conf/hbase.krb5 


hbase.master.keytab.file
/etc/hbase/conf/hbase.krb5 


I'm guessing this can affect other properties as well, so can the values be 
trimmed when read?


> Trim whitespace from configuration values
> -
>
> Key: HBASE-6973
> URL: https://issues.apache.org/jira/browse/HBASE-6973
> Project: HBase
>  Issue Type: Bug
>Affects Versions: 0.92.1
>Reporter: James Kinley
>Priority: Minor
>
> If the following properties have a whitespace at the end of the value it 
> causes problems with Kerberos authentication...
> {code}
> 
> hbase.regionserver.keytab.file
> /etc/hbase/conf/hbase.krb5 
> 
> 
> hbase.master.keytab.file
> /etc/hbase/conf/hbase.krb5 
> 
> {code}
> I'm guessing this can affect other properties as well, so can the values be 
> trimmed when read?

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Created] (HBASE-6973) Trim whitespace from configuration values

2012-10-10 Thread James Kinley (JIRA)
James Kinley created HBASE-6973:
---

 Summary: Trim whitespace from configuration values
 Key: HBASE-6973
 URL: https://issues.apache.org/jira/browse/HBASE-6973
 Project: HBase
  Issue Type: Bug
Affects Versions: 0.92.1
Reporter: James Kinley
Priority: Minor


If the following properties have a whitespace at the end of the value it causes 
problems with Kerberos authentication...


hbase.regionserver.keytab.file
/etc/hbase/conf/hbase.krb5 


hbase.master.keytab.file
/etc/hbase/conf/hbase.krb5 


I'm guessing this can affect other properties as well, so can the values be 
trimmed when read?

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira