Re: [VOTE] Release of Apache Phoenix 5.0.0 RC1

2018-06-27 Thread Josh Elser

+1 (binding)

Noticed that the pom.xml.versionsBackup are still present, but that's 
not the end of the world.


On 6/26/18 1:59 PM, rajeshb...@apache.org wrote:

Hello Everyone,

This is a call for a vote on Apache Phoenix 5.0.0 RC1. This is the next
major release
of Phoenix compatible with the 2.0 branch of Apache HBase(2.0.0+).  The
release
includes both a source-only release and a convenience binary release. The
prior RC
was sunk due to PHOENIX-4785 which is fixed now.

This release has feature parity with HBase 2.0.0 version.

Here is are few highlights of Phoenix 5.0.0 over Phoenix 4.14.0 recently
released.
1) Refactored coprocessor implementations as for the new coprocessor design
changes in HBase 2.0[1 
].
2) Cleaned up deprecated APIs and leveraged new performant APIs[2
].
3) Hive and Spark integration works with latest versions of Hive(3.0.0) and
Spark respectively[3 ][4
].

The source tarball, including signatures, digests, etc can be found at:
https://dist.apache.org/repos/dist/dev/phoenix/apache-
phoenix-5.0.0-HBase-2.0-rc1/src
The binary artifacts can be found at:
https://dist.apache.org/repos/dist/dev/phoenix/apache-
phoenix-5.0.0-HBase-2.0-rc1/bin

Release artifacts are signed with the following key:
https://pgp.mit.edu/pks/lookup?op=get=0x318FD86BAAEDBD7B
https://dist.apache.org/repos/dist/dev/phoenix/KEYS

The hash and tag to be voted upon:
https://git-wip-us.apache.org/repos/asf?p=phoenix.git;a=tag;
h=refs/tags/v5.0.0-HBase-2.0-rc1
*https://git-wip-us.apache.org/repos/asf?p=phoenix.git;a=shortlog;h=refs/tags/v5.0.0-HBase-2.0-rc1
*


Vote will be open for at least 72 hours. Please vote:

[ ] +1 approve
[ ] +0 no opinion 
[ ] -1 disapprove (and reason why)

[1] https://issues.apache.org/jira/browse/PHOENIX-4338
[2] https://issues.apache.org/jira/browse/PHOENIX-4297
[3] https://issues.apache.org/jira/browse/PHOENIX-4423
[4] https://issues.apache.org/jira/browse/PHOENIX-4787

Thanks,
The Apache Phoenix Team



Re: [DISCUSS] stop minor releases for 0.98 and 1.1

2018-06-27 Thread Pedro Boado
I'm OK reducing to one single CDH-5.14 branch and dropping 5.11,5.12 and
5.13 support for next minor 4.15.

Same for 0.98 and 1.1 .

1.2 is not really needed for maintaining a cdh branch but could still be
relevant - isn't it still the most popular version of HBase in terms of
adoption? - .

Anyway I agree there are too many parallel branches.

On Wed, 13 Jun 2018 at 03:35, Thomas D'Silva  wrote:

> +1 on reducing the number of branches.
>
> On Tue, Jun 12, 2018 at 2:03 PM, Vincent Poon 
> wrote:
>
> > big +1
> > Commits have been way too burdensome
> >
> > On Tue, Jun 12, 2018 at 9:08 AM, Josh Elser  wrote:
> >
> > > Also +1
> > >
> > > Do that after the release? Or before?
> > >
> > >
> > > On 6/12/18 11:55 AM, James Taylor wrote:
> > >
> > >> Somewhat orthogonal, but we should move master to a new 4.x-HBase-1.4
> > >> branch and make 5.x the master branch.
> > >>
> > >> On Tue, Jun 12, 2018 at 8:31 AM Josh Elser  wrote:
> > >>
> > >> +1
> > >>>
> > >>> I think HBase 1.2 is soon to be dropped as well (maybe after 1.2.7,
> but
> > >>> I might be inventing that). I'm also not so sure about the value
> behind
> > >>> a 1.3 release either (I think Andrew's 1.4 branch is much more
> > relevant).
> > >>>
> > >>> Getting to and HBase 1.4 and HBase 2.x sounds ideal to me (hopefully,
> > we
> > >>> can avoid a 2.0 and 2.1 schism...), and whatever CDH stuff Pedro
> wants
> > >>> to support.
> > >>>
> > >>> On 6/11/18 9:47 PM, James Taylor wrote:
> > >>>
> >  It feels like we're trying to maintain too many branches. Both HBase
> >  0.98
> >  and 1.1 have been EOLed. To ease the burden on devs, how about we
> stop
> >  maintaining the 4.x-HBase-0.98 and 4.x-HBase-1.1 branches? An RM can
> > 
> > >>> always
> > >>>
> >  step up if need be to do a patch release from the 4.14 branches.
> > 
> >  Also, how about the 1.2 branch? If we kept the 4.x-cdh5.11 branch,
> do
> > we
> >  need the 4.x-HBase-1.2 branch?
> > 
> >  It'd be good if this was decided prior to the biggish splittable
> > system
> >  catalog work (PHOENIX-3534) and omid transaction integration
> > 
> > >>> (PHOENIX-3623).
> > >>>
> > 
> >  Thanks,
> >  James
> > 
> > 
> > >>>
> > >>
> >
>


[jira] [Commented] (PHOENIX-3383) Comparison between descending row keys used in RVC is reverse

2018-06-27 Thread James Taylor (JIRA)


[ 
https://issues.apache.org/jira/browse/PHOENIX-3383?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16525610#comment-16525610
 ] 

James Taylor commented on PHOENIX-3383:
---

WIP patch. Unit tests pass, just need to clean it up a bit.

> Comparison between descending row keys used in RVC is reverse
> -
>
> Key: PHOENIX-3383
> URL: https://issues.apache.org/jira/browse/PHOENIX-3383
> Project: Phoenix
>  Issue Type: Bug
>Reporter: James Taylor
>Assignee: James Taylor
>Priority: Major
>  Labels: DESC
> Fix For: 4.15.0
>
> Attachments: PHOENIX-3383-wip1.patch, PHOENIX-3383_wip.patch, 
> PHOENIX-3383_wip2.patch, PHOENIX-3383_wip3.patch
>
>
> See PHOENIX-3382, but the comparison for RVC with descending row key columns 
> is the reverse of what it should be.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Updated] (PHOENIX-3383) Comparison between descending row keys used in RVC is reverse

2018-06-27 Thread James Taylor (JIRA)


 [ 
https://issues.apache.org/jira/browse/PHOENIX-3383?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Taylor updated PHOENIX-3383:
--
Attachment: PHOENIX-3383-wip1.patch

> Comparison between descending row keys used in RVC is reverse
> -
>
> Key: PHOENIX-3383
> URL: https://issues.apache.org/jira/browse/PHOENIX-3383
> Project: Phoenix
>  Issue Type: Bug
>Reporter: James Taylor
>Assignee: James Taylor
>Priority: Major
>  Labels: DESC
> Fix For: 4.15.0
>
> Attachments: PHOENIX-3383-wip1.patch, PHOENIX-3383_wip.patch, 
> PHOENIX-3383_wip2.patch, PHOENIX-3383_wip3.patch
>
>
> See PHOENIX-3382, but the comparison for RVC with descending row key columns 
> is the reverse of what it should be.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Comment Edited] (PHOENIX-4688) Add kerberos authentication to python-phoenixdb

2018-06-27 Thread Lev Bronshtein (JIRA)


[ 
https://issues.apache.org/jira/browse/PHOENIX-4688?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16525303#comment-16525303
 ] 

Lev Bronshtein edited comment on PHOENIX-4688 at 6/27/18 7:54 PM:
--

Test is working 

2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
CREATING PQS CONNECTION
 2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
[[1, u'admin'], [2, u'user']]

now just need to clean it up. 
 * -How do I pass down proxy settings?  Or should I assume no proxy?- Inherited 
from callers shell
 * -The heimdal kerberos utilities apple ships does not support krb5.conf 
format miniKDC ships (minor variations)- Render a custom krb5.conf if MAC
 * Currently a shell script is needed to launch.  I tried taking out as much as 
possible but I still need to kinit
 * -Do we care if it only works on Linux?-  It will work on MAC OS too
 * currently only works with Anaconda, would rather see it with virtualenv

 

 


was (Author: lbronshtein):
Test is working 

2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
CREATING PQS CONNECTION
 2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
[[1, u'admin'], [2, u'user']]

now just need to clean it up. 
 * -How do I pass down proxy settings?  Or should I assume no proxy?- Inherited 
from callers shell
 * -The heimdal kerberos utilities apple ships does not support krb5.conf 
format miniKDC ships (minor variations)- Render a custom krb5.conf if MAC
 * Currently a shell script is needed to launch.  I tried taking out as much as 
possible but I still need to kinit
 * Do we care if it only works on Linux?
 * currently only works with Anaconda, would rather see it with virtualenv

 

 

> Add kerberos authentication to python-phoenixdb
> ---
>
> Key: PHOENIX-4688
> URL: https://issues.apache.org/jira/browse/PHOENIX-4688
> Project: Phoenix
>  Issue Type: Improvement
>Reporter: Lev Bronshtein
>Priority: Minor
>
> In its current state python-phoenixdv does not support support kerberos 
> authentication.  Using a modern python http library such as requests or 
> urllib it would be simple (if not trivial) to add this support.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Comment Edited] (PHOENIX-4688) Add kerberos authentication to python-phoenixdb

2018-06-27 Thread Lev Bronshtein (JIRA)


[ 
https://issues.apache.org/jira/browse/PHOENIX-4688?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16525303#comment-16525303
 ] 

Lev Bronshtein edited comment on PHOENIX-4688 at 6/27/18 7:48 PM:
--

Test is working 

2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
CREATING PQS CONNECTION
 2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
[[1, u'admin'], [2, u'user']]

now just need to clean it up. 
 * -How do I pass down proxy settings?  Or should I assume no proxy?- Inherited 
from callers shell
 * -The heimdal kerberos utilities apple ships does not support krb5.conf 
format miniKDC ships (minor variations)- Render a custom krb5.conf if MAC
 * Currently a shell script is needed to launch.  I tried taking out as much as 
possible but I still need to kinit
 * Do we care if it only works on Linux?
 * currently only works with Anaconda, would rather see it with virtualenv

 

 


was (Author: lbronshtein):
Test is working 

2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
CREATING PQS CONNECTION
 2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
[[1, u'admin'], [2, u'user']]

now just need to clean it up. 
 * -How do I pass down proxy settings?  Or should I assume no proxy?- Inherited 
from callers shell
 * The heimdal kerberos utilities apple ships does not support krb5.conf format 
miniKDC ships (minor variations)
 * Currently a shell script is needed to launch
 * Do we care if it only works on Linux?
 * currently only works with Anaconda, would rather see it with virtualenv

 

 

> Add kerberos authentication to python-phoenixdb
> ---
>
> Key: PHOENIX-4688
> URL: https://issues.apache.org/jira/browse/PHOENIX-4688
> Project: Phoenix
>  Issue Type: Improvement
>Reporter: Lev Bronshtein
>Priority: Minor
>
> In its current state python-phoenixdv does not support support kerberos 
> authentication.  Using a modern python http library such as requests or 
> urllib it would be simple (if not trivial) to add this support.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Comment Edited] (PHOENIX-4688) Add kerberos authentication to python-phoenixdb

2018-06-27 Thread Lev Bronshtein (JIRA)


[ 
https://issues.apache.org/jira/browse/PHOENIX-4688?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16525303#comment-16525303
 ] 

Lev Bronshtein edited comment on PHOENIX-4688 at 6/27/18 7:06 PM:
--

Test is working 

2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
CREATING PQS CONNECTION
 2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
[[1, u'admin'], [2, u'user']]

now just need to clean it up. 
 * -How do I pass down proxy settings?  Or should I assume no proxy?- Inherited 
from callers shell
 * The heimdal kerberos utilities apple ships does not support krb5.conf format 
miniKDC ships (minor variations)
 * Currently a shell script is needed to launch
 * Do we care if it only works on Linux?
 * currently only works with Anaconda, would rather see it with virtualenv

 

 


was (Author: lbronshtein):
Test is working 

2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
CREATING PQS CONNECTION
 2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
[[1, u'admin'], [2, u'user']]

now just need to clean it up. 
 * -How do I pass down proxy settings?  Or should I assume no proxy?- Inherited 
from callers shell
 * The heimdal kerberos utilities apple ships does not support krb5.conf format 
miniKDC ships (minor variations)
 * Currently a shell script is needed to launch
 * Do we care if it only works on Linux?

 

 

> Add kerberos authentication to python-phoenixdb
> ---
>
> Key: PHOENIX-4688
> URL: https://issues.apache.org/jira/browse/PHOENIX-4688
> Project: Phoenix
>  Issue Type: Improvement
>Reporter: Lev Bronshtein
>Priority: Minor
>
> In its current state python-phoenixdv does not support support kerberos 
> authentication.  Using a modern python http library such as requests or 
> urllib it would be simple (if not trivial) to add this support.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Comment Edited] (PHOENIX-4688) Add kerberos authentication to python-phoenixdb

2018-06-27 Thread Lev Bronshtein (JIRA)


[ 
https://issues.apache.org/jira/browse/PHOENIX-4688?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16525303#comment-16525303
 ] 

Lev Bronshtein edited comment on PHOENIX-4688 at 6/27/18 5:32 PM:
--

Test is working 

2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
CREATING PQS CONNECTION
 2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
[[1, u'admin'], [2, u'user']]

now just need to clean it up. 
 * -How do I pass down proxy settings?  Or should I assume no proxy?- Inherited 
from callers shell
 * The heimdal kerberos utilities apple ships does not support krb5.conf format 
miniKDC ships (minor variations)
 * Currently a shell script is needed to launch
 * Do we care if it only works on Linux?

 

 


was (Author: lbronshtein):
Test is working 

2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
CREATING PQS CONNECTION
 2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
[[1, u'admin'], [2, u'user']]

now just need to clean it up. 
 * -How do I pass down proxy settings?  Or should I assume no proxy?-
 * The heimdal kerberos utilities apple ships does not support krb5.conf format 
miniKDC ships (minor variations)
 * Currently a shell script is needed to launch
 * Do we care if it only works on Linux?

 

 

> Add kerberos authentication to python-phoenixdb
> ---
>
> Key: PHOENIX-4688
> URL: https://issues.apache.org/jira/browse/PHOENIX-4688
> Project: Phoenix
>  Issue Type: Improvement
>Reporter: Lev Bronshtein
>Priority: Minor
>
> In its current state python-phoenixdv does not support support kerberos 
> authentication.  Using a modern python http library such as requests or 
> urllib it would be simple (if not trivial) to add this support.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Comment Edited] (PHOENIX-4688) Add kerberos authentication to python-phoenixdb

2018-06-27 Thread Lev Bronshtein (JIRA)


[ 
https://issues.apache.org/jira/browse/PHOENIX-4688?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16525303#comment-16525303
 ] 

Lev Bronshtein edited comment on PHOENIX-4688 at 6/27/18 5:14 PM:
--

Test is working 

2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
CREATING PQS CONNECTION
 2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
[[1, u'admin'], [2, u'user']]

now just need to clean it up. 
 * -How do I pass down proxy settings?  Or should I assume no proxy?-
 * The heimdal kerberos utilities apple ships does not support krb5.conf format 
miniKDC ships (minor variations)
 * Currently a shell script is needed to launch
 * Do we care if it only works on Linux?

 

 


was (Author: lbronshtein):
Test is working 

2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
CREATING PQS CONNECTION
2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
[[1, u'admin'], [2, u'user']]

now just need to clean it up.  


 * How do I pass down proxy settings?  Or should I assume no proxy?
 * The heimdal kerberos utilities apple ships does not support krb5.conf format 
miniKDC ships (minor variations)
 * Currently a shell script is needed to launch
 * Do we care if it only works on Linux?

 

 

> Add kerberos authentication to python-phoenixdb
> ---
>
> Key: PHOENIX-4688
> URL: https://issues.apache.org/jira/browse/PHOENIX-4688
> Project: Phoenix
>  Issue Type: Improvement
>Reporter: Lev Bronshtein
>Priority: Minor
>
> In its current state python-phoenixdv does not support support kerberos 
> authentication.  Using a modern python http library such as requests or 
> urllib it would be simple (if not trivial) to add this support.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Commented] (PHOENIX-4688) Add kerberos authentication to python-phoenixdb

2018-06-27 Thread Lev Bronshtein (JIRA)


[ 
https://issues.apache.org/jira/browse/PHOENIX-4688?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16525303#comment-16525303
 ] 

Lev Bronshtein commented on PHOENIX-4688:
-

Test is working 

2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
CREATING PQS CONNECTION
2018-06-27 12:52:15,048 INFO [main] end2end.SecureQueryServerPhoenixDBIT(310): 
[[1, u'admin'], [2, u'user']]

now just need to clean it up.  


 * How do I pass down proxy settings?  Or should I assume no proxy?
 * The heimdal kerberos utilities apple ships does not support krb5.conf format 
miniKDC ships (minor variations)
 * Currently a shell script is needed to launch
 * Do we care if it only works on Linux?

 

 

> Add kerberos authentication to python-phoenixdb
> ---
>
> Key: PHOENIX-4688
> URL: https://issues.apache.org/jira/browse/PHOENIX-4688
> Project: Phoenix
>  Issue Type: Improvement
>Reporter: Lev Bronshtein
>Priority: Minor
>
> In its current state python-phoenixdv does not support support kerberos 
> authentication.  Using a modern python http library such as requests or 
> urllib it would be simple (if not trivial) to add this support.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Commented] (PHOENIX-4688) Add kerberos authentication to python-phoenixdb

2018-06-27 Thread Lev Bronshtein (JIRA)


[ 
https://issues.apache.org/jira/browse/PHOENIX-4688?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16525167#comment-16525167
 ] 

Lev Bronshtein commented on PHOENIX-4688:
-

Having to render a custom KDC entry kdc = tcp/localhost:56819

> Add kerberos authentication to python-phoenixdb
> ---
>
> Key: PHOENIX-4688
> URL: https://issues.apache.org/jira/browse/PHOENIX-4688
> Project: Phoenix
>  Issue Type: Improvement
>Reporter: Lev Bronshtein
>Priority: Minor
>
> In its current state python-phoenixdv does not support support kerberos 
> authentication.  Using a modern python http library such as requests or 
> urllib it would be simple (if not trivial) to add this support.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Commented] (PHOENIX-4688) Add kerberos authentication to python-phoenixdb

2018-06-27 Thread Lev Bronshtein (JIRA)


[ 
https://issues.apache.org/jira/browse/PHOENIX-4688?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16525150#comment-16525150
 ] 

Lev Bronshtein commented on PHOENIX-4688:
-

Enabling KRB5_DEBUG it looks like only UDP is being tried

2018-06-27 10:28:22,731 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 set-error: -1765328242: Reached end of credential caches
2018-06-27 10:28:22,731 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 set-error: -1765328243: Principal us...@example.com not 
found in any credential cache
2018-06-27 10:28:22,731 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 set-error: -1765328234: Encryption type 
des-cbc-md5-deprecated not supported
2018-06-27 10:28:22,731 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 Adding PA mech: ENCRYPTED_CHALLENGE
2018-06-27 10:28:22,731 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 Adding PA mech: ENCRYPTED_TIMESTAMP
2018-06-27 10:28:22,731 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 krb5_get_init_creds: loop 1
2018-06-27 10:28:22,731 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 KDC sent 0 patypes
2018-06-27 10:28:22,731 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 fast disabled, not doing any fast wrapping
2018-06-27 10:28:22,731 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 Trying to find service kdc for realm EXAMPLE.COM flags 0
2018-06-27 10:28:22,731 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 configuration file for realm EXAMPLE.COM found
2018-06-27 10:28:22,731 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 submissing new requests to new host
2018-06-27 10:28:22,731 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 host_create: setting hostname localhost
2018-06-27 10:28:22,731 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 connecting to host: udp ::1:56481 (localhost) tid: 0001
2018-06-27 10:28:22,732 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 host_create: setting hostname localhost
2018-06-27 10:28:22,732 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 Queuing host in future (in 3s), its the 2 address on the 
same name: udp 127.0.0.1:56481 (localhost) tid: 0002
2018-06-27 10:28:22,732 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 writing packet: udp ::1:56481 (localhost) tid: 0001
2018-06-27 10:28:22,732 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 reading packet: udp ::1:56481 (localhost) tid: 0001
2018-06-27 10:28:22,732 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 failed to get nbytes from socket, no bytes there?: udp 
::1:56481 (localhost) tid: 0001
2018-06-27 10:28:22,732 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 host disconnected: udp ::1:56481 (localhost) tid: 0001
2018-06-27 10:28:22,732 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 connecting to host: udp 127.0.0.1:56481 (localhost) tid: 
0002
2018-06-27 10:28:22,732 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 writing packet: udp 127.0.0.1:56481 (localhost) tid: 
0002
2018-06-27 10:28:22,732 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 reading packet: udp 127.0.0.1:56481 (localhost) tid: 
0002
2018-06-27 10:28:22,732 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 failed to get nbytes from socket, no bytes there?: udp 
127.0.0.1:56481 (localhost) tid: 0002
2018-06-27 10:28:22,732 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 host disconnected: udp 127.0.0.1:56481 (localhost) tid: 
0002
2018-06-27 10:28:22,732 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 no more hosts to send/recv packets to/from and no more 
hosts -> failure
2018-06-27 10:28:22,732 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 Configuration exists for realm EXAMPLE.COM, wont go to DNS
2018-06-27 10:28:22,732 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 out of hosts, waiting for replies
2018-06-27 10:28:22,732 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 no more hosts to send/recv packets to/from trying to 
pulling more hosts
2018-06-27 10:28:22,732 INFO [main] end2end.SecureQueryServerPhoenixDBIT(308): 
2018-06-27T10:28:22 set-error: -1765328228: unable to reach any KDC in realm 
EXAMPLE.COM, tried 1 KDC
2018-06-27 10:28:22,733 INFO [main] 

[jira] [Commented] (PHOENIX-3810) index_disable_timestamp not set by ALTER INDEX DISABLE

2018-06-27 Thread Ihor Krysenko (JIRA)


[ 
https://issues.apache.org/jira/browse/PHOENIX-3810?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16525130#comment-16525130
 ] 

Ihor Krysenko commented on PHOENIX-3810:


Hi all.

After ALTER INDEX REBUILD we have problem that index table is empty, and all 
queries which contains search criteria covered by this index will return 
nothing until DROP-CREATE this index.

> index_disable_timestamp not set by ALTER INDEX DISABLE
> --
>
> Key: PHOENIX-3810
> URL: https://issues.apache.org/jira/browse/PHOENIX-3810
> Project: Phoenix
>  Issue Type: Bug
>Affects Versions: 4.10.0
>Reporter: Vincent Poon
>Priority: Major
>
> index_disable_timestamp seems to be set to null after issuing a "ALTER INDEX 
> DISABLE".  As a result, the index rebuilding tasks don't start as expected.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Commented] (PHOENIX-4688) Add kerberos authentication to python-phoenixdb

2018-06-27 Thread Lev Bronshtein (JIRA)


[ 
https://issues.apache.org/jira/browse/PHOENIX-4688?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16525011#comment-16525011
 ] 

Lev Bronshtein commented on PHOENIX-4688:
-

I am closing in on the integration test.  Currently have the following issues
 * Unable to connect to miniKDC and perform a KINIT even after exporting 
KRB5_CONFIG to be whatever the miniKDC dumped

2018-06-27 08:51:26,641 INFO [main] end2end.SecureQueryServerPhoenixDBIT(312): 
[libdefaults]
2018-06-27 08:51:26,641 INFO [main] end2end.SecureQueryServerPhoenixDBIT(312): 
default_realm = EXAMPLE.COM
2018-06-27 08:51:26,641 INFO [main] end2end.SecureQueryServerPhoenixDBIT(312): 
udp_preference_limit = 1
2018-06-27 08:51:26,641 INFO [main] end2end.SecureQueryServerPhoenixDBIT(312):
2018-06-27 08:51:26,641 INFO [main] end2end.SecureQueryServerPhoenixDBIT(312): 
[realms]
2018-06-27 08:51:26,642 INFO [main] end2end.SecureQueryServerPhoenixDBIT(312): 
EXAMPLE.COM = {
2018-06-27 08:51:26,642 INFO [main] end2end.SecureQueryServerPhoenixDBIT(312): 
kdc = localhost:54339
2018-06-27 08:51:26,642 INFO [main] end2end.SecureQueryServerPhoenixDBIT(312): }
2018-06-27 08:51:26,642 INFO [main] end2end.SecureQueryServerPhoenixDBIT(312): 
RUNNING KINIT

2018-06-27 08:51:26,650 ERROR [main] end2end.SecureQueryServerPhoenixDBIT(316): 
+ kinit -kt 
/Users/lbronshtein/DEV/phoenix/phoenix-queryserver/target/SecureQueryServerPhoenixDBIT/keytabs/user1.keytab
 us...@example.com
2018-06-27 08:51:26,650 ERROR [main] end2end.SecureQueryServerPhoenixDBIT(316): 
kinit: krb5_get_init_creds: unable to reach any KDC in realm EXAMPLE.COM, tried 
1 KDC
2018-06-27 08:51:26,650 ERROR [main] end2end.SecureQueryServerPhoenixDBIT(316): 
+ cleanup
 *  There are a few places in the IT and the script it launches that hardcode 
paths so I need some pointers on figuring out paths relative to the IT test or 
perhaps another work around

> Add kerberos authentication to python-phoenixdb
> ---
>
> Key: PHOENIX-4688
> URL: https://issues.apache.org/jira/browse/PHOENIX-4688
> Project: Phoenix
>  Issue Type: Improvement
>Reporter: Lev Bronshtein
>Priority: Minor
>
> In its current state python-phoenixdv does not support support kerberos 
> authentication.  Using a modern python http library such as requests or 
> urllib it would be simple (if not trivial) to add this support.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Commented] (PHOENIX-4797) file not found or file exist exception when create global index use -snaopshot option

2018-06-27 Thread sailingYang (JIRA)


[ 
https://issues.apache.org/jira/browse/PHOENIX-4797?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16524746#comment-16524746
 ] 

sailingYang commented on PHOENIX-4797:
--

this is a simple change, and use uuid to create different dir and avoid confict。

> file not found or file exist exception when create global index use 
> -snaopshot option
> -
>
> Key: PHOENIX-4797
> URL: https://issues.apache.org/jira/browse/PHOENIX-4797
> Project: Phoenix
>  Issue Type: Bug
>Affects Versions: 4.13.2-cdh5.11.2
>Reporter: sailingYang
>Priority: Major
>
> when use indextool with -snapshot option and if the mapreduce create multi 
> mapper.this will cause the hdfs file not found or  hdfs file exist 
> exception。finally the mapreduce task must be failed. because the mapper use 
> the same restore work dir.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Commented] (PHOENIX-4797) file not found or file exist exception when create global index use -snaopshot option

2018-06-27 Thread sailingYang (JIRA)


[ 
https://issues.apache.org/jira/browse/PHOENIX-4797?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16524735#comment-16524735
 ] 

sailingYang commented on PHOENIX-4797:
--

[https://github.com/apache/phoenix/pull/306]

 

> file not found or file exist exception when create global index use 
> -snaopshot option
> -
>
> Key: PHOENIX-4797
> URL: https://issues.apache.org/jira/browse/PHOENIX-4797
> Project: Phoenix
>  Issue Type: Bug
>Affects Versions: 4.13.2-cdh5.11.2
>Reporter: sailingYang
>Priority: Major
>
> when use indextool with -snapshot option and if the mapreduce create multi 
> mapper.this will cause the hdfs file not found or  hdfs file exist 
> exception。finally the mapreduce task must be failed. because the mapper use 
> the same restore work dir.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[jira] [Commented] (PHOENIX-4797) file not found or file exist exception when create global index use -snaopshot option

2018-06-27 Thread ASF GitHub Bot (JIRA)


[ 
https://issues.apache.org/jira/browse/PHOENIX-4797?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16524732#comment-16524732
 ] 

ASF GitHub Bot commented on PHOENIX-4797:
-

GitHub user 492066199 opened a pull request:

https://github.com/apache/phoenix/pull/306

PHOENIX-4797  file not found or file exist exception when create glob…

when create global index use -snaopshot option in mapreduce task
multi mapper use the same restore dir to work with snapshot.
1,mapper will remove the file  after mapper task as the other mapper will 
read the file
2,mapper will create the file when begin mapper task as the other mapper 
will create the file too

the 1 will cause the file not found and the 2 will case the file is exists
I change this to let mappers use different dirs to work with snapshot,after 
this path,the  -snapshot option can works well .

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/492066199/phoenix master

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/phoenix/pull/306.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #306


commit 2eebc1af80af1bad6074ce36659e9c861a68db83
Author: 492066199 <492066199@...>
Date:   2018-06-27T07:52:42Z

PHOENIX-4797  file not found or file exist exception when create global 
index use -snaopshot option




> file not found or file exist exception when create global index use 
> -snaopshot option
> -
>
> Key: PHOENIX-4797
> URL: https://issues.apache.org/jira/browse/PHOENIX-4797
> Project: Phoenix
>  Issue Type: Bug
>Affects Versions: 4.13.2-cdh5.11.2
>Reporter: sailingYang
>Priority: Major
>
> when use indextool with -snapshot option and if the mapreduce create multi 
> mapper.this will cause the hdfs file not found or  hdfs file exist 
> exception。finally the mapreduce task must be failed. because the mapper use 
> the same restore work dir.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)


[GitHub] phoenix pull request #306: PHOENIX-4797 file not found or file exist excepti...

2018-06-27 Thread 492066199
GitHub user 492066199 opened a pull request:

https://github.com/apache/phoenix/pull/306

PHOENIX-4797  file not found or file exist exception when create glob…

when create global index use -snaopshot option in mapreduce task
multi mapper use the same restore dir to work with snapshot.
1,mapper will remove the file  after mapper task as the other mapper will 
read the file
2,mapper will create the file when begin mapper task as the other mapper 
will create the file too

the 1 will cause the file not found and the 2 will case the file is exists
I change this to let mappers use different dirs to work with snapshot,after 
this path,the  -snapshot option can works well .

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/492066199/phoenix master

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/phoenix/pull/306.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #306


commit 2eebc1af80af1bad6074ce36659e9c861a68db83
Author: 492066199 <492066199@...>
Date:   2018-06-27T07:52:42Z

PHOENIX-4797  file not found or file exist exception when create global 
index use -snaopshot option




---


[jira] [Created] (PHOENIX-4797) file not found or file exist exception when create global index use -snaopshot option

2018-06-27 Thread sailingYang (JIRA)
sailingYang created PHOENIX-4797:


 Summary: file not found or file exist exception when create global 
index use -snaopshot option
 Key: PHOENIX-4797
 URL: https://issues.apache.org/jira/browse/PHOENIX-4797
 Project: Phoenix
  Issue Type: Bug
Affects Versions: 4.13.2-cdh5.11.2
Reporter: sailingYang


when use indextool with -snapshot option and if the mapreduce create multi 
mapper.this will cause the hdfs file not found or  hdfs file exist 
exception。finally the mapreduce task must be failed. because the mapper use the 
same restore work dir.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)