With HBASE-3194 (https://issues.apache.org/jira/browse/HBASE-3194), I believe HBase 0.90 should run on CDH3B3, as long as you do _not_ have kerberos authentication setup for Hadoop (hadoop.security.authentication=kerberos in core-site.xml). If you wish to use kerberos authentication, you'll need to use CDH3B3 HBase.
When fixing HBASE-3194, I only tested against Y! secure Hadoop (0.20.S), but the same changes are in CDH3B3 Hadoop, so it should also work there. I think we should continue to accommodate both secure and insecure Hadoop versions as much as we can, as people will likely want to run both for the foreseeable future. Back to the original question, though, I think it's important to have an ASF 0.20-append release to point users to as well. Are there any plans in Hadoop-land for a 0.20-append release? --gh On Tue, Dec 21, 2010 at 11:41 PM, Bill Graham <[email protected]> wrote: > Hi Andrew, > > Just to make sure I'm clear, are you saying that HBase 0.90.0 is > incompatible with CDH3b3 due to the security changes? > > We're just getting going with HBase and have been running 0.90.0rc1 on > an un-patched version of Hadoop in dev. We were planning on upgrading > to CDH3b3 to get the sync patches. > > thanks, > Bill > > On Tue, Dec 21, 2010 at 6:44 PM, Andrew Purtell <[email protected]> > wrote: > > The latest CDH3 beta includes security changes that currently HBase 0.90 > and trunk don't incorporate. Of course we can help out with clear HBase > issues, but for security exceptions or similar, what about that? Do we draw > a line? Where? > > > > I've looked over the CDH3B3 installation documentation but have not > installed it nor do presently use it. > > > > If we draw a line, then as an ASF community we should have a fallback > option somewhere in ASF-land for the user to try. Vanilla Hadoop is not > sufficient for HBase. Therefore, I propose we make a Hadoop 0.20-append > tarball available. > > > > Best regards, > > > > - Andy > > > > Problems worthy of attack prove their worth by hitting back. > > - Piet Hein (via Tom White) > > > > > > > > >
