Re: [Discuss] Datasource v2 support for Kerberos

2018-09-24 Thread Wenchen Fan
> All of the Kerberos options already exist in their own legacy locations though - changing their location could break a lot of systems. We can define the prefix for shared options, and we can strip the prefix when passing these options to the data source. Will this work for your case? On Tue,

Re: [Discuss] Datasource v2 support for Kerberos

2018-09-24 Thread tigerquoll
I like the shared namespace option better then the white listing option for any newly defined configuration information. All of the Kerberos options already exist in their own legacy locations though - changing their location could break a lot of systems. Perhaps we can use the shared

[DISCUSS] Cascades style CBO for Spark SQL

2018-09-24 Thread 吴晓菊
Hi All, Current Spark CBO implements a cost based multi-way join reordering algorithm based on the System-R’s paper [Access Path-SIGMOD’79] . When building m-way joins, it uses a bottom-up approach and put all items

unsubscribe

2018-09-24 Thread Ryan Adams
unsubscribe

[CORE] Review needed for spark standalone PR

2018-09-24 Thread Behroz Sikander
Hello, Could someone who is familiar with spark standalone please review my change? https://github.com/apache/spark/pull/21816 Any help would be much appreciated. Regards, Behroz -- Sent from: http://apache-spark-developers-list.1001551.n3.nabble.com/

[CORE] Review needed for spark standalone PR

2018-09-24 Thread Behroz Sikander
Hello, Could someone who is familiar with spark standalone please review my change? https://github.com/apache/spark/pull/21816 Any help would be much appreciated. Regards, Behroz -- Sent from: http://apache-spark-developers-list.1001551.n3.nabble.com/

Re: [Discuss] Datasource v2 support for Kerberos

2018-09-24 Thread Ryan Blue
Dale, what do you think about the option that I suggested? I think that's different from the ones that you just listed. Basically, the idea is to have a "shared" set of options that are passed to all sources. This would not be a whitelist, it would be a namespace that ends up passed in

[build system] jenkins wedged post-SSL cert fiasco, restarting now

2018-09-24 Thread shane knapp
jenkins will be back up and building Real Soon Now[tm]... sorry for the inconvenience! -- Shane Knapp UC Berkeley EECS Research / RISELab Staff Technical Lead https://rise.cs.berkeley.edu

Re: Something wrong of Jenkins proxy

2018-09-24 Thread shane knapp
cert renewed and jenkins is reachable now. On Sun, Sep 23, 2018 at 8:58 PM, shane knapp wrote: > i don't manage the certs on the box doing the reverse proxy, so i've > reached out to the proper party and will hopefully things will be sorted by > early tomorrow. > > On Sun, Sep 23, 2018 at 8:37