Author: elserj Date: Thu Aug 11 03:03:38 2016 New Revision: 1755899 URL: http://svn.apache.org/viewvc?rev=1755899&view=rev Log: PHOENIX-3171 Stub release notes for 4.8.0
Modified: phoenix/site/publish/release_notes.html phoenix/site/source/src/site/markdown/release_notes.md Modified: phoenix/site/publish/release_notes.html URL: http://svn.apache.org/viewvc/phoenix/site/publish/release_notes.html?rev=1755899&r1=1755898&r2=1755899&view=diff ============================================================================== --- phoenix/site/publish/release_notes.html (original) +++ phoenix/site/publish/release_notes.html Thu Aug 11 03:03:38 2016 @@ -1,7 +1,7 @@ <!DOCTYPE html> <!-- - Generated by Apache Maven Doxia at 2016-07-18 + Generated by Apache Maven Doxia at 2016-08-10 Rendered using Reflow Maven Skin 1.1.0 (http://andriusvelykis.github.io/reflow-maven-skin) --> <html xml:lang="en" lang="en"> @@ -152,6 +152,11 @@ <p>Release notes provide details on issues and their fixes which may have an impact on prior Phoenix behavior. For some issues an upgrade may be required to be performed for a fix to take affect. See below for directions specific to a particular release.</p> <div class="section"> <div class="section"> + <h3 id="Phoenix-4.8.0_Release_Notes"><u>Phoenix-4.8.0 Release Notes</u></h3> + <p><a class="externalLink" href="https://issues.apache.org/jira/browse/PHOENIX-3164">PHOENIX-3164</a> is a relatively serious bug that affects the <a class="externalLink" href="http://phoenix.apache.org/server.html">Phoenix Query Server</a> deployed with âsecurity enabledâ (Kerberos or Active Directory). Due to another late-game change in the 4.8.0 release as well as an issue with the use of Hadoopâs UserGroupInformation class, every âclient sessionâ to the Phoenix Query Server with security enabled will result in a new instance of the Phoenix JDBC driver <tt>PhoenixConnection</tt> (and other related classes). This ultimately results in a new connection to ZooKeeper for each âclient sessionâ.</p> + <p>Within a short amount of time of active use with the Phoenix Query Server creating a new ZooKeeper connection for each âclient sessionâ, the number of ZooKeeper connections will have grown rapidly likely triggering ZooKeeperâs built-in denial of service protection (<a class="externalLink" href="https://zookeeper.apache.org/doc/r3.4.8/zookeeperAdmin.html">maxClientCnxns</a>). This will cause all future connections to ZooKeeper by the host running the Phoenix Query Server to be dropped. This would prevent all HBase client API calls which need to access ZooKeeper from completing.</p> + </div> + <div class="section"> <h3 id="Phoenix-4.5.0_Release_Notes"><u>Phoenix-4.5.0 Release Notes</u></h3> <p>Both <a class="externalLink" href="https://issues.apache.org/jira/browse/PHOENIX-2067">PHOENIX-2067</a> and <a class="externalLink" href="https://issues.apache.org/jira/browse/PHOENIX-2120">PHOENIX-2120</a> cause rows to not be ordered correctly for the following types of columns:</p> <ul> Modified: phoenix/site/source/src/site/markdown/release_notes.md URL: http://svn.apache.org/viewvc/phoenix/site/source/src/site/markdown/release_notes.md?rev=1755899&r1=1755898&r2=1755899&view=diff ============================================================================== --- phoenix/site/source/src/site/markdown/release_notes.md (original) +++ phoenix/site/source/src/site/markdown/release_notes.md Thu Aug 11 03:03:38 2016 @@ -4,6 +4,23 @@ Release notes provide details on issues Phoenix behavior. For some issues an upgrade may be required to be performed for a fix to take affect. See below for directions specific to a particular release. +###<u>Phoenix-4.8.0 Release Notes</u> + +[PHOENIX-3164](https://issues.apache.org/jira/browse/PHOENIX-3164) is a relatively serious +bug that affects the [Phoenix Query Server](http://phoenix.apache.org/server.html) +deployed with "security enabled" (Kerberos or Active Directory). Due to another late-game +change in the 4.8.0 release as well as an issue with the use of Hadoop's UserGroupInformation +class, every "client session" to the Phoenix Query Server with security enabled will +result in a new instance of the Phoenix JDBC driver `PhoenixConnection` (and other related +classes). This ultimately results in a new connection to ZooKeeper for each "client session". + +Within a short amount of time of active use with the Phoenix Query Server creating a new ZooKeeper +connection for each "client session", the number of ZooKeeper connections will have grown rapidly +likely triggering ZooKeeper's built-in denial of service protection +([maxClientCnxns](https://zookeeper.apache.org/doc/r3.4.8/zookeeperAdmin.html)). This +will cause all future connections to ZooKeeper by the host running the Phoenix Query Server to +be dropped. This would prevent all HBase client API calls which need to access ZooKeeper +from completing. ###<u>Phoenix-4.5.0 Release Notes</u> Both [PHOENIX-2067](https://issues.apache.org/jira/browse/PHOENIX-2067) and