Author: elserj
Date: Thu Aug 11 03:03:38 2016
New Revision: 1755899

URL: http://svn.apache.org/viewvc?rev=1755899&view=rev
Log:
PHOENIX-3171 Stub release notes for 4.8.0

Modified:
    phoenix/site/publish/release_notes.html
    phoenix/site/source/src/site/markdown/release_notes.md

Modified: phoenix/site/publish/release_notes.html
URL: 
http://svn.apache.org/viewvc/phoenix/site/publish/release_notes.html?rev=1755899&r1=1755898&r2=1755899&view=diff
==============================================================================
--- phoenix/site/publish/release_notes.html (original)
+++ phoenix/site/publish/release_notes.html Thu Aug 11 03:03:38 2016
@@ -1,7 +1,7 @@
 
 <!DOCTYPE html>
 <!--
- Generated by Apache Maven Doxia at 2016-07-18
+ Generated by Apache Maven Doxia at 2016-08-10
  Rendered using Reflow Maven Skin 1.1.0 
(http://andriusvelykis.github.io/reflow-maven-skin)
 -->
 <html  xml:lang="en" lang="en">
@@ -152,6 +152,11 @@
 <p>Release notes provide details on issues and their fixes which may have an 
impact on prior Phoenix behavior. For some issues an upgrade may be required to 
be performed for a fix to take affect. See below for directions specific to a 
particular release.</p> 
 <div class="section"> 
  <div class="section"> 
+  <h3 id="Phoenix-4.8.0_Release_Notes"><u>Phoenix-4.8.0 Release Notes</u></h3> 
+  <p><a class="externalLink" 
href="https://issues.apache.org/jira/browse/PHOENIX-3164";>PHOENIX-3164</a> is a 
relatively serious bug that affects the <a class="externalLink" 
href="http://phoenix.apache.org/server.html";>Phoenix Query Server</a> deployed 
with “security enabled” (Kerberos or Active Directory). Due to another 
late-game change in the 4.8.0 release as well as an issue with the use of 
Hadoop’s UserGroupInformation class, every “client session” to the 
Phoenix Query Server with security enabled will result in a new instance of the 
Phoenix JDBC driver <tt>PhoenixConnection</tt> (and other related classes). 
This ultimately results in a new connection to ZooKeeper for each “client 
session”.</p> 
+  <p>Within a short amount of time of active use with the Phoenix Query Server 
creating a new ZooKeeper connection for each “client session”, the number 
of ZooKeeper connections will have grown rapidly likely triggering 
ZooKeeper’s built-in denial of service protection (<a class="externalLink" 
href="https://zookeeper.apache.org/doc/r3.4.8/zookeeperAdmin.html";>maxClientCnxns</a>).
 This will cause all future connections to ZooKeeper by the host running the 
Phoenix Query Server to be dropped. This would prevent all HBase client API 
calls which need to access ZooKeeper from completing.</p> 
+ </div> 
+ <div class="section"> 
   <h3 id="Phoenix-4.5.0_Release_Notes"><u>Phoenix-4.5.0 Release Notes</u></h3> 
   <p>Both <a class="externalLink" 
href="https://issues.apache.org/jira/browse/PHOENIX-2067";>PHOENIX-2067</a> and 
<a class="externalLink" 
href="https://issues.apache.org/jira/browse/PHOENIX-2120";>PHOENIX-2120</a> 
cause rows to not be ordered correctly for the following types of columns:</p> 
   <ul> 

Modified: phoenix/site/source/src/site/markdown/release_notes.md
URL: 
http://svn.apache.org/viewvc/phoenix/site/source/src/site/markdown/release_notes.md?rev=1755899&r1=1755898&r2=1755899&view=diff
==============================================================================
--- phoenix/site/source/src/site/markdown/release_notes.md (original)
+++ phoenix/site/source/src/site/markdown/release_notes.md Thu Aug 11 03:03:38 
2016
@@ -4,6 +4,23 @@ Release notes provide details on issues
 Phoenix behavior. For some issues an upgrade may be required to be performed 
for a fix to
 take affect. See below for directions specific to a particular release.
 
+###<u>Phoenix-4.8.0 Release Notes</u>
+
+[PHOENIX-3164](https://issues.apache.org/jira/browse/PHOENIX-3164) is a 
relatively serious
+bug that affects the [Phoenix Query 
Server](http://phoenix.apache.org/server.html)
+deployed with "security enabled" (Kerberos or Active Directory). Due to 
another late-game
+change in the 4.8.0 release as well as an issue with the use of Hadoop's 
UserGroupInformation
+class, every "client session" to the Phoenix Query Server with security 
enabled will
+result in a new instance of the Phoenix JDBC driver `PhoenixConnection` (and 
other related
+classes). This ultimately results in a new connection to ZooKeeper for each 
"client session".
+
+Within a short amount of time of active use with the Phoenix Query Server 
creating a new ZooKeeper
+connection for each "client session", the number of ZooKeeper connections will 
have grown rapidly
+likely triggering ZooKeeper's built-in denial of service protection
+([maxClientCnxns](https://zookeeper.apache.org/doc/r3.4.8/zookeeperAdmin.html)).
 This
+will cause all future connections to ZooKeeper by the host running the Phoenix 
Query Server to
+be dropped. This would prevent all HBase client API calls which need to access 
ZooKeeper
+from completing.
 
 ###<u>Phoenix-4.5.0 Release Notes</u>
 Both [PHOENIX-2067](https://issues.apache.org/jira/browse/PHOENIX-2067) and


Reply via email to