[ 
https://issues.apache.org/jira/browse/HIVE-21894?focusedWorklogId=442366&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-442366
 ]

ASF GitHub Bot logged work on HIVE-21894:
-----------------------------------------

                Author: ASF GitHub Bot
            Created on: 07/Jun/20 00:26
            Start Date: 07/Jun/20 00:26
    Worklog Time Spent: 10m 
      Work Description: github-actions[bot] commented on pull request #839:
URL: https://github.com/apache/hive/pull/839#issuecomment-640136392


   This pull request has been automatically marked as stale because it has not 
had recent activity. It will be closed if no further activity occurs.
   Feel free to reach out on the d...@hive.apache.org list if the patch is in 
need of reviews.


----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


Issue Time Tracking
-------------------

    Worklog Id:     (was: 442366)
    Time Spent: 20m  (was: 10m)

> Hadoop credential password storage for the Kafka Storage handler when 
> security is SSL
> -------------------------------------------------------------------------------------
>
>                 Key: HIVE-21894
>                 URL: https://issues.apache.org/jira/browse/HIVE-21894
>             Project: Hive
>          Issue Type: Improvement
>          Components: kafka integration
>    Affects Versions: 4.0.0
>            Reporter: Kristopher Kane
>            Assignee: Justin Leet
>            Priority: Minor
>              Labels: pull-request-available
>             Fix For: 4.0.0
>
>         Attachments: HIVE-21894.1.patch, HIVE-21894.2.patch
>
>          Time Spent: 20m
>  Remaining Estimate: 0h
>
> The Kafka storage handler assumes that if the Hive service is configured with 
> Kerberos then the destination Kafka cluster is also secured with the same 
> Kerberos realm or trust of realms.  The security configuration of the Kafka 
> client can be overwritten due to the additive operations of the Kafka client 
> configs, but, the only way to specify SSL and the keystore/truststore 
> user/pass is via plain text table properties. 
> This ticket proposes adding Hadoop credential security to the Kafka storage 
> handler in support of SSL secured Kafka clusters.  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to