[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals
[ https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14138817#comment-14138817 ] Hudson commented on HADOOP-10982: - SUCCESS: Integrated in Hadoop-Yarn-trunk #684 (See [https://builds.apache.org/job/Hadoop-Yarn-trunk/684/]) HADOOP-10982 (tucu: rev d9a86031a077184d429dd5463e7da156df112011) * hadoop-common-project/hadoop-kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java * hadoop-common-project/hadoop-kms/src/site/apt/index.apt.vm * hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java Revert HADOOP-10982 (tucu: rev 3f8f860cc65e179dd5766fea4d21cf30fa4b96e3) * hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java * hadoop-common-project/hadoop-kms/src/site/apt/index.apt.vm * hadoop-common-project/hadoop-kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java KMS: Support for multiple Kerberos principals - Key: HADOOP-10982 URL: https://issues.apache.org/jira/browse/HADOOP-10982 Project: Hadoop Common Issue Type: Improvement Affects Versions: 3.0.0 Reporter: Andrew Wang Assignee: Alejandro Abdelnur Attachments: HADOOP-10982.patch, HADOOP-10982.patch, HADOOP-10982.patch The Key Management Server should support multiple Kerberos principals. This is required for KMS multi instance setups behind a VIP. In such scenarios there must a principal with the VIP hostname and one with the actual hostname of the KMS instance. Regular users will use the VIP entry point, monitoring agents must hit a specific instance. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals
[ https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14138945#comment-14138945 ] Hudson commented on HADOOP-10982: - FAILURE: Integrated in Hadoop-Mapreduce-trunk #1900 (See [https://builds.apache.org/job/Hadoop-Mapreduce-trunk/1900/]) HADOOP-10982 (tucu: rev d9a86031a077184d429dd5463e7da156df112011) * hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java * hadoop-common-project/hadoop-kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java * hadoop-common-project/hadoop-kms/src/site/apt/index.apt.vm Revert HADOOP-10982 (tucu: rev 3f8f860cc65e179dd5766fea4d21cf30fa4b96e3) * hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java * hadoop-common-project/hadoop-kms/src/site/apt/index.apt.vm * hadoop-common-project/hadoop-kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java KMS: Support for multiple Kerberos principals - Key: HADOOP-10982 URL: https://issues.apache.org/jira/browse/HADOOP-10982 Project: Hadoop Common Issue Type: Improvement Affects Versions: 3.0.0 Reporter: Andrew Wang Assignee: Alejandro Abdelnur Attachments: HADOOP-10982.patch, HADOOP-10982.patch, HADOOP-10982.patch The Key Management Server should support multiple Kerberos principals. This is required for KMS multi instance setups behind a VIP. In such scenarios there must a principal with the VIP hostname and one with the actual hostname of the KMS instance. Regular users will use the VIP entry point, monitoring agents must hit a specific instance. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals
[ https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14138958#comment-14138958 ] Hudson commented on HADOOP-10982: - FAILURE: Integrated in Hadoop-Hdfs-trunk #1875 (See [https://builds.apache.org/job/Hadoop-Hdfs-trunk/1875/]) HADOOP-10982 (tucu: rev d9a86031a077184d429dd5463e7da156df112011) * hadoop-common-project/hadoop-kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java * hadoop-common-project/hadoop-kms/src/site/apt/index.apt.vm * hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java Revert HADOOP-10982 (tucu: rev 3f8f860cc65e179dd5766fea4d21cf30fa4b96e3) * hadoop-common-project/hadoop-kms/src/site/apt/index.apt.vm * hadoop-common-project/hadoop-kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java * hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java KMS: Support for multiple Kerberos principals - Key: HADOOP-10982 URL: https://issues.apache.org/jira/browse/HADOOP-10982 Project: Hadoop Common Issue Type: Improvement Affects Versions: 3.0.0 Reporter: Andrew Wang Assignee: Alejandro Abdelnur Attachments: HADOOP-10982.patch, HADOOP-10982.patch, HADOOP-10982.patch The Key Management Server should support multiple Kerberos principals. This is required for KMS multi instance setups behind a VIP. In such scenarios there must a principal with the VIP hostname and one with the actual hostname of the KMS instance. Regular users will use the VIP entry point, monitoring agents must hit a specific instance. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals
[ https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14139074#comment-14139074 ] Alejandro Abdelnur commented on HADOOP-10982: - the test failure reports java.lang.NoClassDefFoundError: org/apache/hadoop/crypto/key/kms/server/TestKMS$5$3, it seems a JDK issue locally it does not happen. Doing some further testing. KMS: Support for multiple Kerberos principals - Key: HADOOP-10982 URL: https://issues.apache.org/jira/browse/HADOOP-10982 Project: Hadoop Common Issue Type: Improvement Affects Versions: 3.0.0 Reporter: Andrew Wang Assignee: Alejandro Abdelnur Attachments: HADOOP-10982.patch, HADOOP-10982.patch, HADOOP-10982.patch The Key Management Server should support multiple Kerberos principals. This is required for KMS multi instance setups behind a VIP. In such scenarios there must a principal with the VIP hostname and one with the actual hostname of the KMS instance. Regular users will use the VIP entry point, monitoring agents must hit a specific instance. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals
[ https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14139245#comment-14139245 ] Alejandro Abdelnur commented on HADOOP-10982: - OK, this is weird, I've logged in to the jenkins-slave (asf906.gq1.ygridcore.net) and I can run the testcase without any failure with/without the patch. KMS: Support for multiple Kerberos principals - Key: HADOOP-10982 URL: https://issues.apache.org/jira/browse/HADOOP-10982 Project: Hadoop Common Issue Type: Improvement Affects Versions: 3.0.0 Reporter: Andrew Wang Assignee: Alejandro Abdelnur Attachments: HADOOP-10982.patch, HADOOP-10982.patch, HADOOP-10982.patch The Key Management Server should support multiple Kerberos principals. This is required for KMS multi instance setups behind a VIP. In such scenarios there must a principal with the VIP hostname and one with the actual hostname of the KMS instance. Regular users will use the VIP entry point, monitoring agents must hit a specific instance. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals
[ https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14139324#comment-14139324 ] Hadoop QA commented on HADOOP-10982: {color:red}-1 overall{color}. Here are the results of testing the latest attachment http://issues.apache.org/jira/secure/attachment/12669617/HADOOP-10982.patch against trunk revision a3d9934. {color:green}+1 @author{color}. The patch does not contain any @author tags. {color:green}+1 tests included{color}. The patch appears to include 1 new or modified test files. {color:green}+1 javac{color}. The applied patch does not increase the total number of javac compiler warnings. {color:green}+1 javadoc{color}. There were no new javadoc warning messages. {color:green}+1 eclipse:eclipse{color}. The patch built with eclipse:eclipse. {color:green}+1 findbugs{color}. The patch does not introduce any new Findbugs (version 2.0.3) warnings. {color:green}+1 release audit{color}. The applied patch does not increase the total number of release audit warnings. {color:red}-1 core tests{color}. The patch failed these unit tests in hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms: org.apache.hadoop.crypto.key.kms.server.TestKMS {color:green}+1 contrib tests{color}. The patch passed contrib unit tests. Test results: https://builds.apache.org/job/PreCommit-HADOOP-Build/4758//testReport/ Console output: https://builds.apache.org/job/PreCommit-HADOOP-Build/4758//console This message is automatically generated. KMS: Support for multiple Kerberos principals - Key: HADOOP-10982 URL: https://issues.apache.org/jira/browse/HADOOP-10982 Project: Hadoop Common Issue Type: Improvement Affects Versions: 3.0.0 Reporter: Andrew Wang Assignee: Alejandro Abdelnur Attachments: HADOOP-10982.patch, HADOOP-10982.patch, HADOOP-10982.patch The Key Management Server should support multiple Kerberos principals. This is required for KMS multi instance setups behind a VIP. In such scenarios there must a principal with the VIP hostname and one with the actual hostname of the KMS instance. Regular users will use the VIP entry point, monitoring agents must hit a specific instance. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals
[ https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14139501#comment-14139501 ] Aaron T. Myers commented on HADOOP-10982: - Sounds like a good plan. +1 pending Jenkins KMS: Support for multiple Kerberos principals - Key: HADOOP-10982 URL: https://issues.apache.org/jira/browse/HADOOP-10982 Project: Hadoop Common Issue Type: Improvement Affects Versions: 3.0.0 Reporter: Andrew Wang Assignee: Alejandro Abdelnur Attachments: HADOOP-10982.patch, HADOOP-10982.patch, HADOOP-10982.patch, HADOOP-10982.patch The Key Management Server should support multiple Kerberos principals. This is required for KMS multi instance setups behind a VIP. In such scenarios there must a principal with the VIP hostname and one with the actual hostname of the KMS instance. Regular users will use the VIP entry point, monitoring agents must hit a specific instance. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals
[ https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14139533#comment-14139533 ] Hadoop QA commented on HADOOP-10982: {color:red}-1 overall{color}. Here are the results of testing the latest attachment http://issues.apache.org/jira/secure/attachment/12669617/HADOOP-10982.patch against trunk revision 474f116. {color:green}+1 @author{color}. The patch does not contain any @author tags. {color:green}+1 tests included{color}. The patch appears to include 1 new or modified test files. {color:green}+1 javac{color}. The applied patch does not increase the total number of javac compiler warnings. {color:green}+1 javadoc{color}. There were no new javadoc warning messages. {color:green}+1 eclipse:eclipse{color}. The patch built with eclipse:eclipse. {color:green}+1 findbugs{color}. The patch does not introduce any new Findbugs (version 2.0.3) warnings. {color:green}+1 release audit{color}. The applied patch does not increase the total number of release audit warnings. {color:red}-1 core tests{color}. The patch failed these unit tests in hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms: org.apache.hadoop.metrics2.impl.TestMetricsSystemImpl org.apache.hadoop.crypto.key.kms.server.TestKMS The following test timeouts occurred in hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms: org.apache.hadoop.crypto.key.kms.server.TestKMSWithZK {color:green}+1 contrib tests{color}. The patch passed contrib unit tests. Test results: https://builds.apache.org/job/PreCommit-HADOOP-Build/4761//testReport/ Console output: https://builds.apache.org/job/PreCommit-HADOOP-Build/4761//console This message is automatically generated. KMS: Support for multiple Kerberos principals - Key: HADOOP-10982 URL: https://issues.apache.org/jira/browse/HADOOP-10982 Project: Hadoop Common Issue Type: Improvement Affects Versions: 3.0.0 Reporter: Andrew Wang Assignee: Alejandro Abdelnur Attachments: HADOOP-10982.patch, HADOOP-10982.patch, HADOOP-10982.patch, HADOOP-10982.patch The Key Management Server should support multiple Kerberos principals. This is required for KMS multi instance setups behind a VIP. In such scenarios there must a principal with the VIP hostname and one with the actual hostname of the KMS instance. Regular users will use the VIP entry point, monitoring agents must hit a specific instance. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals
[ https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14139568#comment-14139568 ] Hadoop QA commented on HADOOP-10982: {color:red}-1 overall{color}. Here are the results of testing the latest attachment http://issues.apache.org/jira/secure/attachment/12669800/HADOOP-10982.patch against trunk revision 474f116. {color:green}+1 @author{color}. The patch does not contain any @author tags. {color:red}-1 tests included{color}. The patch doesn't appear to include any new or modified tests. Please justify why no new tests are needed for this patch. Also please list what manual steps were performed to verify this patch. {color:green}+1 javac{color}. The applied patch does not increase the total number of javac compiler warnings. {color:green}+1 javadoc{color}. There were no new javadoc warning messages. {color:green}+1 eclipse:eclipse{color}. The patch built with eclipse:eclipse. {color:green}+1 findbugs{color}. The patch does not introduce any new Findbugs (version 2.0.3) warnings. {color:green}+1 release audit{color}. The applied patch does not increase the total number of release audit warnings. {color:red}-1 core tests{color}. The following test timeouts occurred in hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms: org.apache.hadoop.crypto.key.kms.server.TestKMSWithZK The test build failed in hadoop-common-project/hadoop-common {color:green}+1 contrib tests{color}. The patch passed contrib unit tests. Test results: https://builds.apache.org/job/PreCommit-HADOOP-Build/4762//testReport/ Console output: https://builds.apache.org/job/PreCommit-HADOOP-Build/4762//console This message is automatically generated. KMS: Support for multiple Kerberos principals - Key: HADOOP-10982 URL: https://issues.apache.org/jira/browse/HADOOP-10982 Project: Hadoop Common Issue Type: Improvement Affects Versions: 3.0.0 Reporter: Andrew Wang Assignee: Alejandro Abdelnur Attachments: HADOOP-10982.patch, HADOOP-10982.patch, HADOOP-10982.patch, HADOOP-10982.patch The Key Management Server should support multiple Kerberos principals. This is required for KMS multi instance setups behind a VIP. In such scenarios there must a principal with the VIP hostname and one with the actual hostname of the KMS instance. Regular users will use the VIP entry point, monitoring agents must hit a specific instance. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals
[ https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14139581#comment-14139581 ] Hadoop QA commented on HADOOP-10982: {color:red}-1 overall{color}. Here are the results of testing the latest attachment http://issues.apache.org/jira/secure/attachment/12669800/HADOOP-10982.patch against trunk revision 474f116. {color:green}+1 @author{color}. The patch does not contain any @author tags. {color:red}-1 tests included{color}. The patch doesn't appear to include any new or modified tests. Please justify why no new tests are needed for this patch. Also please list what manual steps were performed to verify this patch. {color:green}+1 javac{color}. The applied patch does not increase the total number of javac compiler warnings. {color:green}+1 javadoc{color}. There were no new javadoc warning messages. {color:green}+1 eclipse:eclipse{color}. The patch built with eclipse:eclipse. {color:green}+1 findbugs{color}. The patch does not introduce any new Findbugs (version 2.0.3) warnings. {color:green}+1 release audit{color}. The applied patch does not increase the total number of release audit warnings. {color:red}-1 core tests{color}. The patch failed these unit tests in hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms: org.apache.hadoop.metrics2.impl.TestMetricsSystemImpl The following test timeouts occurred in hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms: org.apache.hadoop.crypto.key.kms.server.TestKMSWithZK {color:green}+1 contrib tests{color}. The patch passed contrib unit tests. Test results: https://builds.apache.org/job/PreCommit-HADOOP-Build/4763//testReport/ Console output: https://builds.apache.org/job/PreCommit-HADOOP-Build/4763//console This message is automatically generated. KMS: Support for multiple Kerberos principals - Key: HADOOP-10982 URL: https://issues.apache.org/jira/browse/HADOOP-10982 Project: Hadoop Common Issue Type: Improvement Affects Versions: 3.0.0 Reporter: Andrew Wang Assignee: Alejandro Abdelnur Attachments: HADOOP-10982.patch, HADOOP-10982.patch, HADOOP-10982.patch, HADOOP-10982.patch The Key Management Server should support multiple Kerberos principals. This is required for KMS multi instance setups behind a VIP. In such scenarios there must a principal with the VIP hostname and one with the actual hostname of the KMS instance. Regular users will use the VIP entry point, monitoring agents must hit a specific instance. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals
[ https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14139616#comment-14139616 ] Alejandro Abdelnur commented on HADOOP-10982: - OK, testpatch is gaga, the KMS tests do not fail (from the console): {code} Running org.apache.hadoop.crypto.key.kms.server.TestKMSACLs Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.503 sec - in org.apache.hadoop.crypto.key.kms.server.TestKMSACLs Running org.apache.hadoop.crypto.key.kms.server.TestKMSWithZK Running org.apache.hadoop.crypto.key.kms.server.TestKeyAuthorizationKeyProvider Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.129 sec - in org.apache.hadoop.crypto.key.kms.server.TestKeyAuthorizationKeyProvider Running org.apache.hadoop.crypto.key.kms.server.TestKMS Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 20.122 sec - in org.apache.hadoop.crypto.key.kms.server.TestKMS Running org.apache.hadoop.crypto.key.kms.server.TestKMSAudit Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 6.489 sec - in org.apache.hadoop.crypto.key.kms.server.TestKMSAudit {code} The failing test is {code} Failed tests: TestMetricsSystemImpl.testMultiThreadedPublish:235 Metric not collected! {code} I'll commit this JIRA momentarily and create one for the testcase part. KMS: Support for multiple Kerberos principals - Key: HADOOP-10982 URL: https://issues.apache.org/jira/browse/HADOOP-10982 Project: Hadoop Common Issue Type: Improvement Affects Versions: 3.0.0 Reporter: Andrew Wang Assignee: Alejandro Abdelnur Attachments: HADOOP-10982.patch, HADOOP-10982.patch, HADOOP-10982.patch, HADOOP-10982.patch The Key Management Server should support multiple Kerberos principals. This is required for KMS multi instance setups behind a VIP. In such scenarios there must a principal with the VIP hostname and one with the actual hostname of the KMS instance. Regular users will use the VIP entry point, monitoring agents must hit a specific instance. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals
[ https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14139677#comment-14139677 ] Alejandro Abdelnur commented on HADOOP-10982: - created HADOOP-11108 for the testcase follow up. KMS: Support for multiple Kerberos principals - Key: HADOOP-10982 URL: https://issues.apache.org/jira/browse/HADOOP-10982 Project: Hadoop Common Issue Type: Improvement Affects Versions: 3.0.0 Reporter: Andrew Wang Assignee: Alejandro Abdelnur Fix For: 2.6.0 Attachments: HADOOP-10982.patch, HADOOP-10982.patch, HADOOP-10982.patch, HADOOP-10982.patch The Key Management Server should support multiple Kerberos principals. This is required for KMS multi instance setups behind a VIP. In such scenarios there must a principal with the VIP hostname and one with the actual hostname of the KMS instance. Regular users will use the VIP entry point, monitoring agents must hit a specific instance. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals
[ https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14137733#comment-14137733 ] Aaron T. Myers commented on HADOOP-10982: - Patch looks pretty good to me. Just a few little typos. +1 once these are addressed, and Jenkins has his say: # One too many have here: + HTTP/#HOSTNAME#. This means that all KMS instances must have have a # s/Kerbero/Kerberos/g: + instance must also have Kebero service name with its own hostname. This is # s/require/required/g: + require for monitoring and admin purposes. KMS: Support for multiple Kerberos principals - Key: HADOOP-10982 URL: https://issues.apache.org/jira/browse/HADOOP-10982 Project: Hadoop Common Issue Type: Improvement Affects Versions: 3.0.0 Reporter: Andrew Wang Assignee: Alejandro Abdelnur Attachments: HADOOP-10982.patch The Key Management Server should support multiple Kerberos principals. This is required for KMS multi instance setups behind a VIP. In such scenarios there must a principal with the VIP hostname and one with the actual hostname of the KMS instance. Regular users will use the VIP entry point, monitoring agents must hit a specific instance. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals
[ https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14138230#comment-14138230 ] Hadoop QA commented on HADOOP-10982: {color:red}-1 overall{color}. Here are the results of testing the latest attachment http://issues.apache.org/jira/secure/attachment/12669515/HADOOP-10982.patch against trunk revision 123f20d. {color:red}-1 patch{color}. The patch command could not apply the patch. Console output: https://builds.apache.org/job/PreCommit-HADOOP-Build/4752//console This message is automatically generated. KMS: Support for multiple Kerberos principals - Key: HADOOP-10982 URL: https://issues.apache.org/jira/browse/HADOOP-10982 Project: Hadoop Common Issue Type: Improvement Affects Versions: 3.0.0 Reporter: Andrew Wang Assignee: Alejandro Abdelnur Attachments: HADOOP-10982.patch, HADOOP-10982.patch The Key Management Server should support multiple Kerberos principals. This is required for KMS multi instance setups behind a VIP. In such scenarios there must a principal with the VIP hostname and one with the actual hostname of the KMS instance. Regular users will use the VIP entry point, monitoring agents must hit a specific instance. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals
[ https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14138454#comment-14138454 ] Hadoop QA commented on HADOOP-10982: {color:red}-1 overall{color}. Here are the results of testing the latest attachment http://issues.apache.org/jira/secure/attachment/12669617/HADOOP-10982.patch against trunk revision 47e5e19. {color:green}+1 @author{color}. The patch does not contain any @author tags. {color:green}+1 tests included{color}. The patch appears to include 1 new or modified test files. {color:green}+1 javac{color}. The applied patch does not increase the total number of javac compiler warnings. {color:green}+1 javadoc{color}. There were no new javadoc warning messages. {color:green}+1 eclipse:eclipse{color}. The patch built with eclipse:eclipse. {color:green}+1 findbugs{color}. The patch does not introduce any new Findbugs (version 2.0.3) warnings. {color:green}+1 release audit{color}. The applied patch does not increase the total number of release audit warnings. {color:red}-1 core tests{color}. The patch failed these unit tests in hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms: org.apache.hadoop.crypto.key.kms.server.TestKMS {color:green}+1 contrib tests{color}. The patch passed contrib unit tests. Test results: https://builds.apache.org/job/PreCommit-HADOOP-Build/4753//testReport/ Console output: https://builds.apache.org/job/PreCommit-HADOOP-Build/4753//console This message is automatically generated. KMS: Support for multiple Kerberos principals - Key: HADOOP-10982 URL: https://issues.apache.org/jira/browse/HADOOP-10982 Project: Hadoop Common Issue Type: Improvement Affects Versions: 3.0.0 Reporter: Andrew Wang Assignee: Alejandro Abdelnur Attachments: HADOOP-10982.patch, HADOOP-10982.patch, HADOOP-10982.patch The Key Management Server should support multiple Kerberos principals. This is required for KMS multi instance setups behind a VIP. In such scenarios there must a principal with the VIP hostname and one with the actual hostname of the KMS instance. Regular users will use the VIP entry point, monitoring agents must hit a specific instance. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals
[ https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14138482#comment-14138482 ] Hadoop QA commented on HADOOP-10982: {color:red}-1 overall{color}. Here are the results of testing the latest attachment http://issues.apache.org/jira/secure/attachment/12669617/HADOOP-10982.patch against trunk revision 10e8602. {color:green}+1 @author{color}. The patch does not contain any @author tags. {color:green}+1 tests included{color}. The patch appears to include 1 new or modified test files. {color:green}+1 javac{color}. The applied patch does not increase the total number of javac compiler warnings. {color:green}+1 javadoc{color}. There were no new javadoc warning messages. {color:green}+1 eclipse:eclipse{color}. The patch built with eclipse:eclipse. {color:green}+1 findbugs{color}. The patch does not introduce any new Findbugs (version 2.0.3) warnings. {color:green}+1 release audit{color}. The applied patch does not increase the total number of release audit warnings. {color:red}-1 core tests{color}. The patch failed these unit tests in hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms: org.apache.hadoop.crypto.key.kms.server.TestKMS The following test timeouts occurred in hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms: org.apache.hadoop.crypto.key.kms.server.TestKMSWithZK {color:green}+1 contrib tests{color}. The patch passed contrib unit tests. Test results: https://builds.apache.org/job/PreCommit-HADOOP-Build/4754//testReport/ Console output: https://builds.apache.org/job/PreCommit-HADOOP-Build/4754//console This message is automatically generated. KMS: Support for multiple Kerberos principals - Key: HADOOP-10982 URL: https://issues.apache.org/jira/browse/HADOOP-10982 Project: Hadoop Common Issue Type: Improvement Affects Versions: 3.0.0 Reporter: Andrew Wang Assignee: Alejandro Abdelnur Attachments: HADOOP-10982.patch, HADOOP-10982.patch, HADOOP-10982.patch The Key Management Server should support multiple Kerberos principals. This is required for KMS multi instance setups behind a VIP. In such scenarios there must a principal with the VIP hostname and one with the actual hostname of the KMS instance. Regular users will use the VIP entry point, monitoring agents must hit a specific instance. -- This message was sent by Atlassian JIRA (v6.3.4#6332)