[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-16 Thread Alejandro Abdelnur (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14136832#comment-14136832
 ] 

Alejandro Abdelnur commented on HADOOP-10982:
-

blocked because of documentation page changes only.

> KMS: Support for multiple Kerberos principals
> -
>
> Key: HADOOP-10982
> URL: https://issues.apache.org/jira/browse/HADOOP-10982
> Project: Hadoop Common
>  Issue Type: Improvement
>Affects Versions: 3.0.0
>Reporter: Andrew Wang
>Assignee: Alejandro Abdelnur
> Attachments: HADOOP-10982.patch
>
>
> The Key Management Server should support multiple Kerberos principals.
> This is required for KMS multi instance setups behind a  VIP. In such 
> scenarios there must a principal with the VIP hostname and one with the 
> actual hostname of the KMS instance. Regular users will use the VIP entry 
> point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-17 Thread Aaron T. Myers (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14137733#comment-14137733
 ] 

Aaron T. Myers commented on HADOOP-10982:
-

Patch looks pretty good to me. Just a few little typos. +1 once these are 
addressed, and Jenkins has his say:

# One too many "have" here: "+  <<>>. This means that all KMS 
instances must have have a"
# s/Kerbero/Kerberos/g: "+  instance must also have Kebero service name with 
its own hostname. This is"
# s/require/required/g: "+  require for monitoring and admin purposes."

> KMS: Support for multiple Kerberos principals
> -
>
> Key: HADOOP-10982
> URL: https://issues.apache.org/jira/browse/HADOOP-10982
> Project: Hadoop Common
>  Issue Type: Improvement
>Affects Versions: 3.0.0
>Reporter: Andrew Wang
>Assignee: Alejandro Abdelnur
> Attachments: HADOOP-10982.patch
>
>
> The Key Management Server should support multiple Kerberos principals.
> This is required for KMS multi instance setups behind a  VIP. In such 
> scenarios there must a principal with the VIP hostname and one with the 
> actual hostname of the KMS instance. Regular users will use the VIP entry 
> point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-17 Thread Hadoop QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14138230#comment-14138230
 ] 

Hadoop QA commented on HADOOP-10982:


{color:red}-1 overall{color}.  Here are the results of testing the latest 
attachment 
  http://issues.apache.org/jira/secure/attachment/12669515/HADOOP-10982.patch
  against trunk revision 123f20d.

{color:red}-1 patch{color}.  The patch command could not apply the patch.

Console output: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4752//console

This message is automatically generated.

> KMS: Support for multiple Kerberos principals
> -
>
> Key: HADOOP-10982
> URL: https://issues.apache.org/jira/browse/HADOOP-10982
> Project: Hadoop Common
>  Issue Type: Improvement
>Affects Versions: 3.0.0
>Reporter: Andrew Wang
>Assignee: Alejandro Abdelnur
> Attachments: HADOOP-10982.patch, HADOOP-10982.patch
>
>
> The Key Management Server should support multiple Kerberos principals.
> This is required for KMS multi instance setups behind a  VIP. In such 
> scenarios there must a principal with the VIP hostname and one with the 
> actual hostname of the KMS instance. Regular users will use the VIP entry 
> point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-17 Thread Hadoop QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14138454#comment-14138454
 ] 

Hadoop QA commented on HADOOP-10982:


{color:red}-1 overall{color}.  Here are the results of testing the latest 
attachment 
  http://issues.apache.org/jira/secure/attachment/12669617/HADOOP-10982.patch
  against trunk revision 47e5e19.

{color:green}+1 @author{color}.  The patch does not contain any @author 
tags.

{color:green}+1 tests included{color}.  The patch appears to include 1 new 
or modified test files.

{color:green}+1 javac{color}.  The applied patch does not increase the 
total number of javac compiler warnings.

{color:green}+1 javadoc{color}.  There were no new javadoc warning messages.

{color:green}+1 eclipse:eclipse{color}.  The patch built with 
eclipse:eclipse.

{color:green}+1 findbugs{color}.  The patch does not introduce any new 
Findbugs (version 2.0.3) warnings.

{color:green}+1 release audit{color}.  The applied patch does not increase 
the total number of release audit warnings.

{color:red}-1 core tests{color}.  The patch failed these unit tests in 
hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms:

  org.apache.hadoop.crypto.key.kms.server.TestKMS

{color:green}+1 contrib tests{color}.  The patch passed contrib unit tests.

Test results: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4753//testReport/
Console output: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4753//console

This message is automatically generated.

> KMS: Support for multiple Kerberos principals
> -
>
> Key: HADOOP-10982
> URL: https://issues.apache.org/jira/browse/HADOOP-10982
> Project: Hadoop Common
>  Issue Type: Improvement
>Affects Versions: 3.0.0
>Reporter: Andrew Wang
>Assignee: Alejandro Abdelnur
> Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
> HADOOP-10982.patch
>
>
> The Key Management Server should support multiple Kerberos principals.
> This is required for KMS multi instance setups behind a  VIP. In such 
> scenarios there must a principal with the VIP hostname and one with the 
> actual hostname of the KMS instance. Regular users will use the VIP entry 
> point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-17 Thread Hadoop QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14138482#comment-14138482
 ] 

Hadoop QA commented on HADOOP-10982:


{color:red}-1 overall{color}.  Here are the results of testing the latest 
attachment 
  http://issues.apache.org/jira/secure/attachment/12669617/HADOOP-10982.patch
  against trunk revision 10e8602.

{color:green}+1 @author{color}.  The patch does not contain any @author 
tags.

{color:green}+1 tests included{color}.  The patch appears to include 1 new 
or modified test files.

{color:green}+1 javac{color}.  The applied patch does not increase the 
total number of javac compiler warnings.

{color:green}+1 javadoc{color}.  There were no new javadoc warning messages.

{color:green}+1 eclipse:eclipse{color}.  The patch built with 
eclipse:eclipse.

{color:green}+1 findbugs{color}.  The patch does not introduce any new 
Findbugs (version 2.0.3) warnings.

{color:green}+1 release audit{color}.  The applied patch does not increase 
the total number of release audit warnings.

{color:red}-1 core tests{color}.  The patch failed these unit tests in 
hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms:

  org.apache.hadoop.crypto.key.kms.server.TestKMS

  The following test timeouts occurred in 
hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms:

org.apache.hadoop.crypto.key.kms.server.TestKMSWithZK

{color:green}+1 contrib tests{color}.  The patch passed contrib unit tests.

Test results: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4754//testReport/
Console output: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4754//console

This message is automatically generated.

> KMS: Support for multiple Kerberos principals
> -
>
> Key: HADOOP-10982
> URL: https://issues.apache.org/jira/browse/HADOOP-10982
> Project: Hadoop Common
>  Issue Type: Improvement
>Affects Versions: 3.0.0
>Reporter: Andrew Wang
>Assignee: Alejandro Abdelnur
> Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
> HADOOP-10982.patch
>
>
> The Key Management Server should support multiple Kerberos principals.
> This is required for KMS multi instance setups behind a  VIP. In such 
> scenarios there must a principal with the VIP hostname and one with the 
> actual hostname of the KMS instance. Regular users will use the VIP entry 
> point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Hudson (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14138817#comment-14138817
 ] 

Hudson commented on HADOOP-10982:
-

SUCCESS: Integrated in Hadoop-Yarn-trunk #684 (See 
[https://builds.apache.org/job/Hadoop-Yarn-trunk/684/])
HADOOP-10982 (tucu: rev d9a86031a077184d429dd5463e7da156df112011)
* 
hadoop-common-project/hadoop-kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java
* hadoop-common-project/hadoop-kms/src/site/apt/index.apt.vm
* 
hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java
Revert "HADOOP-10982" (tucu: rev 3f8f860cc65e179dd5766fea4d21cf30fa4b96e3)
* 
hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java
* hadoop-common-project/hadoop-kms/src/site/apt/index.apt.vm
* 
hadoop-common-project/hadoop-kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java


> KMS: Support for multiple Kerberos principals
> -
>
> Key: HADOOP-10982
> URL: https://issues.apache.org/jira/browse/HADOOP-10982
> Project: Hadoop Common
>  Issue Type: Improvement
>Affects Versions: 3.0.0
>Reporter: Andrew Wang
>Assignee: Alejandro Abdelnur
> Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
> HADOOP-10982.patch
>
>
> The Key Management Server should support multiple Kerberos principals.
> This is required for KMS multi instance setups behind a  VIP. In such 
> scenarios there must a principal with the VIP hostname and one with the 
> actual hostname of the KMS instance. Regular users will use the VIP entry 
> point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Hudson (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14138945#comment-14138945
 ] 

Hudson commented on HADOOP-10982:
-

FAILURE: Integrated in Hadoop-Mapreduce-trunk #1900 (See 
[https://builds.apache.org/job/Hadoop-Mapreduce-trunk/1900/])
HADOOP-10982 (tucu: rev d9a86031a077184d429dd5463e7da156df112011)
* 
hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java
* 
hadoop-common-project/hadoop-kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java
* hadoop-common-project/hadoop-kms/src/site/apt/index.apt.vm
Revert "HADOOP-10982" (tucu: rev 3f8f860cc65e179dd5766fea4d21cf30fa4b96e3)
* 
hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java
* hadoop-common-project/hadoop-kms/src/site/apt/index.apt.vm
* 
hadoop-common-project/hadoop-kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java


> KMS: Support for multiple Kerberos principals
> -
>
> Key: HADOOP-10982
> URL: https://issues.apache.org/jira/browse/HADOOP-10982
> Project: Hadoop Common
>  Issue Type: Improvement
>Affects Versions: 3.0.0
>Reporter: Andrew Wang
>Assignee: Alejandro Abdelnur
> Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
> HADOOP-10982.patch
>
>
> The Key Management Server should support multiple Kerberos principals.
> This is required for KMS multi instance setups behind a  VIP. In such 
> scenarios there must a principal with the VIP hostname and one with the 
> actual hostname of the KMS instance. Regular users will use the VIP entry 
> point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Hudson (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14138958#comment-14138958
 ] 

Hudson commented on HADOOP-10982:
-

FAILURE: Integrated in Hadoop-Hdfs-trunk #1875 (See 
[https://builds.apache.org/job/Hadoop-Hdfs-trunk/1875/])
HADOOP-10982 (tucu: rev d9a86031a077184d429dd5463e7da156df112011)
* 
hadoop-common-project/hadoop-kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java
* hadoop-common-project/hadoop-kms/src/site/apt/index.apt.vm
* 
hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java
Revert "HADOOP-10982" (tucu: rev 3f8f860cc65e179dd5766fea4d21cf30fa4b96e3)
* hadoop-common-project/hadoop-kms/src/site/apt/index.apt.vm
* 
hadoop-common-project/hadoop-kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java
* 
hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java


> KMS: Support for multiple Kerberos principals
> -
>
> Key: HADOOP-10982
> URL: https://issues.apache.org/jira/browse/HADOOP-10982
> Project: Hadoop Common
>  Issue Type: Improvement
>Affects Versions: 3.0.0
>Reporter: Andrew Wang
>Assignee: Alejandro Abdelnur
> Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
> HADOOP-10982.patch
>
>
> The Key Management Server should support multiple Kerberos principals.
> This is required for KMS multi instance setups behind a  VIP. In such 
> scenarios there must a principal with the VIP hostname and one with the 
> actual hostname of the KMS instance. Regular users will use the VIP entry 
> point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Alejandro Abdelnur (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14139074#comment-14139074
 ] 

Alejandro Abdelnur commented on HADOOP-10982:
-

the test failure reports "java.lang.NoClassDefFoundError: 
org/apache/hadoop/crypto/key/kms/server/TestKMS$5$3", it seems a JDK issue 
locally it does not happen. Doing some further testing.

> KMS: Support for multiple Kerberos principals
> -
>
> Key: HADOOP-10982
> URL: https://issues.apache.org/jira/browse/HADOOP-10982
> Project: Hadoop Common
>  Issue Type: Improvement
>Affects Versions: 3.0.0
>Reporter: Andrew Wang
>Assignee: Alejandro Abdelnur
> Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
> HADOOP-10982.patch
>
>
> The Key Management Server should support multiple Kerberos principals.
> This is required for KMS multi instance setups behind a  VIP. In such 
> scenarios there must a principal with the VIP hostname and one with the 
> actual hostname of the KMS instance. Regular users will use the VIP entry 
> point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Hadoop QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14139137#comment-14139137
 ] 

Hadoop QA commented on HADOOP-10982:


{color:red}-1 overall{color}.  Here are the results of testing the latest 
attachment 
  http://issues.apache.org/jira/secure/attachment/12669617/HADOOP-10982.patch
  against trunk revision ee21b13.

{color:green}+1 @author{color}.  The patch does not contain any @author 
tags.

{color:green}+1 tests included{color}.  The patch appears to include 1 new 
or modified test files.

{color:green}+1 javac{color}.  The applied patch does not increase the 
total number of javac compiler warnings.

{color:green}+1 javadoc{color}.  There were no new javadoc warning messages.

{color:green}+1 eclipse:eclipse{color}.  The patch built with 
eclipse:eclipse.

{color:green}+1 findbugs{color}.  The patch does not introduce any new 
Findbugs (version 2.0.3) warnings.

{color:green}+1 release audit{color}.  The applied patch does not increase 
the total number of release audit warnings.

{color:red}-1 core tests{color}.  The patch failed these unit tests in 
hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms:

  org.apache.hadoop.crypto.key.kms.server.TestKMS

{color:green}+1 contrib tests{color}.  The patch passed contrib unit tests.

Test results: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4757//testReport/
Console output: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4757//console

This message is automatically generated.

> KMS: Support for multiple Kerberos principals
> -
>
> Key: HADOOP-10982
> URL: https://issues.apache.org/jira/browse/HADOOP-10982
> Project: Hadoop Common
>  Issue Type: Improvement
>Affects Versions: 3.0.0
>Reporter: Andrew Wang
>Assignee: Alejandro Abdelnur
> Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
> HADOOP-10982.patch
>
>
> The Key Management Server should support multiple Kerberos principals.
> This is required for KMS multi instance setups behind a  VIP. In such 
> scenarios there must a principal with the VIP hostname and one with the 
> actual hostname of the KMS instance. Regular users will use the VIP entry 
> point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Alejandro Abdelnur (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14139245#comment-14139245
 ] 

Alejandro Abdelnur commented on HADOOP-10982:
-

OK, this is weird, I've logged in to the jenkins-slave 
(asf906.gq1.ygridcore.net) and I can run the testcase without any failure 
with/without the patch.

> KMS: Support for multiple Kerberos principals
> -
>
> Key: HADOOP-10982
> URL: https://issues.apache.org/jira/browse/HADOOP-10982
> Project: Hadoop Common
>  Issue Type: Improvement
>Affects Versions: 3.0.0
>Reporter: Andrew Wang
>Assignee: Alejandro Abdelnur
> Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
> HADOOP-10982.patch
>
>
> The Key Management Server should support multiple Kerberos principals.
> This is required for KMS multi instance setups behind a  VIP. In such 
> scenarios there must a principal with the VIP hostname and one with the 
> actual hostname of the KMS instance. Regular users will use the VIP entry 
> point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Hadoop QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14139324#comment-14139324
 ] 

Hadoop QA commented on HADOOP-10982:


{color:red}-1 overall{color}.  Here are the results of testing the latest 
attachment 
  http://issues.apache.org/jira/secure/attachment/12669617/HADOOP-10982.patch
  against trunk revision a3d9934.

{color:green}+1 @author{color}.  The patch does not contain any @author 
tags.

{color:green}+1 tests included{color}.  The patch appears to include 1 new 
or modified test files.

{color:green}+1 javac{color}.  The applied patch does not increase the 
total number of javac compiler warnings.

{color:green}+1 javadoc{color}.  There were no new javadoc warning messages.

{color:green}+1 eclipse:eclipse{color}.  The patch built with 
eclipse:eclipse.

{color:green}+1 findbugs{color}.  The patch does not introduce any new 
Findbugs (version 2.0.3) warnings.

{color:green}+1 release audit{color}.  The applied patch does not increase 
the total number of release audit warnings.

{color:red}-1 core tests{color}.  The patch failed these unit tests in 
hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms:

  org.apache.hadoop.crypto.key.kms.server.TestKMS

{color:green}+1 contrib tests{color}.  The patch passed contrib unit tests.

Test results: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4758//testReport/
Console output: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4758//console

This message is automatically generated.

> KMS: Support for multiple Kerberos principals
> -
>
> Key: HADOOP-10982
> URL: https://issues.apache.org/jira/browse/HADOOP-10982
> Project: Hadoop Common
>  Issue Type: Improvement
>Affects Versions: 3.0.0
>Reporter: Andrew Wang
>Assignee: Alejandro Abdelnur
> Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
> HADOOP-10982.patch
>
>
> The Key Management Server should support multiple Kerberos principals.
> This is required for KMS multi instance setups behind a  VIP. In such 
> scenarios there must a principal with the VIP hostname and one with the 
> actual hostname of the KMS instance. Regular users will use the VIP entry 
> point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Aaron T. Myers (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14139501#comment-14139501
 ] 

Aaron T. Myers commented on HADOOP-10982:
-

Sounds like a good plan.

+1 pending Jenkins

> KMS: Support for multiple Kerberos principals
> -
>
> Key: HADOOP-10982
> URL: https://issues.apache.org/jira/browse/HADOOP-10982
> Project: Hadoop Common
>  Issue Type: Improvement
>Affects Versions: 3.0.0
>Reporter: Andrew Wang
>Assignee: Alejandro Abdelnur
> Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
> HADOOP-10982.patch, HADOOP-10982.patch
>
>
> The Key Management Server should support multiple Kerberos principals.
> This is required for KMS multi instance setups behind a  VIP. In such 
> scenarios there must a principal with the VIP hostname and one with the 
> actual hostname of the KMS instance. Regular users will use the VIP entry 
> point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Hadoop QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14139533#comment-14139533
 ] 

Hadoop QA commented on HADOOP-10982:


{color:red}-1 overall{color}.  Here are the results of testing the latest 
attachment 
  http://issues.apache.org/jira/secure/attachment/12669617/HADOOP-10982.patch
  against trunk revision 474f116.

{color:green}+1 @author{color}.  The patch does not contain any @author 
tags.

{color:green}+1 tests included{color}.  The patch appears to include 1 new 
or modified test files.

{color:green}+1 javac{color}.  The applied patch does not increase the 
total number of javac compiler warnings.

{color:green}+1 javadoc{color}.  There were no new javadoc warning messages.

{color:green}+1 eclipse:eclipse{color}.  The patch built with 
eclipse:eclipse.

{color:green}+1 findbugs{color}.  The patch does not introduce any new 
Findbugs (version 2.0.3) warnings.

{color:green}+1 release audit{color}.  The applied patch does not increase 
the total number of release audit warnings.

{color:red}-1 core tests{color}.  The patch failed these unit tests in 
hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms:

  org.apache.hadoop.metrics2.impl.TestMetricsSystemImpl
  org.apache.hadoop.crypto.key.kms.server.TestKMS

  The following test timeouts occurred in 
hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms:

org.apache.hadoop.crypto.key.kms.server.TestKMSWithZK

{color:green}+1 contrib tests{color}.  The patch passed contrib unit tests.

Test results: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4761//testReport/
Console output: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4761//console

This message is automatically generated.

> KMS: Support for multiple Kerberos principals
> -
>
> Key: HADOOP-10982
> URL: https://issues.apache.org/jira/browse/HADOOP-10982
> Project: Hadoop Common
>  Issue Type: Improvement
>Affects Versions: 3.0.0
>Reporter: Andrew Wang
>Assignee: Alejandro Abdelnur
> Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
> HADOOP-10982.patch, HADOOP-10982.patch
>
>
> The Key Management Server should support multiple Kerberos principals.
> This is required for KMS multi instance setups behind a  VIP. In such 
> scenarios there must a principal with the VIP hostname and one with the 
> actual hostname of the KMS instance. Regular users will use the VIP entry 
> point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Hadoop QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14139568#comment-14139568
 ] 

Hadoop QA commented on HADOOP-10982:


{color:red}-1 overall{color}.  Here are the results of testing the latest 
attachment 
  http://issues.apache.org/jira/secure/attachment/12669800/HADOOP-10982.patch
  against trunk revision 474f116.

{color:green}+1 @author{color}.  The patch does not contain any @author 
tags.

{color:red}-1 tests included{color}.  The patch doesn't appear to include 
any new or modified tests.
Please justify why no new tests are needed for this 
patch.
Also please list what manual steps were performed to 
verify this patch.

{color:green}+1 javac{color}.  The applied patch does not increase the 
total number of javac compiler warnings.

{color:green}+1 javadoc{color}.  There were no new javadoc warning messages.

{color:green}+1 eclipse:eclipse{color}.  The patch built with 
eclipse:eclipse.

{color:green}+1 findbugs{color}.  The patch does not introduce any new 
Findbugs (version 2.0.3) warnings.

{color:green}+1 release audit{color}.  The applied patch does not increase 
the total number of release audit warnings.

{color:red}-1 core tests{color}.  The following test timeouts occurred in 
hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms:

org.apache.hadoop.crypto.key.kms.server.TestKMSWithZK

  The test build failed in 
hadoop-common-project/hadoop-common 

{color:green}+1 contrib tests{color}.  The patch passed contrib unit tests.

Test results: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4762//testReport/
Console output: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4762//console

This message is automatically generated.

> KMS: Support for multiple Kerberos principals
> -
>
> Key: HADOOP-10982
> URL: https://issues.apache.org/jira/browse/HADOOP-10982
> Project: Hadoop Common
>  Issue Type: Improvement
>Affects Versions: 3.0.0
>Reporter: Andrew Wang
>Assignee: Alejandro Abdelnur
> Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
> HADOOP-10982.patch, HADOOP-10982.patch
>
>
> The Key Management Server should support multiple Kerberos principals.
> This is required for KMS multi instance setups behind a  VIP. In such 
> scenarios there must a principal with the VIP hostname and one with the 
> actual hostname of the KMS instance. Regular users will use the VIP entry 
> point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Hadoop QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14139581#comment-14139581
 ] 

Hadoop QA commented on HADOOP-10982:


{color:red}-1 overall{color}.  Here are the results of testing the latest 
attachment 
  http://issues.apache.org/jira/secure/attachment/12669800/HADOOP-10982.patch
  against trunk revision 474f116.

{color:green}+1 @author{color}.  The patch does not contain any @author 
tags.

{color:red}-1 tests included{color}.  The patch doesn't appear to include 
any new or modified tests.
Please justify why no new tests are needed for this 
patch.
Also please list what manual steps were performed to 
verify this patch.

{color:green}+1 javac{color}.  The applied patch does not increase the 
total number of javac compiler warnings.

{color:green}+1 javadoc{color}.  There were no new javadoc warning messages.

{color:green}+1 eclipse:eclipse{color}.  The patch built with 
eclipse:eclipse.

{color:green}+1 findbugs{color}.  The patch does not introduce any new 
Findbugs (version 2.0.3) warnings.

{color:green}+1 release audit{color}.  The applied patch does not increase 
the total number of release audit warnings.

{color:red}-1 core tests{color}.  The patch failed these unit tests in 
hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms:

  org.apache.hadoop.metrics2.impl.TestMetricsSystemImpl

  The following test timeouts occurred in 
hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms:

org.apache.hadoop.crypto.key.kms.server.TestKMSWithZK

{color:green}+1 contrib tests{color}.  The patch passed contrib unit tests.

Test results: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4763//testReport/
Console output: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4763//console

This message is automatically generated.

> KMS: Support for multiple Kerberos principals
> -
>
> Key: HADOOP-10982
> URL: https://issues.apache.org/jira/browse/HADOOP-10982
> Project: Hadoop Common
>  Issue Type: Improvement
>Affects Versions: 3.0.0
>Reporter: Andrew Wang
>Assignee: Alejandro Abdelnur
> Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
> HADOOP-10982.patch, HADOOP-10982.patch
>
>
> The Key Management Server should support multiple Kerberos principals.
> This is required for KMS multi instance setups behind a  VIP. In such 
> scenarios there must a principal with the VIP hostname and one with the 
> actual hostname of the KMS instance. Regular users will use the VIP entry 
> point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Alejandro Abdelnur (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14139616#comment-14139616
 ] 

Alejandro Abdelnur commented on HADOOP-10982:
-

OK, testpatch is gaga, the KMS tests do not fail (from the console):

{code}
Running org.apache.hadoop.crypto.key.kms.server.TestKMSACLs
Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.503 sec - in 
org.apache.hadoop.crypto.key.kms.server.TestKMSACLs
Running org.apache.hadoop.crypto.key.kms.server.TestKMSWithZK
Running org.apache.hadoop.crypto.key.kms.server.TestKeyAuthorizationKeyProvider
Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.129 sec - in 
org.apache.hadoop.crypto.key.kms.server.TestKeyAuthorizationKeyProvider
Running org.apache.hadoop.crypto.key.kms.server.TestKMS
Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 20.122 sec - 
in org.apache.hadoop.crypto.key.kms.server.TestKMS
Running org.apache.hadoop.crypto.key.kms.server.TestKMSAudit
Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 6.489 sec - in 
org.apache.hadoop.crypto.key.kms.server.TestKMSAudit
{code}

The failing test is

{code}
Failed tests: 
  TestMetricsSystemImpl.testMultiThreadedPublish:235 Metric not collected!
{code}

I'll commit this JIRA momentarily and create one for the testcase part. 

> KMS: Support for multiple Kerberos principals
> -
>
> Key: HADOOP-10982
> URL: https://issues.apache.org/jira/browse/HADOOP-10982
> Project: Hadoop Common
>  Issue Type: Improvement
>Affects Versions: 3.0.0
>Reporter: Andrew Wang
>Assignee: Alejandro Abdelnur
> Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
> HADOOP-10982.patch, HADOOP-10982.patch
>
>
> The Key Management Server should support multiple Kerberos principals.
> This is required for KMS multi instance setups behind a  VIP. In such 
> scenarios there must a principal with the VIP hostname and one with the 
> actual hostname of the KMS instance. Regular users will use the VIP entry 
> point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Alejandro Abdelnur (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14139677#comment-14139677
 ] 

Alejandro Abdelnur commented on HADOOP-10982:
-

created HADOOP-11108 for the testcase follow up.

> KMS: Support for multiple Kerberos principals
> -
>
> Key: HADOOP-10982
> URL: https://issues.apache.org/jira/browse/HADOOP-10982
> Project: Hadoop Common
>  Issue Type: Improvement
>Affects Versions: 3.0.0
>Reporter: Andrew Wang
>Assignee: Alejandro Abdelnur
> Fix For: 2.6.0
>
> Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
> HADOOP-10982.patch, HADOOP-10982.patch
>
>
> The Key Management Server should support multiple Kerberos principals.
> This is required for KMS multi instance setups behind a  VIP. In such 
> scenarios there must a principal with the VIP hostname and one with the 
> actual hostname of the KMS instance. Regular users will use the VIP entry 
> point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Jian He (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14139802#comment-14139802
 ] 

Jian He commented on HADOOP-10982:
--

I think site build is broken after this patch. opened HADOOP-11109

> KMS: Support for multiple Kerberos principals
> -
>
> Key: HADOOP-10982
> URL: https://issues.apache.org/jira/browse/HADOOP-10982
> Project: Hadoop Common
>  Issue Type: Improvement
>Affects Versions: 3.0.0
>Reporter: Andrew Wang
>Assignee: Alejandro Abdelnur
> Fix For: 2.6.0
>
> Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
> HADOOP-10982.patch, HADOOP-10982.patch
>
>
> The Key Management Server should support multiple Kerberos principals.
> This is required for KMS multi instance setups behind a  VIP. In such 
> scenarios there must a principal with the VIP hostname and one with the 
> actual hostname of the KMS instance. Regular users will use the VIP entry 
> point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)