[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Hudson (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14138817#comment-14138817
 ] 

Hudson commented on HADOOP-10982:
-

SUCCESS: Integrated in Hadoop-Yarn-trunk #684 (See 
[https://builds.apache.org/job/Hadoop-Yarn-trunk/684/])
HADOOP-10982 (tucu: rev d9a86031a077184d429dd5463e7da156df112011)
* 
hadoop-common-project/hadoop-kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java
* hadoop-common-project/hadoop-kms/src/site/apt/index.apt.vm
* 
hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java
Revert HADOOP-10982 (tucu: rev 3f8f860cc65e179dd5766fea4d21cf30fa4b96e3)
* 
hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java
* hadoop-common-project/hadoop-kms/src/site/apt/index.apt.vm
* 
hadoop-common-project/hadoop-kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java


 KMS: Support for multiple Kerberos principals
 -

 Key: HADOOP-10982
 URL: https://issues.apache.org/jira/browse/HADOOP-10982
 Project: Hadoop Common
  Issue Type: Improvement
Affects Versions: 3.0.0
Reporter: Andrew Wang
Assignee: Alejandro Abdelnur
 Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
 HADOOP-10982.patch


 The Key Management Server should support multiple Kerberos principals.
 This is required for KMS multi instance setups behind a  VIP. In such 
 scenarios there must a principal with the VIP hostname and one with the 
 actual hostname of the KMS instance. Regular users will use the VIP entry 
 point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Hudson (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14138945#comment-14138945
 ] 

Hudson commented on HADOOP-10982:
-

FAILURE: Integrated in Hadoop-Mapreduce-trunk #1900 (See 
[https://builds.apache.org/job/Hadoop-Mapreduce-trunk/1900/])
HADOOP-10982 (tucu: rev d9a86031a077184d429dd5463e7da156df112011)
* 
hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java
* 
hadoop-common-project/hadoop-kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java
* hadoop-common-project/hadoop-kms/src/site/apt/index.apt.vm
Revert HADOOP-10982 (tucu: rev 3f8f860cc65e179dd5766fea4d21cf30fa4b96e3)
* 
hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java
* hadoop-common-project/hadoop-kms/src/site/apt/index.apt.vm
* 
hadoop-common-project/hadoop-kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java


 KMS: Support for multiple Kerberos principals
 -

 Key: HADOOP-10982
 URL: https://issues.apache.org/jira/browse/HADOOP-10982
 Project: Hadoop Common
  Issue Type: Improvement
Affects Versions: 3.0.0
Reporter: Andrew Wang
Assignee: Alejandro Abdelnur
 Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
 HADOOP-10982.patch


 The Key Management Server should support multiple Kerberos principals.
 This is required for KMS multi instance setups behind a  VIP. In such 
 scenarios there must a principal with the VIP hostname and one with the 
 actual hostname of the KMS instance. Regular users will use the VIP entry 
 point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Hudson (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14138958#comment-14138958
 ] 

Hudson commented on HADOOP-10982:
-

FAILURE: Integrated in Hadoop-Hdfs-trunk #1875 (See 
[https://builds.apache.org/job/Hadoop-Hdfs-trunk/1875/])
HADOOP-10982 (tucu: rev d9a86031a077184d429dd5463e7da156df112011)
* 
hadoop-common-project/hadoop-kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java
* hadoop-common-project/hadoop-kms/src/site/apt/index.apt.vm
* 
hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java
Revert HADOOP-10982 (tucu: rev 3f8f860cc65e179dd5766fea4d21cf30fa4b96e3)
* hadoop-common-project/hadoop-kms/src/site/apt/index.apt.vm
* 
hadoop-common-project/hadoop-kms/src/test/java/org/apache/hadoop/crypto/key/kms/server/TestKMS.java
* 
hadoop-common-project/hadoop-common/src/main/java/org/apache/hadoop/crypto/key/kms/KMSClientProvider.java


 KMS: Support for multiple Kerberos principals
 -

 Key: HADOOP-10982
 URL: https://issues.apache.org/jira/browse/HADOOP-10982
 Project: Hadoop Common
  Issue Type: Improvement
Affects Versions: 3.0.0
Reporter: Andrew Wang
Assignee: Alejandro Abdelnur
 Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
 HADOOP-10982.patch


 The Key Management Server should support multiple Kerberos principals.
 This is required for KMS multi instance setups behind a  VIP. In such 
 scenarios there must a principal with the VIP hostname and one with the 
 actual hostname of the KMS instance. Regular users will use the VIP entry 
 point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Alejandro Abdelnur (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14139074#comment-14139074
 ] 

Alejandro Abdelnur commented on HADOOP-10982:
-

the test failure reports java.lang.NoClassDefFoundError: 
org/apache/hadoop/crypto/key/kms/server/TestKMS$5$3, it seems a JDK issue 
locally it does not happen. Doing some further testing.

 KMS: Support for multiple Kerberos principals
 -

 Key: HADOOP-10982
 URL: https://issues.apache.org/jira/browse/HADOOP-10982
 Project: Hadoop Common
  Issue Type: Improvement
Affects Versions: 3.0.0
Reporter: Andrew Wang
Assignee: Alejandro Abdelnur
 Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
 HADOOP-10982.patch


 The Key Management Server should support multiple Kerberos principals.
 This is required for KMS multi instance setups behind a  VIP. In such 
 scenarios there must a principal with the VIP hostname and one with the 
 actual hostname of the KMS instance. Regular users will use the VIP entry 
 point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Alejandro Abdelnur (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14139245#comment-14139245
 ] 

Alejandro Abdelnur commented on HADOOP-10982:
-

OK, this is weird, I've logged in to the jenkins-slave 
(asf906.gq1.ygridcore.net) and I can run the testcase without any failure 
with/without the patch.

 KMS: Support for multiple Kerberos principals
 -

 Key: HADOOP-10982
 URL: https://issues.apache.org/jira/browse/HADOOP-10982
 Project: Hadoop Common
  Issue Type: Improvement
Affects Versions: 3.0.0
Reporter: Andrew Wang
Assignee: Alejandro Abdelnur
 Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
 HADOOP-10982.patch


 The Key Management Server should support multiple Kerberos principals.
 This is required for KMS multi instance setups behind a  VIP. In such 
 scenarios there must a principal with the VIP hostname and one with the 
 actual hostname of the KMS instance. Regular users will use the VIP entry 
 point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Hadoop QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14139324#comment-14139324
 ] 

Hadoop QA commented on HADOOP-10982:


{color:red}-1 overall{color}.  Here are the results of testing the latest 
attachment 
  http://issues.apache.org/jira/secure/attachment/12669617/HADOOP-10982.patch
  against trunk revision a3d9934.

{color:green}+1 @author{color}.  The patch does not contain any @author 
tags.

{color:green}+1 tests included{color}.  The patch appears to include 1 new 
or modified test files.

{color:green}+1 javac{color}.  The applied patch does not increase the 
total number of javac compiler warnings.

{color:green}+1 javadoc{color}.  There were no new javadoc warning messages.

{color:green}+1 eclipse:eclipse{color}.  The patch built with 
eclipse:eclipse.

{color:green}+1 findbugs{color}.  The patch does not introduce any new 
Findbugs (version 2.0.3) warnings.

{color:green}+1 release audit{color}.  The applied patch does not increase 
the total number of release audit warnings.

{color:red}-1 core tests{color}.  The patch failed these unit tests in 
hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms:

  org.apache.hadoop.crypto.key.kms.server.TestKMS

{color:green}+1 contrib tests{color}.  The patch passed contrib unit tests.

Test results: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4758//testReport/
Console output: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4758//console

This message is automatically generated.

 KMS: Support for multiple Kerberos principals
 -

 Key: HADOOP-10982
 URL: https://issues.apache.org/jira/browse/HADOOP-10982
 Project: Hadoop Common
  Issue Type: Improvement
Affects Versions: 3.0.0
Reporter: Andrew Wang
Assignee: Alejandro Abdelnur
 Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
 HADOOP-10982.patch


 The Key Management Server should support multiple Kerberos principals.
 This is required for KMS multi instance setups behind a  VIP. In such 
 scenarios there must a principal with the VIP hostname and one with the 
 actual hostname of the KMS instance. Regular users will use the VIP entry 
 point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Aaron T. Myers (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14139501#comment-14139501
 ] 

Aaron T. Myers commented on HADOOP-10982:
-

Sounds like a good plan.

+1 pending Jenkins

 KMS: Support for multiple Kerberos principals
 -

 Key: HADOOP-10982
 URL: https://issues.apache.org/jira/browse/HADOOP-10982
 Project: Hadoop Common
  Issue Type: Improvement
Affects Versions: 3.0.0
Reporter: Andrew Wang
Assignee: Alejandro Abdelnur
 Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
 HADOOP-10982.patch, HADOOP-10982.patch


 The Key Management Server should support multiple Kerberos principals.
 This is required for KMS multi instance setups behind a  VIP. In such 
 scenarios there must a principal with the VIP hostname and one with the 
 actual hostname of the KMS instance. Regular users will use the VIP entry 
 point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Hadoop QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14139533#comment-14139533
 ] 

Hadoop QA commented on HADOOP-10982:


{color:red}-1 overall{color}.  Here are the results of testing the latest 
attachment 
  http://issues.apache.org/jira/secure/attachment/12669617/HADOOP-10982.patch
  against trunk revision 474f116.

{color:green}+1 @author{color}.  The patch does not contain any @author 
tags.

{color:green}+1 tests included{color}.  The patch appears to include 1 new 
or modified test files.

{color:green}+1 javac{color}.  The applied patch does not increase the 
total number of javac compiler warnings.

{color:green}+1 javadoc{color}.  There were no new javadoc warning messages.

{color:green}+1 eclipse:eclipse{color}.  The patch built with 
eclipse:eclipse.

{color:green}+1 findbugs{color}.  The patch does not introduce any new 
Findbugs (version 2.0.3) warnings.

{color:green}+1 release audit{color}.  The applied patch does not increase 
the total number of release audit warnings.

{color:red}-1 core tests{color}.  The patch failed these unit tests in 
hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms:

  org.apache.hadoop.metrics2.impl.TestMetricsSystemImpl
  org.apache.hadoop.crypto.key.kms.server.TestKMS

  The following test timeouts occurred in 
hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms:

org.apache.hadoop.crypto.key.kms.server.TestKMSWithZK

{color:green}+1 contrib tests{color}.  The patch passed contrib unit tests.

Test results: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4761//testReport/
Console output: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4761//console

This message is automatically generated.

 KMS: Support for multiple Kerberos principals
 -

 Key: HADOOP-10982
 URL: https://issues.apache.org/jira/browse/HADOOP-10982
 Project: Hadoop Common
  Issue Type: Improvement
Affects Versions: 3.0.0
Reporter: Andrew Wang
Assignee: Alejandro Abdelnur
 Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
 HADOOP-10982.patch, HADOOP-10982.patch


 The Key Management Server should support multiple Kerberos principals.
 This is required for KMS multi instance setups behind a  VIP. In such 
 scenarios there must a principal with the VIP hostname and one with the 
 actual hostname of the KMS instance. Regular users will use the VIP entry 
 point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Hadoop QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14139568#comment-14139568
 ] 

Hadoop QA commented on HADOOP-10982:


{color:red}-1 overall{color}.  Here are the results of testing the latest 
attachment 
  http://issues.apache.org/jira/secure/attachment/12669800/HADOOP-10982.patch
  against trunk revision 474f116.

{color:green}+1 @author{color}.  The patch does not contain any @author 
tags.

{color:red}-1 tests included{color}.  The patch doesn't appear to include 
any new or modified tests.
Please justify why no new tests are needed for this 
patch.
Also please list what manual steps were performed to 
verify this patch.

{color:green}+1 javac{color}.  The applied patch does not increase the 
total number of javac compiler warnings.

{color:green}+1 javadoc{color}.  There were no new javadoc warning messages.

{color:green}+1 eclipse:eclipse{color}.  The patch built with 
eclipse:eclipse.

{color:green}+1 findbugs{color}.  The patch does not introduce any new 
Findbugs (version 2.0.3) warnings.

{color:green}+1 release audit{color}.  The applied patch does not increase 
the total number of release audit warnings.

{color:red}-1 core tests{color}.  The following test timeouts occurred in 
hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms:

org.apache.hadoop.crypto.key.kms.server.TestKMSWithZK

  The test build failed in 
hadoop-common-project/hadoop-common 

{color:green}+1 contrib tests{color}.  The patch passed contrib unit tests.

Test results: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4762//testReport/
Console output: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4762//console

This message is automatically generated.

 KMS: Support for multiple Kerberos principals
 -

 Key: HADOOP-10982
 URL: https://issues.apache.org/jira/browse/HADOOP-10982
 Project: Hadoop Common
  Issue Type: Improvement
Affects Versions: 3.0.0
Reporter: Andrew Wang
Assignee: Alejandro Abdelnur
 Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
 HADOOP-10982.patch, HADOOP-10982.patch


 The Key Management Server should support multiple Kerberos principals.
 This is required for KMS multi instance setups behind a  VIP. In such 
 scenarios there must a principal with the VIP hostname and one with the 
 actual hostname of the KMS instance. Regular users will use the VIP entry 
 point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Hadoop QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14139581#comment-14139581
 ] 

Hadoop QA commented on HADOOP-10982:


{color:red}-1 overall{color}.  Here are the results of testing the latest 
attachment 
  http://issues.apache.org/jira/secure/attachment/12669800/HADOOP-10982.patch
  against trunk revision 474f116.

{color:green}+1 @author{color}.  The patch does not contain any @author 
tags.

{color:red}-1 tests included{color}.  The patch doesn't appear to include 
any new or modified tests.
Please justify why no new tests are needed for this 
patch.
Also please list what manual steps were performed to 
verify this patch.

{color:green}+1 javac{color}.  The applied patch does not increase the 
total number of javac compiler warnings.

{color:green}+1 javadoc{color}.  There were no new javadoc warning messages.

{color:green}+1 eclipse:eclipse{color}.  The patch built with 
eclipse:eclipse.

{color:green}+1 findbugs{color}.  The patch does not introduce any new 
Findbugs (version 2.0.3) warnings.

{color:green}+1 release audit{color}.  The applied patch does not increase 
the total number of release audit warnings.

{color:red}-1 core tests{color}.  The patch failed these unit tests in 
hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms:

  org.apache.hadoop.metrics2.impl.TestMetricsSystemImpl

  The following test timeouts occurred in 
hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms:

org.apache.hadoop.crypto.key.kms.server.TestKMSWithZK

{color:green}+1 contrib tests{color}.  The patch passed contrib unit tests.

Test results: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4763//testReport/
Console output: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4763//console

This message is automatically generated.

 KMS: Support for multiple Kerberos principals
 -

 Key: HADOOP-10982
 URL: https://issues.apache.org/jira/browse/HADOOP-10982
 Project: Hadoop Common
  Issue Type: Improvement
Affects Versions: 3.0.0
Reporter: Andrew Wang
Assignee: Alejandro Abdelnur
 Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
 HADOOP-10982.patch, HADOOP-10982.patch


 The Key Management Server should support multiple Kerberos principals.
 This is required for KMS multi instance setups behind a  VIP. In such 
 scenarios there must a principal with the VIP hostname and one with the 
 actual hostname of the KMS instance. Regular users will use the VIP entry 
 point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Alejandro Abdelnur (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14139616#comment-14139616
 ] 

Alejandro Abdelnur commented on HADOOP-10982:
-

OK, testpatch is gaga, the KMS tests do not fail (from the console):

{code}
Running org.apache.hadoop.crypto.key.kms.server.TestKMSACLs
Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 0.503 sec - in 
org.apache.hadoop.crypto.key.kms.server.TestKMSACLs
Running org.apache.hadoop.crypto.key.kms.server.TestKMSWithZK
Running org.apache.hadoop.crypto.key.kms.server.TestKeyAuthorizationKeyProvider
Tests run: 3, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 1.129 sec - in 
org.apache.hadoop.crypto.key.kms.server.TestKeyAuthorizationKeyProvider
Running org.apache.hadoop.crypto.key.kms.server.TestKMS
Tests run: 12, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 20.122 sec - 
in org.apache.hadoop.crypto.key.kms.server.TestKMS
Running org.apache.hadoop.crypto.key.kms.server.TestKMSAudit
Tests run: 2, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 6.489 sec - in 
org.apache.hadoop.crypto.key.kms.server.TestKMSAudit
{code}

The failing test is

{code}
Failed tests: 
  TestMetricsSystemImpl.testMultiThreadedPublish:235 Metric not collected!
{code}

I'll commit this JIRA momentarily and create one for the testcase part. 

 KMS: Support for multiple Kerberos principals
 -

 Key: HADOOP-10982
 URL: https://issues.apache.org/jira/browse/HADOOP-10982
 Project: Hadoop Common
  Issue Type: Improvement
Affects Versions: 3.0.0
Reporter: Andrew Wang
Assignee: Alejandro Abdelnur
 Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
 HADOOP-10982.patch, HADOOP-10982.patch


 The Key Management Server should support multiple Kerberos principals.
 This is required for KMS multi instance setups behind a  VIP. In such 
 scenarios there must a principal with the VIP hostname and one with the 
 actual hostname of the KMS instance. Regular users will use the VIP entry 
 point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-18 Thread Alejandro Abdelnur (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14139677#comment-14139677
 ] 

Alejandro Abdelnur commented on HADOOP-10982:
-

created HADOOP-11108 for the testcase follow up.

 KMS: Support for multiple Kerberos principals
 -

 Key: HADOOP-10982
 URL: https://issues.apache.org/jira/browse/HADOOP-10982
 Project: Hadoop Common
  Issue Type: Improvement
Affects Versions: 3.0.0
Reporter: Andrew Wang
Assignee: Alejandro Abdelnur
 Fix For: 2.6.0

 Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
 HADOOP-10982.patch, HADOOP-10982.patch


 The Key Management Server should support multiple Kerberos principals.
 This is required for KMS multi instance setups behind a  VIP. In such 
 scenarios there must a principal with the VIP hostname and one with the 
 actual hostname of the KMS instance. Regular users will use the VIP entry 
 point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-17 Thread Aaron T. Myers (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14137733#comment-14137733
 ] 

Aaron T. Myers commented on HADOOP-10982:
-

Patch looks pretty good to me. Just a few little typos. +1 once these are 
addressed, and Jenkins has his say:

# One too many have here: +  HTTP/#HOSTNAME#. This means that all KMS 
instances must have have a
# s/Kerbero/Kerberos/g: +  instance must also have Kebero service name with 
its own hostname. This is
# s/require/required/g: +  require for monitoring and admin purposes.

 KMS: Support for multiple Kerberos principals
 -

 Key: HADOOP-10982
 URL: https://issues.apache.org/jira/browse/HADOOP-10982
 Project: Hadoop Common
  Issue Type: Improvement
Affects Versions: 3.0.0
Reporter: Andrew Wang
Assignee: Alejandro Abdelnur
 Attachments: HADOOP-10982.patch


 The Key Management Server should support multiple Kerberos principals.
 This is required for KMS multi instance setups behind a  VIP. In such 
 scenarios there must a principal with the VIP hostname and one with the 
 actual hostname of the KMS instance. Regular users will use the VIP entry 
 point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-17 Thread Hadoop QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14138230#comment-14138230
 ] 

Hadoop QA commented on HADOOP-10982:


{color:red}-1 overall{color}.  Here are the results of testing the latest 
attachment 
  http://issues.apache.org/jira/secure/attachment/12669515/HADOOP-10982.patch
  against trunk revision 123f20d.

{color:red}-1 patch{color}.  The patch command could not apply the patch.

Console output: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4752//console

This message is automatically generated.

 KMS: Support for multiple Kerberos principals
 -

 Key: HADOOP-10982
 URL: https://issues.apache.org/jira/browse/HADOOP-10982
 Project: Hadoop Common
  Issue Type: Improvement
Affects Versions: 3.0.0
Reporter: Andrew Wang
Assignee: Alejandro Abdelnur
 Attachments: HADOOP-10982.patch, HADOOP-10982.patch


 The Key Management Server should support multiple Kerberos principals.
 This is required for KMS multi instance setups behind a  VIP. In such 
 scenarios there must a principal with the VIP hostname and one with the 
 actual hostname of the KMS instance. Regular users will use the VIP entry 
 point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-17 Thread Hadoop QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14138454#comment-14138454
 ] 

Hadoop QA commented on HADOOP-10982:


{color:red}-1 overall{color}.  Here are the results of testing the latest 
attachment 
  http://issues.apache.org/jira/secure/attachment/12669617/HADOOP-10982.patch
  against trunk revision 47e5e19.

{color:green}+1 @author{color}.  The patch does not contain any @author 
tags.

{color:green}+1 tests included{color}.  The patch appears to include 1 new 
or modified test files.

{color:green}+1 javac{color}.  The applied patch does not increase the 
total number of javac compiler warnings.

{color:green}+1 javadoc{color}.  There were no new javadoc warning messages.

{color:green}+1 eclipse:eclipse{color}.  The patch built with 
eclipse:eclipse.

{color:green}+1 findbugs{color}.  The patch does not introduce any new 
Findbugs (version 2.0.3) warnings.

{color:green}+1 release audit{color}.  The applied patch does not increase 
the total number of release audit warnings.

{color:red}-1 core tests{color}.  The patch failed these unit tests in 
hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms:

  org.apache.hadoop.crypto.key.kms.server.TestKMS

{color:green}+1 contrib tests{color}.  The patch passed contrib unit tests.

Test results: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4753//testReport/
Console output: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4753//console

This message is automatically generated.

 KMS: Support for multiple Kerberos principals
 -

 Key: HADOOP-10982
 URL: https://issues.apache.org/jira/browse/HADOOP-10982
 Project: Hadoop Common
  Issue Type: Improvement
Affects Versions: 3.0.0
Reporter: Andrew Wang
Assignee: Alejandro Abdelnur
 Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
 HADOOP-10982.patch


 The Key Management Server should support multiple Kerberos principals.
 This is required for KMS multi instance setups behind a  VIP. In such 
 scenarios there must a principal with the VIP hostname and one with the 
 actual hostname of the KMS instance. Regular users will use the VIP entry 
 point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (HADOOP-10982) KMS: Support for multiple Kerberos principals

2014-09-17 Thread Hadoop QA (JIRA)

[ 
https://issues.apache.org/jira/browse/HADOOP-10982?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14138482#comment-14138482
 ] 

Hadoop QA commented on HADOOP-10982:


{color:red}-1 overall{color}.  Here are the results of testing the latest 
attachment 
  http://issues.apache.org/jira/secure/attachment/12669617/HADOOP-10982.patch
  against trunk revision 10e8602.

{color:green}+1 @author{color}.  The patch does not contain any @author 
tags.

{color:green}+1 tests included{color}.  The patch appears to include 1 new 
or modified test files.

{color:green}+1 javac{color}.  The applied patch does not increase the 
total number of javac compiler warnings.

{color:green}+1 javadoc{color}.  There were no new javadoc warning messages.

{color:green}+1 eclipse:eclipse{color}.  The patch built with 
eclipse:eclipse.

{color:green}+1 findbugs{color}.  The patch does not introduce any new 
Findbugs (version 2.0.3) warnings.

{color:green}+1 release audit{color}.  The applied patch does not increase 
the total number of release audit warnings.

{color:red}-1 core tests{color}.  The patch failed these unit tests in 
hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms:

  org.apache.hadoop.crypto.key.kms.server.TestKMS

  The following test timeouts occurred in 
hadoop-common-project/hadoop-common hadoop-common-project/hadoop-kms:

org.apache.hadoop.crypto.key.kms.server.TestKMSWithZK

{color:green}+1 contrib tests{color}.  The patch passed contrib unit tests.

Test results: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4754//testReport/
Console output: 
https://builds.apache.org/job/PreCommit-HADOOP-Build/4754//console

This message is automatically generated.

 KMS: Support for multiple Kerberos principals
 -

 Key: HADOOP-10982
 URL: https://issues.apache.org/jira/browse/HADOOP-10982
 Project: Hadoop Common
  Issue Type: Improvement
Affects Versions: 3.0.0
Reporter: Andrew Wang
Assignee: Alejandro Abdelnur
 Attachments: HADOOP-10982.patch, HADOOP-10982.patch, 
 HADOOP-10982.patch


 The Key Management Server should support multiple Kerberos principals.
 This is required for KMS multi instance setups behind a  VIP. In such 
 scenarios there must a principal with the VIP hostname and one with the 
 actual hostname of the KMS instance. Regular users will use the VIP entry 
 point, monitoring agents must hit a specific instance.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)