You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@phoenix.apache.org by "Biju Nair (JIRA)" <ji...@apache.org> on 2018/12/17 14:59:00 UTC
[jira] [Commented] (PHOENIX-5067) Support for secure Phoenix
cluster in Pherf
[ https://issues.apache.org/jira/browse/PHOENIX-5067?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16723043#comment-16723043 ]
Biju Nair commented on PHOENIX-5067:
------------------------------------
{quote}
Kerberos stuff also requires the setting of krb5.conf. Are we expecting that users do kinit manually before they do this?
{quote}
To connect to Kerberos KDC, {{krb5.conf}} need to be installed on the machine from which {{Pherf}} is run. By passing in the Keytab and Principal Phoenix will perform the {{kinit}}.
> Support for secure Phoenix cluster in Pherf
> -------------------------------------------
>
> Key: PHOENIX-5067
> URL: https://issues.apache.org/jira/browse/PHOENIX-5067
> Project: Phoenix
> Issue Type: Improvement
> Reporter: Biju Nair
> Assignee: Biju Nair
> Priority: Minor
> Attachments: PHOENIX-5067-4.x-HBase-1.1
>
>
> Currently Phoenix performance and functional testing tool {{Pherf}} doesn't have options to pass in Kerberos principal and Keytab to connect to a secure (Kerberized) Phoenix cluster. This prevents running the tool against a Kerberized clusters.
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)