You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@accumulo.apache.org by el...@apache.org on 2015/02/16 23:31:30 UTC
svn commit: r1660234 -
/accumulo/site/trunk/content/release_notes/1.6.2.mdtext
Author: elserj
Date: Mon Feb 16 22:31:30 2015
New Revision: 1660234
URL: http://svn.apache.org/r1660234
Log:
Added POODLE and filemanager semaphore changes
Modified:
accumulo/site/trunk/content/release_notes/1.6.2.mdtext
Modified: accumulo/site/trunk/content/release_notes/1.6.2.mdtext
URL: http://svn.apache.org/viewvc/accumulo/site/trunk/content/release_notes/1.6.2.mdtext?rev=1660234&r1=1660233&r2=1660234&view=diff
==============================================================================
--- accumulo/site/trunk/content/release_notes/1.6.2.mdtext (original)
+++ accumulo/site/trunk/content/release_notes/1.6.2.mdtext Mon Feb 16 22:31:30 2015
@@ -121,15 +121,27 @@ submission operates as previously.
## Performance Improvements
-Apache Accumulo 1.6.2 includes a number of performance-related fixes over previous versions.
+### User scans can block root and metadata table scans
-### Improvement 1
+The TabletServer provides a feature to limit the number of open files as a resource management configuration.
+To perform a scan against a normal table, the metadata and root table, when not cached, need to be consulted
+first. With a sufficient number of concurrent scans against normal tables, adding to the open file count,
+scans against the metadata and root tables could be blocked from running because no files can be opened.
+This prevents other system operations from happening as expected. [ACCUMULO-3297][16] fixes the internal semaphore
+used to implement this resource management to ensure that root and metadata table scans can proceed.
-### Improvement 2
## Other improvements
-### Improvement 1
+### Limit available ciphers for SSL/TLS
+
+Since Apache Accumulo 1.5.2 and 1.6.1, the [POODLE][17] man-in-the-middle attack was found which exploits a client's
+ability to fallback to the SSLv3.0 protocol. The main mitigation strategy was to prevent the use of old ciphers/protocols
+when using SSL connectors. In Accumulo, both the Apache Thrift RPC servers and Jetty server for the Accumulo
+monitor have the ability to enable SSL. [ACCUMULO-3316][18] is the parent issue which provides new configuration
+properties in accumulo-site.xml which can limit the accepted ciphers/protocols. By default, insecure or out-dated
+protocols have been removed from the default set in order to protect users by default.
+
## Documentation
@@ -160,11 +172,11 @@ and, in HDFS High-Availability instances
</tr>
<tr>
<td>CentOS 6</td>
- <td>Keith TBD</td>
+ <td><strong>Keith TBD<strong></td>
<td>20</td>
- <td>Keith TBD</td>
+ <td><strong>Keith TBD<strong></td>
<td>No</td>
- <td>(Keith Verify this) ContinuousIngest w/ verification w/ and w/o agitation (31B and 21B entries, respectively)</td>
+ <td><strong>Keith Verify this<strong> ContinuousIngest w/ verification w/ and w/o agitation (31B and 21B entries, respectively)</td>
</tr>
</table>
@@ -183,4 +195,7 @@ and, in HDFS High-Availability instances
[12]: https://issues.apache.org/jira/browse/ACCUMULO-3233
[13]: https://issues.apache.org/jira/browse/ACCUMULO-3351
[14]: https://issues.apache.org/jira/browse/ACCUMULO-3462
-[15]: https://issues.apache.org/jira/browse/ACCUMULO-3230
\ No newline at end of file
+[15]: https://issues.apache.org/jira/browse/ACCUMULO-3230
+[16]: https://issues.apache.org/jira/browse/ACCUMULO-3297
+[17]: http://en.wikipedia.org/wiki/POODLE
+[18]: https://issues.apache.org/jira/browse/ACCUMULO-3316
\ No newline at end of file