You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@drill.apache.org by ts...@apache.org on 2015/05/05 20:32:09 UTC

[6/7] drill git commit: republish per Tomer

republish per Tomer


Project: http://git-wip-us.apache.org/repos/asf/drill/repo
Commit: http://git-wip-us.apache.org/repos/asf/drill/commit/707190d4
Tree: http://git-wip-us.apache.org/repos/asf/drill/tree/707190d4
Diff: http://git-wip-us.apache.org/repos/asf/drill/diff/707190d4

Branch: refs/heads/gh-pages
Commit: 707190d45936ed14d63fbfe00ca2eb8789da6523
Parents: 04ed3f5
Author: Kristine Hahn <kh...@maprtech.com>
Authored: Tue May 5 09:48:56 2015 -0700
Committer: Kristine Hahn <kh...@maprtech.com>
Committed: Tue May 5 09:48:56 2015 -0700

----------------------------------------------------------------------
 _docs/rn/070-0.9.0-rn.md | 1 +
 1 file changed, 1 insertion(+)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/drill/blob/707190d4/_docs/rn/070-0.9.0-rn.md
----------------------------------------------------------------------
diff --git a/_docs/rn/070-0.9.0-rn.md b/_docs/rn/070-0.9.0-rn.md
index edae5c8..761269d 100755
--- a/_docs/rn/070-0.9.0-rn.md
+++ b/_docs/rn/070-0.9.0-rn.md
@@ -4,6 +4,7 @@ parent: "Release Notes"
 ---
 It has been about a month since the release of Drill 0.8, which included [more than 240 improvements]({{ site.baseurl }}/blog/drill-0.8-released/). Today we're happy to announce the availability of Drill 0.9, providing additional enhancements and bug fixes. In fact, this release includes [200 resolved JIRAs](https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=12313820&version=12328813). Some of the noteworthy features in Drill 0.9 are:
 
+* **Upgrading** Remove the old version before upgrading, as described in "[Upgrading to the Latest Version of Apache Drill](http://doc.mapr.com/display/MapR/Upgrading+to+the+Latest+Version+of+Apache+Drill)."
 * **Authentication** ([DRILL-2674](https://issues.apache.org/jira/browse/DRILL-2674)). Drill now supports username/password authentication through the Java and C++ clients, as well as JDBC and ODBC. On the server-side, Drill leverages Linux PAM to securely validate the credentials. Users can choose to use an external user directory such as Active Directory or LDAP. To enable authentication, set the `security.user.auth` option in `drill-override.conf`.
 * **Impersonation** ([DRILL-2363](https://issues.apache.org/jira/browse/DRILL-2363)). Queries now execute and access resources using the identity of the user who submitted the query. Previously, all queries would run as the same user (eg, `drill`). With the new impersonation capability, the query will fail if the submitting user does not have permission to read the requested file(s) in the distributed file system. To enable impersonation, set the `drill.exec.impersonation` option in `drill-override.conf`.
 * **Ownership chaining**. Drill now allows views with different owners to be chained. This represents a very flexible access control solution. For example, an administrator with access to raw, sensitive data could create a view called `masked` which would expose only a subset of the data to other users. The administrator would enable users to read the `masked` view but not the raw data. Note that Drill provides an option `max_chained_user_hops` that specifies how many ownership changed are allowed in a chain, thereby providing administrators (or data stewards) more control over sharing of data.