You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@phoenix.apache.org by el...@apache.org on 2016/08/11 03:03:39 UTC

svn commit: r1755899 - in /phoenix/site: publish/release_notes.html source/src/site/markdown/release_notes.md

Author: elserj
Date: Thu Aug 11 03:03:38 2016
New Revision: 1755899

URL: http://svn.apache.org/viewvc?rev=1755899&view=rev
Log:
PHOENIX-3171 Stub release notes for 4.8.0

Modified:
    phoenix/site/publish/release_notes.html
    phoenix/site/source/src/site/markdown/release_notes.md

Modified: phoenix/site/publish/release_notes.html
URL: http://svn.apache.org/viewvc/phoenix/site/publish/release_notes.html?rev=1755899&r1=1755898&r2=1755899&view=diff
==============================================================================
--- phoenix/site/publish/release_notes.html (original)
+++ phoenix/site/publish/release_notes.html Thu Aug 11 03:03:38 2016
@@ -1,7 +1,7 @@
 
 <!DOCTYPE html>
 <!--
- Generated by Apache Maven Doxia at 2016-07-18
+ Generated by Apache Maven Doxia at 2016-08-10
  Rendered using Reflow Maven Skin 1.1.0 (http://andriusvelykis.github.io/reflow-maven-skin)
 -->
 <html  xml:lang="en" lang="en">
@@ -152,6 +152,11 @@
 <p>Release notes provide details on issues and their fixes which may have an impact on prior Phoenix behavior. For some issues an upgrade may be required to be performed for a fix to take affect. See below for directions specific to a particular release.</p> 
 <div class="section"> 
  <div class="section"> 
+  <h3 id="Phoenix-4.8.0_Release_Notes"><u>Phoenix-4.8.0 Release Notes</u></h3> 
+  <p><a class="externalLink" href="https://issues.apache.org/jira/browse/PHOENIX-3164">PHOENIX-3164</a> is a relatively serious bug that affects the <a class="externalLink" href="http://phoenix.apache.org/server.html">Phoenix Query Server</a> deployed with “security enabled” (Kerberos or Active Directory). Due to another late-game change in the 4.8.0 release as well as an issue with the use of Hadoop’s UserGroupInformation class, every “client session” to the Phoenix Query Server with security enabled will result in a new instance of the Phoenix JDBC driver <tt>PhoenixConnection</tt> (and other related classes). This ultimately results in a new connection to ZooKeeper for each “client session”.</p> 
+  <p>Within a short amount of time of active use with the Phoenix Query Server creating a new ZooKeeper connection for each “client session”, the number of ZooKeeper connections will have grown rapidly likely triggering ZooKeeper’s built-in denial of service protection (<a class="externalLink" href="https://zookeeper.apache.org/doc/r3.4.8/zookeeperAdmin.html">maxClientCnxns</a>). This will cause all future connections to ZooKeeper by the host running the Phoenix Query Server to be dropped. This would prevent all HBase client API calls which need to access ZooKeeper from completing.</p> 
+ </div> 
+ <div class="section"> 
   <h3 id="Phoenix-4.5.0_Release_Notes"><u>Phoenix-4.5.0 Release Notes</u></h3> 
   <p>Both <a class="externalLink" href="https://issues.apache.org/jira/browse/PHOENIX-2067">PHOENIX-2067</a> and <a class="externalLink" href="https://issues.apache.org/jira/browse/PHOENIX-2120">PHOENIX-2120</a> cause rows to not be ordered correctly for the following types of columns:</p> 
   <ul> 

Modified: phoenix/site/source/src/site/markdown/release_notes.md
URL: http://svn.apache.org/viewvc/phoenix/site/source/src/site/markdown/release_notes.md?rev=1755899&r1=1755898&r2=1755899&view=diff
==============================================================================
--- phoenix/site/source/src/site/markdown/release_notes.md (original)
+++ phoenix/site/source/src/site/markdown/release_notes.md Thu Aug 11 03:03:38 2016
@@ -4,6 +4,23 @@ Release notes provide details on issues
 Phoenix behavior. For some issues an upgrade may be required to be performed for a fix to
 take affect. See below for directions specific to a particular release.
 
+###<u>Phoenix-4.8.0 Release Notes</u>
+
+[PHOENIX-3164](https://issues.apache.org/jira/browse/PHOENIX-3164) is a relatively serious
+bug that affects the [Phoenix Query Server](http://phoenix.apache.org/server.html)
+deployed with "security enabled" (Kerberos or Active Directory). Due to another late-game
+change in the 4.8.0 release as well as an issue with the use of Hadoop's UserGroupInformation
+class, every "client session" to the Phoenix Query Server with security enabled will
+result in a new instance of the Phoenix JDBC driver `PhoenixConnection` (and other related
+classes). This ultimately results in a new connection to ZooKeeper for each "client session".
+
+Within a short amount of time of active use with the Phoenix Query Server creating a new ZooKeeper
+connection for each "client session", the number of ZooKeeper connections will have grown rapidly
+likely triggering ZooKeeper's built-in denial of service protection
+([maxClientCnxns](https://zookeeper.apache.org/doc/r3.4.8/zookeeperAdmin.html)). This
+will cause all future connections to ZooKeeper by the host running the Phoenix Query Server to
+be dropped. This would prevent all HBase client API calls which need to access ZooKeeper
+from completing.
 
 ###<u>Phoenix-4.5.0 Release Notes</u>
 Both [PHOENIX-2067](https://issues.apache.org/jira/browse/PHOENIX-2067) and