————— 2022-5-30 —————

case 21:49
https://github.com/apache/incubator-linkis/pull/2197/files @legendtkl  I 
adjusted the initial configuration of linkis-env, please help to review. The 
default deployment mode is adjusted to rely on hdfs

legendtkl 22:09
LGTM

Xu Ling 23:15
https://github.com/apache/incubator-linkis/pull/2186 This is also helpful to 
see, rolled back spotless

legendtkl 23:28
LGTM with minor comments

Xu Ling 23:39
I made some instructions @legendtkl

Xu Ling 23:48
I changed the refactoring piece and submitted it.

————— 2022-5-31 —————

Xu Jie 09:47
@peacewong@WDS  Brother Ping, is there any PR for the latest PRESTO engine, 
does it support KERBEROS?

Heisenberg 09:49
PR is under review, to be merged

Heisenberg 09:49
Does Presto itself need kerberos authentication?

Heisenberg 09:50
Connect to PRESTO with Kerberos authentication?

W 10:03
There is pr, but kerberos is not supported

Mr. Lightning 10:03
For presto, we are currently like this, the transmission between nodes requires 
kerberos, and external access does not require kerberos

W 10:04
Looks like kerberos can be supported

Heisenberg 10:06
It seems that we are also kerberos configured at the level of hive catalog

Heisenberg 10:07
Should be a presto proxy normal user? [doubt]

Mr. Lightning 10:08
@CCweixiao_intsig_leojie  Yes, it means that you transmit data between multiple 
presto work nodes, you can configure kerberos authentication to access hdfs

Xu Jie 10:09
@wForget-iQiyi-Wang Zhen pr send me a look, thank you

Mr. Lightning 10:10
But for external access, we do not have kerberos for the time being, not sure 
if there is such an option

W 10:10
https://github.com/apache/incubator-linkis/pull/2173

W 10:10
@徐杰  Do you need kerberos authentication for client access?

Xu Jie 10:13
Need, linkis here we use the previous presto engine pr, added kerberos 
authentication, can run through

Xu Jie 10:14
It is suitable for trino

W 10:14
oh ok, this is about the same as before

Xu Jie 10:15
OK

W 10:15
Brother Jie, can you help me with the code for kerberos authentication? Later, 
I will add an executor to adapt to trino



—————  2022-5-30  —————

casion 21:49
https://github.com/apache/incubator-linkis/pull/2197/files @legendtkl  
linkis-env的初始配置我调整了,帮review下 。默认部署模式调整为依赖hdfs

legendtkl 22:09
LGTM

许灵 23:15
https://github.com/apache/incubator-linkis/pull/2186 这个也帮忙看一下,把spotless回滚了

legendtkl 23:28
LGTM with minor comments

许灵 23:39
我做了一些说明@legendtkl

许灵 23:48
我把重构那块重新改了一下,提交了一下

—————  2022-5-31  —————

徐杰 09:47
@peacewong@WDS 平哥,最新的PRESTO引擎有PR了吗,支持KERBEROS吗?

海森堡 09:49
PR 在review ,待合并了

海森堡 09:49
Presto 本身需要kerberos认证嘛 杰哥

海森堡 09:50
以Kerberos认证方式连接PRESTO?

W 10:03
有 pr 了,不过没支持 kerberos

闪电先生 10:03
presto的话,目前我们是这样,节点和节点之间的传输需要kerberos,外部访问不需要kerberos

W 10:04
看起来可以支持 kerberos

海森堡 10:06
我们好像也是hive catalog那层配置的kerberos

海森堡 10:07
应该是presto代理普通用户?[疑问]

闪电先生 10:08
@CCweixiao_intsig_leojie 对 就是说 你多个presto work节点之间传输数据,可以配置需要kerberos认证去访问hdfs

徐杰 10:09
@wForget-爱奇艺-王震 pr发给我一下看看,谢谢

闪电先生 10:10
但是外部访问,我们暂时是没有kerberos,不确定有没有这个选项

W 10:10
https://github.com/apache/incubator-linkis/pull/2173

W 10:10
@徐杰  你们客户端访问需要 kerberos 认证吗?

徐杰 10:13
需要的,linkis这边我们这边用的是以前presto引擎pr,自己加了kerberos认证,可以跑通的

徐杰 10:14
适配的是trino

W 10:14
哦哦 好的 这个跟之前差不多的

徐杰 10:15
好的

W 10:15
杰哥帮忙提一下 kerberos 认证的代码?后面我加一个 executor 适配一下 trino

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@linkis.apache.org
For additional commands, e-mail: dev-h...@linkis.apache.org

Reply via email to