————— 2022-5-30 ————— case 21:49 https://github.com/apache/incubator-linkis/pull/2197/files @legendtkl I adjusted the initial configuration of linkis-env, please help to review. The default deployment mode is adjusted to rely on hdfs
legendtkl 22:09 LGTM Xu Ling 23:15 https://github.com/apache/incubator-linkis/pull/2186 This is also helpful to see, rolled back spotless legendtkl 23:28 LGTM with minor comments Xu Ling 23:39 I made some instructions @legendtkl Xu Ling 23:48 I changed the refactoring piece and submitted it. ————— 2022-5-31 ————— Xu Jie 09:47 @peacewong@WDS Brother Ping, is there any PR for the latest PRESTO engine, does it support KERBEROS? Heisenberg 09:49 PR is under review, to be merged Heisenberg 09:49 Does Presto itself need kerberos authentication? Heisenberg 09:50 Connect to PRESTO with Kerberos authentication? W 10:03 There is pr, but kerberos is not supported Mr. Lightning 10:03 For presto, we are currently like this, the transmission between nodes requires kerberos, and external access does not require kerberos W 10:04 Looks like kerberos can be supported Heisenberg 10:06 It seems that we are also kerberos configured at the level of hive catalog Heisenberg 10:07 Should be a presto proxy normal user? [doubt] Mr. Lightning 10:08 @CCweixiao_intsig_leojie Yes, it means that you transmit data between multiple presto work nodes, you can configure kerberos authentication to access hdfs Xu Jie 10:09 @wForget-iQiyi-Wang Zhen pr send me a look, thank you Mr. Lightning 10:10 But for external access, we do not have kerberos for the time being, not sure if there is such an option W 10:10 https://github.com/apache/incubator-linkis/pull/2173 W 10:10 @徐杰 Do you need kerberos authentication for client access? Xu Jie 10:13 Need, linkis here we use the previous presto engine pr, added kerberos authentication, can run through Xu Jie 10:14 It is suitable for trino W 10:14 oh ok, this is about the same as before Xu Jie 10:15 OK W 10:15 Brother Jie, can you help me with the code for kerberos authentication? Later, I will add an executor to adapt to trino ————— 2022-5-30 ————— casion 21:49 https://github.com/apache/incubator-linkis/pull/2197/files @legendtkl linkis-env的初始配置我调整了,帮review下 。默认部署模式调整为依赖hdfs legendtkl 22:09 LGTM 许灵 23:15 https://github.com/apache/incubator-linkis/pull/2186 这个也帮忙看一下,把spotless回滚了 legendtkl 23:28 LGTM with minor comments 许灵 23:39 我做了一些说明@legendtkl 许灵 23:48 我把重构那块重新改了一下,提交了一下 ————— 2022-5-31 ————— 徐杰 09:47 @peacewong@WDS 平哥,最新的PRESTO引擎有PR了吗,支持KERBEROS吗? 海森堡 09:49 PR 在review ,待合并了 海森堡 09:49 Presto 本身需要kerberos认证嘛 杰哥 海森堡 09:50 以Kerberos认证方式连接PRESTO? W 10:03 有 pr 了,不过没支持 kerberos 闪电先生 10:03 presto的话,目前我们是这样,节点和节点之间的传输需要kerberos,外部访问不需要kerberos W 10:04 看起来可以支持 kerberos 海森堡 10:06 我们好像也是hive catalog那层配置的kerberos 海森堡 10:07 应该是presto代理普通用户?[疑问] 闪电先生 10:08 @CCweixiao_intsig_leojie 对 就是说 你多个presto work节点之间传输数据,可以配置需要kerberos认证去访问hdfs 徐杰 10:09 @wForget-爱奇艺-王震 pr发给我一下看看,谢谢 闪电先生 10:10 但是外部访问,我们暂时是没有kerberos,不确定有没有这个选项 W 10:10 https://github.com/apache/incubator-linkis/pull/2173 W 10:10 @徐杰 你们客户端访问需要 kerberos 认证吗? 徐杰 10:13 需要的,linkis这边我们这边用的是以前presto引擎pr,自己加了kerberos认证,可以跑通的 徐杰 10:14 适配的是trino W 10:14 哦哦 好的 这个跟之前差不多的 徐杰 10:15 好的 W 10:15 杰哥帮忙提一下 kerberos 认证的代码?后面我加一个 executor 适配一下 trino --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscr...@linkis.apache.org For additional commands, e-mail: dev-h...@linkis.apache.org