Dawnpool commented on PR #12119:
URL: https://github.com/apache/iceberg/pull/12119#issuecomment-2692010557
Hi @bryanck
Please check this PR when you have a chance. Thank you in advance.
--
This is an automated message from the Apache Git Service.
To respond to the message, please log o
juanluhidalgo commented on PR #12119:
URL: https://github.com/apache/iceberg/pull/12119#issuecomment-2648051395
Hi @bryanck, any idea about who might be reviewing this feature?
Thanks advance
--
This is an automated message from the Apache Git Service.
To respond to the message, ple
Dawnpool commented on PR #12119:
URL: https://github.com/apache/iceberg/pull/12119#issuecomment-2632874357
Thanks @bryanck
Could you also mention someone who can review this feature and share some
thoughts if you know anyone?
--
This is an automated message from the Apache Git Service
bryanck commented on PR #12119:
URL: https://github.com/apache/iceberg/pull/12119#issuecomment-2626822428
Thanks @Dawnpool for looking into it. I'm interested to hear what others
think.
--
This is an automated message from the Apache Git Service.
To respond to the message, please log on
Dawnpool commented on PR #12119:
URL: https://github.com/apache/iceberg/pull/12119#issuecomment-2626454244
@bryanck
I believe what I'm referring to is related to the Iceberg Flink sink, which
uses Kerberos-authenticated HDFS as its FileIO.
I'm actually using Flink with Kerberos-authen
Dawnpool commented on PR #12119:
URL: https://github.com/apache/iceberg/pull/12119#issuecomment-2623203039
Hi @bryanck ,
As mentioned in the original
[PR](https://github.com/apache/iceberg/pull/10173#issuecomment-2418414725),
Flink has its own security configuration for Kerberos authenti
bryanck commented on PR #12119:
URL: https://github.com/apache/iceberg/pull/12119#issuecomment-2622206585
If possible, I would like to avoid adding Hadoop/HDFS specific configuration
parameters. Could you research how this is avoided in Flink? We already have an
option to set the Hadoop con
Dawnpool commented on PR #12119:
URL: https://github.com/apache/iceberg/pull/12119#issuecomment-2620702948
Hi @jbonofre
Absolutely! I'll try to add test code once the maintainers agree on this
feature.
--
This is an automated message from the Apache Git Service.
To respond to the mess
juanluhidalgo commented on PR #12119:
URL: https://github.com/apache/iceberg/pull/12119#issuecomment-2618155319
@bryanck could you take a look at this?
Thanks in advance.
--
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub
Dawnpool opened a new pull request, #12119:
URL: https://github.com/apache/iceberg/pull/12119
Hi, I previously submitted a PR for the same feature, but I’m reposting it
since the previous one was closed for some reason. You can find the full
history in the [original PR](https://github.com/a
Dawnpool commented on PR #10173:
URL: https://github.com/apache/iceberg/pull/10173#issuecomment-2618150974
@juanluhidalgo
Just created a new PR here.
https://github.com/apache/iceberg/pull/12119
Thanks!
--
This is an automated message from the Apache Git Service.
To respond to th
Dawnpool commented on PR #10173:
URL: https://github.com/apache/iceberg/pull/10173#issuecomment-2609363690
@bryanck @juanluhidalgo
The PR has been closed for some reason as I was trying to update my main
branch I forked.
I will post a new PR.
--
This is an automated message from th
Dawnpool commented on PR #10173:
URL: https://github.com/apache/iceberg/pull/10173#issuecomment-2563292031
Hi @juanluhidalgo
Sorry for the late reply, and appreciate your interest in this
functionality. (I have also checked your email.)
It's been a while since I last made changes, so
juanluhidalgo commented on PR #10173:
URL: https://github.com/apache/iceberg/pull/10173#issuecomment-2520747853
Hi @Dawnpool I think that the branch has conflicts, anyway @bryanck could
you take a look at this PR?
Thanks in advance.
--
This is an automated message from the Apache G
Dawnpool commented on PR #10173:
URL: https://github.com/apache/iceberg/pull/10173#issuecomment-2482224557
@bryanck
Hi, just a gentle reminder in case you missed. Please take a look when you
get a chance.
--
This is an automated message from the Apache Git Service.
To respond to the m
github-actions[bot] commented on PR #10173:
URL: https://github.com/apache/iceberg/pull/10173#issuecomment-2480862491
This pull request has been marked as stale due to 30 days of inactivity. It
will be closed in 1 week if no further activity occurs. If you think that’s
incorrect or this pul
Dawnpool commented on PR #10173:
URL: https://github.com/apache/iceberg/pull/10173#issuecomment-2418414725
@bryanck
Flink itself has options for Kerberos authentication, not the Flink Iceberg
sink. Here is the reference
[link](https://nightlies.apache.org/flink/flink-docs-master/docs/de
bryanck commented on PR #10173:
URL: https://github.com/apache/iceberg/pull/10173#issuecomment-2417555094
@Dawnpool sorry for the delayed reply. With the Flink Iceberg sink, I don't
believe there are kerberos-specific options, if you could point those out that
would be helpful.
--
This i
Dawnpool commented on PR #10173:
URL: https://github.com/apache/iceberg/pull/10173#issuecomment-2270321532
Hi @bryanck
I did some research and I couldn't really find a way to set the user
principal via an environment variable. Could you please provide more detailed
information about tha
bryanck commented on PR #10173:
URL: https://github.com/apache/iceberg/pull/10173#issuecomment-2233789778
@Dawnpool I'd prefer to keep Hadoop/HDFS specific code out of the sink,
beyond loading generic properties as we're doing now. IIRC you can set the user
principal via an environment vari
Dawnpool commented on PR #10173:
URL: https://github.com/apache/iceberg/pull/10173#issuecomment-2232454330
Hi @bryanck ,
Just a gentle reminder to take a look at my comment when you get a chance.
Thank you!
--
This is an automated message from the Apache Git Service.
To respond to the
Dawnpool commented on PR #10173:
URL: https://github.com/apache/iceberg/pull/10173#issuecomment-2182024037
@bryanck
If I got it right, you’re asking if we can add those configs for Kerberos
authentication via Hadoop config. I found there are Kerberos options for
service principals like
bryanck commented on PR #10173:
URL: https://github.com/apache/iceberg/pull/10173#issuecomment-2171763317
Thanks for the submission @Dawnpool , one question I have is if we can use
the existing facility for setting Hadoop properties, i.e. via the
`iceberg.hadoop.*` config?
--
This is an
Dawnpool commented on PR #10173:
URL: https://github.com/apache/iceberg/pull/10173#issuecomment-2157660809
@bryanck
Hi, I am mentioning you in case you have forgot this PR. Please take a look
and let me know if there is anything more to fix.
--
This is an automated message from the Ap
Dawnpool commented on PR #10173:
URL: https://github.com/apache/iceberg/pull/10173#issuecomment-2105600977
@bryanck
Hi, I have removed Hadoop dependencies and applied reflection to dynamically
load `UserGroupInformation` class and methods, as you guided. Please take a
look at the change
bryanck commented on code in PR #10173:
URL: https://github.com/apache/iceberg/pull/10173#discussion_r1581844369
##
kafka-connect/kafka-connect/src/main/java/org/apache/iceberg/connect/data/Utilities.java:
##
@@ -28,6 +28,8 @@
import java.util.Set;
import java.util.UUID;
impo
bryanck commented on code in PR #10173:
URL: https://github.com/apache/iceberg/pull/10173#discussion_r1581844026
##
kafka-connect/build.gradle:
##
@@ -43,6 +43,7 @@ project(":iceberg-kafka-connect:iceberg-kafka-connect") {
implementation "com.fasterxml.jackson.core:jackson-
Dawnpool opened a new pull request, #10173:
URL: https://github.com/apache/iceberg/pull/10173
Hello,
I am making the same PR as the one in the [original
repository](https://github.com/tabular-io/iceberg-kafka-connect/pull/236)
because I was told that it is being moved to this core reposi
28 matches
Mail list logo