HBase 1.1.13.0-1912 (EEP 6.3.0) Release Notes

The notes below relate to the MapR Converged Data Platform.

These release notes contain only MapR-specific information and are not necessarily cumulative in nature. For information about how to use the release notes, see Ecosystem Component Release Notes.

Version 1.1.13.0
Release Date December 2019
MapR Version Interoperability See EEP Components and OS Support.
Source on GitHub https://github.com/mapr/hbase
GitHub Release Tag 1.1.13.0-mapr-630
Maven Artifacts https://repository.mapr.com/maven/
Package Names Navigate to https://package.ezmeral.hpe.com/releases/MEP/ and select your EEP and OS to view the list of package names.

New in this Release

  • Added HBase Master and RegionServer services.
  • Added MaprSasl support for HBase Master, RegionServer, REST, and Thrift.
  • Added configurable HTTP Security Headers.
  • Added the use of HTTP principal for Kerberos authentication for HBase Thrift.

Fixes

This MapR release includes the following fixes on the base Apache release. For details, refer to the commit log for this project in GitHub.

Commit Date (YYYY-MM-DD) Comment
ac9f771e 2019-01-11 HBASE-24: The key store and trust store password for hbase-rest and hbase-thrift should be taken from ssl-client.xml
39be41fc 2019-01-23 HBASE-36: Implement configure.sh script for HBase.

Warden files were added, existing were changed.

Configure.sh logic was changed.

f2ad71cd 2018-12-13 HBASE-47: Enable authentication for HBase
8b541603 2018-11-18 [SPARK-343] Mapr-db binary connector for Spark does not match predicate with binary keys
43a979f1 2018-12-13 MAPR-15021: HBase package shouldn't contain maprfs jar
713b2026 2019-03-18 MAPR-HBASE-48: HBase: Encrypt RPC connection
ff05a227 2019-01-04 MAPR-HBASE-72: Add opportunity to use security parameters to hbase-rest-1.1.13-mapr-1710-sources.jar!/org/apache/hadoop/hbase/rest/client/Client
8018fae0 2019-01-04 MAPR-HBASE-68: HBase: Enable security for HBase Thrift
a6c11486 2019-01-18 MAPR-HBASE-78: Make HBase Info Web UIs secure
b66dc1d4 2019-01-23 MAPR-HBASE-45: Monitoring: HBase should be monitored by Spyglass
c345baa4 2019-01-25 MAPR-HBASE-88: Endpoint /status/cluster returns list tables instead cluster status
e751182c 2019-02-25 MAPR-HBASE-75: Hbase importtsv mapreduce job failed with 'Try to get a MapR table object from a non-MapR connection'
3a5d84f5 2019-02-25 MAPR-HBASE-97: HBase not working on kerberos cluster
0f9393f1 2019-02-26 MAPR-HBASE-80: CVE-2018-1320 vulnerability in Apache Thrift
bda6a8db 2019-04-04 MAPR-HBASE-107: Change default zookeeper port for hbase
11686313 2019-06-06 MAPR-HBASE-115: mapr.hbase.default.db is changed to default after each run of configure.sh
b11dccd7 2019-06-12 MAPR-HBASE-116: Problem accessing /version/cluster at REST server
c1cb35ec 2019-07-10 MAPR-HBASE-117: Endpoint /status/cluster returns error 500
40fc9b8f 2019-07-17 MAPR-HBASE-119: There are no secure properties in the hbase-site.xml after upgrade from 1.1.8 to 1.1.13
e5c8f29b 2019-08-15 MAPR-HBASE-124: Skip delegation token generation for MaprDB connections
9fc34e70 2019-08-21 MAPR-HBASE-125: Incorrect parsing of kerberosEnable parameter in mapr-clusters.conf leads to errors while starting services in kerberos mode
8ab15ce0 2019-09-13 MAPR-HBASE-126: There is no PAM for HBase Web UIs on kerberos cluster
c0844912 2019-11-06 MAPR-HBASE-127: Add security headers for HBase webservices
606e4555 2019-10-31 MAPR-SPARK-632: Change spark version to 2.4.4.0 for MEP-6.3.0 in pom.xml
7e59aa10 2019-11-07 MAPR-HBASE-130: Uninformative error when impersonation user does not have permissions
53052a5f

89b27e57

2019-11-15 MAPR-HBASE-132: '401 Client Error' when try to open HBase Browser in Hue on kerberos cluster
438db6a8 2019-11-29 CORE-347: fix handling of defaultdb
6f864c85 2019-11-28 HBASE-134: fix usage of not_configure_yet and allow multiple configure.sh runs

Known Issues and Limitations

This release contains the following known issues and limitations:
  • ASYNC-5: MapR-SASL security is not implemented in AsyncHBase. As a result, an AsyncHBase client connection fails on a secure MapR cluster. Workaround: Implement AsyncHBase security, or disable HBase security.
  • MapR client nodes cannot be configured for HBase by using the configure.sh script. Workaround: To configure an HBase client node, you can use the configure_client.sh script. For more information, see Configuring HBase on a Client Node.
  • MD-5925: Drill versions 1.11.0 through 1.16.0.x do not support querying HBase tables. Workaround: None.
  • ASYNC-9: An error is generated when AsyncHBase is used to put data to a cluster with HBase and Kerberos configured. The error occurs when hbase.rpc.protection is set to privacy or integrity in the AsyncHbase client configuration. Workaround: To avoid the error, set hbase.rpc.protection to authentication.

Resolved Issues

  • None.