Return-Path: X-Original-To: apmail-giraph-dev-archive@www.apache.org Delivered-To: apmail-giraph-dev-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 88B02F3D7 for ; Mon, 25 Mar 2013 18:17:17 +0000 (UTC) Received: (qmail 28514 invoked by uid 500); 25 Mar 2013 18:17:17 -0000 Delivered-To: apmail-giraph-dev-archive@giraph.apache.org Received: (qmail 28476 invoked by uid 500); 25 Mar 2013 18:17:17 -0000 Mailing-List: contact dev-help@giraph.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@giraph.apache.org Delivered-To: mailing list dev@giraph.apache.org Received: (qmail 28467 invoked by uid 500); 25 Mar 2013 18:17:17 -0000 Delivered-To: apmail-incubator-giraph-dev@incubator.apache.org Received: (qmail 28463 invoked by uid 99); 25 Mar 2013 18:17:17 -0000 Received: from arcas.apache.org (HELO arcas.apache.org) (140.211.11.28) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 25 Mar 2013 18:17:17 +0000 Date: Mon, 25 Mar 2013 18:17:17 +0000 (UTC) From: "Eugene Koontz (JIRA)" To: giraph-dev@incubator.apache.org Message-ID: In-Reply-To: References: Subject: [jira] [Resolved] (GIRAPH-583) Problem with authentication on Hadoop 0.23 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 [ https://issues.apache.org/jira/browse/GIRAPH-583?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Eugene Koontz resolved GIRAPH-583. ---------------------------------- Resolution: Fixed > Problem with authentication on Hadoop 0.23 > ------------------------------------------ > > Key: GIRAPH-583 > URL: https://issues.apache.org/jira/browse/GIRAPH-583 > Project: Giraph > Issue Type: Bug > Reporter: Gianmarco De Francisci Morales > > Hi, > I am trying to run the RWR code on trunk and Hadoop 0.23 with Kerberos authentication, but I get this exception: > {code} > 13/03/23 17:32:36 ERROR security.UserGroupInformation: PriviledgedActionException as:gdfm (auth:KERBEROS) cause:javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)] > 13/03/23 17:32:36 WARN ipc.Client: Exception encountered while connecting to the server : javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)] > 13/03/23 17:32:36 ERROR security.UserGroupInformation: PriviledgedActionException as:gdfm (auth:KERBEROS) cause:java.io.IOException: javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)] > 13/03/23 17:32:36 ERROR security.UserGroupInformation: PriviledgedActionException as:gdfm (auth:KERBEROS) cause:java.io.IOException: Failed on local exception: java.io.IOException: javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)]; Host Details : local host is: "gwta3005.tan.ygrid.yahoo.com/98.138.127.244"; destination host is: ""tiberiumtan-nn1.tan.ygrid.yahoo.com":8020; > Exception in thread "main" java.io.IOException: Failed on local exception: java.io.IOException: javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)]; Host Details : local host is: "gwta3005.tan.ygrid.yahoo.com/98.138.127.244"; destination host is: ""tiberiumtan-nn1.tan.ygrid.yahoo.com":8020; > at org.apache.hadoop.net.NetUtils.wrapException(NetUtils.java:738) > at org.apache.hadoop.ipc.Client.call(Client.java:1092) > at org.apache.hadoop.ipc.WritableRpcEngine$Invoker.invoke(WritableRpcEngine.java:195) > at $Proxy6.getDelegationToken(Unknown Source) > at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) > at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57) > at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) > at java.lang.reflect.Method.invoke(Method.java:601) > at org.apache.hadoop.io.retry.RetryInvocationHandler.invokeMethod(RetryInvocationHandler.java:102) > at org.apache.hadoop.io.retry.RetryInvocationHandler.invoke(RetryInvocationHandler.java:67) > at $Proxy6.getDelegationToken(Unknown Source) > at org.apache.hadoop.hdfs.DFSClient.getDelegationToken(DFSClient.java:603) > at org.apache.hadoop.hdfs.DistributedFileSystem.getDelegationToken(DistributedFileSystem.java:786) > at org.apache.hadoop.fs.FileSystem.collectDelegationTokens(FileSystem.java:466) > at org.apache.hadoop.fs.FileSystem.addDelegationTokens(FileSystem.java:444) > at org.apache.hadoop.mapreduce.security.TokenCache.obtainTokensForNamenodesInternal(TokenCache.java:122) > at org.apache.hadoop.mapreduce.security.TokenCache.obtainTokensForNamenodesInternal(TokenCache.java:101) > at org.apache.hadoop.mapreduce.security.TokenCache.obtainTokensForNamenodes(TokenCache.java:81) > at org.apache.hadoop.mapreduce.lib.output.FileOutputFormat.checkOutputSpecs(FileOutputFormat.java:137) > at org.apache.giraph.io.formats.TextVertexOutputFormat.checkOutputSpecs(TextVertexOutputFormat.java:55) > at org.apache.giraph.bsp.BspOutputFormat.checkOutputSpecs(BspOutputFormat.java:50) > at org.apache.hadoop.mapreduce.JobSubmitter.checkSpecs(JobSubmitter.java:417) > at org.apache.hadoop.mapreduce.JobSubmitter.submitJobInternal(JobSubmitter.java:332) > at org.apache.hadoop.mapreduce.Job$11.run(Job.java:1218) > at org.apache.hadoop.mapreduce.Job$11.run(Job.java:1215) > at java.security.AccessController.doPrivileged(Native Method) > at javax.security.auth.Subject.doAs(Subject.java:415) > at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1221) > at org.apache.hadoop.mapreduce.Job.submit(Job.java:1215) > at org.apache.hadoop.mapreduce.Job.waitForCompletion(Job.java:1236) > at org.apache.giraph.job.GiraphJob.run(GiraphJob.java:237) > at org.apache.giraph.GiraphRunner.run(GiraphRunner.java:81) > at org.apache.hadoop.util.ToolRunner.run(ToolRunner.java:69) > at org.apache.hadoop.util.ToolRunner.run(ToolRunner.java:83) > at org.apache.giraph.GiraphRunner.main(GiraphRunner.java:111) > at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) > at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57) > at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) > at java.lang.reflect.Method.invoke(Method.java:601) > at org.apache.hadoop.util.RunJar.main(RunJar.java:208) > Caused by: java.io.IOException: javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)] > at org.apache.hadoop.ipc.Client$Connection$1.run(Client.java:534) > at java.security.AccessController.doPrivileged(Native Method) > at javax.security.auth.Subject.doAs(Subject.java:415) > at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1221) > at org.apache.hadoop.ipc.Client$Connection.handleSaslConnectionFailure(Client.java:498) > at org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:582) > at org.apache.hadoop.ipc.Client$Connection.access$2000(Client.java:205) > at org.apache.hadoop.ipc.Client.getConnection(Client.java:1198) > at org.apache.hadoop.ipc.Client.call(Client.java:1068) > ... 38 more > Caused by: javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)] > at com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212) > at org.apache.hadoop.security.SaslRpcClient.saslConnect(SaslRpcClient.java:137) > at org.apache.hadoop.ipc.Client$Connection.setupSaslConnection(Client.java:406) > at org.apache.hadoop.ipc.Client$Connection.access$1200(Client.java:205) > at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:575) > at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:572) > at java.security.AccessController.doPrivileged(Native Method) > at javax.security.auth.Subject.doAs(Subject.java:415) > at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1221) > at org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:571) > ... 41 more > Caused by: GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt) > at sun.security.jgss.krb5.Krb5InitCredential.getInstance(Krb5InitCredential.java:147) > at sun.security.jgss.krb5.Krb5MechFactory.getCredentialElement(Krb5MechFactory.java:121) > at sun.security.jgss.krb5.Krb5MechFactory.getMechanismContext(Krb5MechFactory.java:187) > at sun.security.jgss.GSSManagerImpl.getMechanismContext(GSSManagerImpl.java:223) > at sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:212) > at sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:179) > at com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:193) > ... 50 more > {code} > For reference, I am using -Dgiraph.useNetty="true" -Dgiraph.authenticate="true" -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators For more information on JIRA, see: http://www.atlassian.com/software/jira