hadoop-mapreduce-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Anoop Sam John (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (MAPREDUCE-4548) M/R jobs can not access S3 if Kerberos is enabled
Date Tue, 28 May 2013 09:45:33 GMT

    [ https://issues.apache.org/jira/browse/MAPREDUCE-4548?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13668210#comment-13668210
] 

Anoop Sam John commented on MAPREDUCE-4548:
-------------------------------------------

With the above mentioned change I am able to disctp data to S3 when security is enabled also.
                
> M/R jobs can not access S3 if Kerberos is enabled
> -------------------------------------------------
>
>                 Key: MAPREDUCE-4548
>                 URL: https://issues.apache.org/jira/browse/MAPREDUCE-4548
>             Project: Hadoop Map/Reduce
>          Issue Type: Bug
>         Environment: hadoop-1.0.0;MIT kerberos;java 1.6.0_26
>            Reporter: Manuel DE FERRAN
>
> With Kerberos enabled, any job that is taking as input or output s3 files fails.
> It can be easily reproduced with wordcount shipped in hadoop-examples.jar and a public
S3 file:
> {code}
> /opt/hadoop/bin/hadoop --config /opt/hadoop/conf/ jar /opt/hadoop/hadoop-examples-1.0.0.jar
wordcount s3n://ubikodpublic/test out01
> {code}
> returns:
> {code}
> 12/08/10 12:40:19 INFO hdfs.DFSClient: Created HDFS_DELEGATION_TOKEN token 192 for hadoop
on 10.85.151.233:9000
> 12/08/10 12:40:19 INFO security.TokenCache: Got dt for hdfs://aws04.machine.com:9000/mapred/staging/hadoop/.staging/job_201208101229_0004;uri=10.85.151.233:9000;t.service=10.85.151.233:9000
> 12/08/10 12:40:19 INFO mapred.JobClient: Cleaning up the staging area hdfs://aws04.machine.com:9000/mapred/staging/hadoop/.staging/job_201208101229_0004
> java.lang.IllegalArgumentException: java.net.UnknownHostException: ubikodpublic
>         at org.apache.hadoop.security.SecurityUtil.buildTokenService(SecurityUtil.java:293)
>         at org.apache.hadoop.security.SecurityUtil.buildDTServiceName(SecurityUtil.java:317)
>         at org.apache.hadoop.fs.FileSystem.getCanonicalServiceName(FileSystem.java:189)
>         at org.apache.hadoop.mapreduce.security.TokenCache.obtainTokensForNamenodesInternal(TokenCache.java:92)
>         at org.apache.hadoop.mapreduce.security.TokenCache.obtainTokensForNamenodes(TokenCache.java:79)
>         at org.apache.hadoop.mapreduce.lib.input.FileInputFormat.listStatus(FileInputFormat.java:197)
>         at org.apache.hadoop.mapreduce.lib.input.FileInputFormat.getSplits(FileInputFormat.java:252)
> <SNIP>
> {code}
> This patch seems to fix it.
> {code}
> Index: core/org/apache/hadoop/security/SecurityUtil.java
> ===================================================================
> --- core/org/apache/hadoop/security/SecurityUtil.java   (révision 1305278)
> +++ core/org/apache/hadoop/security/SecurityUtil.java   (copie de travail)
> @@ -313,6 +313,9 @@
>      if (authority == null || authority.isEmpty()) {
>        return null;
>      }
> +    if (uri.getScheme().equals("s3n") || uri.getScheme().equals("s3")) {
> +      return null;
> +    }
>      InetSocketAddress addr = NetUtils.createSocketAddr(authority, defPort);
>      return buildTokenService(addr).toString();
>     }
> {code}

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

Mime
View raw message