From issues-return-43492-archive-asf-public=cust-asf.ponee.io@tez.apache.org Sat Jan 9 10:24:02 2021 Return-Path: X-Original-To: archive-asf-public@cust-asf.ponee.io Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mxout1-ec2-va.apache.org (mxout1-ec2-va.apache.org [3.227.148.255]) by mx-eu-01.ponee.io (Postfix) with ESMTPS id 46B5B180670 for ; Sat, 9 Jan 2021 11:24:02 +0100 (CET) Received: from mail.apache.org (mailroute1-lw-us.apache.org [207.244.88.153]) by mxout1-ec2-va.apache.org (ASF Mail Server at mxout1-ec2-va.apache.org) with SMTP id 75EF3442CB for ; Sat, 9 Jan 2021 10:24:01 +0000 (UTC) Received: (qmail 14119 invoked by uid 500); 9 Jan 2021 10:24:01 -0000 Mailing-List: contact issues-help@tez.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@tez.apache.org Delivered-To: mailing list issues@tez.apache.org Received: (qmail 14079 invoked by uid 99); 9 Jan 2021 10:24:01 -0000 Received: from mailrelay1-he-de.apache.org (HELO mailrelay1-he-de.apache.org) (116.203.21.61) by apache.org (qpsmtpd/0.29) with ESMTP; Sat, 09 Jan 2021 10:24:01 +0000 Received: from jira2-he-de.apache.org (unknown [IPv6:2a01:4f8:242:1f49::2]) by mailrelay1-he-de.apache.org (ASF Mail Server at mailrelay1-he-de.apache.org) with ESMTPS id 3242C3E856 for ; Sat, 9 Jan 2021 10:24:00 +0000 (UTC) Received: from jira2-he-de.apache.org (localhost.localdomain [127.0.0.1]) by jira2-he-de.apache.org (ASF Mail Server at jira2-he-de.apache.org) with ESMTP id 19599C8028F for ; Sat, 9 Jan 2021 10:24:00 +0000 (UTC) Date: Sat, 9 Jan 2021 10:24:00 +0000 (UTC) From: "Eugene Chung (Jira)" To: issues@tez.apache.org Message-ID: In-Reply-To: References: Subject: [jira] [Updated] (TEZ-4205) Support RM delegation token MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 [ https://issues.apache.org/jira/browse/TEZ-4205?page=3Dcom.atlassian.= jira.plugin.system.issuetabpanels:all-tabpanel ] Eugene Chung updated TEZ-4205: ------------------------------ Description:=20 I have a requirement to get some information from YARN Resource Manager lik= e [NodeReports|#getNodeReports-org.apache.hadoop.yarn.api.records.NodeState= ...-]. But on the kerberized cluster, I can't do it because of kerberos authentica= tion failure.=C2=A0 {code:java} 2020-05-26 14:29:03,044 [ERROR] [InputInitializer {Map 1} #0] |mapreduce.My= InputFormat|: getNodeReports error=20 java.io.IOException: DestHost:destPort my-rm-address:9050 , LocalHost:local= Port my-node-address:0. Failed on local exception: java.io.IOException: org= .apache.hadoop.security.AccessControlException: Client cannot authenticate = via:[TOKEN, KERBEROS] at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method) at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructor= AccessorImpl.java:62) at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingCon= structorAccessorImpl.java:45) at java.lang.reflect.Constructor.newInstance(Constructor.java:423) at org.apache.hadoop.net.NetUtils.wrapWithMessage(NetUtils.java:831) at org.apache.hadoop.net.NetUtils.wrapException(NetUtils.java:806) at org.apache.hadoop.ipc.Client.getRpcResponse(Client.java:1495) at org.apache.hadoop.ipc.Client.call(Client.java:1437) at org.apache.hadoop.ipc.Client.call(Client.java:1347) at org.apache.hadoop.ipc.ProtobufRpcEngine$Invoker.invoke(ProtobufRpcEngin= e.java:228) at org.apache.hadoop.ipc.ProtobufRpcEngine$Invoker.invoke(ProtobufRpcEngin= e.java:116) at com.sun.proxy.$Proxy54.getClusterNodes(Unknown Source) at org.apache.hadoop.yarn.api.impl.pb.client.ApplicationClientProtocolPBCl= ientImpl.getClusterNodes(ApplicationClientProtocolPBClientImpl.java:319) at sun.reflect.GeneratedMethodAccessor30.invoke(Unknown Source) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccesso= rImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.apache.hadoop.io.retry.RetryInvocationHandler.invokeMethod(RetryInv= ocationHandler.java:422) at org.apache.hadoop.io.retry.RetryInvocationHandler$Call.invokeMethod(Ret= ryInvocationHandler.java:165) at org.apache.hadoop.io.retry.RetryInvocationHandler$Call.invoke(RetryInvo= cationHandler.java:157) at org.apache.hadoop.io.retry.RetryInvocationHandler$Call.invokeOnce(Retry= InvocationHandler.java:95) at org.apache.hadoop.io.retry.RetryInvocationHandler.invoke(RetryInvocatio= nHandler.java:359) at com.sun.proxy.$Proxy55.getClusterNodes(Unknown Source) at org.apache.hadoop.yarn.client.api.impl.YarnClientImpl.getNodeReports(Ya= rnClientImpl.java:614) ... at com.naver.mapreduce.MyInputFormat.getSplits(MyInputFormat.java:537) ... at org.apache.hadoop.hive.ql.io.HiveInputFormat.addSplitsForGroup(HiveInpu= tFormat.java:512) at org.apache.hadoop.hive.ql.io.HiveInputFormat.getSplits(HiveInputFormat.= java:781) at org.apache.hadoop.hive.ql.exec.tez.HiveSplitGenerator.initialize(HiveSp= litGenerator.java:243) at org.apache.tez.dag.app.dag.RootInputInitializerManager$InputInitializer= Callable$1.run(RootInputInitializerManager.java:278) at org.apache.tez.dag.app.dag.RootInputInitializerManager$InputInitializer= Callable$1.run(RootInputInitializerManager.java:269) at java.security.AccessController.doPrivileged(Native Method) at javax.security.auth.Subject.doAs(Subject.java:422) at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformati= on.java:1682) at org.apache.tez.dag.app.dag.RootInputInitializerManager$InputInitializer= Callable.call(RootInputInitializerManager.java:269) at org.apache.tez.dag.app.dag.RootInputInitializerManager$InputInitializer= Callable.call(RootInputInitializerManager.java:253) at com.google.common.util.concurrent.TrustedListenableFutureTask$TrustedFu= tureInterruptibleTask.runInterruptibly(TrustedListenableFutureTask.java:108= ) at com.google.common.util.concurrent.InterruptibleTask.run(InterruptibleTa= sk.java:41) at com.google.common.util.concurrent.TrustedListenableFutureTask.run(Trust= edListenableFutureTask.java:77) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.ja= va:1142) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.j= ava:617) at java.lang.Thread.run(Thread.java:745) Caused by: java.io.IOException: org.apache.hadoop.security.AccessControlExc= eption: Client cannot authenticate via:[TOKEN, KERBEROS] at org.apache.hadoop.ipc.Client$Connection$1.run(Client.java:755) at java.security.AccessController.doPrivileged(Native Method) at javax.security.auth.Subject.doAs(Subject.java:422) at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformati= on.java:1682) at org.apache.hadoop.ipc.Client$Connection.handleSaslConnectionFailure(Cli= ent.java:718) at org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:811) at org.apache.hadoop.ipc.Client$Connection.access$3500(Client.java:409) at org.apache.hadoop.ipc.Client.getConnection(Client.java:1552) at org.apache.hadoop.ipc.Client.call(Client.java:1383) ... 35 more Caused by: org.apache.hadoop.security.AccessControlException: Client cannot= authenticate via:[TOKEN, KERBEROS] at org.apache.hadoop.security.SaslRpcClient.selectSaslClient(SaslRpcClient= .java:173) at org.apache.hadoop.security.SaslRpcClient.saslConnect(SaslRpcClient.java= :390) at org.apache.hadoop.ipc.Client$Connection.setupSaslConnection(Client.java= :613) at org.apache.hadoop.ipc.Client$Connection.access$2200(Client.java:409) at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:798) at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:794) at java.security.AccessController.doPrivileged(Native Method) at javax.security.auth.Subject.doAs(Subject.java:422) at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformati= on.java:1682) at org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:794) ... 38 more{code} =C2=A0 So I implemented the feature that generates RM delegation token at=C2=A0Tez= client side like=C2=A0 https://issues.apache.org/jira/browse/TEZ-4032. I borrowed the main code fragment from here, slider=C2=A0[https://github.co= m/apache/incubator-retired-slider/blob/1d4f519d763210f46e327338be72efa99e65= cb5d/slider-core/src/main/java/org/apache/slider/core/launch/CredentialUtil= s.java#L257-L269]=C2=A0which considers RM single/HA case using RM delegatio= n token service. was: I have a requirement to get some information from YARN Resource Manager lik= e [NodeReports|#getNodeReports-org.apache.hadoop.yarn.api.records.NodeState= ...-]]. But on the kerberized cluster, I can't do it because of kerberos authentica= tion failure.=C2=A0 {code:java} 2020-05-26 14:29:03,044 [ERROR] [InputInitializer {Map 1} #0] |mapreduce.My= InputFormat|: getNodeReports error=20 java.io.IOException: DestHost:destPort my-rm-address:9050 , LocalHost:local= Port my-node-address:0. Failed on local exception: java.io.IOException: org= .apache.hadoop.security.AccessControlException: Client cannot authenticate = via:[TOKEN, KERBEROS] at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method) at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructor= AccessorImpl.java:62) at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingCon= structorAccessorImpl.java:45) at java.lang.reflect.Constructor.newInstance(Constructor.java:423) at org.apache.hadoop.net.NetUtils.wrapWithMessage(NetUtils.java:831) at org.apache.hadoop.net.NetUtils.wrapException(NetUtils.java:806) at org.apache.hadoop.ipc.Client.getRpcResponse(Client.java:1495) at org.apache.hadoop.ipc.Client.call(Client.java:1437) at org.apache.hadoop.ipc.Client.call(Client.java:1347) at org.apache.hadoop.ipc.ProtobufRpcEngine$Invoker.invoke(ProtobufRpcEngin= e.java:228) at org.apache.hadoop.ipc.ProtobufRpcEngine$Invoker.invoke(ProtobufRpcEngin= e.java:116) at com.sun.proxy.$Proxy54.getClusterNodes(Unknown Source) at org.apache.hadoop.yarn.api.impl.pb.client.ApplicationClientProtocolPBCl= ientImpl.getClusterNodes(ApplicationClientProtocolPBClientImpl.java:319) at sun.reflect.GeneratedMethodAccessor30.invoke(Unknown Source) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccesso= rImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.apache.hadoop.io.retry.RetryInvocationHandler.invokeMethod(RetryInv= ocationHandler.java:422) at org.apache.hadoop.io.retry.RetryInvocationHandler$Call.invokeMethod(Ret= ryInvocationHandler.java:165) at org.apache.hadoop.io.retry.RetryInvocationHandler$Call.invoke(RetryInvo= cationHandler.java:157) at org.apache.hadoop.io.retry.RetryInvocationHandler$Call.invokeOnce(Retry= InvocationHandler.java:95) at org.apache.hadoop.io.retry.RetryInvocationHandler.invoke(RetryInvocatio= nHandler.java:359) at com.sun.proxy.$Proxy55.getClusterNodes(Unknown Source) at org.apache.hadoop.yarn.client.api.impl.YarnClientImpl.getNodeReports(Ya= rnClientImpl.java:614) ... at com.naver.mapreduce.MyInputFormat.getSplits(MyInputFormat.java:537) ... at org.apache.hadoop.hive.ql.io.HiveInputFormat.addSplitsForGroup(HiveInpu= tFormat.java:512) at org.apache.hadoop.hive.ql.io.HiveInputFormat.getSplits(HiveInputFormat.= java:781) at org.apache.hadoop.hive.ql.exec.tez.HiveSplitGenerator.initialize(HiveSp= litGenerator.java:243) at org.apache.tez.dag.app.dag.RootInputInitializerManager$InputInitializer= Callable$1.run(RootInputInitializerManager.java:278) at org.apache.tez.dag.app.dag.RootInputInitializerManager$InputInitializer= Callable$1.run(RootInputInitializerManager.java:269) at java.security.AccessController.doPrivileged(Native Method) at javax.security.auth.Subject.doAs(Subject.java:422) at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformati= on.java:1682) at org.apache.tez.dag.app.dag.RootInputInitializerManager$InputInitializer= Callable.call(RootInputInitializerManager.java:269) at org.apache.tez.dag.app.dag.RootInputInitializerManager$InputInitializer= Callable.call(RootInputInitializerManager.java:253) at com.google.common.util.concurrent.TrustedListenableFutureTask$TrustedFu= tureInterruptibleTask.runInterruptibly(TrustedListenableFutureTask.java:108= ) at com.google.common.util.concurrent.InterruptibleTask.run(InterruptibleTa= sk.java:41) at com.google.common.util.concurrent.TrustedListenableFutureTask.run(Trust= edListenableFutureTask.java:77) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.ja= va:1142) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.j= ava:617) at java.lang.Thread.run(Thread.java:745) Caused by: java.io.IOException: org.apache.hadoop.security.AccessControlExc= eption: Client cannot authenticate via:[TOKEN, KERBEROS] at org.apache.hadoop.ipc.Client$Connection$1.run(Client.java:755) at java.security.AccessController.doPrivileged(Native Method) at javax.security.auth.Subject.doAs(Subject.java:422) at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformati= on.java:1682) at org.apache.hadoop.ipc.Client$Connection.handleSaslConnectionFailure(Cli= ent.java:718) at org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:811) at org.apache.hadoop.ipc.Client$Connection.access$3500(Client.java:409) at org.apache.hadoop.ipc.Client.getConnection(Client.java:1552) at org.apache.hadoop.ipc.Client.call(Client.java:1383) ... 35 more Caused by: org.apache.hadoop.security.AccessControlException: Client cannot= authenticate via:[TOKEN, KERBEROS] at org.apache.hadoop.security.SaslRpcClient.selectSaslClient(SaslRpcClient= .java:173) at org.apache.hadoop.security.SaslRpcClient.saslConnect(SaslRpcClient.java= :390) at org.apache.hadoop.ipc.Client$Connection.setupSaslConnection(Client.java= :613) at org.apache.hadoop.ipc.Client$Connection.access$2200(Client.java:409) at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:798) at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:794) at java.security.AccessController.doPrivileged(Native Method) at javax.security.auth.Subject.doAs(Subject.java:422) at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformati= on.java:1682) at org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:794) ... 38 more{code} =C2=A0 So I implemented the feature that generates RM delegation token at=C2=A0Tez= client side like=C2=A0 https://issues.apache.org/jira/browse/TEZ-4032. I borrowed the main code fragment from here, slider=C2=A0[https://github.co= m/apache/incubator-retired-slider/blob/1d4f519d763210f46e327338be72efa99e65= cb5d/slider-core/src/main/java/org/apache/slider/core/launch/CredentialUtil= s.java#L257-L269]=C2=A0which considers RM single/HA case using RM delegatio= n token service. > Support RM delegation token > --------------------------- > > Key: TEZ-4205 > URL: https://issues.apache.org/jira/browse/TEZ-4205 > Project: Apache Tez > Issue Type: Improvement > Reporter: Eugene Chung > Priority: Major > Attachments: TEZ-4205-0.9.2.patch, TEZ-4205.01.patch > > > I have a requirement to get some information from YARN Resource Manager l= ike [NodeReports|#getNodeReports-org.apache.hadoop.yarn.api.records.NodeSta= te...-]. > But on the kerberized cluster, I can't do it because of kerberos authenti= cation failure.=C2=A0 > {code:java} > 2020-05-26 14:29:03,044 [ERROR] [InputInitializer {Map 1} #0] |mapreduce.= MyInputFormat|: getNodeReports error=20 > java.io.IOException: DestHost:destPort my-rm-address:9050 , LocalHost:loc= alPort my-node-address:0. Failed on local exception: java.io.IOException: o= rg.apache.hadoop.security.AccessControlException: Client cannot authenticat= e via:[TOKEN, KERBEROS] > at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method) > at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstruct= orAccessorImpl.java:62) > at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingC= onstructorAccessorImpl.java:45) > at java.lang.reflect.Constructor.newInstance(Constructor.java:423) > at org.apache.hadoop.net.NetUtils.wrapWithMessage(NetUtils.java:831) > at org.apache.hadoop.net.NetUtils.wrapException(NetUtils.java:806) > at org.apache.hadoop.ipc.Client.getRpcResponse(Client.java:1495) > at org.apache.hadoop.ipc.Client.call(Client.java:1437) > at org.apache.hadoop.ipc.Client.call(Client.java:1347) > at org.apache.hadoop.ipc.ProtobufRpcEngine$Invoker.invoke(ProtobufRpcEng= ine.java:228) > at org.apache.hadoop.ipc.ProtobufRpcEngine$Invoker.invoke(ProtobufRpcEng= ine.java:116) > at com.sun.proxy.$Proxy54.getClusterNodes(Unknown Source) > at org.apache.hadoop.yarn.api.impl.pb.client.ApplicationClientProtocolPB= ClientImpl.getClusterNodes(ApplicationClientProtocolPBClientImpl.java:319) > at sun.reflect.GeneratedMethodAccessor30.invoke(Unknown Source) > at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAcces= sorImpl.java:43) > at java.lang.reflect.Method.invoke(Method.java:498) > at org.apache.hadoop.io.retry.RetryInvocationHandler.invokeMethod(RetryI= nvocationHandler.java:422) > at org.apache.hadoop.io.retry.RetryInvocationHandler$Call.invokeMethod(R= etryInvocationHandler.java:165) > at org.apache.hadoop.io.retry.RetryInvocationHandler$Call.invoke(RetryIn= vocationHandler.java:157) > at org.apache.hadoop.io.retry.RetryInvocationHandler$Call.invokeOnce(Ret= ryInvocationHandler.java:95) > at org.apache.hadoop.io.retry.RetryInvocationHandler.invoke(RetryInvocat= ionHandler.java:359) > at com.sun.proxy.$Proxy55.getClusterNodes(Unknown Source) > at org.apache.hadoop.yarn.client.api.impl.YarnClientImpl.getNodeReports(= YarnClientImpl.java:614) > ... > at com.naver.mapreduce.MyInputFormat.getSplits(MyInputFormat.java:537) > ... > at org.apache.hadoop.hive.ql.io.HiveInputFormat.addSplitsForGroup(HiveIn= putFormat.java:512) > at org.apache.hadoop.hive.ql.io.HiveInputFormat.getSplits(HiveInputForma= t.java:781) > at org.apache.hadoop.hive.ql.exec.tez.HiveSplitGenerator.initialize(Hive= SplitGenerator.java:243) > at org.apache.tez.dag.app.dag.RootInputInitializerManager$InputInitializ= erCallable$1.run(RootInputInitializerManager.java:278) > at org.apache.tez.dag.app.dag.RootInputInitializerManager$InputInitializ= erCallable$1.run(RootInputInitializerManager.java:269) > at java.security.AccessController.doPrivileged(Native Method) > at javax.security.auth.Subject.doAs(Subject.java:422) > at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInforma= tion.java:1682) > at org.apache.tez.dag.app.dag.RootInputInitializerManager$InputInitializ= erCallable.call(RootInputInitializerManager.java:269) > at org.apache.tez.dag.app.dag.RootInputInitializerManager$InputInitializ= erCallable.call(RootInputInitializerManager.java:253) > at com.google.common.util.concurrent.TrustedListenableFutureTask$Trusted= FutureInterruptibleTask.runInterruptibly(TrustedListenableFutureTask.java:1= 08) > at com.google.common.util.concurrent.InterruptibleTask.run(Interruptible= Task.java:41) > at com.google.common.util.concurrent.TrustedListenableFutureTask.run(Tru= stedListenableFutureTask.java:77) > at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.= java:1142) > at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor= .java:617) > at java.lang.Thread.run(Thread.java:745) > Caused by: java.io.IOException: org.apache.hadoop.security.AccessControlE= xception: Client cannot authenticate via:[TOKEN, KERBEROS] > at org.apache.hadoop.ipc.Client$Connection$1.run(Client.java:755) > at java.security.AccessController.doPrivileged(Native Method) > at javax.security.auth.Subject.doAs(Subject.java:422) > at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInforma= tion.java:1682) > at org.apache.hadoop.ipc.Client$Connection.handleSaslConnectionFailure(C= lient.java:718) > at org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:81= 1) > at org.apache.hadoop.ipc.Client$Connection.access$3500(Client.java:409) > at org.apache.hadoop.ipc.Client.getConnection(Client.java:1552) > at org.apache.hadoop.ipc.Client.call(Client.java:1383) > ... 35 more > Caused by: org.apache.hadoop.security.AccessControlException: Client cann= ot authenticate via:[TOKEN, KERBEROS] > at org.apache.hadoop.security.SaslRpcClient.selectSaslClient(SaslRpcClie= nt.java:173) > at org.apache.hadoop.security.SaslRpcClient.saslConnect(SaslRpcClient.ja= va:390) > at org.apache.hadoop.ipc.Client$Connection.setupSaslConnection(Client.ja= va:613) > at org.apache.hadoop.ipc.Client$Connection.access$2200(Client.java:409) > at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:798) > at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:794) > at java.security.AccessController.doPrivileged(Native Method) > at javax.security.auth.Subject.doAs(Subject.java:422) > at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInforma= tion.java:1682) > at org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:79= 4) > ... 38 more{code} > =C2=A0 > So I implemented the feature that generates RM delegation token at=C2=A0T= ez client side like=C2=A0 https://issues.apache.org/jira/browse/TEZ-4032. > I borrowed the main code fragment from here, slider=C2=A0[https://github.= com/apache/incubator-retired-slider/blob/1d4f519d763210f46e327338be72efa99e= 65cb5d/slider-core/src/main/java/org/apache/slider/core/launch/CredentialUt= ils.java#L257-L269]=C2=A0which considers RM single/HA case using RM delegat= ion token service. -- This message was sent by Atlassian Jira (v8.3.4#803005)