CR7Zhang opened a new issue, #6592:
URL: https://github.com/apache/seatunnel/issues/6592

   ### Search before asking
   
   - [X] I had searched in the 
[issues](https://github.com/apache/seatunnel/issues?q=is%3Aissue+label%3A%22bug%22)
 and found no similar issues.
   
   
   ### What happened
   
   update to 2.3.4 hive kerberos error (Hive sink)
   
   ### SeaTunnel Version
   
   2.3.4
   
   ### SeaTunnel Config
   
   ```conf
   {
       "transform" : [
           {
               "field_mapper" : {
                   "id" : "id",
                   "name" : "name",
                   "age" : "age",
                   "grade" : "grade",
                   "score" : "score"
               },
               "source_table_name" : "source",
               "result_table_name" : "transform1",
               "plugin_name" : "FieldMapper"
           }
       ],
       "sink" : [
           {
               "hive_site_path" : 
"/home/hxsjzt/soft/seatunnel/apache-seatunnel-2.3.4/config/hive-site.xml",
               "hdfs_site_path" : 
"/home/hxsjzt/soft/seatunnel/apache-seatunnel-2.3.4/config/hdfs-site.xml",
               "metastore_uri" : "thrift://10.3.240.170:9083",
               "source_table_name" : "transform1",
               "plugin_name" : "Hive",
               "table_name" : "sjzt.student_zr",
               "krb5_path" : "/etc/krb5.conf",
               "kerberos_principal" : "[email protected]",
               "kerberos_keytab_path" : "/etc/sjzt.keytab"
           }
       ],
       "source" : [
           {
               "driver" : "com.mysql.cj.jdbc.Driver",
               "url" : 
"jdbc:mysql://10.2.13.125:8801/sjzt?useSSL=false?rewriteBatchedStatements=true&useUnicode=true&characterEncoding=utf8&useSSL=false&serverTimezone=Asia/Shanghai&nullCatalogMeansCurrent=true&allowPublicKeyRetrieval=true",
               "user" : "hxsjzt",
               "password" : "xxxxxxx",
               "query" : "select id,name,age,grade,score from sjzt.student",
               "plugin_name" : "Jdbc",
               "result_table_name" : "source"
           }
       ],
       "env" : {
           "job.mode" : "BATCH",
           "execution.parallelism" : 1
       }
   }
   ```
   
   
   ### Running Command
   
   ```shell
   ./bin/seatunnel.sh --config ./jobFile/mysql_hive.json
   ```
   
   
   ### Error Exception
   
   ```log
   2024-03-27 17:01:04,941 ERROR [o.a.t.t.TSaslTransport        ] [main] - SASL 
negotiation failure
   javax.security.sasl.SaslException: GSS initiate failed
        at 
com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:211)
 ~[?:1.8.0_351]
        at 
org.apache.thrift.transport.TSaslClientTransport.handleSaslStartMessage(TSaslClientTransport.java:94)
 ~[hive-exec-2.3.9.jar:2.3.9]
        at 
org.apache.thrift.transport.TSaslTransport.open(TSaslTransport.java:271) 
~[hive-exec-2.3.9.jar:2.3.9]
        at 
org.apache.thrift.transport.TSaslClientTransport.open(TSaslClientTransport.java:37)
 ~[hive-exec-2.3.9.jar:2.3.9]
        at 
org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport$1.run(TUGIAssumingTransport.java:52)
 ~[hive-exec-2.3.9.jar:2.3.9]
        at 
org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport$1.run(TUGIAssumingTransport.java:49)
 ~[hive-exec-2.3.9.jar:2.3.9]
        at java.security.AccessController.doPrivileged(Native Method) 
~[?:1.8.0_351]
        at javax.security.auth.Subject.doAs(Subject.java:422) ~[?:1.8.0_351]
        at 
org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1729)
 ~[seatunnel-hadoop3-3.1.4-uber.jar:2.3.4]
        at 
org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport.open(TUGIAssumingTransport.java:49)
 ~[hive-exec-2.3.9.jar:2.3.9]
        at 
org.apache.hadoop.hive.metastore.HiveMetaStoreClient.open(HiveMetaStoreClient.java:478)
 ~[hive-exec-2.3.9.jar:2.3.9]
        at 
org.apache.hadoop.hive.metastore.HiveMetaStoreClient.<init>(HiveMetaStoreClient.java:245)
 ~[hive-exec-2.3.9.jar:2.3.9]
        at 
org.apache.hadoop.hive.metastore.HiveMetaStoreClient.<init>(HiveMetaStoreClient.java:128)
 ~[hive-exec-2.3.9.jar:2.3.9]
        at 
org.apache.seatunnel.connectors.seatunnel.hive.utils.HiveMetaStoreProxy.lambda$new$0(HiveMetaStoreProxy.java:73)
 ~[connector-hive-2.3.4.jar:2.3.4]
        at 
org.apache.seatunnel.connectors.seatunnel.file.hadoop.HadoopLoginFactory.lambda$loginWithKerberos$0(HadoopLoginFactory.java:52)
 ~[connector-hive-2.3.4.jar:2.3.4]
        at java.security.AccessController.doPrivileged(Native Method) 
~[?:1.8.0_351]
        at javax.security.auth.Subject.doAs(Subject.java:422) [?:1.8.0_351]
        at 
org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1729)
 [seatunnel-hadoop3-3.1.4-uber.jar:2.3.4]
        at 
org.apache.seatunnel.connectors.seatunnel.file.hadoop.HadoopLoginFactory.loginWithKerberos(HadoopLoginFactory.java:50)
 [connector-hive-2.3.4.jar:2.3.4]
        at 
org.apache.seatunnel.connectors.seatunnel.hive.utils.HiveMetaStoreProxy.<init>(HiveMetaStoreProxy.java:63)
 [connector-hive-2.3.4.jar:2.3.4]
        at 
org.apache.seatunnel.connectors.seatunnel.hive.utils.HiveMetaStoreProxy.getInstance(HiveMetaStoreProxy.java:116)
 [connector-hive-2.3.4.jar:2.3.4]
        at 
org.apache.seatunnel.connectors.seatunnel.hive.config.HiveConfig.getTableInfo(HiveConfig.java:73)
 [connector-hive-2.3.4.jar:2.3.4]
        at 
org.apache.seatunnel.connectors.seatunnel.hive.sink.HiveSink.prepare(HiveSink.java:122)
 [connector-hive-2.3.4.jar:2.3.4]
        at 
org.apache.seatunnel.engine.core.parse.JobConfigParser.parseSink(JobConfigParser.java:200)
 [seatunnel-starter.jar:2.3.4]
        at 
org.apache.seatunnel.engine.core.parse.JobConfigParser.parseSinks(JobConfigParser.java:170)
 [seatunnel-starter.jar:2.3.4]
        at 
org.apache.seatunnel.engine.core.parse.MultipleTableJobConfigParser.parseSink(MultipleTableJobConfigParser.java:531)
 [seatunnel-starter.jar:2.3.4]
        at 
org.apache.seatunnel.engine.core.parse.MultipleTableJobConfigParser.parse(MultipleTableJobConfigParser.java:193)
 [seatunnel-starter.jar:2.3.4]
        at 
org.apache.seatunnel.engine.client.job.ClientJobExecutionEnvironment.getLogicalDag(ClientJobExecutionEnvironment.java:88)
 [seatunnel-starter.jar:2.3.4]
        at 
org.apache.seatunnel.engine.client.job.ClientJobExecutionEnvironment.execute(ClientJobExecutionEnvironment.java:161)
 [seatunnel-starter.jar:2.3.4]
        at 
org.apache.seatunnel.core.starter.seatunnel.command.ClientExecuteCommand.execute(ClientExecuteCommand.java:146)
 [seatunnel-starter.jar:2.3.4]
        at org.apache.seatunnel.core.starter.SeaTunnel.run(SeaTunnel.java:40) 
[seatunnel-starter.jar:2.3.4]
        at 
org.apache.seatunnel.core.starter.seatunnel.SeaTunnelClient.main(SeaTunnelClient.java:34)
 [seatunnel-starter.jar:2.3.4]
   Caused by: org.ietf.jgss.GSSException: No valid credentials provided 
(Mechanism level: Server not found in Kerberos database (7) - LOOKING_UP_SERVER)
        at 
sun.security.jgss.krb5.Krb5Context.initSecContext(Krb5Context.java:772) 
~[?:1.8.0_351]
        at 
sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:248) 
~[?:1.8.0_351]
        at 
sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:179) 
~[?:1.8.0_351]
        at 
com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:192)
 ~[?:1.8.0_351]
        ... 31 more
   Caused by: sun.security.krb5.KrbException: Server not found in Kerberos 
database (7) - LOOKING_UP_SERVER
        at sun.security.krb5.KrbTgsRep.<init>(KrbTgsRep.java:73) ~[?:1.8.0_351]
        at sun.security.krb5.KrbTgsReq.getReply(KrbTgsReq.java:225) 
~[?:1.8.0_351]
        at sun.security.krb5.KrbTgsReq.sendAndGetCreds(KrbTgsReq.java:236) 
~[?:1.8.0_351]
        at 
sun.security.krb5.internal.CredentialsUtil.serviceCredsSingle(CredentialsUtil.java:477)
 ~[?:1.8.0_351]
        at 
sun.security.krb5.internal.CredentialsUtil.serviceCreds(CredentialsUtil.java:340)
 ~[?:1.8.0_351]
        at 
sun.security.krb5.internal.CredentialsUtil.serviceCreds(CredentialsUtil.java:314)
 ~[?:1.8.0_351]
        at 
sun.security.krb5.internal.CredentialsUtil.acquireServiceCreds(CredentialsUtil.java:169)
 ~[?:1.8.0_351]
        at 
sun.security.krb5.Credentials.acquireServiceCreds(Credentials.java:490) 
~[?:1.8.0_351]
        at 
sun.security.jgss.krb5.Krb5Context.initSecContext(Krb5Context.java:695) 
~[?:1.8.0_351]
        at 
sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:248) 
~[?:1.8.0_351]
        at 
sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:179) 
~[?:1.8.0_351]
        at 
com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:192)
 ~[?:1.8.0_351]
        ... 31 more
   Caused by: sun.security.krb5.Asn1Exception: Identifier doesn't match 
expected value (906)
        at sun.security.krb5.internal.KDCRep.init(KDCRep.java:140) 
~[?:1.8.0_351]
        at sun.security.krb5.internal.TGSRep.init(TGSRep.java:65) ~[?:1.8.0_351]
        at sun.security.krb5.internal.TGSRep.<init>(TGSRep.java:60) 
~[?:1.8.0_351]
        at sun.security.krb5.KrbTgsRep.<init>(KrbTgsRep.java:55) ~[?:1.8.0_351]
        at sun.security.krb5.KrbTgsReq.getReply(KrbTgsReq.java:225) 
~[?:1.8.0_351]
        at sun.security.krb5.KrbTgsReq.sendAndGetCreds(KrbTgsReq.java:236) 
~[?:1.8.0_351]
        at 
sun.security.krb5.internal.CredentialsUtil.serviceCredsSingle(CredentialsUtil.java:477)
 ~[?:1.8.0_351]
        at 
sun.security.krb5.internal.CredentialsUtil.serviceCreds(CredentialsUtil.java:340)
 ~[?:1.8.0_351]
        at 
sun.security.krb5.internal.CredentialsUtil.serviceCreds(CredentialsUtil.java:314)
 ~[?:1.8.0_351]
        at 
sun.security.krb5.internal.CredentialsUtil.acquireServiceCreds(CredentialsUtil.java:169)
 ~[?:1.8.0_351]
        at 
sun.security.krb5.Credentials.acquireServiceCreds(Credentials.java:490) 
~[?:1.8.0_351]
        at 
sun.security.jgss.krb5.Krb5Context.initSecContext(Krb5Context.java:695) 
~[?:1.8.0_351]
        at 
sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:248) 
~[?:1.8.0_351]
        at 
sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:179) 
~[?:1.8.0_351]
        at 
com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:192)
 ~[?:1.8.0_351]
        ... 31 more
   ```
   
   
   ### Zeta or Flink or Spark Version
   
   Zeta
   
   ### Java or Scala Version
   
   jdk 1.8
   
   ### Screenshots
   
   
![截图20240327170407](https://github.com/apache/seatunnel/assets/163375984/b9c63d1e-2035-44ba-af58-01bd29876665)
   
   
   ### Are you willing to submit PR?
   
   - [X] Yes I am willing to submit a PR!
   
   ### Code of Conduct
   
   - [X] I agree to follow this project's [Code of 
Conduct](https://www.apache.org/foundation/policies/conduct)
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to