stay off 22183 for YARN's ZK. Its mine! ;)
On Mon, Mar 25, 2013 at 11:50 AM, Eli Reisman <[email protected]>wrote: > Yes, sorry i forgot to mention, many of the conflicts of dirs and ports > occurs because of multiple instance-local test ZK's up at once. Make your > dirs and ports unique and this will go away. Had the same trouble with > YarnMiniCluster ;) > > > > On Mon, Mar 25, 2013 at 11:17 AM, Eugene Koontz (JIRA) <[email protected]>wrote: > >> >> [ >> https://issues.apache.org/jira/browse/GIRAPH-583?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel] >> >> Eugene Koontz resolved GIRAPH-583. >> ---------------------------------- >> >> Resolution: Fixed >> >> > Problem with authentication on Hadoop 0.23 >> > ------------------------------------------ >> > >> > Key: GIRAPH-583 >> > URL: https://issues.apache.org/jira/browse/GIRAPH-583 >> > Project: Giraph >> > Issue Type: Bug >> > Reporter: Gianmarco De Francisci Morales >> > >> > Hi, >> > I am trying to run the RWR code on trunk and Hadoop 0.23 with Kerberos >> authentication, but I get this exception: >> > {code} >> > 13/03/23 17:32:36 ERROR security.UserGroupInformation: >> PriviledgedActionException as:gdfm (auth:KERBEROS) >> cause:javax.security.sasl.SaslException: GSS initiate failed [Caused by >> GSSException: No valid credentials provided (Mechanism level: Failed to >> find any Kerberos tgt)] >> > 13/03/23 17:32:36 WARN ipc.Client: Exception encountered while >> connecting to the server : javax.security.sasl.SaslException: GSS initiate >> failed [Caused by GSSException: No valid credentials provided (Mechanism >> level: Failed to find any Kerberos tgt)] >> > 13/03/23 17:32:36 ERROR security.UserGroupInformation: >> PriviledgedActionException as:gdfm (auth:KERBEROS) >> cause:java.io.IOException: javax.security.sasl.SaslException: GSS initiate >> failed [Caused by GSSException: No valid credentials provided (Mechanism >> level: Failed to find any Kerberos tgt)] >> > 13/03/23 17:32:36 ERROR security.UserGroupInformation: >> PriviledgedActionException as:gdfm (auth:KERBEROS) >> cause:java.io.IOException: Failed on local exception: java.io.IOException: >> javax.security.sasl.SaslException: GSS initiate failed [Caused by >> GSSException: No valid credentials provided (Mechanism level: Failed to >> find any Kerberos tgt)]; Host Details : local host is: " >> gwta3005.tan.ygrid.yahoo.com/98.138.127.244"; destination host is: "" >> tiberiumtan-nn1.tan.ygrid.yahoo.com":8020; >> > Exception in thread "main" java.io.IOException: Failed on local >> exception: java.io.IOException: javax.security.sasl.SaslException: GSS >> initiate failed [Caused by GSSException: No valid credentials provided >> (Mechanism level: Failed to find any Kerberos tgt)]; Host Details : local >> host is: "gwta3005.tan.ygrid.yahoo.com/98.138.127.244"; destination host >> is: ""tiberiumtan-nn1.tan.ygrid.yahoo.com":8020; >> > at org.apache.hadoop.net.NetUtils.wrapException(NetUtils.java:738) >> > at org.apache.hadoop.ipc.Client.call(Client.java:1092) >> > at >> org.apache.hadoop.ipc.WritableRpcEngine$Invoker.invoke(WritableRpcEngine.java:195) >> > at $Proxy6.getDelegationToken(Unknown Source) >> > at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) >> > at >> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57) >> > at >> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) >> > at java.lang.reflect.Method.invoke(Method.java:601) >> > at >> org.apache.hadoop.io.retry.RetryInvocationHandler.invokeMethod(RetryInvocationHandler.java:102) >> > at >> org.apache.hadoop.io.retry.RetryInvocationHandler.invoke(RetryInvocationHandler.java:67) >> > at $Proxy6.getDelegationToken(Unknown Source) >> > at >> org.apache.hadoop.hdfs.DFSClient.getDelegationToken(DFSClient.java:603) >> > at >> org.apache.hadoop.hdfs.DistributedFileSystem.getDelegationToken(DistributedFileSystem.java:786) >> > at >> org.apache.hadoop.fs.FileSystem.collectDelegationTokens(FileSystem.java:466) >> > at >> org.apache.hadoop.fs.FileSystem.addDelegationTokens(FileSystem.java:444) >> > at >> org.apache.hadoop.mapreduce.security.TokenCache.obtainTokensForNamenodesInternal(TokenCache.java:122) >> > at >> org.apache.hadoop.mapreduce.security.TokenCache.obtainTokensForNamenodesInternal(TokenCache.java:101) >> > at >> org.apache.hadoop.mapreduce.security.TokenCache.obtainTokensForNamenodes(TokenCache.java:81) >> > at >> org.apache.hadoop.mapreduce.lib.output.FileOutputFormat.checkOutputSpecs(FileOutputFormat.java:137) >> > at >> org.apache.giraph.io.formats.TextVertexOutputFormat.checkOutputSpecs(TextVertexOutputFormat.java:55) >> > at >> org.apache.giraph.bsp.BspOutputFormat.checkOutputSpecs(BspOutputFormat.java:50) >> > at >> org.apache.hadoop.mapreduce.JobSubmitter.checkSpecs(JobSubmitter.java:417) >> > at >> org.apache.hadoop.mapreduce.JobSubmitter.submitJobInternal(JobSubmitter.java:332) >> > at org.apache.hadoop.mapreduce.Job$11.run(Job.java:1218) >> > at org.apache.hadoop.mapreduce.Job$11.run(Job.java:1215) >> > at java.security.AccessController.doPrivileged(Native Method) >> > at javax.security.auth.Subject.doAs(Subject.java:415) >> > at >> org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1221) >> > at org.apache.hadoop.mapreduce.Job.submit(Job.java:1215) >> > at >> org.apache.hadoop.mapreduce.Job.waitForCompletion(Job.java:1236) >> > at org.apache.giraph.job.GiraphJob.run(GiraphJob.java:237) >> > at org.apache.giraph.GiraphRunner.run(GiraphRunner.java:81) >> > at org.apache.hadoop.util.ToolRunner.run(ToolRunner.java:69) >> > at org.apache.hadoop.util.ToolRunner.run(ToolRunner.java:83) >> > at org.apache.giraph.GiraphRunner.main(GiraphRunner.java:111) >> > at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) >> > at >> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57) >> > at >> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) >> > at java.lang.reflect.Method.invoke(Method.java:601) >> > at org.apache.hadoop.util.RunJar.main(RunJar.java:208) >> > Caused by: java.io.IOException: javax.security.sasl.SaslException: GSS >> initiate failed [Caused by GSSException: No valid credentials provided >> (Mechanism level: Failed to find any Kerberos tgt)] >> > at org.apache.hadoop.ipc.Client$Connection$1.run(Client.java:534) >> > at java.security.AccessController.doPrivileged(Native Method) >> > at javax.security.auth.Subject.doAs(Subject.java:415) >> > at >> org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1221) >> > at >> org.apache.hadoop.ipc.Client$Connection.handleSaslConnectionFailure(Client.java:498) >> > at >> org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:582) >> > at >> org.apache.hadoop.ipc.Client$Connection.access$2000(Client.java:205) >> > at org.apache.hadoop.ipc.Client.getConnection(Client.java:1198) >> > at org.apache.hadoop.ipc.Client.call(Client.java:1068) >> > ... 38 more >> > Caused by: javax.security.sasl.SaslException: GSS initiate failed >> [Caused by GSSException: No valid credentials provided (Mechanism level: >> Failed to find any Kerberos tgt)] >> > at >> com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212) >> > at >> org.apache.hadoop.security.SaslRpcClient.saslConnect(SaslRpcClient.java:137) >> > at >> org.apache.hadoop.ipc.Client$Connection.setupSaslConnection(Client.java:406) >> > at >> org.apache.hadoop.ipc.Client$Connection.access$1200(Client.java:205) >> > at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:575) >> > at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:572) >> > at java.security.AccessController.doPrivileged(Native Method) >> > at javax.security.auth.Subject.doAs(Subject.java:415) >> > at >> org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1221) >> > at >> org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:571) >> > ... 41 more >> > Caused by: GSSException: No valid credentials provided (Mechanism >> level: Failed to find any Kerberos tgt) >> > at >> sun.security.jgss.krb5.Krb5InitCredential.getInstance(Krb5InitCredential.java:147) >> > at >> sun.security.jgss.krb5.Krb5MechFactory.getCredentialElement(Krb5MechFactory.java:121) >> > at >> sun.security.jgss.krb5.Krb5MechFactory.getMechanismContext(Krb5MechFactory.java:187) >> > at >> sun.security.jgss.GSSManagerImpl.getMechanismContext(GSSManagerImpl.java:223) >> > at >> sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:212) >> > at >> sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:179) >> > at >> com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:193) >> > ... 50 more >> > {code} >> > For reference, I am using -Dgiraph.useNetty="true" >> -Dgiraph.authenticate="true" >> >> -- >> This message is automatically generated by JIRA. >> If you think it was sent incorrectly, please contact your JIRA >> administrators >> For more information on JIRA, see: http://www.atlassian.com/software/jira >> > >
