Ted Yu created SLIDER-437:
-----------------------------

             Summary: Re-login is needed to ensure the TGT is up to date
                 Key: SLIDER-437
                 URL: https://issues.apache.org/jira/browse/SLIDER-437
             Project: Slider
          Issue Type: Bug
            Reporter: Ted Yu


Here is snippet of AppMaster log on a secure cluster:
{code}
14/09/16 16:08:17 ERROR appmaster.SliderAppMaster: Exception in AmExecutor-006: 
java.io.IOException: Can't get new delegation token 
java.io.IOException: Can't get new delegation token 
        at 
org.apache.slider.server.services.security.FsDelegationTokenManager$RenewAction.getNewToken(FsDelegationTokenManager.java:251)
        at 
org.apache.slider.server.services.security.FsDelegationTokenManager$RenewAction.execute(FsDelegationTokenManager.java:217)
        at 
org.apache.slider.server.appmaster.actions.RenewingAction.execute(RenewingAction.java:88)
        at 
org.apache.slider.server.appmaster.actions.QueueExecutor.run(QueueExecutor.java:70)
        at 
java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
        at 
java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615)
        at java.lang.Thread.run(Thread.java:745)
Caused by: java.io.IOException: Failed on local exception: java.io.IOException: 
javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: 
No valid credentials provided (Mechanism level: Failed to find any Kerberos 
tgt)]; Host Details : local host is: "hor9n00.gq1.ygridcore.net/68.142.247.19"; 
destination host is: "hor12n12.gq1.ygridcore.net":8020; 
        at org.apache.hadoop.net.NetUtils.wrapException(NetUtils.java:764)
        at org.apache.hadoop.ipc.Client.call(Client.java:1423)
        at org.apache.hadoop.ipc.Client.call(Client.java:1372)
        at 
org.apache.hadoop.ipc.ProtobufRpcEngine$Invoker.invoke(ProtobufRpcEngine.java:219)
        at com.sun.proxy.$Proxy17.getDelegationToken(Unknown Source)
        at 
org.apache.hadoop.hdfs.protocolPB.ClientNamenodeProtocolTranslatorPB.getDelegationToken(ClientNamenodeProtocolTranslatorPB.java:902)
        at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
        at 
sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)
        at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
        at java.lang.reflect.Method.invoke(Method.java:606)
        at 
org.apache.hadoop.io.retry.RetryInvocationHandler.invokeMethod(RetryInvocationHandler.java:187)
        at 
org.apache.hadoop.io.retry.RetryInvocationHandler.invoke(RetryInvocationHandler.java:102)
        at com.sun.proxy.$Proxy18.getDelegationToken(Unknown Source)
        at 
org.apache.hadoop.hdfs.DFSClient.getDelegationToken(DFSClient.java:1001)
        at 
org.apache.hadoop.hdfs.DistributedFileSystem.getDelegationToken(DistributedFileSystem.java:1316)
        at 
org.apache.hadoop.fs.FileSystem.collectDelegationTokens(FileSystem.java:529)
        at 
org.apache.hadoop.fs.FileSystem.addDelegationTokens(FileSystem.java:507)
        at 
org.apache.hadoop.hdfs.DistributedFileSystem.addDelegationTokens(DistributedFileSystem.java:2002)
        at 
org.apache.slider.server.services.security.FsDelegationTokenManager$RenewAction$4.run(FsDelegationTokenManager.java:235)
        at 
org.apache.slider.server.services.security.FsDelegationTokenManager$RenewAction$4.run(FsDelegationTokenManager.java:1)
        at java.security.AccessController.doPrivileged(Native Method)
        at javax.security.auth.Subject.doAs(Subject.java:415)
        at 
org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1614)
        at 
org.apache.slider.server.services.security.FsDelegationTokenManager$RenewAction.getNewToken(FsDelegationTokenManager.java:232)
        ... 6 more
Caused by: java.io.IOException: javax.security.sasl.SaslException: GSS initiate 
failed [Caused by GSSException: No valid credentials provided (Mechanism level: 
Failed to find any Kerberos tgt)]
        at org.apache.hadoop.ipc.Client$Connection$1.run(Client.java:680)
        at java.security.AccessController.doPrivileged(Native Method)
        at javax.security.auth.Subject.doAs(Subject.java:415)
        at 
org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1614)
        at 
org.apache.hadoop.ipc.Client$Connection.handleSaslConnectionFailure(Client.java:643)
        at 
org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:729)
        at org.apache.hadoop.ipc.Client$Connection.access$2800(Client.java:368)
        at org.apache.hadoop.ipc.Client.getConnection(Client.java:1471)
        at org.apache.hadoop.ipc.Client.call(Client.java:1390)
        ... 28 more
Caused by: javax.security.sasl.SaslException: GSS initiate failed [Caused by 
GSSException: No valid credentials provided (Mechanism level: Failed to find 
any Kerberos tgt)]
        at 
com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212)
        at 
org.apache.hadoop.security.SaslRpcClient.saslConnect(SaslRpcClient.java:413)
        at 
org.apache.hadoop.ipc.Client$Connection.setupSaslConnection(Client.java:553)
        at org.apache.hadoop.ipc.Client$Connection.access$1800(Client.java:368)
        at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:721)
        at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:717)
        at java.security.AccessController.doPrivileged(Native Method)
        at javax.security.auth.Subject.doAs(Subject.java:415)
        at 
org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1614)
        at 
org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:716)
        ... 31 more
Caused by: GSSException: No valid credentials provided (Mechanism level: Failed 
to find any Kerberos tgt)
        at 
sun.security.jgss.krb5.Krb5InitCredential.getInstance(Krb5InitCredential.java:147)
        at 
sun.security.jgss.krb5.Krb5MechFactory.getCredentialElement(Krb5MechFactory.java:121)
        at 
sun.security.jgss.krb5.Krb5MechFactory.getMechanismContext(Krb5MechFactory.java:187)
        at 
sun.security.jgss.GSSManagerImpl.getMechanismContext(GSSManagerImpl.java:223)
        at 
sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:212)
        at 
sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:179)
        at 
com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:193)
        ... 40 more
14/09/16 16:08:18 INFO appmaster.SliderAppMaster: Triggering shutdown of the 
AM: java.io.IOException: Can't get new delegation token 
14/09/16 16:08:18 INFO hdfs.DFSClient: Cancelling HDFS_DELEGATION_TOKEN token 
38 for hdfs on 68.142.247.223:8020
14/09/16 16:08:18 WARN ipc.Client: Exception encountered while connecting to 
the server : 
org.apache.hadoop.ipc.RemoteException(org.apache.hadoop.security.token.SecretManager$InvalidToken):
 token (HDFS_DELEGATION_TOKEN token 38 for hdfs) is expired
14/09/16 16:08:18 INFO appmaster.SliderAppMaster: Error cancelling HDFS 
delegation token
org.apache.hadoop.security.token.SecretManager$InvalidToken: token 
(HDFS_DELEGATION_TOKEN token 38 for hdfs) is expired
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at 
sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:57)
        at 
sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:45)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:526)
        at 
org.apache.hadoop.ipc.RemoteException.instantiateException(RemoteException.java:106)
        at 
org.apache.hadoop.ipc.RemoteException.unwrapRemoteException(RemoteException.java:73)
        at org.apache.hadoop.hdfs.DFSClient$Renewer.cancel(DFSClient.java:1120)
        at org.apache.hadoop.security.token.Token.cancel(Token.java:387)
        at 
org.apache.slider.server.services.security.FsDelegationTokenManager.cancelDelegationToken(FsDelegationTokenManager.java:115)
        at 
org.apache.slider.server.appmaster.SliderAppMaster.finish(SliderAppMaster.java:1078)
        at 
org.apache.slider.server.appmaster.SliderAppMaster.createAndRunCluster(SliderAppMaster.java:816)
        at 
org.apache.slider.server.appmaster.SliderAppMaster.runService(SliderAppMaster.java:483)
        at 
org.apache.slider.core.main.ServiceLauncher.launchService(ServiceLauncher.java:186)
        at 
org.apache.slider.core.main.ServiceLauncher.launchServiceRobustly(ServiceLauncher.java:471)
        at 
org.apache.slider.core.main.ServiceLauncher.launchServiceAndExit(ServiceLauncher.java:401)
        at 
org.apache.slider.core.main.ServiceLauncher.serviceMain(ServiceLauncher.java:626)
        at 
org.apache.slider.server.appmaster.SliderAppMaster.main(SliderAppMaster.java:1899)
Caused by: 
org.apache.hadoop.ipc.RemoteException(org.apache.hadoop.security.token.SecretManager$InvalidToken):
 token (HDFS_DELEGATION_TOKEN token 38 for hdfs) is expired
        at org.apache.hadoop.ipc.Client.call(Client.java:1419)
        at org.apache.hadoop.ipc.Client.call(Client.java:1372)
        at 
org.apache.hadoop.ipc.ProtobufRpcEngine$Invoker.invoke(ProtobufRpcEngine.java:219)
        at com.sun.proxy.$Proxy17.cancelDelegationToken(Unknown Source)
        at 
org.apache.hadoop.hdfs.protocolPB.ClientNamenodeProtocolTranslatorPB.cancelDelegationToken(ClientNamenodeProtocolTranslatorPB.java:931)
        at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
        at 
sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)
        at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
        at java.lang.reflect.Method.invoke(Method.java:606)
        at 
org.apache.hadoop.io.retry.RetryInvocationHandler.invokeMethod(RetryInvocationHandler.java:187)
        at 
org.apache.hadoop.io.retry.RetryInvocationHandler.invoke(RetryInvocationHandler.java:102)
        at com.sun.proxy.$Proxy18.cancelDelegationToken(Unknown Source)
        at org.apache.hadoop.hdfs.DFSClient$Renewer.cancel(DFSClient.java:1118)
        ... 10 more
{code}
re-login should be done to ensure the TGT is up to date.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to