Junvn commented on PR #5049:
URL: https://github.com/apache/hive/pull/5049#issuecomment-3491184654

   @vikramahuja1001 For the third optimization you mentioned, for A 
long-running task, whether this modification can take effect on the Hive 2.X 
version, I tried to merge the code you submitted into the Hive 2.X code, but I 
found that it has not taken effect, and when the token is invalid and falls 
back to the Kerberos authentication, it always prompts that the authentication 
fails. Can you help me solve this problem or is there any other solution?
   
   Error Stack:
   2025-11-05T21:17:10,467 ERROR [HiveServer2-Background-Pool: Thread-408] 
transport.TSaslTransport: SASL negotiation failure
   javax.security.sasl.SaslException: GSS initiate failed
           at 
com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:211)
 ~[?:1.8.0_342]
           at 
org.apache.thrift.transport.TSaslClientTransport.handleSaslStartMessage(TSaslClientTransport.java:94)
 ~[hive-exec-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at 
org.apache.thrift.transport.TSaslTransport.open(TSaslTransport.java:271) 
[hive-exec-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at 
org.apache.thrift.transport.TSaslClientTransport.open(TSaslClientTransport.java:37)
 [hive-exec-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at 
org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport$1.run(TUGIAssumingTransport.java:52)
 [hive-exec-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at 
org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport$1.run(TUGIAssumingTransport.java:49)
 [hive-exec-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at java.security.AccessController.doPrivileged(Native Method) 
~[?:1.8.0_342]
           at javax.security.auth.Subject.doAs(Subject.java:422) [?:1.8.0_342]
           at 
org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:2012)
 [hadoop-common-2.10.1-HDP-24.11.1.jar:?]
           at 
org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport.open(TUGIAssumingTransport.java:49)
 [hive-exec-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at 
org.apache.hadoop.hive.metastore.HiveMetaStoreClient.open(HiveMetaStoreClient.java:759)
 [hive-exec-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at 
org.apache.hadoop.hive.metastore.HiveMetaStoreClient.reconnect(HiveMetaStoreClient.java:393)
 [hive-exec-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at 
org.apache.hadoop.hive.metastore.RetryingMetaStoreClient.invoke(RetryingMetaStoreClient.java:163)
 [hive-exec-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at com.sun.proxy.$Proxy51.getAllDatabases(Unknown Source) [?:?]
           at sun.reflect.GeneratedMethodAccessor63.invoke(Unknown Source) 
~[?:?]
           at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
 ~[?:1.8.0_342]
           at java.lang.reflect.Method.invoke(Method.java:498) ~[?:1.8.0_342]
           at 
org.apache.hadoop.hive.metastore.HiveMetaStoreClient$SynchronizedHandler.invoke(HiveMetaStoreClient.java:2626)
 [hive-exec-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at com.sun.proxy.$Proxy51.getAllDatabases(Unknown Source) [?:?]
           at 
org.apache.hadoop.hive.ql.metadata.Hive.getAllDatabases(Hive.java:1519) 
[hive-exec-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at 
org.apache.hadoop.hive.ql.exec.DDLTask.showDatabases(DDLTask.java:2509) 
[hive-exec-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at org.apache.hadoop.hive.ql.exec.DDLTask.execute(DDLTask.java:444) 
[hive-exec-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at org.apache.hadoop.hive.ql.exec.Task.executeTask(Task.java:199) 
[hive-exec-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at 
org.apache.hadoop.hive.ql.exec.TaskRunner.runSequential(TaskRunner.java:100) 
[hive-exec-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at org.apache.hadoop.hive.ql.Driver.launchTask(Driver.java:2516) 
[hive-exec-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at org.apache.hadoop.hive.ql.Driver.execute(Driver.java:1982) 
[hive-exec-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at org.apache.hadoop.hive.ql.Driver.runInternal(Driver.java:1620) 
[hive-exec-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at org.apache.hadoop.hive.ql.Driver.run(Driver.java:1319) 
[hive-exec-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at org.apache.hadoop.hive.ql.Driver.run(Driver.java:1314) 
[hive-exec-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at 
org.apache.hive.service.cli.operation.SQLOperation.runQuery(SQLOperation.java:305)
 [hive-service-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at 
org.apache.hive.service.cli.operation.SQLOperation.access$800(SQLOperation.java:102)
 [hive-service-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at 
org.apache.hive.service.cli.operation.SQLOperation$BackgroundWork$1.run(SQLOperation.java:399)
 [hive-service-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at java.security.AccessController.doPrivileged(Native Method) 
~[?:1.8.0_342]
           at javax.security.auth.Subject.doAs(Subject.java:422) [?:1.8.0_342]
           at 
org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:2012)
 [hadoop-common-2.10.1-HDP-24.11.1.jar:?]
           at 
org.apache.hive.service.cli.operation.SQLOperation$BackgroundWork.run(SQLOperation.java:414)
 [hive-service-2.3.6-HDP-25.09.1.jar:2.3.6-HDP-25.09.1]
           at 
java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511) 
[?:1.8.0_342]
           at java.util.concurrent.FutureTask.run(FutureTask.java:266) 
[?:1.8.0_342]
           at 
java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) 
[?:1.8.0_342]
           at 
java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) 
[?:1.8.0_342]
           at java.lang.Thread.run(Thread.java:750) [?:1.8.0_342]
   Caused by: org.ietf.jgss.GSSException: No valid credentials provided 
(Mechanism level: Failed to find any Kerberos tgt)
           at 
sun.security.jgss.krb5.Krb5InitCredential.getInstance(Krb5InitCredential.java:162)
 ~[?:1.8.0_342]
           at 
sun.security.jgss.krb5.Krb5MechFactory.getCredentialElement(Krb5MechFactory.java:122)
 ~[?:1.8.0_342]
           at 
sun.security.jgss.krb5.Krb5MechFactory.getMechanismContext(Krb5MechFactory.java:189)
 ~[?:1.8.0_342]
           at 
sun.security.jgss.GSSManagerImpl.getMechanismContext(GSSManagerImpl.java:224) 
~[?:1.8.0_342]
           at 
sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:212) 
~[?:1.8.0_342]
           at 
sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:179) 
~[?:1.8.0_342]
           at 
com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:192)
 ~[?:1.8.0_342]
           ... 40 more


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to