[jira] [Updated] (HIVE-6915) Hive Hbase queries fail on secure Tez cluster

2014-10-24 Thread Sergey Shelukhin (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6915?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sergey Shelukhin updated HIVE-6915:
---
Attachment: HIVE-6915.03.patch

rebased patch. I think it was previously tested in our test env, and worked 
then. We'll try again before committing.

 Hive Hbase queries fail on secure Tez cluster
 -

 Key: HIVE-6915
 URL: https://issues.apache.org/jira/browse/HIVE-6915
 Project: Hive
  Issue Type: Bug
  Components: Tez
Affects Versions: 0.13.0
 Environment: Kerberos secure Tez cluster
Reporter: Deepesh Khandelwal
Assignee: Siddharth Seth
 Attachments: HIVE-6915.03.patch, HIVE-6915.1.patch, HIVE-6915.2.patch


 Hive queries reading and writing to HBase are currently failing with the 
 following exception in a secure Tez cluster:
 {noformat}
 2014-04-14 13:47:05,644 FATAL [InputInitializer [Map 1] #0] 
 org.apache.hadoop.ipc.RpcClient: SASL authentication failed. The most likely 
 cause is missing or invalid credentials. Consider 'kinit'.
 javax.security.sasl.SaslException: GSS initiate failed [Caused by 
 GSSException: No valid credentials provided (Mechanism level: Failed to find 
 any Kerberos tgt)]
   at 
 com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212)
   at 
 org.apache.hadoop.hbase.security.HBaseSaslRpcClient.saslConnect(HBaseSaslRpcClient.java:152)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.setupSaslConnection(RpcClient.java:792)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.access$800(RpcClient.java:349)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection$2.run(RpcClient.java:918)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection$2.run(RpcClient.java:915)
   at java.security.AccessController.doPrivileged(Native Method)
   at javax.security.auth.Subject.doAs(Subject.java:415)
   at 
 org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1557)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.setupIOstreams(RpcClient.java:915)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.writeRequest(RpcClient.java:1065)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.tracedWriteRequest(RpcClient.java:1032)
   at org.apache.hadoop.hbase.ipc.RpcClient.call(RpcClient.java:1474)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient.callBlockingMethod(RpcClient.java:1684)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$BlockingRpcChannelImplementation.callBlockingMethod(RpcClient.java:1737)
   at 
 org.apache.hadoop.hbase.protobuf.generated.ClientProtos$ClientService$BlockingStub.execService(ClientProtos.java:29288)
   at 
 org.apache.hadoop.hbase.protobuf.ProtobufUtil.execService(ProtobufUtil.java:1562)
   at 
 org.apache.hadoop.hbase.ipc.RegionCoprocessorRpcChannel$1.call(RegionCoprocessorRpcChannel.java:87)
   at 
 org.apache.hadoop.hbase.ipc.RegionCoprocessorRpcChannel$1.call(RegionCoprocessorRpcChannel.java:84)
   at 
 org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithRetries(RpcRetryingCaller.java:121)
   at 
 org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithRetries(RpcRetryingCaller.java:97)
   at 
 org.apache.hadoop.hbase.ipc.RegionCoprocessorRpcChannel.callExecService(RegionCoprocessorRpcChannel.java:90)
   at 
 org.apache.hadoop.hbase.ipc.CoprocessorRpcChannel.callBlockingMethod(CoprocessorRpcChannel.java:67)
   at 
 org.apache.hadoop.hbase.protobuf.generated.AuthenticationProtos$AuthenticationService$BlockingStub.getAuthenticationToken(AuthenticationProtos.java:4512)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil.obtainToken(TokenUtil.java:60)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil$3.run(TokenUtil.java:174)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil$3.run(TokenUtil.java:172)
   at java.security.AccessController.doPrivileged(Native Method)
   at javax.security.auth.Subject.doAs(Subject.java:415)
   at 
 org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1557)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil.obtainTokenForJob(TokenUtil.java:171)
   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
   at 
 sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)
   at 
 sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
   at java.lang.reflect.Method.invoke(Method.java:601)
   at org.apache.hadoop.hbase.util.Methods.call(Methods.java:39)
   at 
 org.apache.hadoop.hbase.security.User$SecureHadoopUser.obtainAuthTokenForJob(User.java:334)
   at 
 org.apache.hadoop.hbase.mapred.TableMapReduceUtil.initCredentials(TableMapReduceUtil.java:201)
   

[jira] [Updated] (HIVE-6915) Hive Hbase queries fail on secure Tez cluster

2014-10-24 Thread Sergey Shelukhin (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6915?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sergey Shelukhin updated HIVE-6915:
---
   Resolution: Fixed
Fix Version/s: 0.15.0
   Status: Resolved  (was: Patch Available)

committed to trunk meanwhile

 Hive Hbase queries fail on secure Tez cluster
 -

 Key: HIVE-6915
 URL: https://issues.apache.org/jira/browse/HIVE-6915
 Project: Hive
  Issue Type: Bug
  Components: Tez
Affects Versions: 0.13.0
 Environment: Kerberos secure Tez cluster
Reporter: Deepesh Khandelwal
Assignee: Siddharth Seth
 Fix For: 0.15.0

 Attachments: HIVE-6915.03.patch, HIVE-6915.1.patch, HIVE-6915.2.patch


 Hive queries reading and writing to HBase are currently failing with the 
 following exception in a secure Tez cluster:
 {noformat}
 2014-04-14 13:47:05,644 FATAL [InputInitializer [Map 1] #0] 
 org.apache.hadoop.ipc.RpcClient: SASL authentication failed. The most likely 
 cause is missing or invalid credentials. Consider 'kinit'.
 javax.security.sasl.SaslException: GSS initiate failed [Caused by 
 GSSException: No valid credentials provided (Mechanism level: Failed to find 
 any Kerberos tgt)]
   at 
 com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212)
   at 
 org.apache.hadoop.hbase.security.HBaseSaslRpcClient.saslConnect(HBaseSaslRpcClient.java:152)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.setupSaslConnection(RpcClient.java:792)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.access$800(RpcClient.java:349)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection$2.run(RpcClient.java:918)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection$2.run(RpcClient.java:915)
   at java.security.AccessController.doPrivileged(Native Method)
   at javax.security.auth.Subject.doAs(Subject.java:415)
   at 
 org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1557)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.setupIOstreams(RpcClient.java:915)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.writeRequest(RpcClient.java:1065)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.tracedWriteRequest(RpcClient.java:1032)
   at org.apache.hadoop.hbase.ipc.RpcClient.call(RpcClient.java:1474)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient.callBlockingMethod(RpcClient.java:1684)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$BlockingRpcChannelImplementation.callBlockingMethod(RpcClient.java:1737)
   at 
 org.apache.hadoop.hbase.protobuf.generated.ClientProtos$ClientService$BlockingStub.execService(ClientProtos.java:29288)
   at 
 org.apache.hadoop.hbase.protobuf.ProtobufUtil.execService(ProtobufUtil.java:1562)
   at 
 org.apache.hadoop.hbase.ipc.RegionCoprocessorRpcChannel$1.call(RegionCoprocessorRpcChannel.java:87)
   at 
 org.apache.hadoop.hbase.ipc.RegionCoprocessorRpcChannel$1.call(RegionCoprocessorRpcChannel.java:84)
   at 
 org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithRetries(RpcRetryingCaller.java:121)
   at 
 org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithRetries(RpcRetryingCaller.java:97)
   at 
 org.apache.hadoop.hbase.ipc.RegionCoprocessorRpcChannel.callExecService(RegionCoprocessorRpcChannel.java:90)
   at 
 org.apache.hadoop.hbase.ipc.CoprocessorRpcChannel.callBlockingMethod(CoprocessorRpcChannel.java:67)
   at 
 org.apache.hadoop.hbase.protobuf.generated.AuthenticationProtos$AuthenticationService$BlockingStub.getAuthenticationToken(AuthenticationProtos.java:4512)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil.obtainToken(TokenUtil.java:60)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil$3.run(TokenUtil.java:174)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil$3.run(TokenUtil.java:172)
   at java.security.AccessController.doPrivileged(Native Method)
   at javax.security.auth.Subject.doAs(Subject.java:415)
   at 
 org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1557)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil.obtainTokenForJob(TokenUtil.java:171)
   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
   at 
 sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)
   at 
 sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
   at java.lang.reflect.Method.invoke(Method.java:601)
   at org.apache.hadoop.hbase.util.Methods.call(Methods.java:39)
   at 
 org.apache.hadoop.hbase.security.User$SecureHadoopUser.obtainAuthTokenForJob(User.java:334)
   at 
 

[jira] [Updated] (HIVE-6915) Hive Hbase queries fail on secure Tez cluster

2014-10-24 Thread Sergey Shelukhin (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6915?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sergey Shelukhin updated HIVE-6915:
---
Fix Version/s: (was: 0.15.0)
   0.14.0

 Hive Hbase queries fail on secure Tez cluster
 -

 Key: HIVE-6915
 URL: https://issues.apache.org/jira/browse/HIVE-6915
 Project: Hive
  Issue Type: Bug
  Components: Tez
Affects Versions: 0.13.0
 Environment: Kerberos secure Tez cluster
Reporter: Deepesh Khandelwal
Assignee: Siddharth Seth
 Fix For: 0.14.0

 Attachments: HIVE-6915.03.patch, HIVE-6915.1.patch, HIVE-6915.2.patch


 Hive queries reading and writing to HBase are currently failing with the 
 following exception in a secure Tez cluster:
 {noformat}
 2014-04-14 13:47:05,644 FATAL [InputInitializer [Map 1] #0] 
 org.apache.hadoop.ipc.RpcClient: SASL authentication failed. The most likely 
 cause is missing or invalid credentials. Consider 'kinit'.
 javax.security.sasl.SaslException: GSS initiate failed [Caused by 
 GSSException: No valid credentials provided (Mechanism level: Failed to find 
 any Kerberos tgt)]
   at 
 com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212)
   at 
 org.apache.hadoop.hbase.security.HBaseSaslRpcClient.saslConnect(HBaseSaslRpcClient.java:152)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.setupSaslConnection(RpcClient.java:792)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.access$800(RpcClient.java:349)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection$2.run(RpcClient.java:918)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection$2.run(RpcClient.java:915)
   at java.security.AccessController.doPrivileged(Native Method)
   at javax.security.auth.Subject.doAs(Subject.java:415)
   at 
 org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1557)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.setupIOstreams(RpcClient.java:915)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.writeRequest(RpcClient.java:1065)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.tracedWriteRequest(RpcClient.java:1032)
   at org.apache.hadoop.hbase.ipc.RpcClient.call(RpcClient.java:1474)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient.callBlockingMethod(RpcClient.java:1684)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$BlockingRpcChannelImplementation.callBlockingMethod(RpcClient.java:1737)
   at 
 org.apache.hadoop.hbase.protobuf.generated.ClientProtos$ClientService$BlockingStub.execService(ClientProtos.java:29288)
   at 
 org.apache.hadoop.hbase.protobuf.ProtobufUtil.execService(ProtobufUtil.java:1562)
   at 
 org.apache.hadoop.hbase.ipc.RegionCoprocessorRpcChannel$1.call(RegionCoprocessorRpcChannel.java:87)
   at 
 org.apache.hadoop.hbase.ipc.RegionCoprocessorRpcChannel$1.call(RegionCoprocessorRpcChannel.java:84)
   at 
 org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithRetries(RpcRetryingCaller.java:121)
   at 
 org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithRetries(RpcRetryingCaller.java:97)
   at 
 org.apache.hadoop.hbase.ipc.RegionCoprocessorRpcChannel.callExecService(RegionCoprocessorRpcChannel.java:90)
   at 
 org.apache.hadoop.hbase.ipc.CoprocessorRpcChannel.callBlockingMethod(CoprocessorRpcChannel.java:67)
   at 
 org.apache.hadoop.hbase.protobuf.generated.AuthenticationProtos$AuthenticationService$BlockingStub.getAuthenticationToken(AuthenticationProtos.java:4512)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil.obtainToken(TokenUtil.java:60)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil$3.run(TokenUtil.java:174)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil$3.run(TokenUtil.java:172)
   at java.security.AccessController.doPrivileged(Native Method)
   at javax.security.auth.Subject.doAs(Subject.java:415)
   at 
 org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1557)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil.obtainTokenForJob(TokenUtil.java:171)
   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
   at 
 sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)
   at 
 sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
   at java.lang.reflect.Method.invoke(Method.java:601)
   at org.apache.hadoop.hbase.util.Methods.call(Methods.java:39)
   at 
 org.apache.hadoop.hbase.security.User$SecureHadoopUser.obtainAuthTokenForJob(User.java:334)
   at 
 org.apache.hadoop.hbase.mapred.TableMapReduceUtil.initCredentials(TableMapReduceUtil.java:201)
   at 
 

[jira] [Updated] (HIVE-6915) Hive Hbase queries fail on secure Tez cluster

2014-05-02 Thread Craig Condit (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6915?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Craig Condit updated HIVE-6915:
---

Attachment: HIVE-6915.2.patch

New patch version. This version calls TableMapReduceUtil.initCredentials() only 
in the case where the current user is logged in via Kerberos.

 Hive Hbase queries fail on secure Tez cluster
 -

 Key: HIVE-6915
 URL: https://issues.apache.org/jira/browse/HIVE-6915
 Project: Hive
  Issue Type: Bug
  Components: Tez
Affects Versions: 0.13.0
 Environment: Kerberos secure Tez cluster
Reporter: Deepesh Khandelwal
Assignee: Siddharth Seth
 Attachments: HIVE-6915.1.patch, HIVE-6915.2.patch


 Hive queries reading and writing to HBase are currently failing with the 
 following exception in a secure Tez cluster:
 {noformat}
 2014-04-14 13:47:05,644 FATAL [InputInitializer [Map 1] #0] 
 org.apache.hadoop.ipc.RpcClient: SASL authentication failed. The most likely 
 cause is missing or invalid credentials. Consider 'kinit'.
 javax.security.sasl.SaslException: GSS initiate failed [Caused by 
 GSSException: No valid credentials provided (Mechanism level: Failed to find 
 any Kerberos tgt)]
   at 
 com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212)
   at 
 org.apache.hadoop.hbase.security.HBaseSaslRpcClient.saslConnect(HBaseSaslRpcClient.java:152)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.setupSaslConnection(RpcClient.java:792)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.access$800(RpcClient.java:349)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection$2.run(RpcClient.java:918)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection$2.run(RpcClient.java:915)
   at java.security.AccessController.doPrivileged(Native Method)
   at javax.security.auth.Subject.doAs(Subject.java:415)
   at 
 org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1557)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.setupIOstreams(RpcClient.java:915)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.writeRequest(RpcClient.java:1065)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.tracedWriteRequest(RpcClient.java:1032)
   at org.apache.hadoop.hbase.ipc.RpcClient.call(RpcClient.java:1474)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient.callBlockingMethod(RpcClient.java:1684)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$BlockingRpcChannelImplementation.callBlockingMethod(RpcClient.java:1737)
   at 
 org.apache.hadoop.hbase.protobuf.generated.ClientProtos$ClientService$BlockingStub.execService(ClientProtos.java:29288)
   at 
 org.apache.hadoop.hbase.protobuf.ProtobufUtil.execService(ProtobufUtil.java:1562)
   at 
 org.apache.hadoop.hbase.ipc.RegionCoprocessorRpcChannel$1.call(RegionCoprocessorRpcChannel.java:87)
   at 
 org.apache.hadoop.hbase.ipc.RegionCoprocessorRpcChannel$1.call(RegionCoprocessorRpcChannel.java:84)
   at 
 org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithRetries(RpcRetryingCaller.java:121)
   at 
 org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithRetries(RpcRetryingCaller.java:97)
   at 
 org.apache.hadoop.hbase.ipc.RegionCoprocessorRpcChannel.callExecService(RegionCoprocessorRpcChannel.java:90)
   at 
 org.apache.hadoop.hbase.ipc.CoprocessorRpcChannel.callBlockingMethod(CoprocessorRpcChannel.java:67)
   at 
 org.apache.hadoop.hbase.protobuf.generated.AuthenticationProtos$AuthenticationService$BlockingStub.getAuthenticationToken(AuthenticationProtos.java:4512)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil.obtainToken(TokenUtil.java:60)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil$3.run(TokenUtil.java:174)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil$3.run(TokenUtil.java:172)
   at java.security.AccessController.doPrivileged(Native Method)
   at javax.security.auth.Subject.doAs(Subject.java:415)
   at 
 org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1557)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil.obtainTokenForJob(TokenUtil.java:171)
   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
   at 
 sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)
   at 
 sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
   at java.lang.reflect.Method.invoke(Method.java:601)
   at org.apache.hadoop.hbase.util.Methods.call(Methods.java:39)
   at 
 org.apache.hadoop.hbase.security.User$SecureHadoopUser.obtainAuthTokenForJob(User.java:334)
   at 
 org.apache.hadoop.hbase.mapred.TableMapReduceUtil.initCredentials(TableMapReduceUtil.java:201)
   at 

[jira] [Updated] (HIVE-6915) Hive Hbase queries fail on secure Tez cluster

2014-04-15 Thread Siddharth Seth (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6915?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Siddharth Seth updated HIVE-6915:
-

Attachment: HIVE-6915.1.patch

Changes in the patch
- Obtain delegation tokens in the HBaseStorageHandler configureJobConf method.
- Ensure that these tokens are sent to Tez while constructing the DAG.

MR works since it does InputsSplits client side and 
HiveHbaseTableInput|OutpoutFormat take care of getting relevant tokens via 
getSplits / checkOutputSpecs

 Hive Hbase queries fail on secure Tez cluster
 -

 Key: HIVE-6915
 URL: https://issues.apache.org/jira/browse/HIVE-6915
 Project: Hive
  Issue Type: Bug
  Components: Tez
Affects Versions: 0.13.0
 Environment: Kerberos secure Tez cluster
Reporter: Deepesh Khandelwal
Assignee: Siddharth Seth
 Attachments: HIVE-6915.1.patch


 Hive queries reading and writing to HBase are currently failing with the 
 following exception in a secure Tez cluster:
 {noformat}
 2014-04-14 13:47:05,644 FATAL [InputInitializer [Map 1] #0] 
 org.apache.hadoop.ipc.RpcClient: SASL authentication failed. The most likely 
 cause is missing or invalid credentials. Consider 'kinit'.
 javax.security.sasl.SaslException: GSS initiate failed [Caused by 
 GSSException: No valid credentials provided (Mechanism level: Failed to find 
 any Kerberos tgt)]
   at 
 com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212)
   at 
 org.apache.hadoop.hbase.security.HBaseSaslRpcClient.saslConnect(HBaseSaslRpcClient.java:152)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.setupSaslConnection(RpcClient.java:792)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.access$800(RpcClient.java:349)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection$2.run(RpcClient.java:918)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection$2.run(RpcClient.java:915)
   at java.security.AccessController.doPrivileged(Native Method)
   at javax.security.auth.Subject.doAs(Subject.java:415)
   at 
 org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1557)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.setupIOstreams(RpcClient.java:915)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.writeRequest(RpcClient.java:1065)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.tracedWriteRequest(RpcClient.java:1032)
   at org.apache.hadoop.hbase.ipc.RpcClient.call(RpcClient.java:1474)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient.callBlockingMethod(RpcClient.java:1684)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$BlockingRpcChannelImplementation.callBlockingMethod(RpcClient.java:1737)
   at 
 org.apache.hadoop.hbase.protobuf.generated.ClientProtos$ClientService$BlockingStub.execService(ClientProtos.java:29288)
   at 
 org.apache.hadoop.hbase.protobuf.ProtobufUtil.execService(ProtobufUtil.java:1562)
   at 
 org.apache.hadoop.hbase.ipc.RegionCoprocessorRpcChannel$1.call(RegionCoprocessorRpcChannel.java:87)
   at 
 org.apache.hadoop.hbase.ipc.RegionCoprocessorRpcChannel$1.call(RegionCoprocessorRpcChannel.java:84)
   at 
 org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithRetries(RpcRetryingCaller.java:121)
   at 
 org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithRetries(RpcRetryingCaller.java:97)
   at 
 org.apache.hadoop.hbase.ipc.RegionCoprocessorRpcChannel.callExecService(RegionCoprocessorRpcChannel.java:90)
   at 
 org.apache.hadoop.hbase.ipc.CoprocessorRpcChannel.callBlockingMethod(CoprocessorRpcChannel.java:67)
   at 
 org.apache.hadoop.hbase.protobuf.generated.AuthenticationProtos$AuthenticationService$BlockingStub.getAuthenticationToken(AuthenticationProtos.java:4512)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil.obtainToken(TokenUtil.java:60)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil$3.run(TokenUtil.java:174)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil$3.run(TokenUtil.java:172)
   at java.security.AccessController.doPrivileged(Native Method)
   at javax.security.auth.Subject.doAs(Subject.java:415)
   at 
 org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1557)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil.obtainTokenForJob(TokenUtil.java:171)
   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
   at 
 sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)
   at 
 sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
   at java.lang.reflect.Method.invoke(Method.java:601)
   at org.apache.hadoop.hbase.util.Methods.call(Methods.java:39)
   at 
 

[jira] [Updated] (HIVE-6915) Hive Hbase queries fail on secure Tez cluster

2014-04-15 Thread Siddharth Seth (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-6915?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Siddharth Seth updated HIVE-6915:
-

Status: Patch Available  (was: Open)

 Hive Hbase queries fail on secure Tez cluster
 -

 Key: HIVE-6915
 URL: https://issues.apache.org/jira/browse/HIVE-6915
 Project: Hive
  Issue Type: Bug
  Components: Tez
Affects Versions: 0.13.0
 Environment: Kerberos secure Tez cluster
Reporter: Deepesh Khandelwal
Assignee: Siddharth Seth
 Attachments: HIVE-6915.1.patch


 Hive queries reading and writing to HBase are currently failing with the 
 following exception in a secure Tez cluster:
 {noformat}
 2014-04-14 13:47:05,644 FATAL [InputInitializer [Map 1] #0] 
 org.apache.hadoop.ipc.RpcClient: SASL authentication failed. The most likely 
 cause is missing or invalid credentials. Consider 'kinit'.
 javax.security.sasl.SaslException: GSS initiate failed [Caused by 
 GSSException: No valid credentials provided (Mechanism level: Failed to find 
 any Kerberos tgt)]
   at 
 com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212)
   at 
 org.apache.hadoop.hbase.security.HBaseSaslRpcClient.saslConnect(HBaseSaslRpcClient.java:152)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.setupSaslConnection(RpcClient.java:792)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.access$800(RpcClient.java:349)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection$2.run(RpcClient.java:918)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection$2.run(RpcClient.java:915)
   at java.security.AccessController.doPrivileged(Native Method)
   at javax.security.auth.Subject.doAs(Subject.java:415)
   at 
 org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1557)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.setupIOstreams(RpcClient.java:915)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.writeRequest(RpcClient.java:1065)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$Connection.tracedWriteRequest(RpcClient.java:1032)
   at org.apache.hadoop.hbase.ipc.RpcClient.call(RpcClient.java:1474)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient.callBlockingMethod(RpcClient.java:1684)
   at 
 org.apache.hadoop.hbase.ipc.RpcClient$BlockingRpcChannelImplementation.callBlockingMethod(RpcClient.java:1737)
   at 
 org.apache.hadoop.hbase.protobuf.generated.ClientProtos$ClientService$BlockingStub.execService(ClientProtos.java:29288)
   at 
 org.apache.hadoop.hbase.protobuf.ProtobufUtil.execService(ProtobufUtil.java:1562)
   at 
 org.apache.hadoop.hbase.ipc.RegionCoprocessorRpcChannel$1.call(RegionCoprocessorRpcChannel.java:87)
   at 
 org.apache.hadoop.hbase.ipc.RegionCoprocessorRpcChannel$1.call(RegionCoprocessorRpcChannel.java:84)
   at 
 org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithRetries(RpcRetryingCaller.java:121)
   at 
 org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithRetries(RpcRetryingCaller.java:97)
   at 
 org.apache.hadoop.hbase.ipc.RegionCoprocessorRpcChannel.callExecService(RegionCoprocessorRpcChannel.java:90)
   at 
 org.apache.hadoop.hbase.ipc.CoprocessorRpcChannel.callBlockingMethod(CoprocessorRpcChannel.java:67)
   at 
 org.apache.hadoop.hbase.protobuf.generated.AuthenticationProtos$AuthenticationService$BlockingStub.getAuthenticationToken(AuthenticationProtos.java:4512)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil.obtainToken(TokenUtil.java:60)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil$3.run(TokenUtil.java:174)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil$3.run(TokenUtil.java:172)
   at java.security.AccessController.doPrivileged(Native Method)
   at javax.security.auth.Subject.doAs(Subject.java:415)
   at 
 org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1557)
   at 
 org.apache.hadoop.hbase.security.token.TokenUtil.obtainTokenForJob(TokenUtil.java:171)
   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
   at 
 sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)
   at 
 sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
   at java.lang.reflect.Method.invoke(Method.java:601)
   at org.apache.hadoop.hbase.util.Methods.call(Methods.java:39)
   at 
 org.apache.hadoop.hbase.security.User$SecureHadoopUser.obtainAuthTokenForJob(User.java:334)
   at 
 org.apache.hadoop.hbase.mapred.TableMapReduceUtil.initCredentials(TableMapReduceUtil.java:201)
   at 
 org.apache.hadoop.hive.hbase.HiveHBaseTableInputFormat.getSplits(HiveHBaseTableInputFormat.java:415)
   at