Re: kerberos question

2015-11-06 Thread Ruslan Dautkhanov
You could probably instead of specifying --principal [principle] --keytab [keytab] --proxy-user [proxied_user] ... arguments just create/renew a kerberos ticket before submitting a job $ kinit prinipal.name -kt keytab.file $ spark-submit ... Do you need impersonation / proxy user at all? I

Re: kerberos question

2015-11-04 Thread Chen Song
After a bit more investigation, I found that it could be related to impersonation on kerberized cluster. Our job is started with the following command. /usr/lib/spark/bin/spark-submit --master yarn-client --principal [principle] --keytab [keytab] --proxy-user [proxied_user] ... In application

Re: kerberos question

2015-11-04 Thread Ted Yu
2015-11-04 10:03:31,905 ERROR [Delegation Token Refresh Thread-0] hdfs.KeyProviderCache (KeyProviderCache.java:createKeyProviderURI(87)) - Could not find uri with key [dfs. encryption.key.provider.uri] to create a keyProvider !! Could it be related to HDFS-7931 ? On Wed, Nov 4, 2015 at 12:30

kerberos question

2015-11-03 Thread Chen Song
We saw the following error happening in Spark Streaming job. Our job is running on YARN with kerberos enabled. First, warnings below were printed out, I only pasted a few but the following was repeated hundred/thousand of times. 15/11/03 14:43:07 WARN UserGroupInformation: