[ 
https://issues.apache.org/jira/browse/HADOOP-19732?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Steve Loughran resolved HADOOP-19732.
-------------------------------------
    Resolution: Duplicate

> Namenode Crash Due to Delegation Renewer Runtime Exit (NoMatchingRule)
> ----------------------------------------------------------------------
>
>                 Key: HADOOP-19732
>                 URL: https://issues.apache.org/jira/browse/HADOOP-19732
>             Project: Hadoop Common
>          Issue Type: Improvement
>            Reporter: Karthik Palanisamy
>            Priority: Major
>
> The delegation token renewer enters runtime exit when a _NoMatchingRule_ 
> error, which caused the entire namenode to crash. I think returning an error 
> to the client should be fine but bringing down the namenode is not acceptable 
> to anyone.
> After the AD change, the new realm was updated, but some jobs are still using 
> the old realm as users are updating them gradually. This migration process 
> will take time, and during this period, other jobs are still catching up with 
> the new realm configuration. However, the namenode down disrupts all of them.
>  
> {code:java}
> ERROR 
> org.apache.hadoop.security.token.delegation.AbstractDelegationTokenSecretManager:
>  ExpiredTokenRemover thread received unexpected exception
> java.lang.IllegalArgumentException: Illegal principal name hive/[email protected]
> org.apache.hadoop.security.authentication.util.KerberosName$NoMatchingRule: 
> No rules applied to hive/[email protected]         at 
> org.apache.hadoop.security.User.<init>(User.java:51)
>         at org.apache.hadoop.security.User.<init>(User.java:43)
>         at 
> org.apache.hadoop.security.UserGroupInformation.createRemoteUser(UserGroupInformation.java:1417)
>         at 
> org.apache.hadoop.security.UserGroupInformation.createRemoteUser(UserGroupInformation.java:1401)
>         at 
> org.apache.hadoop.security.token.delegation.AbstractDelegationTokenIdentifier.getUser(AbstractDelegationTokenIdentifier.java:80)
>         at 
> org.apache.hadoop.hdfs.security.token.delegation.DelegationTokenIdentifier.getUser(DelegationTokenIdentifier.java:81)
>         at 
> org.apache.hadoop.hdfs.security.token.delegation.DelegationTokenIdentifier.toString(DelegationTokenIdentifier.java:91)
>         at java.lang.String.valueOf(String.java:2994)
>         at java.lang.StringBuilder.append(StringBuilder.java:137)
>         at 
> org.apache.hadoop.security.token.delegation.AbstractDelegationTokenSecretManager.formatTokenId(AbstractDelegationTokenSecretManager.java:58)
>         at 
> org.apache.hadoop.security.token.delegation.AbstractDelegationTokenSecretManager.logExpireTokens(AbstractDelegationTokenSecretManager.java:642)
>         at 
> org.apache.hadoop.security.token.delegation.AbstractDelegationTokenSecretManager.removeExpiredToken(AbstractDelegationTokenSecretManager.java:635)
>         at 
> org.apache.hadoop.security.token.delegation.AbstractDelegationTokenSecretManager.access$400(AbstractDelegationTokenSecretManager.java:51)
>         at 
> org.apache.hadoop.security.token.delegation.AbstractDelegationTokenSecretManager$ExpiredTokenRemover.run(AbstractDelegationTokenSecretManager.java:694)
>         at java.lang.Thread.run(Thread.java:750)
> Caused by: 
> org.apache.hadoop.security.authentication.util.KerberosName$NoMatchingRule: 
> No rules applied to hive/[email protected]
>         at 
> org.apache.hadoop.security.authentication.util.KerberosName.getShortName(KerberosName.java:429)
>         at org.apache.hadoop.security.User.<init>(User.java:48)
>         ... 14 more {code}
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to