Hey Eli, Can you tell me which options I need to modify? Do I need a different ZK port per Giraph job?
Thanks, -- Gianmarco On Mon, Mar 25, 2013 at 7:50 PM, Eli Reisman <apache.mail...@gmail.com>wrote: > Yes, sorry i forgot to mention, many of the conflicts of dirs and ports > occurs because of multiple instance-local test ZK's up at once. Make your > dirs and ports unique and this will go away. Had the same trouble with > YarnMiniCluster ;) > > > > On Mon, Mar 25, 2013 at 11:17 AM, Eugene Koontz (JIRA) <j...@apache.org > >wrote: > > > > > [ > > > https://issues.apache.org/jira/browse/GIRAPH-583?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel > ] > > > > Eugene Koontz resolved GIRAPH-583. > > ---------------------------------- > > > > Resolution: Fixed > > > > > Problem with authentication on Hadoop 0.23 > > > ------------------------------------------ > > > > > > Key: GIRAPH-583 > > > URL: https://issues.apache.org/jira/browse/GIRAPH-583 > > > Project: Giraph > > > Issue Type: Bug > > > Reporter: Gianmarco De Francisci Morales > > > > > > Hi, > > > I am trying to run the RWR code on trunk and Hadoop 0.23 with Kerberos > > authentication, but I get this exception: > > > {code} > > > 13/03/23 17:32:36 ERROR security.UserGroupInformation: > > PriviledgedActionException as:gdfm (auth:KERBEROS) > > cause:javax.security.sasl.SaslException: GSS initiate failed [Caused by > > GSSException: No valid credentials provided (Mechanism level: Failed to > > find any Kerberos tgt)] > > > 13/03/23 17:32:36 WARN ipc.Client: Exception encountered while > > connecting to the server : javax.security.sasl.SaslException: GSS > initiate > > failed [Caused by GSSException: No valid credentials provided (Mechanism > > level: Failed to find any Kerberos tgt)] > > > 13/03/23 17:32:36 ERROR security.UserGroupInformation: > > PriviledgedActionException as:gdfm (auth:KERBEROS) > > cause:java.io.IOException: javax.security.sasl.SaslException: GSS > initiate > > failed [Caused by GSSException: No valid credentials provided (Mechanism > > level: Failed to find any Kerberos tgt)] > > > 13/03/23 17:32:36 ERROR security.UserGroupInformation: > > PriviledgedActionException as:gdfm (auth:KERBEROS) > > cause:java.io.IOException: Failed on local exception: > java.io.IOException: > > javax.security.sasl.SaslException: GSS initiate failed [Caused by > > GSSException: No valid credentials provided (Mechanism level: Failed to > > find any Kerberos tgt)]; Host Details : local host is: " > > gwta3005.tan.ygrid.yahoo.com/98.138.127.244"; destination host is: "" > > tiberiumtan-nn1.tan.ygrid.yahoo.com":8020; > > > Exception in thread "main" java.io.IOException: Failed on local > > exception: java.io.IOException: javax.security.sasl.SaslException: GSS > > initiate failed [Caused by GSSException: No valid credentials provided > > (Mechanism level: Failed to find any Kerberos tgt)]; Host Details : local > > host is: "gwta3005.tan.ygrid.yahoo.com/98.138.127.244"; destination host > > is: ""tiberiumtan-nn1.tan.ygrid.yahoo.com":8020; > > > at > org.apache.hadoop.net.NetUtils.wrapException(NetUtils.java:738) > > > at org.apache.hadoop.ipc.Client.call(Client.java:1092) > > > at > > > org.apache.hadoop.ipc.WritableRpcEngine$Invoker.invoke(WritableRpcEngine.java:195) > > > at $Proxy6.getDelegationToken(Unknown Source) > > > at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) > > > at > > > sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57) > > > at > > > sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) > > > at java.lang.reflect.Method.invoke(Method.java:601) > > > at > > > org.apache.hadoop.io.retry.RetryInvocationHandler.invokeMethod(RetryInvocationHandler.java:102) > > > at > > > org.apache.hadoop.io.retry.RetryInvocationHandler.invoke(RetryInvocationHandler.java:67) > > > at $Proxy6.getDelegationToken(Unknown Source) > > > at > > org.apache.hadoop.hdfs.DFSClient.getDelegationToken(DFSClient.java:603) > > > at > > > org.apache.hadoop.hdfs.DistributedFileSystem.getDelegationToken(DistributedFileSystem.java:786) > > > at > > > org.apache.hadoop.fs.FileSystem.collectDelegationTokens(FileSystem.java:466) > > > at > > org.apache.hadoop.fs.FileSystem.addDelegationTokens(FileSystem.java:444) > > > at > > > org.apache.hadoop.mapreduce.security.TokenCache.obtainTokensForNamenodesInternal(TokenCache.java:122) > > > at > > > org.apache.hadoop.mapreduce.security.TokenCache.obtainTokensForNamenodesInternal(TokenCache.java:101) > > > at > > > org.apache.hadoop.mapreduce.security.TokenCache.obtainTokensForNamenodes(TokenCache.java:81) > > > at > > > org.apache.hadoop.mapreduce.lib.output.FileOutputFormat.checkOutputSpecs(FileOutputFormat.java:137) > > > at > > > org.apache.giraph.io.formats.TextVertexOutputFormat.checkOutputSpecs(TextVertexOutputFormat.java:55) > > > at > > > org.apache.giraph.bsp.BspOutputFormat.checkOutputSpecs(BspOutputFormat.java:50) > > > at > > > org.apache.hadoop.mapreduce.JobSubmitter.checkSpecs(JobSubmitter.java:417) > > > at > > > org.apache.hadoop.mapreduce.JobSubmitter.submitJobInternal(JobSubmitter.java:332) > > > at org.apache.hadoop.mapreduce.Job$11.run(Job.java:1218) > > > at org.apache.hadoop.mapreduce.Job$11.run(Job.java:1215) > > > at java.security.AccessController.doPrivileged(Native Method) > > > at javax.security.auth.Subject.doAs(Subject.java:415) > > > at > > > org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1221) > > > at org.apache.hadoop.mapreduce.Job.submit(Job.java:1215) > > > at > org.apache.hadoop.mapreduce.Job.waitForCompletion(Job.java:1236) > > > at org.apache.giraph.job.GiraphJob.run(GiraphJob.java:237) > > > at org.apache.giraph.GiraphRunner.run(GiraphRunner.java:81) > > > at org.apache.hadoop.util.ToolRunner.run(ToolRunner.java:69) > > > at org.apache.hadoop.util.ToolRunner.run(ToolRunner.java:83) > > > at org.apache.giraph.GiraphRunner.main(GiraphRunner.java:111) > > > at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) > > > at > > > sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57) > > > at > > > sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) > > > at java.lang.reflect.Method.invoke(Method.java:601) > > > at org.apache.hadoop.util.RunJar.main(RunJar.java:208) > > > Caused by: java.io.IOException: javax.security.sasl.SaslException: GSS > > initiate failed [Caused by GSSException: No valid credentials provided > > (Mechanism level: Failed to find any Kerberos tgt)] > > > at org.apache.hadoop.ipc.Client$Connection$1.run(Client.java:534) > > > at java.security.AccessController.doPrivileged(Native Method) > > > at javax.security.auth.Subject.doAs(Subject.java:415) > > > at > > > org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1221) > > > at > > > org.apache.hadoop.ipc.Client$Connection.handleSaslConnectionFailure(Client.java:498) > > > at > > org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:582) > > > at > > org.apache.hadoop.ipc.Client$Connection.access$2000(Client.java:205) > > > at org.apache.hadoop.ipc.Client.getConnection(Client.java:1198) > > > at org.apache.hadoop.ipc.Client.call(Client.java:1068) > > > ... 38 more > > > Caused by: javax.security.sasl.SaslException: GSS initiate failed > > [Caused by GSSException: No valid credentials provided (Mechanism level: > > Failed to find any Kerberos tgt)] > > > at > > > com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212) > > > at > > > org.apache.hadoop.security.SaslRpcClient.saslConnect(SaslRpcClient.java:137) > > > at > > > org.apache.hadoop.ipc.Client$Connection.setupSaslConnection(Client.java:406) > > > at > > org.apache.hadoop.ipc.Client$Connection.access$1200(Client.java:205) > > > at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:575) > > > at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:572) > > > at java.security.AccessController.doPrivileged(Native Method) > > > at javax.security.auth.Subject.doAs(Subject.java:415) > > > at > > > org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1221) > > > at > > org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:571) > > > ... 41 more > > > Caused by: GSSException: No valid credentials provided (Mechanism > level: > > Failed to find any Kerberos tgt) > > > at > > > sun.security.jgss.krb5.Krb5InitCredential.getInstance(Krb5InitCredential.java:147) > > > at > > > sun.security.jgss.krb5.Krb5MechFactory.getCredentialElement(Krb5MechFactory.java:121) > > > at > > > sun.security.jgss.krb5.Krb5MechFactory.getMechanismContext(Krb5MechFactory.java:187) > > > at > > > sun.security.jgss.GSSManagerImpl.getMechanismContext(GSSManagerImpl.java:223) > > > at > > sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:212) > > > at > > sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:179) > > > at > > > com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:193) > > > ... 50 more > > > {code} > > > For reference, I am using -Dgiraph.useNetty="true" > > -Dgiraph.authenticate="true" > > > > -- > > This message is automatically generated by JIRA. > > If you think it was sent incorrectly, please contact your JIRA > > administrators > > For more information on JIRA, see: > http://www.atlassian.com/software/jira > > >