Hey Eli,
Can you tell me which options I need to modify?
Do I need a different ZK port per Giraph job?

Thanks,

--
Gianmarco


On Mon, Mar 25, 2013 at 7:50 PM, Eli Reisman <apache.mail...@gmail.com>wrote:

> Yes, sorry i forgot to mention, many of the conflicts of dirs and ports
> occurs because of multiple instance-local test ZK's up at once. Make your
> dirs and ports unique and this will go away. Had the same trouble with
> YarnMiniCluster ;)
>
>
>
> On Mon, Mar 25, 2013 at 11:17 AM, Eugene Koontz (JIRA) <j...@apache.org
> >wrote:
>
> >
> >      [
> >
> https://issues.apache.org/jira/browse/GIRAPH-583?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
> ]
> >
> > Eugene Koontz resolved GIRAPH-583.
> > ----------------------------------
> >
> >     Resolution: Fixed
> >
> > > Problem with authentication on Hadoop 0.23
> > > ------------------------------------------
> > >
> > >                 Key: GIRAPH-583
> > >                 URL: https://issues.apache.org/jira/browse/GIRAPH-583
> > >             Project: Giraph
> > >          Issue Type: Bug
> > >            Reporter: Gianmarco De Francisci Morales
> > >
> > > Hi,
> > > I am trying to run the RWR code on trunk and Hadoop 0.23 with Kerberos
> > authentication, but I get this exception:
> > > {code}
> > > 13/03/23 17:32:36 ERROR security.UserGroupInformation:
> > PriviledgedActionException as:gdfm (auth:KERBEROS)
> > cause:javax.security.sasl.SaslException: GSS initiate failed [Caused by
> > GSSException: No valid credentials provided (Mechanism level: Failed to
> > find any Kerberos tgt)]
> > > 13/03/23 17:32:36 WARN ipc.Client: Exception encountered while
> > connecting to the server : javax.security.sasl.SaslException: GSS
> initiate
> > failed [Caused by GSSException: No valid credentials provided (Mechanism
> > level: Failed to find any Kerberos tgt)]
> > > 13/03/23 17:32:36 ERROR security.UserGroupInformation:
> > PriviledgedActionException as:gdfm (auth:KERBEROS)
> > cause:java.io.IOException: javax.security.sasl.SaslException: GSS
> initiate
> > failed [Caused by GSSException: No valid credentials provided (Mechanism
> > level: Failed to find any Kerberos tgt)]
> > > 13/03/23 17:32:36 ERROR security.UserGroupInformation:
> > PriviledgedActionException as:gdfm (auth:KERBEROS)
> > cause:java.io.IOException: Failed on local exception:
> java.io.IOException:
> > javax.security.sasl.SaslException: GSS initiate failed [Caused by
> > GSSException: No valid credentials provided (Mechanism level: Failed to
> > find any Kerberos tgt)]; Host Details : local host is: "
> > gwta3005.tan.ygrid.yahoo.com/98.138.127.244"; destination host is: ""
> > tiberiumtan-nn1.tan.ygrid.yahoo.com":8020;
> > > Exception in thread "main" java.io.IOException: Failed on local
> > exception: java.io.IOException: javax.security.sasl.SaslException: GSS
> > initiate failed [Caused by GSSException: No valid credentials provided
> > (Mechanism level: Failed to find any Kerberos tgt)]; Host Details : local
> > host is: "gwta3005.tan.ygrid.yahoo.com/98.138.127.244"; destination host
> > is: ""tiberiumtan-nn1.tan.ygrid.yahoo.com":8020;
> > >       at
> org.apache.hadoop.net.NetUtils.wrapException(NetUtils.java:738)
> > >       at org.apache.hadoop.ipc.Client.call(Client.java:1092)
> > >       at
> >
> org.apache.hadoop.ipc.WritableRpcEngine$Invoker.invoke(WritableRpcEngine.java:195)
> > >       at $Proxy6.getDelegationToken(Unknown Source)
> > >       at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> > >       at
> >
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)
> > >       at
> >
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> > >       at java.lang.reflect.Method.invoke(Method.java:601)
> > >       at
> >
> org.apache.hadoop.io.retry.RetryInvocationHandler.invokeMethod(RetryInvocationHandler.java:102)
> > >       at
> >
> org.apache.hadoop.io.retry.RetryInvocationHandler.invoke(RetryInvocationHandler.java:67)
> > >       at $Proxy6.getDelegationToken(Unknown Source)
> > >       at
> > org.apache.hadoop.hdfs.DFSClient.getDelegationToken(DFSClient.java:603)
> > >       at
> >
> org.apache.hadoop.hdfs.DistributedFileSystem.getDelegationToken(DistributedFileSystem.java:786)
> > >       at
> >
> org.apache.hadoop.fs.FileSystem.collectDelegationTokens(FileSystem.java:466)
> > >       at
> > org.apache.hadoop.fs.FileSystem.addDelegationTokens(FileSystem.java:444)
> > >       at
> >
> org.apache.hadoop.mapreduce.security.TokenCache.obtainTokensForNamenodesInternal(TokenCache.java:122)
> > >       at
> >
> org.apache.hadoop.mapreduce.security.TokenCache.obtainTokensForNamenodesInternal(TokenCache.java:101)
> > >       at
> >
> org.apache.hadoop.mapreduce.security.TokenCache.obtainTokensForNamenodes(TokenCache.java:81)
> > >       at
> >
> org.apache.hadoop.mapreduce.lib.output.FileOutputFormat.checkOutputSpecs(FileOutputFormat.java:137)
> > >       at
> >
> org.apache.giraph.io.formats.TextVertexOutputFormat.checkOutputSpecs(TextVertexOutputFormat.java:55)
> > >       at
> >
> org.apache.giraph.bsp.BspOutputFormat.checkOutputSpecs(BspOutputFormat.java:50)
> > >       at
> >
> org.apache.hadoop.mapreduce.JobSubmitter.checkSpecs(JobSubmitter.java:417)
> > >       at
> >
> org.apache.hadoop.mapreduce.JobSubmitter.submitJobInternal(JobSubmitter.java:332)
> > >       at org.apache.hadoop.mapreduce.Job$11.run(Job.java:1218)
> > >       at org.apache.hadoop.mapreduce.Job$11.run(Job.java:1215)
> > >       at java.security.AccessController.doPrivileged(Native Method)
> > >       at javax.security.auth.Subject.doAs(Subject.java:415)
> > >       at
> >
> org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1221)
> > >       at org.apache.hadoop.mapreduce.Job.submit(Job.java:1215)
> > >       at
> org.apache.hadoop.mapreduce.Job.waitForCompletion(Job.java:1236)
> > >       at org.apache.giraph.job.GiraphJob.run(GiraphJob.java:237)
> > >       at org.apache.giraph.GiraphRunner.run(GiraphRunner.java:81)
> > >       at org.apache.hadoop.util.ToolRunner.run(ToolRunner.java:69)
> > >       at org.apache.hadoop.util.ToolRunner.run(ToolRunner.java:83)
> > >       at org.apache.giraph.GiraphRunner.main(GiraphRunner.java:111)
> > >       at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> > >       at
> >
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)
> > >       at
> >
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> > >       at java.lang.reflect.Method.invoke(Method.java:601)
> > >       at org.apache.hadoop.util.RunJar.main(RunJar.java:208)
> > > Caused by: java.io.IOException: javax.security.sasl.SaslException: GSS
> > initiate failed [Caused by GSSException: No valid credentials provided
> > (Mechanism level: Failed to find any Kerberos tgt)]
> > >       at org.apache.hadoop.ipc.Client$Connection$1.run(Client.java:534)
> > >       at java.security.AccessController.doPrivileged(Native Method)
> > >       at javax.security.auth.Subject.doAs(Subject.java:415)
> > >       at
> >
> org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1221)
> > >       at
> >
> org.apache.hadoop.ipc.Client$Connection.handleSaslConnectionFailure(Client.java:498)
> > >       at
> > org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:582)
> > >       at
> > org.apache.hadoop.ipc.Client$Connection.access$2000(Client.java:205)
> > >       at org.apache.hadoop.ipc.Client.getConnection(Client.java:1198)
> > >       at org.apache.hadoop.ipc.Client.call(Client.java:1068)
> > >       ... 38 more
> > > Caused by: javax.security.sasl.SaslException: GSS initiate failed
> > [Caused by GSSException: No valid credentials provided (Mechanism level:
> > Failed to find any Kerberos tgt)]
> > >       at
> >
> com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212)
> > >       at
> >
> org.apache.hadoop.security.SaslRpcClient.saslConnect(SaslRpcClient.java:137)
> > >       at
> >
> org.apache.hadoop.ipc.Client$Connection.setupSaslConnection(Client.java:406)
> > >       at
> > org.apache.hadoop.ipc.Client$Connection.access$1200(Client.java:205)
> > >       at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:575)
> > >       at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:572)
> > >       at java.security.AccessController.doPrivileged(Native Method)
> > >       at javax.security.auth.Subject.doAs(Subject.java:415)
> > >       at
> >
> org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1221)
> > >       at
> > org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:571)
> > >       ... 41 more
> > > Caused by: GSSException: No valid credentials provided (Mechanism
> level:
> > Failed to find any Kerberos tgt)
> > >       at
> >
> sun.security.jgss.krb5.Krb5InitCredential.getInstance(Krb5InitCredential.java:147)
> > >       at
> >
> sun.security.jgss.krb5.Krb5MechFactory.getCredentialElement(Krb5MechFactory.java:121)
> > >       at
> >
> sun.security.jgss.krb5.Krb5MechFactory.getMechanismContext(Krb5MechFactory.java:187)
> > >       at
> >
> sun.security.jgss.GSSManagerImpl.getMechanismContext(GSSManagerImpl.java:223)
> > >       at
> > sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:212)
> > >       at
> > sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:179)
> > >       at
> >
> com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:193)
> > >       ... 50 more
> > > {code}
> > > For reference, I am using  -Dgiraph.useNetty="true"
> > -Dgiraph.authenticate="true"
> >
> > --
> > This message is automatically generated by JIRA.
> > If you think it was sent incorrectly, please contact your JIRA
> > administrators
> > For more information on JIRA, see:
> http://www.atlassian.com/software/jira
> >
>

Reply via email to