Thanks Gordon.

Regards,
Raja.

From: "Tzu-Li (Gordon) Tai" <tzuli...@apache.org>
Date: Thursday, August 17, 2017 at 11:47 PM
To: Raja Aravapalli <raja.aravapa...@target.com>, "user@flink.apache.org" 
<user@flink.apache.org>
Subject: Re: [EXTERNAL] Re: Fink application failing with kerberos issue after 
running successfully without any issues for few days

Hi Raja,

Can you please confirm if I have to use the below settings to ensure I use 
keytabs?


  *   security.kerberos.login.use-ticket-cache:
Indicates whether to read from your Kerberos ticket cache (default: true).


  *   security.kerberos.login.keytab:
Absolute path to a Kerberos keytab file that contains the user credentials.


  *   security.kerberos.login.principal:
Kerberos principal name associated with the keytab.


  *   security.kerberos.login.contexts: A comma-separated list of login 
contexts to provide the Kerberos credentials to (for example, 
Client,KafkaClient to use the credentials for ZooKeeper authentication and for 
Kafka authentication).

Yes, these are the exact configs that you’ll need to set.

Also a quick question, once I make these changes to use keytabs instead of 
ticket cache, Is there any place in the logs I can check, were the setting I 
made are in use and the applications are not actually using again ticket cache 
again?
You should be able to find logs such as “Adding keytab <keytab path> to the AM 
container …” at the beginning of the job submission.

Cheers,
Gordon

On 18 August 2017 at 5:51:57 AM, Raja.Aravapalli 
(raja.aravapa...@target.com<mailto:raja.aravapa...@target.com>) wrote:

Thanks a lot Eron…

If I am understanding you correct, you suggest using keytabs to launch 
streaming applications!

Can you please confirm if I have to use the below settings to ensure I use 
keytabs?


  *   security.kerberos.login.use-ticket-cache:
Indicates whether to read from your Kerberos ticket cache (default: true).


  *   security.kerberos.login.keytab:
Absolute path to a Kerberos keytab file that contains the user credentials.


  *   security.kerberos.login.principal:
Kerberos principal name associated with the keytab.


  *   security.kerberos.login.contexts: A comma-separated list of login 
contexts to provide the Kerberos credentials to (for example, 
Client,KafkaClient to use the credentials for ZooKeeper authentication and for 
Kafka authentication).

https://ci.apache.org/projects/flink/flink-docs-release-1.3/setup/config.html#kerberos-based-security-1


Also a quick question, once I make these changes to use keytabs instead of 
ticket cache, Is there any place in the logs I can check, were the setting I 
made are in use and the applications are not actually using again ticket cache 
again?

Thanks a lot, in advance.


Regards,
Raja.

From: Eron Wright <eronwri...@gmail.com>
Date: Thursday, August 17, 2017 at 1:06 PM
To: Ted Yu <yuzhih...@gmail.com>
Cc: Raja Aravapalli <raja.aravapa...@target.com>, "user@flink.apache.org" 
<user@flink.apache.org>
Subject: Re: [EXTERNAL] Re: Fink application failing with kerberos issue after 
running successfully without any issues for few days

Raja,
According to those configuration values, the delegation token would be 
automatically renewed every 24 hours, then expire entirely after 7 days.   You 
say that the job ran without issue for 'a few days'.  Can we conclude that the 
job hit the 7-day DT expiration?

Flink supports the use of Kerberos keytabs as an alternative to delegation 
tokens for exactly this reason, that delegation tokens eventually expire and so 
aren't useful to a long-running program.   Consider making use of keytabs here.

Hope this helps!
-Eron


On Thu, Aug 17, 2017 at 9:58 AM, Ted Yu 
<yuzhih...@gmail.com<mailto:yuzhih...@gmail.com>> wrote:
I think this needs to be done by the admin.

On Thu, Aug 17, 2017 at 9:37 AM, Raja.Aravapalli 
<raja.aravapa...@target.com<mailto:raja.aravapa...@target.com>> wrote:

I don’t have access to the site.xml files, it is controlled by a support team.

Does flink has any configuration settings or api’s thru which we can control 
this ?


Regards,
Raja.

From: Ted Yu <yuzhih...@gmail.com<mailto:yuzhih...@gmail.com>>
Date: Thursday, August 17, 2017 at 11:07 AM
To: Raja Aravapalli 
<raja.aravapa...@target.com<mailto:raja.aravapa...@target.com>>
Cc: "user@flink.apache.org<mailto:user@flink.apache.org>" 
<user@flink.apache.org<mailto:user@flink.apache.org>>
Subject: Re: [EXTERNAL] Re: Fink application failing with kerberos issue after 
running successfully without any issues for few days

Can you try shortening renewal interval to something like 28800000 ?

Cheers

On Thu, Aug 17, 2017 at 8:58 AM, Raja.Aravapalli 
<raja.aravapa...@target.com<mailto:raja.aravapa...@target.com>> wrote:
Hi Ted,

Below is what I see in the environment:

dfs.namenode.delegation.token.max-lifetime:          604800000
dfs.namenode.delegation.token.renew-interval:      86400000


Thanks.


Regards,
Raja.

From: Ted Yu <yuzhih...@gmail.com<mailto:yuzhih...@gmail.com>>
Date: Thursday, August 17, 2017 at 10:46 AM
To: Raja Aravapalli 
<raja.aravapa...@target.com<mailto:raja.aravapa...@target.com>>
Cc: "user@flink.apache.org<mailto:user@flink.apache.org>" 
<user@flink.apache.org<mailto:user@flink.apache.org>>
Subject: [EXTERNAL] Re: Fink application failing with kerberos issue after 
running successfully without any issues for few days

What are the values for the following parameters ?

dfs.namenode.delegation.token.max-lifetime

dfs.namenode.delegation.token.renew-interval

Cheers

On Thu, Aug 17, 2017 at 8:24 AM, Raja.Aravapalli 
<raja.aravapa...@target.com<mailto:raja.aravapa...@target.com>> wrote:
Hi Ted,

Find below the configuration I see in yarn-site.xml

<property>
      
<name>yarn.resourcemanager.pro<http://yarn.resourcemanager.pro>xy-user-privileges.enabled</name>
      <value>true</value>
    </property>


Regards,
Raja.


From: Ted Yu <yuzhih...@gmail.com<mailto:yuzhih...@gmail.com>>
Date: Wednesday, August 16, 2017 at 9:05 PM
To: Raja Aravapalli 
<raja.aravapa...@target.com<mailto:raja.aravapa...@target.com>>
Cc: "user@flink.apache.org<mailto:user@flink.apache.org>" 
<user@flink.apache.org<mailto:user@flink.apache.org>>
Subject: [EXTERNAL] Re: hadoop

Can you check the following config in yarn-site.xml ?

yarn.resourcemanager.proxy-user-privileges.enabled (true)

Cheers

On Wed, Aug 16, 2017 at 4:48 PM, Raja.Aravapalli 
<raja.aravapa...@target.com<mailto:raja.aravapa...@target.com>> wrote:

Hi,

I triggered an flink yarn-session on a running Hadoop cluster… and triggering 
streaming application on that.

But, I see after few days of running without any issues, the flink application 
which is writing data to hdfs failing with below exception.

Caused by: 
org.apache.hadoop.ipc.RemoteException(org.apache.hadoop.security.token.SecretManager$InvalidToken):
 token (HDFS_DELEGATION_TOKEN token xxxxxx for xxxxxx) can't be found in cache


Can someone please help me how I can fix this. Thanks a lot.



Regards,
Raja.





Reply via email to