<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: tez job started by oozie fails with &amp;quot;Delegation Token can be issued only with kerberos or web authentication&amp;quot; in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/tez-job-started-by-oozie-fails-with-quot-Delegation-Token/m-p/140192#M102815</link>
    <description>&lt;P&gt;
	Ok, I avoided this problem by runnin shell action that performs 'hadoop jar' command instead of java action.&lt;/P&gt;&lt;P&gt;
	Of course I have to use 'UserGroupInformation.loginUserFromKeytab' inside my class (or run 'kinit -kt' command at the start of shell script).&lt;/P&gt;&lt;P&gt;
	I suppose that 
	&lt;A href="https://community.hortonworks.com/users/2766/sinhapranshu.html"&gt;@Pranshu Pranshu&lt;/A&gt;'s scenario can be realized too. But in my situation, solution with shell action is also suitable. If anybody knows how to replace the old tokens with the new ones inside java action, please show me example.&lt;/P&gt;&lt;P&gt;
	Thank you very much for helping!&lt;/P&gt;</description>
    <pubDate>Mon, 15 Feb 2016 01:00:16 GMT</pubDate>
    <dc:creator>ro_v_boyko</dc:creator>
    <dc:date>2016-02-15T01:00:16Z</dc:date>
    <item>
      <title>tez job started by oozie fails with "Delegation Token can be issued only with kerberos or web authentication"</title>
      <link>https://community.cloudera.com/t5/Support-Questions/tez-job-started-by-oozie-fails-with-quot-Delegation-Token/m-p/140187#M102810</link>
      <description>&lt;P&gt;
	Hello everybody! &lt;/P&gt;&lt;P&gt;
	I have a very difficult problem for me, could you help me with the decision? &lt;/P&gt;&lt;P&gt;
	I'm trying to run Tez job from oozie workflow on secure cluster. &lt;/P&gt;&lt;P&gt;My wf action code:&lt;/P&gt;&lt;PRE&gt;    &amp;lt;action name="replace-data" cred="hive-credentials"&amp;gt;
        &amp;lt;java&amp;gt;
            &amp;lt;job-tracker&amp;gt;${jobTracker}&amp;lt;/job-tracker&amp;gt;
            &amp;lt;name-node&amp;gt;${nameNode}&amp;lt;/name-node&amp;gt;
            &amp;lt;configuration&amp;gt;
                &amp;lt;property&amp;gt;
                    &amp;lt;name&amp;gt;mapreduce.job.queuename&amp;lt;/name&amp;gt;
                        &amp;lt;value&amp;gt;${queueName}&amp;lt;/value&amp;gt;
                &amp;lt;/property&amp;gt;
                &amp;lt;property&amp;gt;
                    &amp;lt;name&amp;gt;tez.queue.name&amp;lt;/name&amp;gt;
                        &amp;lt;value&amp;gt;${queueName}&amp;lt;/value&amp;gt;
                &amp;lt;/property&amp;gt;
            &amp;lt;/configuration&amp;gt;
            &amp;lt;main-class&amp;gt;ru.beeline.hadoop.smsnewest.WestReplacer&amp;lt;/main-class&amp;gt;
            &amp;lt;arg&amp;gt;-Dtez.queue.name=${queueName}&amp;lt;/arg&amp;gt;
            &amp;lt;arg&amp;gt;-Dmapreduce.job.queuename=${queueName}&amp;lt;/arg&amp;gt;
            &amp;lt;arg&amp;gt;${inputHDFSDir}/${partDate}&amp;lt;/arg&amp;gt;
            &amp;lt;arg&amp;gt;${outputHDFSDir}/data_date=${partDate}&amp;lt;/arg&amp;gt;
            &amp;lt;file&amp;gt;lib/SmsNeWest.jar&amp;lt;/file&amp;gt;
        &amp;lt;/java&amp;gt;
        &amp;lt;ok to="load-parts-to-hive-recover"/&amp;gt;
        &amp;lt;error to="fail"/&amp;gt;
    &amp;lt;/action&amp;gt;
&lt;/PRE&gt;&lt;P&gt;tez-site.xml file with the correct value of "tez.lib.uris=/hdp/apps/".... exists in lib subdirectory of workflow application path.&lt;/P&gt;&lt;P&gt;But an error occurs during the execution step of the method &lt;STRONG&gt;&lt;EM&gt;submitDAG(dag)&lt;/EM&gt;&lt;/STRONG&gt; at the stage tez.lib.uris read: &lt;/P&gt;&lt;PRE&gt;Caused by: org.apache.hadoop.ipc.RemoteException(java.io.IOException): Delegation Token can be issued only with kerberos or web authentication
	at org.apache.hadoop.hdfs.server.namenode.FSNamesystem.getDelegationToken(FSNamesystem.java:7751)
	at org.apache.hadoop.hdfs.server.namenode.NameNodeRpcServer.getDelegationToken(NameNodeRpcServer.java:534)
	at org.apache.hadoop.hdfs.protocolPB.ClientNamenodeProtocolServerSideTranslatorPB.getDelegationToken(ClientNamenodeProtocolServerSideTranslatorPB.java:977)
	at org.apache.hadoop.hdfs.protocol.proto.ClientNamenodeProtocolProtos$ClientNamenodeProtocol$2.callBlockingMethod(ClientNamenodeProtocolProtos.java)
	at org.apache.hadoop.ipc.ProtobufRpcEngine$Server$ProtoBufRpcInvoker.call(ProtobufRpcEngine.java:619)
	at org.apache.hadoop.ipc.RPC$Server.call(RPC.java:962)
	at org.apache.hadoop.ipc.Server$Handler$1.run(Server.java:2127)
	at org.apache.hadoop.ipc.Server$Handler$1.run(Server.java:2123)
	at java.security.AccessController.doPrivileged(Native Method)
	at javax.security.auth.Subject.doAs(Subject.java:415)
	at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1671)
	at org.apache.hadoop.ipc.Server$Handler.run(Server.java:2121)

	at org.apache.hadoop.ipc.Client.call(Client.java:1469)
	at org.apache.hadoop.ipc.Client.call(Client.java:1400)
	at org.apache.hadoop.ipc.ProtobufRpcEngine$Invoker.invoke(ProtobufRpcEngine.java:232)
	at com.sun.proxy.$Proxy17.getDelegationToken(Unknown Source)
	at org.apache.hadoop.hdfs.protocolPB.ClientNamenodeProtocolTranslatorPB.getDelegationToken(ClientNamenodeProtocolTranslatorPB.java:925)
	at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)
	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.lang.reflect.Method.invoke(Method.java:606)
	at org.apache.hadoop.io.retry.RetryInvocationHandler.invokeMethod(RetryInvocationHandler.java:187)
	at org.apache.hadoop.io.retry.RetryInvocationHandler.invoke(RetryInvocationHandler.java:102)
	at com.sun.proxy.$Proxy18.getDelegationToken(Unknown Source)
	at org.apache.hadoop.hdfs.DFSClient.getDelegationToken(DFSClient.java:1032)
	at org.apache.hadoop.hdfs.DistributedFileSystem.getDelegationToken(DistributedFileSystem.java:1452)
	at org.apache.hadoop.fs.FileSystem.collectDelegationTokens(FileSystem.java:529)
	at org.apache.hadoop.fs.FileSystem.addDelegationTokens(FileSystem.java:507)
	at org.apache.hadoop.hdfs.DistributedFileSystem.addDelegationTokens(DistributedFileSystem.java:2138)
	at org.apache.tez.common.security.TokenCache.obtainTokensForFileSystemsInternal(TokenCache.java:107)
	at org.apache.tez.common.security.TokenCache.obtainTokensForFileSystemsInternal(TokenCache.java:86)
	at org.apache.tez.common.security.TokenCache.obtainTokensForFileSystems(TokenCache.java:76)
	at org.apache.tez.client.TezClientUtils.setupTezJarsLocalResources(TezClientUtils.java:195)
	at org.apache.tez.client.TezClient.getTezJarResources(TezClient.java:724)
	at org.apache.tez.client.TezClient.submitDAGApplication(TezClient.java:692)
	at org.apache.tez.client.TezClient.submitDAGApplication(TezClient.java:670)
	at org.apache.tez.client.TezClient.submitDAG(TezClient.java:356)
	at ru.beeline.hadoop.smsnewest.WestReplacer.run(WestReplacer.java:173)
	at ru.beeline.hadoop.smsnewest.WestReplacer.run(WestReplacer.java:100)
	at ru.beeline.hadoop.smsnewest.WestReplacer.main(WestReplacer.java:193)
	at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:57)
	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
	at java.lang.reflect.Method.invoke(Method.java:606)
	at org.apache.oozie.action.hadoop.JavaMain.run(JavaMain.java:55)
	... 15 more&lt;/PRE&gt;&lt;P&gt;This class works fine when called from the console.&lt;/P&gt;&lt;P&gt;My stack and versions:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;hdp-2.2.8.0&lt;/LI&gt;&lt;LI&gt;hdfs and yarn 2.6.0.2.2&lt;/LI&gt;&lt;LI&gt;oozie 4.1.0.2.2&lt;/LI&gt;&lt;LI&gt;tez 0.5.2.2.2&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Any help would be greatly fo me! Thanks!&lt;/P&gt;</description>
      <pubDate>Sat, 13 Feb 2016 16:03:37 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/tez-job-started-by-oozie-fails-with-quot-Delegation-Token/m-p/140187#M102810</guid>
      <dc:creator>ro_v_boyko</dc:creator>
      <dc:date>2016-02-13T16:03:37Z</dc:date>
    </item>
    <item>
      <title>Re: tez job started by oozie fails with "Delegation Token can be issued only with kerberos or web authentication"</title>
      <link>https://community.cloudera.com/t5/Support-Questions/tez-job-started-by-oozie-fails-with-quot-Delegation-Token/m-p/140188#M102811</link>
      <description>&lt;P&gt;Since Hadoop gives precedence to the delegation tokens,  we must make sure we login as a different user, get new tokens and replace the old ones in the current user's credentials cache to avoid not being able to get new ones. This may help.&lt;/P&gt;</description>
      <pubDate>Sat, 13 Feb 2016 20:02:32 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/tez-job-started-by-oozie-fails-with-quot-Delegation-Token/m-p/140188#M102811</guid>
      <dc:creator>sinha_pranshu</dc:creator>
      <dc:date>2016-02-13T20:02:32Z</dc:date>
    </item>
    <item>
      <title>Re: tez job started by oozie fails with "Delegation Token can be issued only with kerberos or web authentication"</title>
      <link>https://community.cloudera.com/t5/Support-Questions/tez-job-started-by-oozie-fails-with-quot-Delegation-Token/m-p/140189#M102812</link>
      <description>&lt;P&gt;Thank you for your reply!&lt;/P&gt;&lt;P&gt;I can get new crendentials by using UserGroupInformation.loginUserFromKeytab (I tryed it, but no effect). Could you please tell me how to replace the old tokens with the new ones?&lt;/P&gt;&lt;P&gt;I tried to google it but i didn't find any usefull information.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Feb 2016 02:38:00 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/tez-job-started-by-oozie-fails-with-quot-Delegation-Token/m-p/140189#M102812</guid>
      <dc:creator>ro_v_boyko</dc:creator>
      <dc:date>2016-02-14T02:38:00Z</dc:date>
    </item>
    <item>
      <title>Re: tez job started by oozie fails with "Delegation Token can be issued only with kerberos or web authentication"</title>
      <link>https://community.cloudera.com/t5/Support-Questions/tez-job-started-by-oozie-fails-with-quot-Delegation-Token/m-p/140190#M102813</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/2582/rovboyko.html" nodeid="2582"&gt;@Roman Boyko&lt;/A&gt; Can you try a quick fix described &lt;A href="https://issues.apache.org/jira/browse/HIVE-5618"&gt;here&lt;/A&gt;, setting&lt;/P&gt;&lt;P&gt;set hive.server2.enable.doAs=false;&lt;/P&gt;&lt;P&gt;before running the query. It's also the mode required for Ranger to manage permissions in Hive.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Feb 2016 09:10:09 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/tez-job-started-by-oozie-fails-with-quot-Delegation-Token/m-p/140190#M102813</guid>
      <dc:creator>pminovic</dc:creator>
      <dc:date>2016-02-14T09:10:09Z</dc:date>
    </item>
    <item>
      <title>Re: tez job started by oozie fails with "Delegation Token can be issued only with kerberos or web authentication"</title>
      <link>https://community.cloudera.com/t5/Support-Questions/tez-job-started-by-oozie-fails-with-quot-Delegation-Token/m-p/140191#M102814</link>
      <description>&lt;P&gt;Predrag, realy thank you for ansswer!&lt;/P&gt;&lt;P&gt;I tried this solution, but it did not take any result for my problem.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Feb 2016 12:01:51 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/tez-job-started-by-oozie-fails-with-quot-Delegation-Token/m-p/140191#M102814</guid>
      <dc:creator>ro_v_boyko</dc:creator>
      <dc:date>2016-02-14T12:01:51Z</dc:date>
    </item>
    <item>
      <title>Re: tez job started by oozie fails with "Delegation Token can be issued only with kerberos or web authentication"</title>
      <link>https://community.cloudera.com/t5/Support-Questions/tez-job-started-by-oozie-fails-with-quot-Delegation-Token/m-p/140192#M102815</link>
      <description>&lt;P&gt;
	Ok, I avoided this problem by runnin shell action that performs 'hadoop jar' command instead of java action.&lt;/P&gt;&lt;P&gt;
	Of course I have to use 'UserGroupInformation.loginUserFromKeytab' inside my class (or run 'kinit -kt' command at the start of shell script).&lt;/P&gt;&lt;P&gt;
	I suppose that 
	&lt;A href="https://community.hortonworks.com/users/2766/sinhapranshu.html"&gt;@Pranshu Pranshu&lt;/A&gt;'s scenario can be realized too. But in my situation, solution with shell action is also suitable. If anybody knows how to replace the old tokens with the new ones inside java action, please show me example.&lt;/P&gt;&lt;P&gt;
	Thank you very much for helping!&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2016 01:00:16 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/tez-job-started-by-oozie-fails-with-quot-Delegation-Token/m-p/140192#M102815</guid>
      <dc:creator>ro_v_boyko</dc:creator>
      <dc:date>2016-02-15T01:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: tez job started by oozie fails with "Delegation Token can be issued only with kerberos or web authentication"</title>
      <link>https://community.cloudera.com/t5/Support-Questions/tez-job-started-by-oozie-fails-with-quot-Delegation-Token/m-p/140193#M102816</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/140/nsabharwal.html" nodeid="140"&gt;@Neeraj Sabharwal&lt;/A&gt; Can you please help us out here by providing  an example if this lies in your scope. &lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2016 09:13:59 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/tez-job-started-by-oozie-fails-with-quot-Delegation-Token/m-p/140193#M102816</guid>
      <dc:creator>sinha_pranshu</dc:creator>
      <dc:date>2016-02-16T09:13:59Z</dc:date>
    </item>
  </channel>
</rss>

