<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Kerberos ticket expired ( kinit keytab successfully , java secure policy applied ) in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/80522#M33016</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Dear all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I got the following error in my HDFS datanodes. However , kinit with the keytab files that generated by the CM is fine and java security policy has been applied.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there anyway to&amp;nbsp;diagnose such a problem?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information:&lt;/P&gt;
&lt;P&gt;no LDAP is set in the cluster nodes. cloudera manager and CDH version 5.13.2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Ticket expired (32) - PROCESS_TGS)]
	at com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212)
	at org.apache.hadoop.security.SaslRpcClient.saslConnect(SaslRpcClient.java:413)
	at org.apache.hadoop.ipc.Client$Connection.setupSaslConnection(Client.java:594)
	at org.apache.hadoop.ipc.Client$Connection.access$2000(Client.java:396)
	at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:761)
	at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:757)
	at java.security.AccessController.doPrivileged(Native Method)
	at javax.security.auth.Subject.doAs(Subject.java:415)
	at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1920)
	at org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:756)
	at org.apache.hadoop.ipc.Client$Connection.access$3000(Client.java:396)
	at org.apache.hadoop.ipc.Client.getConnection(Client.java:1557)
	at org.apache.hadoop.ipc.Client.call(Client.java:1480)
	at org.apache.hadoop.ipc.Client.call(Client.java:1441)
	at org.apache.hadoop.ipc.ProtobufRpcEngine$Invoker.invoke(ProtobufRpcEngine.java:230)
	at com.sun.proxy.$Proxy23.versionRequest(Unknown Source)
	at org.apache.hadoop.hdfs.protocolPB.DatanodeProtocolClientSideTranslatorPB.versionRequest(DatanodeProtocolClientSideTranslatorPB.java:275)
	at org.apache.hadoop.hdfs.server.datanode.BPServiceActor.retrieveNamespaceInfo(BPServiceActor.java:168)
	at org.apache.hadoop.hdfs.server.datanode.BPServiceActor.connectToNNAndHandshake(BPServiceActor.java:214)
	at org.apache.hadoop.hdfs.server.datanode.BPServiceActor.run(BPServiceActor.java:673)
	at java.lang.Thread.run(Thread.java:745)
Caused by: GSSException: No valid credentials provided (Mechanism level: Ticket expired (32) - PROCESS_TGS)
	at sun.security.jgss.krb5.Krb5Context.initSecContext(Krb5Context.java:710)
	at sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:248)
	at sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:179)
	at com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:193)
	... 20 more
Caused by: KrbException: Ticket expired (32) - PROCESS_TGS
	at sun.security.krb5.KrbTgsRep.&amp;lt;init&amp;gt;(KrbTgsRep.java:73)
	at sun.security.krb5.KrbTgsReq.getReply(KrbTgsReq.java:192)
	at sun.security.krb5.KrbTgsReq.sendAndGetCreds(KrbTgsReq.java:203)
	at sun.security.krb5.internal.CredentialsUtil.serviceCreds(CredentialsUtil.java:309)
	at sun.security.krb5.internal.CredentialsUtil.acquireServiceCreds(CredentialsUtil.java:115)
	at sun.security.krb5.Credentials.acquireServiceCreds(Credentials.java:454)
	at sun.security.jgss.krb5.Krb5Context.initSecContext(Krb5Context.java:641)
	... 23 more
Caused by: KrbException: Identifier doesn't match expected value (906)
	at sun.security.krb5.internal.KDCRep.init(KDCRep.java:143)
	at sun.security.krb5.internal.TGSRep.init(TGSRep.java:66)
	at sun.security.krb5.internal.TGSRep.&amp;lt;init&amp;gt;(TGSRep.java:61)
	at sun.security.krb5.KrbTgsRep.&amp;lt;init&amp;gt;(KrbTgsRep.java:55)
	... 29 more&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the /var/log/krb5kdc.log, I got some message like that:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Oct 02 09:52:12&amp;nbsp;kdc.fqdn krb5kdc[2426](info): TGS_REQ (1 etypes {23}) 172.32.237.83: PROCESS_TGS: authtime 0, hdfs/datanode.fqdn@REALM&amp;nbsp;for hdfs/name&lt;SPAN&gt;node.f&lt;/SPAN&gt;&lt;SPAN&gt;qdn&lt;/SPAN&gt;@&lt;SPAN&gt;REALM&lt;/SPAN&gt;, Ticket expired&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Roy&lt;/P&gt;</description>
    <pubDate>Fri, 05 Oct 2018 16:16:53 GMT</pubDate>
    <dc:creator>roychan</dc:creator>
    <dc:date>2018-10-05T16:16:53Z</dc:date>
    <item>
      <title>Kerberos ticket expired ( kinit keytab successfully , java secure policy applied )</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/80522#M33016</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Dear all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I got the following error in my HDFS datanodes. However , kinit with the keytab files that generated by the CM is fine and java security policy has been applied.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there anyway to&amp;nbsp;diagnose such a problem?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information:&lt;/P&gt;
&lt;P&gt;no LDAP is set in the cluster nodes. cloudera manager and CDH version 5.13.2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Ticket expired (32) - PROCESS_TGS)]
	at com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212)
	at org.apache.hadoop.security.SaslRpcClient.saslConnect(SaslRpcClient.java:413)
	at org.apache.hadoop.ipc.Client$Connection.setupSaslConnection(Client.java:594)
	at org.apache.hadoop.ipc.Client$Connection.access$2000(Client.java:396)
	at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:761)
	at org.apache.hadoop.ipc.Client$Connection$2.run(Client.java:757)
	at java.security.AccessController.doPrivileged(Native Method)
	at javax.security.auth.Subject.doAs(Subject.java:415)
	at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1920)
	at org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:756)
	at org.apache.hadoop.ipc.Client$Connection.access$3000(Client.java:396)
	at org.apache.hadoop.ipc.Client.getConnection(Client.java:1557)
	at org.apache.hadoop.ipc.Client.call(Client.java:1480)
	at org.apache.hadoop.ipc.Client.call(Client.java:1441)
	at org.apache.hadoop.ipc.ProtobufRpcEngine$Invoker.invoke(ProtobufRpcEngine.java:230)
	at com.sun.proxy.$Proxy23.versionRequest(Unknown Source)
	at org.apache.hadoop.hdfs.protocolPB.DatanodeProtocolClientSideTranslatorPB.versionRequest(DatanodeProtocolClientSideTranslatorPB.java:275)
	at org.apache.hadoop.hdfs.server.datanode.BPServiceActor.retrieveNamespaceInfo(BPServiceActor.java:168)
	at org.apache.hadoop.hdfs.server.datanode.BPServiceActor.connectToNNAndHandshake(BPServiceActor.java:214)
	at org.apache.hadoop.hdfs.server.datanode.BPServiceActor.run(BPServiceActor.java:673)
	at java.lang.Thread.run(Thread.java:745)
Caused by: GSSException: No valid credentials provided (Mechanism level: Ticket expired (32) - PROCESS_TGS)
	at sun.security.jgss.krb5.Krb5Context.initSecContext(Krb5Context.java:710)
	at sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:248)
	at sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:179)
	at com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:193)
	... 20 more
Caused by: KrbException: Ticket expired (32) - PROCESS_TGS
	at sun.security.krb5.KrbTgsRep.&amp;lt;init&amp;gt;(KrbTgsRep.java:73)
	at sun.security.krb5.KrbTgsReq.getReply(KrbTgsReq.java:192)
	at sun.security.krb5.KrbTgsReq.sendAndGetCreds(KrbTgsReq.java:203)
	at sun.security.krb5.internal.CredentialsUtil.serviceCreds(CredentialsUtil.java:309)
	at sun.security.krb5.internal.CredentialsUtil.acquireServiceCreds(CredentialsUtil.java:115)
	at sun.security.krb5.Credentials.acquireServiceCreds(Credentials.java:454)
	at sun.security.jgss.krb5.Krb5Context.initSecContext(Krb5Context.java:641)
	... 23 more
Caused by: KrbException: Identifier doesn't match expected value (906)
	at sun.security.krb5.internal.KDCRep.init(KDCRep.java:143)
	at sun.security.krb5.internal.TGSRep.init(TGSRep.java:66)
	at sun.security.krb5.internal.TGSRep.&amp;lt;init&amp;gt;(TGSRep.java:61)
	at sun.security.krb5.KrbTgsRep.&amp;lt;init&amp;gt;(KrbTgsRep.java:55)
	... 29 more&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the /var/log/krb5kdc.log, I got some message like that:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Oct 02 09:52:12&amp;nbsp;kdc.fqdn krb5kdc[2426](info): TGS_REQ (1 etypes {23}) 172.32.237.83: PROCESS_TGS: authtime 0, hdfs/datanode.fqdn@REALM&amp;nbsp;for hdfs/name&lt;SPAN&gt;node.f&lt;/SPAN&gt;&lt;SPAN&gt;qdn&lt;/SPAN&gt;@&lt;SPAN&gt;REALM&lt;/SPAN&gt;, Ticket expired&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Roy&lt;/P&gt;</description>
      <pubDate>Fri, 05 Oct 2018 16:16:53 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/80522#M33016</guid>
      <dc:creator>roychan</dc:creator>
      <dc:date>2018-10-05T16:16:53Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket expired ( kinit keytab successfully , java secure policy applied )</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/80524#M33017</link>
      <description>&lt;P&gt;Hi, did you try 'kdestroy' first and then 'kinit' again to generate a new auth ticket.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Oct 2018 03:57:41 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/80524#M33017</guid>
      <dc:creator>irobot</dc:creator>
      <dc:date>2018-10-02T03:57:41Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket expired ( kinit keytab successfully , java secure policy applied )</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/80530#M33018</link>
      <description>&lt;P&gt;Hi irobot,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, I did tried it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is no problem for the kinit. the result will be like below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[root@datanode01 471-hdfs-DATANODE]# sudo -u hdfs kdestroy&lt;BR /&gt;[root@datanode01 471-hdfs-DATANODE]# sudo -u hdfs klist&lt;BR /&gt;klist: No credentials cache found (filename: /tmp/krb5cc_996)&lt;BR /&gt;[root@datanode01 471-hdfs-DATANODE]# date&lt;BR /&gt;Tue Oct 2 13:54:09 CST 2018&lt;BR /&gt;[root@datanode01 471-hdfs-DATANODE]# sudo -u hdfs kinit -kt hdfs.keytab hdfs/datanode01.domain@REALM&lt;BR /&gt;[root@datanode01 471-hdfs-DATANODE]# sudo -u hdfs klist&lt;BR /&gt;Ticket cache: FILE:/tmp/krb5cc_996&lt;BR /&gt;Default principal: hdfs/datanode01.domain@REALM&lt;/P&gt;&lt;P&gt;Valid starting Expires Service principal&lt;BR /&gt;10/02/2018 13:54:16 10/03/2018 13:54:16 krbtgt/DOMAIN@REALM&lt;BR /&gt;renew until 10/09/2018 13:54:16&lt;BR /&gt;[root@datanode01 471-hdfs-DATANODE]#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[root@&lt;SPAN&gt;datanode01&lt;/SPAN&gt; 471-hdfs-DATANODE]# sudo -u hdfs klist -e&lt;BR /&gt;Ticket cache: FILE:/tmp/krb5cc_996&lt;BR /&gt;Default principal: hdfs/&lt;SPAN&gt;datanode01.domain&lt;/SPAN&gt;@&lt;SPAN&gt;REALM&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Valid starting Expires Service principal&lt;BR /&gt;10/02/2018 13:54:16 10/03/2018 13:54:16 krbtgt/DOMAIN@REALM&lt;BR /&gt;renew until 10/09/2018 13:54:16, Etype (skey, tkt): arcfour-hmac, aes256-cts-hmac-sha1-96&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Roy&lt;/P&gt;</description>
      <pubDate>Tue, 02 Oct 2018 06:08:56 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/80530#M33018</guid>
      <dc:creator>roychan</dc:creator>
      <dc:date>2018-10-02T06:08:56Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket expired ( kinit keytab successfully , java secure policy applied )</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/80531#M33019</link>
      <description>&lt;P&gt;Hi irobot,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes. The result will be like that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[root@datanode01 471-hdfs-DATANODE]# pwd&lt;BR /&gt;/var/run/cloudera-scm-agent/process/471-hdfs-DATANODE&lt;/P&gt;&lt;P&gt;[root@datanode01 471-hdfs-DATANODE]# sudo -u hdfs klist -kt hdfs.keytab&lt;BR /&gt;Keytab name: FILE:hdfs.keytab&lt;BR /&gt;KVNO Timestamp Principal&lt;BR /&gt;---- ------------------- ------------------------------------------------------&lt;BR /&gt;6 09/27/2018 22:49:46 HTTP/datanode01.domain@REALM&lt;BR /&gt;6 09/27/2018 22:49:46 HTTP/datanode01.domain@REALM&lt;BR /&gt;6 09/27/2018 22:49:46 HTTP/datanode01.domain@REALM&lt;BR /&gt;6 09/27/2018 22:49:46 HTTP/datanode01.domain@REALM&lt;BR /&gt;6 09/27/2018 22:49:46 HTTP/datanode01.domain@REALM&lt;BR /&gt;6 09/27/2018 22:49:46 HTTP/datanode01.domain@REALM&lt;BR /&gt;6 09/27/2018 22:49:46 HTTP/datanode01.domain@REALM&lt;BR /&gt;6 09/27/2018 22:49:46 hdfs/datanode01.domain@REALM&lt;BR /&gt;6 09/27/2018 22:49:46 hdfs/datanode01.domain@REALM&lt;BR /&gt;6 09/27/2018 22:49:46 hdfs/datanode01.domain@REALM&lt;BR /&gt;6 09/27/2018 22:49:46 hdfs/datanode01.domain@REALM&lt;BR /&gt;6 09/27/2018 22:49:46 hdfs/datanode01.domain@REALM&lt;BR /&gt;6 09/27/2018 22:49:46 hdfs/datanode01.domain@REALM&lt;BR /&gt;6 09/27/2018 22:49:46 hdfs/datanode01.domain@REALM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[root@datanode01 471-hdfs-DATANODE]# sudo -u hdfs kdestroy&lt;BR /&gt;[root@datanode01 471-hdfs-DATANODE]# sudo -u hdfs klist&lt;BR /&gt;klist: No credentials cache found (filename: /tmp/krb5cc_996)&lt;BR /&gt;[root@datanode01 471-hdfs-DATANODE]# date&lt;BR /&gt;Tue Oct 2 13:54:09 CST 2018&lt;BR /&gt;[root@datanode01 471-hdfs-DATANODE]# sudo -u hdfs kinit -kt hdfs.keytab hdfs/datanode01.domain@REALM&lt;BR /&gt;[root@datanode01 471-hdfs-DATANODE]# sudo -u hdfs klist&lt;BR /&gt;Ticket cache: FILE:/tmp/krb5cc_996&lt;BR /&gt;Default principal: hdfs/datanode01.domain@REALM&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;[root@datanode01 471-hdfs-DATANODE]# sudo -u hdfs kvno hdfs/datanode01.domain@REALM&lt;BR /&gt;hdfs/datanode01.domain@REALM: kvno = 6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Roy&lt;/P&gt;</description>
      <pubDate>Tue, 02 Oct 2018 06:24:24 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/80531#M33019</guid>
      <dc:creator>roychan</dc:creator>
      <dc:date>2018-10-02T06:24:24Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket expired ( kinit keytab successfully , java secure policy applied )</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/80532#M33020</link>
      <description>&lt;P&gt;[root@datanode01 471-hdfs-DATANODE]# sudo -u hdfs klist -e&lt;BR /&gt;Ticket cache: FILE:/tmp/krb5cc_996&lt;BR /&gt;Default principal: hdfs/datanode01.domain@REALM&lt;/P&gt;&lt;P&gt;Valid starting Expires Service principal&lt;BR /&gt;10/02/2018 13:54:16 10/03/2018 13:54:16 krbtgt/DOMAIN@REALM&lt;BR /&gt;renew until 10/09/2018 13:54:16, Etype (skey, tkt): arcfour-hmac, aes256-cts-hmac-sha1-96&lt;/P&gt;</description>
      <pubDate>Tue, 02 Oct 2018 06:27:24 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/80532#M33020</guid>
      <dc:creator>roychan</dc:creator>
      <dc:date>2018-10-02T06:27:24Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket expired ( kinit keytab successfully , java secure policy applied )</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/80552#M33021</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/28447"&gt;@roychan&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you saying that if you restart the DataNodes that this issue happens right away?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The DataNode, for RPC communication, will get a TGT (Kerberos Ticket Granting Ticket) via &lt;STRONG&gt;UserGroupInformation.loginUserFromKeytab()&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This means that there is no visible cache file you can view to see the experiation time.&lt;/P&gt;&lt;P&gt;The exception in the stack trace means that there was a TGT acquired and stored in memory, but when there was an attempt to get s Service Ticket to connect to the Active NameNode, the KDC responded that it could not process the request since the TGT had expired.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With "loginUserFromKeytab()" if the RPC connection fails, the code has built-in mechanisms that will attempt to handle the condition and re-login.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What happens after this message?&amp;nbsp; Does the DataNode eventually recover from this?&lt;/P&gt;</description>
      <pubDate>Tue, 02 Oct 2018 16:31:26 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/80552#M33021</guid>
      <dc:creator>bgooley</dc:creator>
      <dc:date>2018-10-02T16:31:26Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket expired ( kinit keytab successfully , java secure policy applied )</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/80569#M33022</link>
      <description>&lt;P&gt;Hi&amp;nbsp;bgooley,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your reply&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Are you saying that if you restart the DataNodes that this issue happens right away? &amp;lt;= Yes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Actually, there is similar problem on HBase after i enabled the Kerberos and failed to start the cluster.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is there anything I can do for&amp;nbsp;diagnose&amp;nbsp;for the "getting Service Ticket&amp;nbsp;"?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;No. The datanode&amp;nbsp;&lt;SPAN&gt;eventually&amp;nbsp;could not connected to the namenode.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I enabled the debug log level on datanode and the debug for kerberos and got the following log:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2018-09-27 22:54:36,552 DEBUG org.apache.hadoop.ipc.Server: IPC Server idle connection scanner for port 50020: task running&lt;BR /&gt;2018-09-27 22:54:41,340 DEBUG org.apache.hadoop.ipc.Client: The ping interval is 60000 ms.&lt;BR /&gt;2018-09-27 22:54:41,340 DEBUG org.apache.hadoop.ipc.Client: Connecting to namenode.domain/172.32.237.80:8022&lt;BR /&gt;2018-09-27 22:54:41,341 DEBUG org.apache.hadoop.security.UserGroupInformation: PrivilegedAction as:hdfs/datanode01.domain@REALM (auth:KERBEROS) from:org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:756)&lt;BR /&gt;2018-09-27 22:54:41,341 DEBUG org.apache.hadoop.security.SaslRpcClient: Sending sasl message state: NEGOTIATE&lt;/P&gt;&lt;P&gt;2018-09-27 22:54:41,342 DEBUG org.apache.hadoop.security.SaslRpcClient: Get token info proto:interface org.apache.hadoop.hdfs.protocolPB.DatanodeProtocolPB info:null&lt;BR /&gt;2018-09-27 22:54:41,342 DEBUG org.apache.hadoop.security.SaslRpcClient: Get kerberos info proto:interface org.apache.hadoop.hdfs.protocolPB.DatanodeProtocolPB info:@org.apache.hadoop.security.KerberosInfo(clientPrincipal=dfs.datanode.kerberos.principal, serverPrincipal=dfs.namenode.kerberos.principal)&lt;BR /&gt;2018-09-27 22:54:41,342 DEBUG org.apache.hadoop.security.SaslRpcClient: RPC Server's Kerberos principal name for protocol=org.apache.hadoop.hdfs.protocolPB.DatanodeProtocolPB is hdfs/namenode.domain@REALM&lt;BR /&gt;2018-09-27 22:54:41,342 DEBUG org.apache.hadoop.security.SaslRpcClient: Creating SASL GSSAPI(KERBEROS) client to authenticate to service at namenode.domain&lt;BR /&gt;2018-09-27 22:54:41,342 DEBUG org.apache.hadoop.security.SaslRpcClient: Use KERBEROS authentication for protocol DatanodeProtocolPB&lt;BR /&gt;2018-09-27 22:54:41,345 WARN org.apache.hadoop.security.UserGroupInformation: PriviledgedActionException as:hdfs/datanode01.domain@REALM (auth:KERBEROS) cause:javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Ticket expired (32) - PROCESS_TGS)]&lt;BR /&gt;2018-09-27 22:54:41,345 DEBUG org.apache.hadoop.security.UserGroupInformation: PrivilegedAction as:hdfs/datanode01.domain@REALM (auth:KERBEROS) from:org.apache.hadoop.ipc.Client$Connection.handleSaslConnectionFailure(Client.java:681)&lt;BR /&gt;2018-09-27 22:54:41,345 DEBUG org.apache.hadoop.ipc.Client: Exception encountered while connecting to the server : javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Ticket expired (32) - PROCESS_TGS)]&lt;BR /&gt;2018-09-27 22:54:42,716 DEBUG org.apache.hadoop.security.UserGroupInformation: PrivilegedAction as:hdfs/datanode01.domain@REALM (auth:KERBEROS) from:org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:756)&lt;BR /&gt;2018-09-27 22:54:42,716 DEBUG org.apache.hadoop.security.SaslRpcClient: Sending sasl message state: NEGOTIATE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Roy&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 01:19:20 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/80569#M33022</guid>
      <dc:creator>roychan</dc:creator>
      <dc:date>2018-10-03T01:19:20Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket expired ( kinit keytab successfully , java secure policy applied )</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/80574#M33023</link>
      <description>&lt;P&gt;Hi all,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is more information, the namenode is also the kdc server and the package version is as below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[root@namenode conf.cloudera.hdfs]# rpm -qa | grep krb&lt;BR /&gt;krb5-server-1.15.1-18.el7.x86_64&lt;BR /&gt;sssd-krb5-common-1.16.0-19.el7.x86_64&lt;BR /&gt;sssd-krb5-1.16.0-19.el7.x86_64&lt;BR /&gt;krb5-libs-1.15.1-18.el7.x86_64&lt;BR /&gt;krb5-workstation-1.15.1-18.el7.x86_64&lt;BR /&gt;krb5-devel-1.15.1-18.el7.x86_64&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[root@datanode01 ~]# rpm -qa | grep krb&lt;BR /&gt;krb5-devel-1.15.1-18.el7.x86_64&lt;BR /&gt;krb5-workstation-1.15.1-18.el7.x86_64&lt;BR /&gt;krb5-libs-1.15.1-18.el7.x86_64&lt;BR /&gt;sssd-krb5-common-1.16.0-19.el7.x86_64&lt;BR /&gt;sssd-krb5-1.16.0-19.el7.x86_64&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Roy&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 03:00:48 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/80574#M33023</guid>
      <dc:creator>roychan</dc:creator>
      <dc:date>2018-10-03T03:00:48Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket expired ( kinit keytab successfully , java secure policy applied )</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/80582#M33024</link>
      <description>&lt;P&gt;Dear all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After I updated the kerberos packages, the cluster resumed.&lt;/P&gt;&lt;P&gt;Hope this help. Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For more information: OS:&amp;nbsp;CentOS Linux release 7.5.1804 (Core)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Packages version after update:&lt;/P&gt;&lt;P&gt;[root@namenode x86_64]# rpm -qa | grep krb&lt;BR /&gt;krb5-server-1.15.1-19.el7.x86_64&lt;BR /&gt;sssd-krb5-common-1.16.0-19.el7.x86_64&lt;BR /&gt;sssd-krb5-1.16.0-19.el7.x86_64&lt;BR /&gt;krb5-libs-1.15.1-19.el7.x86_64&lt;BR /&gt;krb5-devel-1.15.1-19.el7.x86_64&lt;BR /&gt;krb5-workstation-1.15.1-19.el7.x86_64&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[root@datanode01 ~]# rpm -qa | grep krb&lt;BR /&gt;krb5-devel-1.15.1-19.el7.x86_64&lt;BR /&gt;krb5-workstation-1.15.1-19.el7.x86_64&lt;BR /&gt;sssd-krb5-common-1.16.0-19.el7.x86_64&lt;BR /&gt;sssd-krb5-1.16.0-19.el7.x86_64&lt;BR /&gt;krb5-libs-1.15.1-19.el7.x86_64&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Roy&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 09:57:23 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/80582#M33024</guid>
      <dc:creator>roychan</dc:creator>
      <dc:date>2018-10-03T09:57:23Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket expired ( kinit keytab successfully , java secure policy applied )</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/80615#M33025</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/28447"&gt;@roychan&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nice sleuthing... indeed you hit that buggy version.&amp;nbsp; Here is more info on the issue:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://bugzilla.redhat.com/show_bug.cgi?id=1560951" target="_blank"&gt;https://bugzilla.redhat.com/show_bug.cgi?id=1560951&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Oct 2018 19:07:54 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/80615#M33025</guid>
      <dc:creator>bgooley</dc:creator>
      <dc:date>2018-10-03T19:07:54Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket expired ( kinit keytab successfully , java secure policy applied )</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/90004#M33026</link>
      <description>Hi, Thanks for the resolution. Is there any specific procedures to upgrade krb packages to 1.15.1-19?..&lt;BR /&gt;Detailed steps to upgrade and post upgrade to start hadoop cluster would be more helpful</description>
      <pubDate>Tue, 07 May 2019 07:17:48 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/90004#M33026</guid>
      <dc:creator>prashanthshetty</dc:creator>
      <dc:date>2019-05-07T07:17:48Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos ticket expired ( kinit keytab successfully , java secure policy applied )</title>
      <link>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/90007#M33027</link>
      <description>&lt;P&gt;Hi Prash,&lt;/P&gt;&lt;P&gt;Since i upgraded the packages in the early stage of the setup.&lt;/P&gt;&lt;P&gt;I just created a&amp;nbsp;dump (backup) for&amp;nbsp;the Kerberos , and use the yum update command to upgrade it.&lt;/P&gt;&lt;P&gt;After updated the packages, the cluster could be started.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2019 08:24:28 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/Kerberos-ticket-expired-kinit-keytab-successfully-java/m-p/90007#M33027</guid>
      <dc:creator>roychan</dc:creator>
      <dc:date>2019-05-07T08:24:28Z</dc:date>
    </item>
  </channel>
</rss>

