<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question impalad kerbeors - error Mechanism level: Failed to find any Kerberos tgt)] in Archives of Support Questions (Read Only)</title>
    <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/impalad-kerbeors-error-Mechanism-level-Failed-to-find-any/m-p/3271#M564</link>
    <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think you guys may be knowing is reason for this issue. Could you please give me hand to get this resolved?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I get this error after getting kerberos configured by using cloudera manager.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other components all working with kerberos and no issue within cluster.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ram&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;W1115 09:26:01.391156 32586 Configuration.java:824] mapred.max.split.size is deprecated. Instead, use mapreduce.input.fileinputformat.split.maxsize&lt;BR /&gt;W1115 09:26:01.391850 32586 Configuration.java:824] mapred.min.split.size is deprecated. Instead, use mapreduce.input.fileinputformat.split.minsize&lt;BR /&gt;W1115 09:26:01.392773 32586 Configuration.java:824] mapred.min.split.size.per.rack is deprecated. Instead, use mapreduce.input.fileinputformat.split.minsize.per.rack&lt;BR /&gt;W1115 09:26:01.392869 32586 Configuration.java:824] mapred.min.split.size.per.node is deprecated. Instead, use mapreduce.input.fileinputformat.split.minsize.per.node&lt;BR /&gt;W1115 09:26:01.392962 32586 Configuration.java:824] mapred.reduce.tasks is deprecated. Instead, use mapreduce.job.reduces&lt;BR /&gt;W1115 09:26:01.393112 32586 Configuration.java:824] mapred.reduce.tasks.speculative.execution is deprecated. Instead, use mapreduce.reduce.speculative&lt;BR /&gt;W1115 09:26:01.513977 32586 Configuration.java:2038] org.apache.hadoop.hive.conf.LoopingByteArrayInputStream@6c63a721:an attempt to override final parameter: mapreduce.job.end-notification.max.retry.interval;&amp;nbsp; Ignoring.&lt;BR /&gt;W1115 09:26:01.522991 32586 Configuration.java:2038] org.apache.hadoop.hive.conf.LoopingByteArrayInputStream@6c63a721:an attempt to override final parameter: mapreduce.job.end-notification.max.attempts;&amp;nbsp; Ignoring.&lt;BR /&gt;W1115 09:26:01.526234 32586 HiveConf.java:1055] DEPRECATED: Configuration property hive.metastore.local no longer has any effect. Make sure to provide a valid value for hive.metastore.uris if you are connecting to a remote metastore.&lt;BR /&gt;I1115 09:26:01.546197 32586 HiveMetaStoreClient.java:238] Trying to connect to metastore with URI thrift://chapdt3hdpnm1.ops.tiaa-cref.org:9083&lt;BR /&gt;E1115 09:26:01.592290 32586 TSaslTransport.java:296] SASL negotiation failure&lt;BR /&gt;Java exception follows:&lt;BR /&gt;javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:194)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at org.apache.thrift.transport.TSaslClientTransport.handleSaslStartMessage(TSaslClientTransport.java:94)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at org.apache.thrift.transport.TSaslTransport.open(TSaslTransport.java:253)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at org.apache.thrift.transport.TSaslClientTransport.open(TSaslClientTransport.java:37)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport$1.run(TUGIAssumingTransport.java:52)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport$1.run(TUGIAssumingTransport.java:49)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at java.security.AccessController.doPrivileged(Native Method)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at javax.security.auth.Subject.doAs(Subject.java:396)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1408)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport.open(TUGIAssumingTransport.java:49)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at org.apache.hadoop.hive.metastore.HiveMetaStoreClient.open(HiveMetaStoreClient.java:277)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at org.apache.hadoop.hive.metastore.HiveMetaStoreClient.&amp;lt;init&amp;gt;(HiveMetaStoreClient.java:163)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at org.apache.hadoop.hive.metastore.HiveMetaStoreClient.&amp;lt;init&amp;gt;(HiveMetaStoreClient.java:103)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at com.cloudera.impala.catalog.MetaStoreClientPool.createHiveClient(MetaStoreClientPool.java:154)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at com.cloudera.impala.catalog.MetaStoreClientPool.access$200(MetaStoreClientPool.java:31)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at com.cloudera.impala.catalog.MetaStoreClientPool$MetaStoreClient.&amp;lt;init&amp;gt;(MetaStoreClientPool.java:51)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at com.cloudera.impala.catalog.MetaStoreClientPool$MetaStoreClient.&amp;lt;init&amp;gt;(MetaStoreClientPool.java:44)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at com.cloudera.impala.catalog.MetaStoreClientPool.addClients(MetaStoreClientPool.java:105)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at com.cloudera.impala.catalog.Catalog.&amp;lt;init&amp;gt;(Catalog.java:112)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at com.cloudera.impala.service.Frontend.&amp;lt;init&amp;gt;(Frontend.java:104)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at com.cloudera.impala.service.JniFrontend.&amp;lt;init&amp;gt;(JniFrontend.java:109)&lt;BR /&gt;Caused by: GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at sun.security.jgss.krb5.Krb5InitCredential.getInstance(Krb5InitCredential.java:130)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at sun.security.jgss.krb5.Krb5MechFactory.getCredentialElement(Krb5MechFactory.java:106)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at sun.security.jgss.krb5.Krb5MechFactory.getMechanismContext(Krb5MechFactory.java:172)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at sun.security.jgss.GSSManagerImpl.getMechanismContext(GSSManagerImpl.java:209)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:195)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:162)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:175)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ... 20 more&lt;BR /&gt;W1115 09:26:01.594300 32586 HiveMetaStoreClient.java:285] Failed to connect to the MetaStore Server...&lt;BR /&gt;I1115 09:26:01.594702 32586 HiveMetaStoreClient.java:316] Waiting 1 seconds before next connection attempt.&lt;BR /&gt;I1115 09:26:02.595170 32586 HiveMetaStoreClient.java:238] Trying to connect to metastore with URI thrift://chapdt3hdpnm1.ops.tiaa-cref.org:9083&lt;BR /&gt;E1115 09:26:02.598673 32586 TSaslTransport.java:296] SASL negotiation failure&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 16 Sep 2022 08:50:15 GMT</pubDate>
    <dc:creator>Ram</dc:creator>
    <dc:date>2022-09-16T08:50:15Z</dc:date>
    <item>
      <title>impalad kerbeors - error Mechanism level: Failed to find any Kerberos tgt)]</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/impalad-kerbeors-error-Mechanism-level-Failed-to-find-any/m-p/3271#M564</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think you guys may be knowing is reason for this issue. Could you please give me hand to get this resolved?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I get this error after getting kerberos configured by using cloudera manager.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other components all working with kerberos and no issue within cluster.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ram&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;W1115 09:26:01.391156 32586 Configuration.java:824] mapred.max.split.size is deprecated. Instead, use mapreduce.input.fileinputformat.split.maxsize&lt;BR /&gt;W1115 09:26:01.391850 32586 Configuration.java:824] mapred.min.split.size is deprecated. Instead, use mapreduce.input.fileinputformat.split.minsize&lt;BR /&gt;W1115 09:26:01.392773 32586 Configuration.java:824] mapred.min.split.size.per.rack is deprecated. Instead, use mapreduce.input.fileinputformat.split.minsize.per.rack&lt;BR /&gt;W1115 09:26:01.392869 32586 Configuration.java:824] mapred.min.split.size.per.node is deprecated. Instead, use mapreduce.input.fileinputformat.split.minsize.per.node&lt;BR /&gt;W1115 09:26:01.392962 32586 Configuration.java:824] mapred.reduce.tasks is deprecated. Instead, use mapreduce.job.reduces&lt;BR /&gt;W1115 09:26:01.393112 32586 Configuration.java:824] mapred.reduce.tasks.speculative.execution is deprecated. Instead, use mapreduce.reduce.speculative&lt;BR /&gt;W1115 09:26:01.513977 32586 Configuration.java:2038] org.apache.hadoop.hive.conf.LoopingByteArrayInputStream@6c63a721:an attempt to override final parameter: mapreduce.job.end-notification.max.retry.interval;&amp;nbsp; Ignoring.&lt;BR /&gt;W1115 09:26:01.522991 32586 Configuration.java:2038] org.apache.hadoop.hive.conf.LoopingByteArrayInputStream@6c63a721:an attempt to override final parameter: mapreduce.job.end-notification.max.attempts;&amp;nbsp; Ignoring.&lt;BR /&gt;W1115 09:26:01.526234 32586 HiveConf.java:1055] DEPRECATED: Configuration property hive.metastore.local no longer has any effect. Make sure to provide a valid value for hive.metastore.uris if you are connecting to a remote metastore.&lt;BR /&gt;I1115 09:26:01.546197 32586 HiveMetaStoreClient.java:238] Trying to connect to metastore with URI thrift://chapdt3hdpnm1.ops.tiaa-cref.org:9083&lt;BR /&gt;E1115 09:26:01.592290 32586 TSaslTransport.java:296] SASL negotiation failure&lt;BR /&gt;Java exception follows:&lt;BR /&gt;javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:194)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at org.apache.thrift.transport.TSaslClientTransport.handleSaslStartMessage(TSaslClientTransport.java:94)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at org.apache.thrift.transport.TSaslTransport.open(TSaslTransport.java:253)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at org.apache.thrift.transport.TSaslClientTransport.open(TSaslClientTransport.java:37)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport$1.run(TUGIAssumingTransport.java:52)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport$1.run(TUGIAssumingTransport.java:49)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at java.security.AccessController.doPrivileged(Native Method)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at javax.security.auth.Subject.doAs(Subject.java:396)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1408)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at org.apache.hadoop.hive.thrift.client.TUGIAssumingTransport.open(TUGIAssumingTransport.java:49)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at org.apache.hadoop.hive.metastore.HiveMetaStoreClient.open(HiveMetaStoreClient.java:277)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at org.apache.hadoop.hive.metastore.HiveMetaStoreClient.&amp;lt;init&amp;gt;(HiveMetaStoreClient.java:163)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at org.apache.hadoop.hive.metastore.HiveMetaStoreClient.&amp;lt;init&amp;gt;(HiveMetaStoreClient.java:103)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at com.cloudera.impala.catalog.MetaStoreClientPool.createHiveClient(MetaStoreClientPool.java:154)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at com.cloudera.impala.catalog.MetaStoreClientPool.access$200(MetaStoreClientPool.java:31)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at com.cloudera.impala.catalog.MetaStoreClientPool$MetaStoreClient.&amp;lt;init&amp;gt;(MetaStoreClientPool.java:51)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at com.cloudera.impala.catalog.MetaStoreClientPool$MetaStoreClient.&amp;lt;init&amp;gt;(MetaStoreClientPool.java:44)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at com.cloudera.impala.catalog.MetaStoreClientPool.addClients(MetaStoreClientPool.java:105)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at com.cloudera.impala.catalog.Catalog.&amp;lt;init&amp;gt;(Catalog.java:112)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at com.cloudera.impala.service.Frontend.&amp;lt;init&amp;gt;(Frontend.java:104)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at com.cloudera.impala.service.JniFrontend.&amp;lt;init&amp;gt;(JniFrontend.java:109)&lt;BR /&gt;Caused by: GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at sun.security.jgss.krb5.Krb5InitCredential.getInstance(Krb5InitCredential.java:130)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at sun.security.jgss.krb5.Krb5MechFactory.getCredentialElement(Krb5MechFactory.java:106)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at sun.security.jgss.krb5.Krb5MechFactory.getMechanismContext(Krb5MechFactory.java:172)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at sun.security.jgss.GSSManagerImpl.getMechanismContext(GSSManagerImpl.java:209)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:195)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:162)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; at com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:175)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ... 20 more&lt;BR /&gt;W1115 09:26:01.594300 32586 HiveMetaStoreClient.java:285] Failed to connect to the MetaStore Server...&lt;BR /&gt;I1115 09:26:01.594702 32586 HiveMetaStoreClient.java:316] Waiting 1 seconds before next connection attempt.&lt;BR /&gt;I1115 09:26:02.595170 32586 HiveMetaStoreClient.java:238] Trying to connect to metastore with URI thrift://chapdt3hdpnm1.ops.tiaa-cref.org:9083&lt;BR /&gt;E1115 09:26:02.598673 32586 TSaslTransport.java:296] SASL negotiation failure&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 08:50:15 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/impalad-kerbeors-error-Mechanism-level-Failed-to-find-any/m-p/3271#M564</guid>
      <dc:creator>Ram</dc:creator>
      <dc:date>2022-09-16T08:50:15Z</dc:date>
    </item>
    <item>
      <title>Re: impalad kerbeors - error Mechanism level: Failed to find any Kerberos tgt)]</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/impalad-kerbeors-error-Mechanism-level-Failed-to-find-any/m-p/3279#M565</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/1251"&gt;@Ram&lt;/a&gt;&amp;nbsp;I have moved this thread to the Impala discussion board because your issue seems specific to Impala. &amp;nbsp;Hopefully somebody in here can assist you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Clint&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2013 15:32:40 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/impalad-kerbeors-error-Mechanism-level-Failed-to-find-any/m-p/3279#M565</guid>
      <dc:creator>Clint</dc:creator>
      <dc:date>2013-11-15T15:32:40Z</dc:date>
    </item>
    <item>
      <title>Re: impalad kerbeors - error Mechanism level: Failed to find any Kerberos tgt)]</title>
      <link>https://community.cloudera.com/t5/Archives-of-Support-Questions/impalad-kerbeors-error-Mechanism-level-Failed-to-find-any/m-p/3491#M566</link>
      <description>&lt;P&gt;it was resolved&amp;nbsp;&amp;nbsp; by issuing the following command&lt;/P&gt;&lt;P&gt;kadmin.local: modprinc -maxrenewlife 7day krbtgt/YOUR_REALM&lt;/P&gt;&lt;P&gt;modprinc -maxrenewlife 7day +allow_renewable &lt;A target="_blank" href="mailto:impala/chapdt3hdpnm1.ops.tiaa-cref.org@TIAA-HADOOP-K5.COM"&gt;impala/FQDN@YOUR_REALM&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 23 Nov 2013 23:43:05 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Archives-of-Support-Questions/impalad-kerbeors-error-Mechanism-level-Failed-to-find-any/m-p/3491#M566</guid>
      <dc:creator>Ram</dc:creator>
      <dc:date>2013-11-23T23:43:05Z</dc:date>
    </item>
  </channel>
</rss>

