Support Questions
Find answers, ask questions, and share your expertise
Announcements
Alert: Welcome to the Unified Cloudera Community. Former HCC members be sure to read and learn how to activate your account here.

HST agent in smartsense failed to start

Highlighted

HST agent in smartsense failed to start

New Contributor

Hello, ambari built a big data platform, in which HST agent in smartsense failed to start. The following is the detailed output log. What should I do? Is this component necessary for big data platform? I look forward to your reply.

 

stderr:
Traceback (most recent call last):
File "/usr/sbin/hst-agent.py", line 658, in <module>
main(sys.argv)
File "/usr/sbin/hst-agent.py", line 625, in main
setup(options)
File "/usr/sbin/hst-agent.py", line 433, in setup
server_hostname = get_server_hostname(server, tries, try_sleep, options.quiet)
File "/usr/sbin/hst-agent.py", line 102, in get_server_hostname
server_hostname = validate_server_hostname(default_hostname, tries, try_sleep)
File "/usr/sbin/hst-agent.py", line 120, in validate_server_hostname
elif not register_agent(server_hostname):
File "/usr/sbin/hst-agent.py", line 138, in register_agent
if not server_api.register_agent(agent_version):
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/ServerAPI.py", line 132, in register_agent
(status, content) = self.call(request)
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/ServerAPI.py", line 44, in call
self.cachedconnect = security.CachedHTTPSConnection(self.config)
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/security.py", line 109, in __init__
self.connect()
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/security.py", line 114, in connect
self.httpsconn.connect()
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/security.py", line 75, in connect
raise err
ssl.SSLError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:618)
Traceback (most recent call last):
File "/usr/sbin/hst-agent.py", line 658, in <module>
main(sys.argv)
File "/usr/sbin/hst-agent.py", line 631, in main
update_config(options)
File "/usr/sbin/hst-agent.py", line 154, in update_config
download_flag = patch.download_and_apply_patch(server_hostname, download_dir, server_api)
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/patch.py", line 35, in download_and_apply_patch
patch_content = server_api.download_config_patch()
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/ServerAPI.py", line 177, in download_config_patch
(status, content) = self.call(request)
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/ServerAPI.py", line 44, in call
self.cachedconnect = security.CachedHTTPSConnection(self.config)
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/security.py", line 109, in __init__
self.connect()
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/security.py", line 114, in connect
self.httpsconn.connect()
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/security.py", line 75, in connect
raise err
ssl.SSLError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:618)
stdout:
2020-06-10 19:07:29,712 - Stack Feature Version Info: Cluster Stack=3.1, Command Stack=None, Command Version=3.1.4.0-315 -> 3.1.4.0-315
2020-06-10 19:07:29,734 - Using hadoop conf dir: /usr/hdp/3.1.4.0-315/hadoop/conf
2020-06-10 19:07:29,898 - Stack Feature Version Info: Cluster Stack=3.1, Command Stack=None, Command Version=3.1.4.0-315 -> 3.1.4.0-315
2020-06-10 19:07:29,904 - Using hadoop conf dir: /usr/hdp/3.1.4.0-315/hadoop/conf
2020-06-10 19:07:29,906 - Group['hdfs'] {}
2020-06-10 19:07:29,907 - Group['hadoop'] {}
2020-06-10 19:07:29,907 - Group['users'] {}
2020-06-10 19:07:29,907 - User['yarn-ats'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
2020-06-10 19:07:29,909 - User['zookeeper'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
2020-06-10 19:07:29,909 - User['ams'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
2020-06-10 19:07:29,910 - User['ambari-qa'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop', 'users'], 'uid': None}
2020-06-10 19:07:29,911 - User['hdfs'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hdfs', 'hadoop'], 'uid': None}
2020-06-10 19:07:29,912 - User['yarn'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
2020-06-10 19:07:29,912 - User['mapred'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
2020-06-10 19:07:29,913 - User['hbase'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
2020-06-10 19:07:29,914 - File['/var/lib/ambari-agent/tmp/changeUid.sh'] {'content': StaticFile('changeToSecureUid.sh'), 'mode': 0555}
2020-06-10 19:07:29,915 - Execute['/var/lib/ambari-agent/tmp/changeUid.sh ambari-qa /tmp/hadoop-ambari-qa,/tmp/hsperfdata_ambari-qa,/home/ambari-qa,/tmp/ambari-qa,/tmp/sqoop-ambari-qa 0'] {'not_if': '(test $(id -u ambari-qa) -gt 1000) || (false)'}
2020-06-10 19:07:29,923 - Skipping Execute['/var/lib/ambari-agent/tmp/changeUid.sh ambari-qa /tmp/hadoop-ambari-qa,/tmp/hsperfdata_ambari-qa,/home/ambari-qa,/tmp/ambari-qa,/tmp/sqoop-ambari-qa 0'] due to not_if
2020-06-10 19:07:29,924 - Directory['/tmp/hbase-hbase'] {'owner': 'hbase', 'create_parents': True, 'mode': 0775, 'cd_access': 'a'}
2020-06-10 19:07:29,926 - File['/var/lib/ambari-agent/tmp/changeUid.sh'] {'content': StaticFile('changeToSecureUid.sh'), 'mode': 0555}
2020-06-10 19:07:29,928 - File['/var/lib/ambari-agent/tmp/changeUid.sh'] {'content': StaticFile('changeToSecureUid.sh'), 'mode': 0555}
2020-06-10 19:07:29,930 - call['/var/lib/ambari-agent/tmp/changeUid.sh hbase'] {}
2020-06-10 19:07:29,942 - call returned (0, '1008')
2020-06-10 19:07:29,943 - Execute['/var/lib/ambari-agent/tmp/changeUid.sh hbase /home/hbase,/tmp/hbase,/usr/bin/hbase,/var/log/hbase,/tmp/hbase-hbase 1008'] {'not_if': '(test $(id -u hbase) -gt 1000) || (false)'}
2020-06-10 19:07:29,952 - Skipping Execute['/var/lib/ambari-agent/tmp/changeUid.sh hbase /home/hbase,/tmp/hbase,/usr/bin/hbase,/var/log/hbase,/tmp/hbase-hbase 1008'] due to not_if
2020-06-10 19:07:29,953 - Group['hdfs'] {}
2020-06-10 19:07:29,953 - User['hdfs'] {'fetch_nonlocal_groups': True, 'groups': ['hdfs', 'hadoop', u'hdfs']}
2020-06-10 19:07:29,954 - FS Type: HDFS
2020-06-10 19:07:29,954 - Directory['/etc/hadoop'] {'mode': 0755}
2020-06-10 19:07:29,970 - File['/usr/hdp/3.1.4.0-315/hadoop/conf/hadoop-env.sh'] {'content': InlineTemplate(...), 'owner': 'hdfs', 'group': 'hadoop'}
2020-06-10 19:07:29,970 - Directory['/var/lib/ambari-agent/tmp/hadoop_java_io_tmpdir'] {'owner': 'hdfs', 'group': 'hadoop', 'mode': 01777}
2020-06-10 19:07:29,987 - Execute[('setenforce', '0')] {'not_if': '(! which getenforce ) || (which getenforce && getenforce | grep -q Disabled)', 'sudo': True, 'only_if': 'test -f /selinux/enforce'}
2020-06-10 19:07:29,998 - Skipping Execute[('setenforce', '0')] due to not_if
2020-06-10 19:07:29,999 - Directory['/var/log/hadoop'] {'owner': 'root', 'create_parents': True, 'group': 'hadoop', 'mode': 0775, 'cd_access': 'a'}
2020-06-10 19:07:30,003 - Directory['/var/run/hadoop'] {'owner': 'root', 'create_parents': True, 'group': 'root', 'cd_access': 'a'}
2020-06-10 19:07:30,004 - Directory['/var/run/hadoop/hdfs'] {'owner': 'hdfs', 'cd_access': 'a'}
2020-06-10 19:07:30,005 - Directory['/tmp/hadoop-hdfs'] {'owner': 'hdfs', 'create_parents': True, 'cd_access': 'a'}
2020-06-10 19:07:30,013 - File['/usr/hdp/3.1.4.0-315/hadoop/conf/commons-logging.properties'] {'content': Template('commons-logging.properties.j2'), 'owner': 'hdfs'}
2020-06-10 19:07:30,015 - File['/usr/hdp/3.1.4.0-315/hadoop/conf/health_check'] {'content': Template('health_check.j2'), 'owner': 'hdfs'}
2020-06-10 19:07:30,021 - File['/usr/hdp/3.1.4.0-315/hadoop/conf/log4j.properties'] {'content': InlineTemplate(...), 'owner': 'hdfs', 'group': 'hadoop', 'mode': 0644}
2020-06-10 19:07:30,031 - File['/usr/hdp/3.1.4.0-315/hadoop/conf/hadoop-metrics2.properties'] {'content': InlineTemplate(...), 'owner': 'hdfs', 'group': 'hadoop'}
2020-06-10 19:07:30,032 - File['/usr/hdp/3.1.4.0-315/hadoop/conf/task-log4j.properties'] {'content': StaticFile('task-log4j.properties'), 'mode': 0755}
2020-06-10 19:07:30,033 - File['/usr/hdp/3.1.4.0-315/hadoop/conf/configuration.xsl'] {'owner': 'hdfs', 'group': 'hadoop'}
2020-06-10 19:07:30,037 - File['/etc/hadoop/conf/topology_mappings.data'] {'owner': 'hdfs', 'content': Template('topology_mappings.data.j2'), 'only_if': 'test -d /etc/hadoop/conf', 'group': 'hadoop', 'mode': 0644}
2020-06-10 19:07:30,043 - File['/etc/hadoop/conf/topology_script.py'] {'content': StaticFile('topology_script.py'), 'only_if': 'test -d /etc/hadoop/conf', 'mode': 0755}
2020-06-10 19:07:30,049 - Skipping unlimited key JCE policy check and setup since the Java VM is not managed by Ambari
2020-06-10 19:07:30,058 - Skipping stack-select on SMARTSENSE because it does not exist in the stack-select package structure.
validating versions
Command: hst --version
Exit code: 0
Std Out: 1.5.1.2.7.4.0-118

Std Err: None
owner for set_permissions:root
Command: mkdir -p /etc/hst
Exit code: 0
Std Out: None
Std Err: None
Command: chown -R 'root':'root' /etc/hst
Exit code: 0
Std Out: None
Std Err: None
Command: mkdir -p /var/log/hst
Exit code: 0
Std Out: None
Std Err: None
Command: chown -R 'root':'root' /var/log/hst
Exit code: 0
Std Out: None
Std Err: None
setting permissions: 750
Command: chmod 750 /var/log/hst
Exit code: 0
Std Out: None
Std Err: None
Command: mkdir -p /etc/hst/conf
Exit code: 0
Std Out: None
Std Err: None
Command: chown -R 'root':'root' /etc/hst/conf
Exit code: 0
Std Out: None
Std Err: None
Command: mkdir -p /var/lib/smartsense/hst-agent
Exit code: 0
Std Out: None
Std Err: None
Command: chown -R 'root':'root' /var/lib/smartsense/hst-agent
Exit code: 0
Std Out: None
Std Err: None
Writing configs to : /etc/hst/conf/hst-agent.ini
Command: chmod 644 /etc/hst/conf/hst-agent.ini
Exit code: 0
Std Out: None
Std Err: None
fileOwner for config files:
2020-06-10 19:07:30,334 - File['/etc/hst/conf/anonymization_rules.json'] {'content': InlineTemplate(...), 'owner': '', 'mode': 0644}
2020-06-10 19:07:30,337 - File['/etc/hst/conf/productinfo.json'] {'content': InlineTemplate(...), 'owner': '', 'mode': 0644}
2020-06-10 19:07:30,339 - File['/etc/hst/conf/log4j.properties'] {'content': InlineTemplate(...), 'owner': '', 'mode': 0644}
2020-06-10 19:07:30,344 - Directory['/usr/lib/ambari-logsearch-logfeeder/conf'] {'create_parents': True, 'mode': 0755, 'cd_access': 'a'}
2020-06-10 19:07:30,344 - Generate Log Feeder config file: /usr/lib/ambari-logsearch-logfeeder/conf/input.config-smartsense.json
2020-06-10 19:07:30,344 - File['/usr/lib/ambari-logsearch-logfeeder/conf/input.config-smartsense.json'] {'content': Template('input.config-smartsense.json.j2'), 'mode': 0644}
User root failed to execute command : /usr/sbin/hst setup-agent -q
owner for set_permissions:root
Command: mkdir -p /etc/hst
Exit code: 0
Std Out: None
Std Err: None
Command: chown -R 'root':'root' /etc/hst
Exit code: 0
Std Out: None
Std Err: None
Command: mkdir -p /var/log/hst
Exit code: 0
Std Out: None
Std Err: None
Command: chown -R 'root':'root' /var/log/hst
Exit code: 0
Std Out: None
Std Err: None
setting permissions: 750
Command: chmod 750 /var/log/hst
Exit code: 0
Std Out: None
Std Err: None
Command: mkdir -p /etc/hst/conf
Exit code: 0
Std Out: None
Std Err: None
Command: chown -R 'root':'root' /etc/hst/conf
Exit code: 0
Std Out: None
Std Err: None
Command: mkdir -p /var/lib/smartsense/hst-agent
Exit code: 0
Std Out: None
Std Err: None
Command: chown -R 'root':'root' /var/lib/smartsense/hst-agent
Exit code: 0
Std Out: None
Std Err: None
2020-06-10 19:07:33,415 - Pid files for current script are not defined
2020-06-10 19:07:33,430 - Skipping stack-select on SMARTSENSE because it does not exist in the stack-select package structure.

Command completed successfully!

Don't have an account?
Coming from Hortonworks? Activate your account here