Support Questions
Find answers, ask questions, and share your expertise

HST agent in smartsense failed to start

Highlighted

HST agent in smartsense failed to start

New Contributor

Hello, ambari built a big data platform, in which HST agent in smartsense failed to start. The following is the detailed output log. What should I do? Is this component necessary for big data platform? I look forward to your reply.

 

stderr:
Traceback (most recent call last):
File "/usr/sbin/hst-agent.py", line 658, in <module>
main(sys.argv)
File "/usr/sbin/hst-agent.py", line 625, in main
setup(options)
File "/usr/sbin/hst-agent.py", line 433, in setup
server_hostname = get_server_hostname(server, tries, try_sleep, options.quiet)
File "/usr/sbin/hst-agent.py", line 102, in get_server_hostname
server_hostname = validate_server_hostname(default_hostname, tries, try_sleep)
File "/usr/sbin/hst-agent.py", line 120, in validate_server_hostname
elif not register_agent(server_hostname):
File "/usr/sbin/hst-agent.py", line 138, in register_agent
if not server_api.register_agent(agent_version):
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/ServerAPI.py", line 132, in register_agent
(status, content) = self.call(request)
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/ServerAPI.py", line 44, in call
self.cachedconnect = security.CachedHTTPSConnection(self.config)
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/security.py", line 109, in __init__
self.connect()
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/security.py", line 114, in connect
self.httpsconn.connect()
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/security.py", line 75, in connect
raise err
ssl.SSLError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:618)
Traceback (most recent call last):
File "/usr/sbin/hst-agent.py", line 658, in <module>
main(sys.argv)
File "/usr/sbin/hst-agent.py", line 631, in main
update_config(options)
File "/usr/sbin/hst-agent.py", line 154, in update_config
download_flag = patch.download_and_apply_patch(server_hostname, download_dir, server_api)
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/patch.py", line 35, in download_and_apply_patch
patch_content = server_api.download_config_patch()
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/ServerAPI.py", line 177, in download_config_patch
(status, content) = self.call(request)
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/ServerAPI.py", line 44, in call
self.cachedconnect = security.CachedHTTPSConnection(self.config)
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/security.py", line 109, in __init__
self.connect()
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/security.py", line 114, in connect
self.httpsconn.connect()
File "/usr/hdp/share/hst/hst-agent/lib/hst_agent/security.py", line 75, in connect
raise err
ssl.SSLError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:618)
stdout:
2020-06-10 19:07:29,712 - Stack Feature Version Info: Cluster Stack=3.1, Command Stack=None, Command Version=3.1.4.0-315 -> 3.1.4.0-315
2020-06-10 19:07:29,734 - Using hadoop conf dir: /usr/hdp/3.1.4.0-315/hadoop/conf
2020-06-10 19:07:29,898 - Stack Feature Version Info: Cluster Stack=3.1, Command Stack=None, Command Version=3.1.4.0-315 -> 3.1.4.0-315
2020-06-10 19:07:29,904 - Using hadoop conf dir: /usr/hdp/3.1.4.0-315/hadoop/conf
2020-06-10 19:07:29,906 - Group['hdfs'] {}
2020-06-10 19:07:29,907 - Group['hadoop'] {}
2020-06-10 19:07:29,907 - Group['users'] {}
2020-06-10 19:07:29,907 - User['yarn-ats'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
2020-06-10 19:07:29,909 - User['zookeeper'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
2020-06-10 19:07:29,909 - User['ams'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
2020-06-10 19:07:29,910 - User['ambari-qa'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop', 'users'], 'uid': None}
2020-06-10 19:07:29,911 - User['hdfs'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hdfs', 'hadoop'], 'uid': None}
2020-06-10 19:07:29,912 - User['yarn'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
2020-06-10 19:07:29,912 - User['mapred'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
2020-06-10 19:07:29,913 - User['hbase'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
2020-06-10 19:07:29,914 - File['/var/lib/ambari-agent/tmp/changeUid.sh'] {'content': StaticFile('changeToSecureUid.sh'), 'mode': 0555}
2020-06-10 19:07:29,915 - Execute['/var/lib/ambari-agent/tmp/changeUid.sh ambari-qa /tmp/hadoop-ambari-qa,/tmp/hsperfdata_ambari-qa,/home/ambari-qa,/tmp/ambari-qa,/tmp/sqoop-ambari-qa 0'] {'not_if': '(test $(id -u ambari-qa) -gt 1000) || (false)'}
2020-06-10 19:07:29,923 - Skipping Execute['/var/lib/ambari-agent/tmp/changeUid.sh ambari-qa /tmp/hadoop-ambari-qa,/tmp/hsperfdata_ambari-qa,/home/ambari-qa,/tmp/ambari-qa,/tmp/sqoop-ambari-qa 0'] due to not_if
2020-06-10 19:07:29,924 - Directory['/tmp/hbase-hbase'] {'owner': 'hbase', 'create_parents': True, 'mode': 0775, 'cd_access': 'a'}
2020-06-10 19:07:29,926 - File['/var/lib/ambari-agent/tmp/changeUid.sh'] {'content': StaticFile('changeToSecureUid.sh'), 'mode': 0555}
2020-06-10 19:07:29,928 - File['/var/lib/ambari-agent/tmp/changeUid.sh'] {'content': StaticFile('changeToSecureUid.sh'), 'mode': 0555}
2020-06-10 19:07:29,930 - call['/var/lib/ambari-agent/tmp/changeUid.sh hbase'] {}
2020-06-10 19:07:29,942 - call returned (0, '1008')
2020-06-10 19:07:29,943 - Execute['/var/lib/ambari-agent/tmp/changeUid.sh hbase /home/hbase,/tmp/hbase,/usr/bin/hbase,/var/log/hbase,/tmp/hbase-hbase 1008'] {'not_if': '(test $(id -u hbase) -gt 1000) || (false)'}
2020-06-10 19:07:29,952 - Skipping Execute['/var/lib/ambari-agent/tmp/changeUid.sh hbase /home/hbase,/tmp/hbase,/usr/bin/hbase,/var/log/hbase,/tmp/hbase-hbase 1008'] due to not_if
2020-06-10 19:07:29,953 - Group['hdfs'] {}
2020-06-10 19:07:29,953 - User['hdfs'] {'fetch_nonlocal_groups': True, 'groups': ['hdfs', 'hadoop', u'hdfs']}
2020-06-10 19:07:29,954 - FS Type: HDFS
2020-06-10 19:07:29,954 - Directory['/etc/hadoop'] {'mode': 0755}
2020-06-10 19:07:29,970 - File['/usr/hdp/3.1.4.0-315/hadoop/conf/hadoop-env.sh'] {'content': InlineTemplate(...), 'owner': 'hdfs', 'group': 'hadoop'}
2020-06-10 19:07:29,970 - Directory['/var/lib/ambari-agent/tmp/hadoop_java_io_tmpdir'] {'owner': 'hdfs', 'group': 'hadoop', 'mode': 01777}
2020-06-10 19:07:29,987 - Execute[('setenforce', '0')] {'not_if': '(! which getenforce ) || (which getenforce && getenforce | grep -q Disabled)', 'sudo': True, 'only_if': 'test -f /selinux/enforce'}
2020-06-10 19:07:29,998 - Skipping Execute[('setenforce', '0')] due to not_if
2020-06-10 19:07:29,999 - Directory['/var/log/hadoop'] {'owner': 'root', 'create_parents': True, 'group': 'hadoop', 'mode': 0775, 'cd_access': 'a'}
2020-06-10 19:07:30,003 - Directory['/var/run/hadoop'] {'owner': 'root', 'create_parents': True, 'group': 'root', 'cd_access': 'a'}
2020-06-10 19:07:30,004 - Directory['/var/run/hadoop/hdfs'] {'owner': 'hdfs', 'cd_access': 'a'}
2020-06-10 19:07:30,005 - Directory['/tmp/hadoop-hdfs'] {'owner': 'hdfs', 'create_parents': True, 'cd_access': 'a'}
2020-06-10 19:07:30,013 - File['/usr/hdp/3.1.4.0-315/hadoop/conf/commons-logging.properties'] {'content': Template('commons-logging.properties.j2'), 'owner': 'hdfs'}
2020-06-10 19:07:30,015 - File['/usr/hdp/3.1.4.0-315/hadoop/conf/health_check'] {'content': Template('health_check.j2'), 'owner': 'hdfs'}
2020-06-10 19:07:30,021 - File['/usr/hdp/3.1.4.0-315/hadoop/conf/log4j.properties'] {'content': InlineTemplate(...), 'owner': 'hdfs', 'group': 'hadoop', 'mode': 0644}
2020-06-10 19:07:30,031 - File['/usr/hdp/3.1.4.0-315/hadoop/conf/hadoop-metrics2.properties'] {'content': InlineTemplate(...), 'owner': 'hdfs', 'group': 'hadoop'}
2020-06-10 19:07:30,032 - File['/usr/hdp/3.1.4.0-315/hadoop/conf/task-log4j.properties'] {'content': StaticFile('task-log4j.properties'), 'mode': 0755}
2020-06-10 19:07:30,033 - File['/usr/hdp/3.1.4.0-315/hadoop/conf/configuration.xsl'] {'owner': 'hdfs', 'group': 'hadoop'}
2020-06-10 19:07:30,037 - File['/etc/hadoop/conf/topology_mappings.data'] {'owner': 'hdfs', 'content': Template('topology_mappings.data.j2'), 'only_if': 'test -d /etc/hadoop/conf', 'group': 'hadoop', 'mode': 0644}
2020-06-10 19:07:30,043 - File['/etc/hadoop/conf/topology_script.py'] {'content': StaticFile('topology_script.py'), 'only_if': 'test -d /etc/hadoop/conf', 'mode': 0755}
2020-06-10 19:07:30,049 - Skipping unlimited key JCE policy check and setup since the Java VM is not managed by Ambari
2020-06-10 19:07:30,058 - Skipping stack-select on SMARTSENSE because it does not exist in the stack-select package structure.
validating versions
Command: hst --version
Exit code: 0
Std Out: 1.5.1.2.7.4.0-118

Std Err: None
owner for set_permissions:root
Command: mkdir -p /etc/hst
Exit code: 0
Std Out: None
Std Err: None
Command: chown -R 'root':'root' /etc/hst
Exit code: 0
Std Out: None
Std Err: None
Command: mkdir -p /var/log/hst
Exit code: 0
Std Out: None
Std Err: None
Command: chown -R 'root':'root' /var/log/hst
Exit code: 0
Std Out: None
Std Err: None
setting permissions: 750
Command: chmod 750 /var/log/hst
Exit code: 0
Std Out: None
Std Err: None
Command: mkdir -p /etc/hst/conf
Exit code: 0
Std Out: None
Std Err: None
Command: chown -R 'root':'root' /etc/hst/conf
Exit code: 0
Std Out: None
Std Err: None
Command: mkdir -p /var/lib/smartsense/hst-agent
Exit code: 0
Std Out: None
Std Err: None
Command: chown -R 'root':'root' /var/lib/smartsense/hst-agent
Exit code: 0
Std Out: None
Std Err: None
Writing configs to : /etc/hst/conf/hst-agent.ini
Command: chmod 644 /etc/hst/conf/hst-agent.ini
Exit code: 0
Std Out: None
Std Err: None
fileOwner for config files:
2020-06-10 19:07:30,334 - File['/etc/hst/conf/anonymization_rules.json'] {'content': InlineTemplate(...), 'owner': '', 'mode': 0644}
2020-06-10 19:07:30,337 - File['/etc/hst/conf/productinfo.json'] {'content': InlineTemplate(...), 'owner': '', 'mode': 0644}
2020-06-10 19:07:30,339 - File['/etc/hst/conf/log4j.properties'] {'content': InlineTemplate(...), 'owner': '', 'mode': 0644}
2020-06-10 19:07:30,344 - Directory['/usr/lib/ambari-logsearch-logfeeder/conf'] {'create_parents': True, 'mode': 0755, 'cd_access': 'a'}
2020-06-10 19:07:30,344 - Generate Log Feeder config file: /usr/lib/ambari-logsearch-logfeeder/conf/input.config-smartsense.json
2020-06-10 19:07:30,344 - File['/usr/lib/ambari-logsearch-logfeeder/conf/input.config-smartsense.json'] {'content': Template('input.config-smartsense.json.j2'), 'mode': 0644}
User root failed to execute command : /usr/sbin/hst setup-agent -q
owner for set_permissions:root
Command: mkdir -p /etc/hst
Exit code: 0
Std Out: None
Std Err: None
Command: chown -R 'root':'root' /etc/hst
Exit code: 0
Std Out: None
Std Err: None
Command: mkdir -p /var/log/hst
Exit code: 0
Std Out: None
Std Err: None
Command: chown -R 'root':'root' /var/log/hst
Exit code: 0
Std Out: None
Std Err: None
setting permissions: 750
Command: chmod 750 /var/log/hst
Exit code: 0
Std Out: None
Std Err: None
Command: mkdir -p /etc/hst/conf
Exit code: 0
Std Out: None
Std Err: None
Command: chown -R 'root':'root' /etc/hst/conf
Exit code: 0
Std Out: None
Std Err: None
Command: mkdir -p /var/lib/smartsense/hst-agent
Exit code: 0
Std Out: None
Std Err: None
Command: chown -R 'root':'root' /var/lib/smartsense/hst-agent
Exit code: 0
Std Out: None
Std Err: None
2020-06-10 19:07:33,415 - Pid files for current script are not defined
2020-06-10 19:07:33,430 - Skipping stack-select on SMARTSENSE because it does not exist in the stack-select package structure.

Command completed successfully!