You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@flink.apache.org by "Yangze Guo (Jira)" <ji...@apache.org> on 2020/08/05 01:53:00 UTC

[jira] [Commented] (FLINK-18817) 'Kerberized YARN per-job on Docker test' failed

    [ https://issues.apache.org/jira/browse/FLINK-18817?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17171216#comment-17171216 ] 

Yangze Guo commented on FLINK-18817:
------------------------------------

It seems the same issue with FLINK-18771.

> 'Kerberized YARN per-job on Docker test' failed
> -----------------------------------------------
>
>                 Key: FLINK-18817
>                 URL: https://issues.apache.org/jira/browse/FLINK-18817
>             Project: Flink
>          Issue Type: Test
>          Components: Tests
>            Reporter: Hequn Cheng
>            Priority: Major
>
> The end-to-end test failed due to some AccessControlException:
> https://dev.azure.com/apache-flink/98463496-1af2-4620-8eab-a2ecc1a2e6fe/_apis/build/builds/5169/logs/125
> {code}
> 2020-08-04T13:13:10.2755424Z Failing this attempt.Diagnostics: Failed on local exception: java.io.IOException: org.apache.hadoop.security.AccessControlException: Client cannot authenticate via:[TOKEN, KERBEROS]; Host Details : local host is: "worker1.docker-hadoop-cluster-network/172.19.0.5"; destination host is: "master.docker-hadoop-cluster-network":9000; 
> 2020-08-04T13:13:10.2757620Z java.io.IOException: Failed on local exception: java.io.IOException: org.apache.hadoop.security.AccessControlException: Client cannot authenticate via:[TOKEN, KERBEROS]; Host Details : local host is: "worker1.docker-hadoop-cluster-network/172.19.0.5"; destination host is: "master.docker-hadoop-cluster-network":9000; 
> 2020-08-04T13:13:10.2758550Z 	at org.apache.hadoop.net.NetUtils.wrapException(NetUtils.java:782)
> 2020-08-04T13:13:10.2758960Z 	at org.apache.hadoop.ipc.Client.getRpcResponse(Client.java:1493)
> 2020-08-04T13:13:10.2759321Z 	at org.apache.hadoop.ipc.Client.call(Client.java:1435)
> 2020-08-04T13:13:10.2759676Z 	at org.apache.hadoop.ipc.Client.call(Client.java:1345)
> 2020-08-04T13:13:10.2760305Z 	at org.apache.hadoop.ipc.ProtobufRpcEngine$Invoker.invoke(ProtobufRpcEngine.java:227)
> 2020-08-04T13:13:10.2760743Z 	at org.apache.hadoop.ipc.ProtobufRpcEngine$Invoker.invoke(ProtobufRpcEngine.java:116)
> 2020-08-04T13:13:10.2761087Z 	at com.sun.proxy.$Proxy11.getFileInfo(Unknown Source)
> 2020-08-04T13:13:10.2761521Z 	at org.apache.hadoop.hdfs.protocolPB.ClientNamenodeProtocolTranslatorPB.getFileInfo(ClientNamenodeProtocolTranslatorPB.java:796)
> 2020-08-04T13:13:10.2761964Z 	at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
> 2020-08-04T13:13:10.2762310Z 	at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
> 2020-08-04T13:13:10.2762741Z 	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
> 2020-08-04T13:13:10.2763105Z 	at java.lang.reflect.Method.invoke(Method.java:498)
> 2020-08-04T13:13:10.2763503Z 	at org.apache.hadoop.io.retry.RetryInvocationHandler.invokeMethod(RetryInvocationHandler.java:409)
> 2020-08-04T13:13:10.2763979Z 	at org.apache.hadoop.io.retry.RetryInvocationHandler$Call.invokeMethod(RetryInvocationHandler.java:163)
> 2020-08-04T13:13:10.2764474Z 	at org.apache.hadoop.io.retry.RetryInvocationHandler$Call.invoke(RetryInvocationHandler.java:155)
> 2020-08-04T13:13:10.2764944Z 	at org.apache.hadoop.io.retry.RetryInvocationHandler$Call.invokeOnce(RetryInvocationHandler.java:95)
> 2020-08-04T13:13:10.2765417Z 	at org.apache.hadoop.io.retry.RetryInvocationHandler.invoke(RetryInvocationHandler.java:346)
> 2020-08-04T13:13:10.2765770Z 	at com.sun.proxy.$Proxy12.getFileInfo(Unknown Source)
> 2020-08-04T13:13:10.2766093Z 	at org.apache.hadoop.hdfs.DFSClient.getFileInfo(DFSClient.java:1649)
> 2020-08-04T13:13:10.2766489Z 	at org.apache.hadoop.hdfs.DistributedFileSystem$27.doCall(DistributedFileSystem.java:1440)
> 2020-08-04T13:13:10.2767209Z 	at org.apache.hadoop.hdfs.DistributedFileSystem$27.doCall(DistributedFileSystem.java:1437)
> 2020-08-04T13:13:10.2767699Z 	at org.apache.hadoop.fs.FileSystemLinkResolver.resolve(FileSystemLinkResolver.java:81)
> 2020-08-04T13:13:10.2768187Z 	at org.apache.hadoop.hdfs.DistributedFileSystem.getFileStatus(DistributedFileSystem.java:1437)
> 2020-08-04T13:13:10.2768646Z 	at org.apache.hadoop.yarn.util.FSDownload.copy(FSDownload.java:253)
> 2020-08-04T13:13:10.2769051Z 	at org.apache.hadoop.yarn.util.FSDownload.access$000(FSDownload.java:63)
> 2020-08-04T13:13:10.2769470Z 	at org.apache.hadoop.yarn.util.FSDownload$2.run(FSDownload.java:361)
> 2020-08-04T13:13:10.2769988Z 	at org.apache.hadoop.yarn.util.FSDownload$2.run(FSDownload.java:359)
> 2020-08-04T13:13:10.2770438Z 	at java.security.AccessController.doPrivileged(Native Method)
> 2020-08-04T13:13:10.2770735Z 	at javax.security.auth.Subject.doAs(Subject.java:422)
> 2020-08-04T13:13:10.2771113Z 	at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1840)
> 2020-08-04T13:13:10.2771503Z 	at org.apache.hadoop.yarn.util.FSDownload.call(FSDownload.java:358)
> 2020-08-04T13:13:10.2771870Z 	at org.apache.hadoop.yarn.util.FSDownload.call(FSDownload.java:62)
> 2020-08-04T13:13:10.2772317Z 	at java.util.concurrent.FutureTask.run(FutureTask.java:266)
> 2020-08-04T13:13:10.2772732Z 	at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511)
> 2020-08-04T13:13:10.2773094Z 	at java.util.concurrent.FutureTask.run(FutureTask.java:266)
> 2020-08-04T13:13:10.2773473Z 	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
> 2020-08-04T13:13:10.2773897Z 	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
> 2020-08-04T13:13:10.2774712Z 	at java.lang.Thread.run(Thread.java:748)
> 2020-08-04T13:13:10.2775151Z Caused by: java.io.IOException: org.apache.hadoop.security.AccessControlException: Client cannot authenticate via:[TOKEN, KERBEROS]
> 2020-08-04T13:13:10.2775614Z 	at org.apache.hadoop.ipc.Client$Connection$1.run(Client.java:755)
> 2020-08-04T13:13:10.2775947Z 	at java.security.AccessController.doPrivileged(Native Method)
> 2020-08-04T13:13:10.2776469Z 	at javax.security.auth.Subject.doAs(Subject.java:422)
> 2020-08-04T13:13:10.2777104Z 	at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1840)
> 2020-08-04T13:13:10.2777581Z 	at org.apache.hadoop.ipc.Client$Connection.handleSaslConnectionFailure(Client.java:718)
> 2020-08-04T13:13:10.2778047Z 	at org.apache.hadoop.ipc.Client$Connection.setupIOstreams(Client.java:811)
> 2020-08-04T13:13:10.2778464Z 	at org.apache.hadoop.ipc.Client$Connection.access$3500(Client.java:410)
> 2020-08-04T13:13:10.2778874Z 	at org.apache.hadoop.ipc.Client.getConnection(Client.java:1550)
> 2020-08-04T13:13:10.2779233Z 	at org.apache.hadoop.ipc.Client.call(Client.java:1381)
> 2020-08-04T13:13:10.2779498Z 	... 35 more
> {code}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)