You are viewing a plain text version of this content. The canonical link for it is here.
Posted to user@phoenix.apache.org by "rohitrk.10" <ro...@whiteklay.in> on 2017/03/14 09:19:59 UTC

Cannot connect Phoenix to HBase in secure cluster (Kerberos)

Hi,



We are trying to connect to HBase in secure cluster using the following command as mentioned in the website,

./sqlline.py &lt;Zookeeper_Node_Hostname&gt;:5181:/hbase:&lt;Principal&gt;:&lt;keytab&gt;.



Hadoop version is MapR 5.2, HBase ver. 1.1.1 and Phoenix ver. 4.8.1 for HBase 1.1.1.



We have executed "kinit -kt &lt;keytab&gt; &lt;principal&gt;" command on all nodes before starting Phoenix but even then we are not able to connect. Following is the error log displayed,



ERROR:

------

17/03/08 16:29:41 WARN ipc.AbstractRpcClient: Exception encountered while connecting to the server : javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)]

17/03/08 16:29:41 FATAL ipc.AbstractRpcClient: SASL authentication failed. The most likely cause is missing or invalid credentials. Consider 'kinit'.

javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)]

        at com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212)

        at org.apache.hadoop.hbase.security.HBaseSaslRpcClient.saslConnect(HBaseSaslRpcClient.java:179)

        at org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.setupSaslConnection(RpcClientImpl.java:612)

        at org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.access$600(RpcClientImpl.java:157)

        at org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection$2.run(RpcClientImpl.java:738)

        at org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection$2.run(RpcClientImpl.java:735)

        at java.security.AccessController.doPrivileged(Native Method)

        at javax.security.auth.Subject.doAs(Subject.java:415)

        at org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1657)

        at org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.setupIOstreams(RpcClientImpl.java:735)

        at org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.writeRequest(RpcClientImpl.java:897)

        at org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.tracedWriteRequest(RpcClientImpl.java:866)

        at org.apache.hadoop.hbase.ipc.RpcClientImpl.call(RpcClientImpl.java:1209)

        at org.apache.hadoop.hbase.ipc.AbstractRpcClient.callBlockingMethod(AbstractRpcClient.java:217)

        at org.apache.hadoop.hbase.ipc.AbstractRpcClient$BlockingRpcChannelImplementation.callBlockingMethod(AbstractRpcClient.java:318)

        at org.apache.hadoop.hbase.protobuf.generated.ClientProtos$ClientService$BlockingStub.scan(ClientProtos.java:32831)

        at org.apache.hadoop.hbase.client.ScannerCallable.openScanner(ScannerCallable.java:373)

        at org.apache.hadoop.hbase.client.ScannerCallable.call(ScannerCallable.java:200)

        at org.apache.hadoop.hbase.client.ScannerCallable.call(ScannerCallable.java:62)

        at org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithoutRetries(RpcRetryingCaller.java:200)

        at org.apache.hadoop.hbase.client.ScannerCallableWithReplicas$RetryingRPC.call(ScannerCallableWithReplicas.java:350)

        at org.apache.hadoop.hbase.client.ScannerCallableWithReplicas$RetryingRPC.call(ScannerCallableWithReplicas.java:324)

        at org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithRetries(RpcRetryingCaller.java:126)

        at org.apache.hadoop.hbase.client.ResultBoundedCompletionService$QueueingFuture.run(ResultBoundedCompletionService.java:64)

        at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)

        at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615)

        at java.lang.Thread.run(Thread.java:745)

Caused by: GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)

        at sun.security.jgss.krb5.Krb5InitCredential.getInstance(Krb5InitCredential.java:147)

        at sun.security.jgss.krb5.Krb5MechFactory.getCredentialElement(Krb5MechFactory.java:121)

        at sun.security.jgss.krb5.Krb5MechFactory.getMechanismContext(Krb5MechFactory.java:187)

        at sun.security.jgss.GSSManagerImpl.getMechanismContext(GSSManagerImpl.java:223)

        at sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:212)

        at sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:179)

        at com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:193)

        ... 26 more





Thanks &amp; Regards,

Rohit R. K.






Re: Cannot connect Phoenix to HBase in secure cluster (Kerberos)

Posted by Josh Elser <el...@apache.org>.
Phoenix uses log4j to print out log messages to the console. You can
modify the log level in the referenced logj4.properties...

On Mon, Mar 20, 2017 at 2:50 AM, rohitrk.10 <ro...@whiteklay.in> wrote:
> Hi,
>
> We did not find any other logs. We have added
> "-Dsun.security.krb5.debug=true", even then there is no much information
> about the error.
> And also there are no logs about Phoenix trying to perform kerberos
> authentication in HBase logs as well as in Kerberos logs. The log shared in
> the earlier mail is the only information on error we have got.
>
>
> Thanks & Regards,
> Rohit R. K.
>
>
> ---- On Tue, 14 Mar 2017 20:50:30 +0530 Josh Elser <el...@apache.org> wrote
> ----
>
> When you provide the principal and keytab options in the JDBC URL, the
> ticket cache (created by your kinit invocation) is not used.
>
> What does the other logging say from your client? You should see a
> message about Phoenix performing a Kerberos login given the information
> you provided.
>
> rohitrk.10 wrote:
>> Hi,
>>
>> We are trying to connect to HBase in secure cluster using the following
>> command as mentioned in the website,
>> ./sqlline.py <Zookeeper_Node_Hostname>:5181:/hbase:<Principal>:<keytab>.
>>
>> Hadoop version is MapR 5.2, HBase ver. 1.1.1 and Phoenix ver. 4.8.1 for
>> HBase 1.1.1.
>>
>> We have executed "kinit -kt <keytab> <principal>" command on all nodes
>> before starting Phoenix but even then we are not able to connect.
>> Following is the error log displayed,
>>
>> ERROR:
>> ------
>> 17/03/08 16:29:41 WARN ipc.AbstractRpcClient: Exception encountered
>> while connecting to the server : javax.security.sasl.SaslException: GSS
>> initiate failed [Caused by GSSException: No valid credentials provided
>> (Mechanism level: Failed to find any Kerberos tgt)]
>> 17/03/08 16:29:41 FATAL ipc.AbstractRpcClient: SASL authentication
>> failed. The most likely cause is missing or invalid credentials.
>> Consider 'kinit'.
>> javax.security.sasl.SaslException: GSS initiate failed [Caused by
>> GSSException: No valid credentials provided (Mechanism level: Failed to
>> find any Kerberos tgt)]
>> at
>>
>> com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212)
>> at
>>
>> org.apache.hadoop.hbase.security.HBaseSaslRpcClient.saslConnect(HBaseSaslRpcClient.java:179)
>> at
>>
>> org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.setupSaslConnection(RpcClientImpl.java:612)
>> at
>>
>> org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.access$600(RpcClientImpl.java:157)
>> at
>>
>> org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection$2.run(RpcClientImpl.java:738)
>> at
>>
>> org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection$2.run(RpcClientImpl.java:735)
>> at java.security.AccessController.doPrivileged(Native Method)
>> at javax.security.auth.Subject.doAs(Subject.java:415)
>> at
>>
>> org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1657)
>> at
>>
>> org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.setupIOstreams(RpcClientImpl.java:735)
>> at
>>
>> org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.writeRequest(RpcClientImpl.java:897)
>> at
>>
>> org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.tracedWriteRequest(RpcClientImpl.java:866)
>> at org.apache.hadoop.hbase.ipc.RpcClientImpl.call(RpcClientImpl.java:1209)
>> at
>>
>> org.apache.hadoop.hbase.ipc.AbstractRpcClient.callBlockingMethod(AbstractRpcClient.java:217)
>> at
>>
>> org.apache.hadoop.hbase.ipc.AbstractRpcClient$BlockingRpcChannelImplementation.callBlockingMethod(AbstractRpcClient.java:318)
>> at
>>
>> org.apache.hadoop.hbase.protobuf.generated.ClientProtos$ClientService$BlockingStub.scan(ClientProtos.java:32831)
>> at
>>
>> org.apache.hadoop.hbase.client.ScannerCallable.openScanner(ScannerCallable.java:373)
>> at
>>
>> org.apache.hadoop.hbase.client.ScannerCallable.call(ScannerCallable.java:200)
>> at
>>
>> org.apache.hadoop.hbase.client.ScannerCallable.call(ScannerCallable.java:62)
>> at
>>
>> org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithoutRetries(RpcRetryingCaller.java:200)
>> at
>>
>> org.apache.hadoop.hbase.client.ScannerCallableWithReplicas$RetryingRPC.call(ScannerCallableWithReplicas.java:350)
>> at
>>
>> org.apache.hadoop.hbase.client.ScannerCallableWithReplicas$RetryingRPC.call(ScannerCallableWithReplicas.java:324)
>> at
>>
>> org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithRetries(RpcRetryingCaller.java:126)
>> at
>>
>> org.apache.hadoop.hbase.client.ResultBoundedCompletionService$QueueingFuture.run(ResultBoundedCompletionService.java:64)
>> at
>>
>> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
>> at
>>
>> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615)
>> at java.lang.Thread.run(Thread.java:745)
>> Caused by: GSSException: No valid credentials provided (Mechanism level:
>> Failed to find any Kerberos tgt)
>> at
>>
>> sun.security.jgss.krb5.Krb5InitCredential.getInstance(Krb5InitCredential.java:147)
>> at
>>
>> sun.security.jgss.krb5.Krb5MechFactory.getCredentialElement(Krb5MechFactory.java:121)
>> at
>>
>> sun.security.jgss.krb5.Krb5MechFactory.getMechanismContext(Krb5MechFactory.java:187)
>> at
>>
>> sun.security.jgss.GSSManagerImpl.getMechanismContext(GSSManagerImpl.java:223)
>> at
>> sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:212)
>> at
>> sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:179)
>> at
>>
>> com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:193)
>> ... 26 more
>>
>>
>> Thanks & Regards,
>> Rohit R. K.
>>
>
>

Re: Cannot connect Phoenix to HBase in secure cluster (Kerberos)

Posted by "rohitrk.10" <ro...@whiteklay.in>.
Hi,



We did not find any other logs. We have added "-Dsun.security.krb5.debug=true", even then there is no much information about the error. 

And also there are no logs about Phoenix trying to perform kerberos authentication in HBase logs as well as in Kerberos logs. The log shared in the earlier mail is the only information on error we have got.





Thanks &amp; Regards,

Rohit R. K.






---- On Tue, 14 Mar 2017 20:50:30 +0530 Josh Elser &lt;elserj@apache.org&gt; wrote ----




When you provide the principal and keytab options in the JDBC URL, the 

ticket cache (created by your kinit invocation) is not used. 

 

What does the other logging say from your client? You should see a 

message about Phoenix performing a Kerberos login given the information 

you provided. 

 

rohitrk.10 wrote: 

&gt; Hi, 

&gt; 

&gt; We are trying to connect to HBase in secure cluster using the following 

&gt; command as mentioned in the website, 

&gt; ./sqlline.py &lt;Zookeeper_Node_Hostname&gt;:5181:/hbase:&lt;Principal&gt;:&lt;keytab&gt;. 

&gt; 

&gt; Hadoop version is MapR 5.2, HBase ver. 1.1.1 and Phoenix ver. 4.8.1 for 

&gt; HBase 1.1.1. 

&gt; 

&gt; We have executed "kinit -kt &lt;keytab&gt; &lt;principal&gt;" command on all nodes 

&gt; before starting Phoenix but even then we are not able to connect. 

&gt; Following is the error log displayed, 

&gt; 

&gt; ERROR: 

&gt; ------ 

&gt; 17/03/08 16:29:41 WARN ipc.AbstractRpcClient: Exception encountered 

&gt; while connecting to the server : javax.security.sasl.SaslException: GSS 

&gt; initiate failed [Caused by GSSException: No valid credentials provided 

&gt; (Mechanism level: Failed to find any Kerberos tgt)] 

&gt; 17/03/08 16:29:41 FATAL ipc.AbstractRpcClient: SASL authentication 

&gt; failed. The most likely cause is missing or invalid credentials. 

&gt; Consider 'kinit'. 

&gt; javax.security.sasl.SaslException: GSS initiate failed [Caused by 

&gt; GSSException: No valid credentials provided (Mechanism level: Failed to 

&gt; find any Kerberos tgt)] 

&gt; at 

&gt; com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212) 

&gt; at 

&gt; org.apache.hadoop.hbase.security.HBaseSaslRpcClient.saslConnect(HBaseSaslRpcClient.java:179) 

&gt; at 

&gt; org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.setupSaslConnection(RpcClientImpl.java:612) 

&gt; at 

&gt; org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.access$600(RpcClientImpl.java:157) 

&gt; at 

&gt; org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection$2.run(RpcClientImpl.java:738) 

&gt; at 

&gt; org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection$2.run(RpcClientImpl.java:735) 

&gt; at java.security.AccessController.doPrivileged(Native Method) 

&gt; at javax.security.auth.Subject.doAs(Subject.java:415) 

&gt; at 

&gt; org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1657) 

&gt; at 

&gt; org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.setupIOstreams(RpcClientImpl.java:735) 

&gt; at 

&gt; org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.writeRequest(RpcClientImpl.java:897) 

&gt; at 

&gt; org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.tracedWriteRequest(RpcClientImpl.java:866) 

&gt; at org.apache.hadoop.hbase.ipc.RpcClientImpl.call(RpcClientImpl.java:1209) 

&gt; at 

&gt; org.apache.hadoop.hbase.ipc.AbstractRpcClient.callBlockingMethod(AbstractRpcClient.java:217) 

&gt; at 

&gt; org.apache.hadoop.hbase.ipc.AbstractRpcClient$BlockingRpcChannelImplementation.callBlockingMethod(AbstractRpcClient.java:318) 

&gt; at 

&gt; org.apache.hadoop.hbase.protobuf.generated.ClientProtos$ClientService$BlockingStub.scan(ClientProtos.java:32831) 

&gt; at 

&gt; org.apache.hadoop.hbase.client.ScannerCallable.openScanner(ScannerCallable.java:373) 

&gt; at 

&gt; org.apache.hadoop.hbase.client.ScannerCallable.call(ScannerCallable.java:200) 

&gt; at 

&gt; org.apache.hadoop.hbase.client.ScannerCallable.call(ScannerCallable.java:62) 

&gt; at 

&gt; org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithoutRetries(RpcRetryingCaller.java:200) 

&gt; at 

&gt; org.apache.hadoop.hbase.client.ScannerCallableWithReplicas$RetryingRPC.call(ScannerCallableWithReplicas.java:350) 

&gt; at 

&gt; org.apache.hadoop.hbase.client.ScannerCallableWithReplicas$RetryingRPC.call(ScannerCallableWithReplicas.java:324) 

&gt; at 

&gt; org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithRetries(RpcRetryingCaller.java:126) 

&gt; at 

&gt; org.apache.hadoop.hbase.client.ResultBoundedCompletionService$QueueingFuture.run(ResultBoundedCompletionService.java:64) 

&gt; at 

&gt; java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145) 

&gt; at 

&gt; java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615) 

&gt; at java.lang.Thread.run(Thread.java:745) 

&gt; Caused by: GSSException: No valid credentials provided (Mechanism level: 

&gt; Failed to find any Kerberos tgt) 

&gt; at 

&gt; sun.security.jgss.krb5.Krb5InitCredential.getInstance(Krb5InitCredential.java:147) 

&gt; at 

&gt; sun.security.jgss.krb5.Krb5MechFactory.getCredentialElement(Krb5MechFactory.java:121) 

&gt; at 

&gt; sun.security.jgss.krb5.Krb5MechFactory.getMechanismContext(Krb5MechFactory.java:187) 

&gt; at 

&gt; sun.security.jgss.GSSManagerImpl.getMechanismContext(GSSManagerImpl.java:223) 

&gt; at sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:212) 

&gt; at sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:179) 

&gt; at 

&gt; com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:193) 

&gt; ... 26 more 

&gt; 

&gt; 

&gt; Thanks &amp; Regards, 

&gt; Rohit R. K. 

&gt; 







Re: Cannot connect Phoenix to HBase in secure cluster (Kerberos)

Posted by Josh Elser <el...@apache.org>.
When you provide the principal and keytab options in the JDBC URL, the 
ticket cache (created by your kinit invocation) is not used.

What does the other logging say from your client? You should see a 
message about Phoenix performing a Kerberos login given the information 
you provided.

rohitrk.10 wrote:
> Hi,
>
> We are trying to connect to HBase in secure cluster using the following
> command as mentioned in the website,
> ./sqlline.py <Zookeeper_Node_Hostname>:5181:/hbase:<Principal>:<keytab>.
>
> Hadoop version is MapR 5.2, HBase ver. 1.1.1 and Phoenix ver. 4.8.1 for
> HBase 1.1.1.
>
> We have executed "kinit -kt <keytab> <principal>" command on all nodes
> before starting Phoenix but even then we are not able to connect.
> Following is the error log displayed,
>
> ERROR:
> ------
> 17/03/08 16:29:41 WARN ipc.AbstractRpcClient: Exception encountered
> while connecting to the server : javax.security.sasl.SaslException: GSS
> initiate failed [Caused by GSSException: No valid credentials provided
> (Mechanism level: Failed to find any Kerberos tgt)]
> 17/03/08 16:29:41 FATAL ipc.AbstractRpcClient: SASL authentication
> failed. The most likely cause is missing or invalid credentials.
> Consider 'kinit'.
> javax.security.sasl.SaslException: GSS initiate failed [Caused by
> GSSException: No valid credentials provided (Mechanism level: Failed to
> find any Kerberos tgt)]
> at
> com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212)
> at
> org.apache.hadoop.hbase.security.HBaseSaslRpcClient.saslConnect(HBaseSaslRpcClient.java:179)
> at
> org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.setupSaslConnection(RpcClientImpl.java:612)
> at
> org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.access$600(RpcClientImpl.java:157)
> at
> org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection$2.run(RpcClientImpl.java:738)
> at
> org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection$2.run(RpcClientImpl.java:735)
> at java.security.AccessController.doPrivileged(Native Method)
> at javax.security.auth.Subject.doAs(Subject.java:415)
> at
> org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1657)
> at
> org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.setupIOstreams(RpcClientImpl.java:735)
> at
> org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.writeRequest(RpcClientImpl.java:897)
> at
> org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.tracedWriteRequest(RpcClientImpl.java:866)
> at org.apache.hadoop.hbase.ipc.RpcClientImpl.call(RpcClientImpl.java:1209)
> at
> org.apache.hadoop.hbase.ipc.AbstractRpcClient.callBlockingMethod(AbstractRpcClient.java:217)
> at
> org.apache.hadoop.hbase.ipc.AbstractRpcClient$BlockingRpcChannelImplementation.callBlockingMethod(AbstractRpcClient.java:318)
> at
> org.apache.hadoop.hbase.protobuf.generated.ClientProtos$ClientService$BlockingStub.scan(ClientProtos.java:32831)
> at
> org.apache.hadoop.hbase.client.ScannerCallable.openScanner(ScannerCallable.java:373)
> at
> org.apache.hadoop.hbase.client.ScannerCallable.call(ScannerCallable.java:200)
> at
> org.apache.hadoop.hbase.client.ScannerCallable.call(ScannerCallable.java:62)
> at
> org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithoutRetries(RpcRetryingCaller.java:200)
> at
> org.apache.hadoop.hbase.client.ScannerCallableWithReplicas$RetryingRPC.call(ScannerCallableWithReplicas.java:350)
> at
> org.apache.hadoop.hbase.client.ScannerCallableWithReplicas$RetryingRPC.call(ScannerCallableWithReplicas.java:324)
> at
> org.apache.hadoop.hbase.client.RpcRetryingCaller.callWithRetries(RpcRetryingCaller.java:126)
> at
> org.apache.hadoop.hbase.client.ResultBoundedCompletionService$QueueingFuture.run(ResultBoundedCompletionService.java:64)
> at
> java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
> at
> java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615)
> at java.lang.Thread.run(Thread.java:745)
> Caused by: GSSException: No valid credentials provided (Mechanism level:
> Failed to find any Kerberos tgt)
> at
> sun.security.jgss.krb5.Krb5InitCredential.getInstance(Krb5InitCredential.java:147)
> at
> sun.security.jgss.krb5.Krb5MechFactory.getCredentialElement(Krb5MechFactory.java:121)
> at
> sun.security.jgss.krb5.Krb5MechFactory.getMechanismContext(Krb5MechFactory.java:187)
> at
> sun.security.jgss.GSSManagerImpl.getMechanismContext(GSSManagerImpl.java:223)
> at sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:212)
> at sun.security.jgss.GSSContextImpl.initSecContext(GSSContextImpl.java:179)
> at
> com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:193)
> ... 26 more
>
>
> Thanks & Regards,
> Rohit R. K.
>