Page MenuHomePhabricator

Update the Camus checker to be able to authenticate via Kerberos
Closed, ResolvedPublic5 Estimated Story Points


2019-06-21 06:59:52 ERROR CamusPartitionChecker$:328 - A fatal error occurred during execution. SIMPLE authentication is not enabled.  Available:[TOKEN, KERBEROS]
	at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
	at sun.reflect.NativeConstructorAccessorImpl.newInstance(
	at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(
	at java.lang.reflect.Constructor.newInstance(
	at org.apache.hadoop.ipc.RemoteException.instantiateException(
	at org.apache.hadoop.ipc.RemoteException.unwrapRemoteException(
	at org.apache.hadoop.hdfs.DFSClient.listPaths(
	at org.apache.hadoop.hdfs.DFSClient.listPaths(
	at org.apache.hadoop.hdfs.DistributedFileSystem.listStatusInternal(
	at org.apache.hadoop.hdfs.DistributedFileSystem.access$600(
	at org.apache.hadoop.hdfs.DistributedFileSystem$15.doCall(
	at org.apache.hadoop.hdfs.DistributedFileSystem$15.doCall(
	at org.apache.hadoop.fs.FileSystemLinkResolver.resolve(
	at org.apache.hadoop.hdfs.DistributedFileSystem.listStatus(
	at org.apache.hadoop.fs.FileSystem.listStatus(
	at org.apache.hadoop.fs.FileSystem.listStatus(
Caused by: org.apache.hadoop.ipc.RemoteException( SIMPLE authentication is not enabled.  Available:[TOKEN, KERBEROS]
	at org.apache.hadoop.ipc.ProtobufRpcEngine$Invoker.invoke(
	at com.sun.proxy.$Proxy9.getListing(Unknown Source)
	at org.apache.hadoop.hdfs.protocolPB.ClientNamenodeProtocolTranslatorPB.getListing(
	at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
	at sun.reflect.NativeMethodAccessorImpl.invoke(
	at sun.reflect.DelegatingMethodAccessorImpl.invoke(
	at java.lang.reflect.Method.invoke(
	at com.sun.proxy.$Proxy10.getListing(Unknown Source)
	at org.apache.hadoop.hdfs.DFSClient.listPaths(
	... 12 more

The camus checker seems to be using Hadoop HDFS apis directly, and those will probably need to support Kerberos.

Event Timeline

elukey created this task.Jun 21 2019, 7:07 AM

Joseph seems to have found a solution to this problem, namely appending :/etc/hadoop/conf to the -cp path of the call to the camus checker in our camus python script. Why it works is a bit of a mistery :D

Change 518961 had a related patch set uploaded (by Elukey; owner: Elukey):
[analytics/refinery@master] camus: add hadoop config path to the checker's java cp parameter

Change 518961 merged by Elukey:
[analytics/refinery@master] camus: add hadoop config path to the checker's java cp parameter

elukey triaged this task as Medium priority.Jun 27 2019, 9:09 AM
elukey added a project: Analytics-Kanban.
elukey set the point value for this task to 5.

Systemd timers now support kerberos auth, and Joseph's change for the checker seems to work perfectly. No more actions left!

elukey moved this task from Next Up to Done on the Analytics-Kanban board.Jun 27 2019, 9:10 AM
fdans closed this task as Resolved.Jul 1 2019, 3:50 PM