Enabling Kerberos Debug for Hive

http://sacredsourcework.com/?buy-college-essay-online From time to time, we need to do troubleshooting steps for locating the root cause of Kerberos failure in Hive. I will outline below steps in order to turn on debugging message from both Client and HiveServer2 server side.

http://imnubi.com/?p=dissertation-participant
  1. To enable on Hive Client side (beeline), simply add the following export commands before you run beeline command:

    developing an argument dissertation export HADOOP_JAAS_DEBUG=true; export HADOOP_OPTS='-Dsun.security.krb5.debug=true -Dsun.security.jgss.debug=true'

    http://foodland-stbarth.com/dissertation-case-studies/ dissertation case studies Then the debug message will be printed on the shell when you run beeline.

  2. To enable kerberos debug on HiveServer2 side (assuming you are using Cloudera Manager)
    1. To to CM > Hive > Configuration
    2. locate “HiveServer2 Environment Advanced Configuration Snippet (Safety Valve)”
    3. add following to the textarea:

      http://katakira.com/?p=childhood-memory-essay HADOOP_OPTS='-Dsun.security.krb5.debug=true -Dsun.security.jgss.debug=true'

    4. Save and restart Hive service

    Dissertation In Africa Once restarted, you will be able to locate the kerberos debug message from HiveServer2’s process directory on the server host, which is located under /var/run/cloudera-scm-agent/process/XXX-hive-HIVESERVER2/logs/stdout.log, where XXX is the largest number under the directory for HiveServer2

business plan statistics The sample debug message for kerberos looks like below:

http://caralangsingsehat.com/?p=professional-essays-on-euthanasia

article writing tips Java config name: null Native config name: /etc/krb5.conf Loaded from native config [UnixLoginModule]: succeeded importing info: uid = 0 gid = 0 supp gid = 0 Debug is true storeKey false useTicketCache true useKeyTab false doNotPrompt true ticketCache is null isInitiator true KeyTab is null refreshKrb5Config is false principal is null tryFirstPass is false useFirstPass is false storePass is false clearPass is false Acquire TGT from Cache >>>KinitOptions cache name is /tmp/krb5cc_0 >>>DEBUG client principal is impala/{host-name}@REAL.COM >>>DEBUG server principal is krbtgt/REAL.COM@REAL.COM >>>DEBUG key type: 23 >>>DEBUG auth time: Sun Aug 13 21:07:46 PDT 2017 >>>DEBUG start time: Sun Aug 13 21:07:46 PDT 2017 >>>DEBUG end time: Mon Aug 14 07:07:46 PDT 2017 >>>DEBUG renew_till time: Sun Aug 20 21:07:46 PDT 2017 >>> CCacheInputStream: readFlags() FORWARDABLE; RENEWABLE; INITIAL; PRE_AUTH; >>>DEBUG client principal is impala/{host-name}@REAL.COM >>>DEBUG server principal is X-CACHECONF:/krb5_ccache_conf_data/pa_type/krbtgt/REAL.COM@REAL.COM >>>DEBUG key type: 0 >>>DEBUG auth time: Wed Dec 31 16:00:00 PST 1969 >>>DEBUG start time: null >>>DEBUG end time: Wed Dec 31 16:00:00 PST 1969 >>>DEBUG renew_till time: null >>> CCacheInputStream: readFlags() Principal is impala/{host-name}@REAL.COM [UnixLoginModule]: added UnixPrincipal, UnixNumericUserPrincipal, UnixNumericGroupPrincipal(s), to Subject Commit Succeeded Search Subject for Kerberos V5 INIT cred (<>, sun.security.jgss.krb5.Krb5InitCredential) Found ticket for impala/{host-name}@REAL.COM to go to krbtgt/REAL.COM@REAL.COM expiring on Mon Aug 14 07:07:46 PDT 2017 Entered Krb5Context.initSecContext with state=STATE_NEW Found ticket for impala/{host-name}@REAL.COM to go to krbtgt/REAL.COM@REAL.COM expiring on Mon Aug 14 07:07:46 PDT 2017 Service ticket not found in the subject >>> Credentials acquireServiceCreds: same realm default etypes for default_tgs_enctypes: 23. >>> CksumType: sun.security.krb5.internal.crypto.RsaMd5CksumType >>> EType: sun.security.krb5.internal.crypto.ArcFourHmacEType >>> KdcAccessibility: reset >>> KrbKdcReq send: kdc=kdc-host.com TCP:88, timeout=3000, number of retries =3, #bytes=1607 >>> KDCCommunication: kdc=kdc-host.com TCP:88, timeout=3000,Attempt =1, #bytes=1607 >>>DEBUG: TCPClient reading 1581 bytes >>> KrbKdcReq send: #bytes read=1581 >>> KdcAccessibility: remove kdc-host.com >>> EType: sun.security.krb5.internal.crypto.ArcFourHmacEType >>> KrbApReq: APOptions are 00100000 00000000 00000000 00000000 >>> EType: sun.security.krb5.internal.crypto.ArcFourHmacEType Krb5Context setting mySeqNumber to: 789412608 Created InitSecContextToken:

genetics homework help From above message, you can see at least below info:

here
  • Client config file for kerberos /etc/krb5.conf
  • Ticket case file: /tmp/krb5cc_0
  • Client principal name: impala/{host-name}@REAL.COM
  • KDC server host: kdc=kdc-host.com and using TCP connection via port 88 (TCP:88)
  • and a lot more others that might be useful for your troubleshooting

http://adieutabac.fr/homework-help-thailand/ Hope above helps.

go to site