javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)] at com.sun.security.sasl.gsskerb.GssKrb5Client.evalua teChallenge(GssKrb5Client.java:212) at sentry.org.apache.thrift.transport.TSaslClientTran sport.handleSaslStartMessage(TSaslClientTransport. java:94) at sentry.org.apache.thrift.transport.TSaslTransport. open(TSaslTransport.java:253) at sentry.org.apache.thrift.transport.TSaslClientTran sport.open(TSaslClientTransport.java:1) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport.baseOp en(SentryPolicyServiceClient.java:115) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport.access $000(SentryPolicyServiceClient.java:77) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport$1.run( SentryPolicyServiceClient.java:101) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport$1.run( SentryPolicyServiceClient.java:99)

cloudera.com | 8 months ago
tip
Your exception is missing from the Samebug knowledge base.
Here are the best solutions we found on the Internet.
Click on the to mark the helpful solution and get rewards for you help.
  1. 0

    Solved: Sentry Kerberos Issue - Cloudera Community

    cloudera.com | 8 months ago
    javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)] at com.sun.security.sasl.gsskerb.GssKrb5Client.evalua teChallenge(GssKrb5Client.java:212) at sentry.org.apache.thrift.transport.TSaslClientTran sport.handleSaslStartMessage(TSaslClientTransport. java:94) at sentry.org.apache.thrift.transport.TSaslTransport. open(TSaslTransport.java:253) at sentry.org.apache.thrift.transport.TSaslClientTran sport.open(TSaslClientTransport.java:1) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport.baseOp en(SentryPolicyServiceClient.java:115) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport.access $000(SentryPolicyServiceClient.java:77) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport$1.run( SentryPolicyServiceClient.java:101) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport$1.run( SentryPolicyServiceClient.java:99)
  2. 0

    Re: GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)

    crunch-user | 2 years ago | Tahir Hameed
    javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)] at com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212) at org.apache.hadoop.hbase.security.HBaseSaslRpcClient.saslConnect(HBaseSaslRpcClient.java:177) at org.apache.hadoop.hbase.ipc.RpcClient$Connection.setupSaslConnection(RpcClient.java:815) at org.apache.hadoop.hbase.ipc.RpcClient$Connection.access$800(RpcClient.java:349) at org.apache.hadoop.hbase.ipc.RpcClient$Connection$2.run(RpcClient.java:943) at org.apache.hadoop.hbase.ipc.RpcClient$Connection$2.run(RpcClient.java:940)
  3. 0

    LDAP with SASL authentication

    Google Groups | 1 decade ago | Andreas Schmid
    javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Invalid option setting in ticket request. (101))]]
  4. Speed up your debug routine!

    Automated exception search integrated into your IDE

  5. 0

    Kerberos Exceptions on Secured HBase Cluster - 陆恒 - org.apache.incubator.crunch-dev - MarkMail

    markmail.org | 1 year ago
    javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)] at com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:194) at org.apache.hadoop.hbase.security.HBaseSaslRpcClient.saslConnect(HBaseSaslRpcClient.java:138) at org.apache.hadoop.hbase.ipc.SecureClient$SecureConnection.setupSaslConnection(SecureClient.java:177) at org.apache.hadoop.hbase.ipc.SecureClient$SecureConnection.access$500(SecureClient.java:85) at org.apache.hadoop.hbase.ipc.SecureClient$SecureConnection$2.run(SecureClient.java:286) at org.apache.hadoop.hbase.ipc.SecureClient$SecureConnection$2.run(SecureClient.java:283)
  6. 0

    Apache NiFi Developer List - Using NiFI with a Secured HBASE setup

    nabble.com | 12 months ago
    javax.security.sasl.SaslException: GSS initiate failed >         at > com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(Unknown > Source) ~[na:1.8.0_71] >         at > org.apache.hadoop.hbase.security.HBaseSaslRpcClient.saslConnect(HBaseSaslRpcClient.java:179) > ~[hbase-client-1.1.2.jar:1.1.2] >         at > org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.setupSaslConnection(RpcClientImpl.java:642) > [hbase-client-1.1.2.jar:1.1.2] >         at > org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.access$600(RpcClientImpl.java:166) > [hbase-client-1.1.2.jar:1.1.2] >         at > org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection$2.run(RpcClientImpl.java:769) > ~[hbase-client-1.1.2.jar:1.1.2] >         at > org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection$2.run(RpcClientImpl.java:766) > ~[hbase-client-1.1.2.jar:1.1.2] >         at java.security.AccessController.doPrivileged(Native Method)

    Not finding the right solution?
    Take a tour to get the most out of Samebug.

    Tired of useless tips?

    Automated exception search integrated into your IDE

    Root Cause Analysis

    1. javax.security.sasl.SaslException

      GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)] at com.sun.security.sasl.gsskerb.GssKrb5Client.evalua teChallenge(GssKrb5Client.java:212) at sentry.org.apache.thrift.transport.TSaslClientTran sport.handleSaslStartMessage(TSaslClientTransport. java:94) at sentry.org.apache.thrift.transport.TSaslTransport. open(TSaslTransport.java:253) at sentry.org.apache.thrift.transport.TSaslClientTran sport.open(TSaslClientTransport.java:1) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport.baseOp en(SentryPolicyServiceClient.java:115) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport.access $000(SentryPolicyServiceClient.java:77) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport$1.run( SentryPolicyServiceClient.java:101) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport$1.run( SentryPolicyServiceClient.java:99)

      at java.security.AccessController.doPrivileged()
    2. Java RT
      Subject.doAs
      1. java.security.AccessController.doPrivileged(Native Method)
      2. javax.security.auth.Subject.doAs(Subject.java:415)
      2 frames