javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)] at com.sun.security.sasl.gsskerb.GssKrb5Client.evalua teChallenge(GssKrb5Client.java:212) at sentry.org.apache.thrift.transport.TSaslClientTran sport.handleSaslStartMessage(TSaslClientTransport. java:94) at sentry.org.apache.thrift.transport.TSaslTransport. open(TSaslTransport.java:253) at sentry.org.apache.thrift.transport.TSaslClientTran sport.open(TSaslClientTransport.java:1) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport.baseOp en(SentryPolicyServiceClient.java:115) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport.access $000(SentryPolicyServiceClient.java:77) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport$1.run( SentryPolicyServiceClient.java:101) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport$1.run( SentryPolicyServiceClient.java:99)

cloudera.com | 4 months ago
  1. 0

    Solved: Sentry Kerberos Issue - Cloudera Community

    cloudera.com | 4 months ago
    javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)] at com.sun.security.sasl.gsskerb.GssKrb5Client.evalua teChallenge(GssKrb5Client.java:212) at sentry.org.apache.thrift.transport.TSaslClientTran sport.handleSaslStartMessage(TSaslClientTransport. java:94) at sentry.org.apache.thrift.transport.TSaslTransport. open(TSaslTransport.java:253) at sentry.org.apache.thrift.transport.TSaslClientTran sport.open(TSaslClientTransport.java:1) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport.baseOp en(SentryPolicyServiceClient.java:115) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport.access $000(SentryPolicyServiceClient.java:77) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport$1.run( SentryPolicyServiceClient.java:101) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport$1.run( SentryPolicyServiceClient.java:99)
  2. 0

    Re: GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)

    crunch-user | 1 year ago | Tahir Hameed
    javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)] at com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:212) at org.apache.hadoop.hbase.security.HBaseSaslRpcClient.saslConnect(HBaseSaslRpcClient.java:177) at org.apache.hadoop.hbase.ipc.RpcClient$Connection.setupSaslConnection(RpcClient.java:815) at org.apache.hadoop.hbase.ipc.RpcClient$Connection.access$800(RpcClient.java:349) at org.apache.hadoop.hbase.ipc.RpcClient$Connection$2.run(RpcClient.java:943) at org.apache.hadoop.hbase.ipc.RpcClient$Connection$2.run(RpcClient.java:940)
  3. 0

    LDAP with SASL authentication

    Google Groups | 1 decade ago | Andreas Schmid
    javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Invalid option setting in ticket request. (101))]]
  4. Speed up your debug routine!

    Automated exception search integrated into your IDE

  5. 0

    Kerberos Exceptions on Secured HBase Cluster - 陆恒 - org.apache.incubator.crunch-dev - MarkMail

    markmail.org | 1 year ago
    javax.security.sasl.SaslException: GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)] at com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(GssKrb5Client.java:194) at org.apache.hadoop.hbase.security.HBaseSaslRpcClient.saslConnect(HBaseSaslRpcClient.java:138) at org.apache.hadoop.hbase.ipc.SecureClient$SecureConnection.setupSaslConnection(SecureClient.java:177) at org.apache.hadoop.hbase.ipc.SecureClient$SecureConnection.access$500(SecureClient.java:85) at org.apache.hadoop.hbase.ipc.SecureClient$SecureConnection$2.run(SecureClient.java:286) at org.apache.hadoop.hbase.ipc.SecureClient$SecureConnection$2.run(SecureClient.java:283)
  6. 0

    Apache NiFi Developer List - Using NiFI with a Secured HBASE setup

    nabble.com | 7 months ago
    javax.security.sasl.SaslException: GSS initiate failed >         at > com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChallenge(Unknown > Source) ~[na:1.8.0_71] >         at > org.apache.hadoop.hbase.security.HBaseSaslRpcClient.saslConnect(HBaseSaslRpcClient.java:179) > ~[hbase-client-1.1.2.jar:1.1.2] >         at > org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.setupSaslConnection(RpcClientImpl.java:642) > [hbase-client-1.1.2.jar:1.1.2] >         at > org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection.access$600(RpcClientImpl.java:166) > [hbase-client-1.1.2.jar:1.1.2] >         at > org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection$2.run(RpcClientImpl.java:769) > ~[hbase-client-1.1.2.jar:1.1.2] >         at > org.apache.hadoop.hbase.ipc.RpcClientImpl$Connection$2.run(RpcClientImpl.java:766) > ~[hbase-client-1.1.2.jar:1.1.2] >         at java.security.AccessController.doPrivileged(Native Method)

    Not finding the right solution?
    Take a tour to get the most out of Samebug.

    Tired of useless tips?

    Automated exception search integrated into your IDE

    Root Cause Analysis

    1. javax.security.sasl.SaslException

      GSS initiate failed [Caused by GSSException: No valid credentials provided (Mechanism level: Failed to find any Kerberos tgt)] at com.sun.security.sasl.gsskerb.GssKrb5Client.evalua teChallenge(GssKrb5Client.java:212) at sentry.org.apache.thrift.transport.TSaslClientTran sport.handleSaslStartMessage(TSaslClientTransport. java:94) at sentry.org.apache.thrift.transport.TSaslTransport. open(TSaslTransport.java:253) at sentry.org.apache.thrift.transport.TSaslClientTran sport.open(TSaslClientTransport.java:1) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport.baseOp en(SentryPolicyServiceClient.java:115) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport.access $000(SentryPolicyServiceClient.java:77) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport$1.run( SentryPolicyServiceClient.java:101) at org.apache.sentry.provider.db.service.thrift.Sentr yPolicyServiceClient$UgiSaslClientTransport$1.run( SentryPolicyServiceClient.java:99)

      at java.security.AccessController.doPrivileged()
    2. Java RT
      Subject.doAs
      1. java.security.AccessController.doPrivileged(Native Method)
      2. javax.security.auth.Subject.doAs(Subject.java:415)
      2 frames