java.io.IOException: Login failure for hdfs://namenode:8020 from keytab xxxxx@zz.yy.COM: javax.security.auth.login.LoginException: java.lang.IllegalArgumentException: Empty nameString not allowed

tip
Your exception is missing from the Samebug knowledge base.
Here are the best solutions we found on the Internet.
Click on the to mark the helpful solution and get rewards for you help.
  1. 0

    Access to HDFS Oozie java action with Kerberos

    Stack Overflow | 4 months ago | Padmanabhan Vijendran
    java.io.IOException: Login failure for hdfs://namenode:8020 from keytab xxxxx@zz.yy.COM: javax.security.auth.login.LoginException: java.lang.IllegalArgumentException: Empty nameString not allowed
  2. 0

    Secure Zookeeper for CDH4.1.1 - Grokbase

    grokbase.com | 8 months ago
    java.io.IOException: Could not configure server because SASL configuration did not allow the ZooKeeper server to authenticate itself properly: javax.security.auth.login.LoginException: java.lang.IllegalArgumentException: EncryptionKey: Key bytes cannot be null!
  3. 0

    The Secure HDFS Error "No valid credentials provided" Displays when Running HDFS, DFS or Hadoop FS – All Help & Support

    pivotal.io | 1 year ago
    java.io.IOException: extra data given to DerValue constructor
  4. Speed up your debug routine!

    Automated exception search integrated into your IDE

  5. 0

    The Secure HDFS Error "No valid credentials provided" Displays when Running HDFS, DFS or Hadoop FS – All Help & Support

    zendesk.com | 9 months ago
    java.io.IOException: extra data given to DerValue constructor
  6. 0

    Configuring Kerberos User Authentication

    mapr.com | 3 months ago
    java.io.IOException: extra data given to DerValue constructor

    Root Cause Analysis

    1. java.io.IOException

      Login failure for hdfs://namenode:8020 from keytab xxxxx@zz.yy.COM: javax.security.auth.login.LoginException: java.lang.IllegalArgumentException: Empty nameString not allowed

      at sun.security.krb5.PrincipalName.validateNameStrings()
    2. Java RT
      LoginContext.login
      1. sun.security.krb5.PrincipalName.validateNameStrings(PrincipalName.java:171)
      2. sun.security.krb5.PrincipalName.<init>(PrincipalName.java:393)
      3. sun.security.krb5.PrincipalName.<init>(PrincipalName.java:460)
      4. com.sun.security.auth.module.Krb5LoginModule.attemptAuthentication(Krb5LoginModule.java:650)
      5. com.sun.security.auth.module.Krb5LoginModule.login(Krb5LoginModule.java:617)
      6. sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
      7. sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
      8. sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
      9. java.lang.reflect.Method.invoke(Method.java:497)
      10. javax.security.auth.login.LoginContext.invoke(LoginContext.java:755)
      11. javax.security.auth.login.LoginContext.access$000(LoginContext.java:195)
      12. javax.security.auth.login.LoginContext$4.run(LoginContext.java:682)
      13. javax.security.auth.login.LoginContext$4.run(LoginContext.java:680)
      14. java.security.AccessController.doPrivileged(Native Method)
      15. javax.security.auth.login.LoginContext.invokePriv(LoginContext.java:680)
      16. javax.security.auth.login.LoginContext.login(LoginContext.java:587)
      16 frames
    3. Hadoop
      UserGroupInformation.loginUserFromKeytab
      1. org.apache.hadoop.security.UserGroupInformation.loginUserFromKeytab(UserGroupInformation.java:967)
      1 frame
    4. Unknown
      RunLdap_Utility.main
      1. RunLdap_Utility.ldapLookupLoop(RunLdap_Utility.java:142)
      2. RunLdap_Utility.main(RunLdap_Utility.java:72)
      2 frames
    5. Java RT
      Method.invoke
      1. sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
      2. sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
      3. sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
      4. java.lang.reflect.Method.invoke(Method.java:497)
      4 frames
    6. org.apache.oozie
      JavaMain.main
      1. org.apache.oozie.action.hadoop.JavaMain.run(JavaMain.java:56)
      2. org.apache.oozie.action.hadoop.LauncherMain.run(LauncherMain.java:47)
      3. org.apache.oozie.action.hadoop.JavaMain.main(JavaMain.java:35)
      3 frames
    7. Java RT
      Method.invoke
      1. sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
      2. sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
      3. sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
      4. java.lang.reflect.Method.invoke(Method.java:497)
      4 frames
    8. org.apache.oozie
      LauncherMapper.map
      1. org.apache.oozie.action.hadoop.LauncherMapper.map(LauncherMapper.java:241)
      1 frame
    9. Hadoop
      YarnChild$2.run
      1. org.apache.hadoop.mapred.MapRunner.run(MapRunner.java:54)
      2. org.apache.hadoop.mapred.MapTask.runOldMapper(MapTask.java:453)
      3. org.apache.hadoop.mapred.MapTask.run(MapTask.java:343)
      4. org.apache.hadoop.mapred.YarnChild$2.run(YarnChild.java:168)
      4 frames
    10. Java RT
      Subject.doAs
      1. java.security.AccessController.doPrivileged(Native Method)
      2. javax.security.auth.Subject.doAs(Subject.java:422)
      2 frames
    11. Hadoop
      UserGroupInformation.doAs
      1. org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1709)
      1 frame
    12. Hadoop
      YarnChild.main
      1. org.apache.hadoop.mapred.YarnChild.main(YarnChild.java:162)
      1 frame