Advertisement
Guest User

Untitled

a guest
Mar 29th, 2019
217
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 42.40 KB | None | 0 0
  1. stderr:
  2. None
  3. stdout:
  4. 2019-03-29 14:03:01,926 - Stack Feature Version Info: Cluster Stack=3.0, Command Stack=None, Command Version=3.0.0.0-0000 -> 3.0.0.0-0000
  5. 2019-03-29 14:03:01,959 - Using hadoop conf dir: /usr/yava/3.0.0.0-0000/hadoop/conf
  6. 2019-03-29 14:03:02,185 - Stack Feature Version Info: Cluster Stack=3.0, Command Stack=None, Command Version=3.0.0.0-0000 -> 3.0.0.0-0000
  7. 2019-03-29 14:03:02,194 - Using hadoop conf dir: /usr/yava/3.0.0.0-0000/hadoop/conf
  8. 2019-03-29 14:03:02,196 - Group['kms'] {}
  9. 2019-03-29 14:03:02,198 - Group['livy'] {}
  10. 2019-03-29 14:03:02,198 - Group['spark'] {}
  11. 2019-03-29 14:03:02,198 - Group['ranger'] {}
  12. 2019-03-29 14:03:02,198 - Group['hdfs'] {}
  13. 2019-03-29 14:03:02,199 - Group['zeppelin'] {}
  14. 2019-03-29 14:03:02,199 - Group['hadoop'] {}
  15. 2019-03-29 14:03:02,199 - Group['users'] {}
  16. 2019-03-29 14:03:02,200 - User['yarn-ats'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
  17. 2019-03-29 14:03:02,201 - User['hive'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
  18. 2019-03-29 14:03:02,202 - User['infra-solr'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
  19. 2019-03-29 14:03:02,203 - User['zookeeper'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
  20. 2019-03-29 14:03:02,204 - User['atlas'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
  21. 2019-03-29 14:03:02,205 - User['ams'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
  22. 2019-03-29 14:03:02,207 - User['ranger'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['ranger', 'hadoop'], 'uid': None}
  23. 2019-03-29 14:03:02,208 - User['tez'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop', 'users'], 'uid': None}
  24. 2019-03-29 14:03:02,209 - User['zeppelin'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['zeppelin', 'hadoop'], 'uid': None}
  25. 2019-03-29 14:03:02,210 - User['kms'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['kms', 'hadoop'], 'uid': None}
  26. 2019-03-29 14:03:02,211 - User['accumulo'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
  27. 2019-03-29 14:03:02,213 - User['livy'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['livy', 'hadoop'], 'uid': None}
  28. 2019-03-29 14:03:02,214 - User['spark'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['spark', 'hadoop'], 'uid': None}
  29. 2019-03-29 14:03:02,215 - User['ambari-qa'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop', 'users'], 'uid': None}
  30. 2019-03-29 14:03:02,216 - User['kafka'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
  31. 2019-03-29 14:03:02,217 - User['hdfs'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hdfs', 'hadoop'], 'uid': None}
  32. 2019-03-29 14:03:02,218 - User['sqoop'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
  33. 2019-03-29 14:03:02,219 - User['yarn'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
  34. 2019-03-29 14:03:02,221 - User['mapred'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
  35. 2019-03-29 14:03:02,222 - User['hbase'] {'gid': 'hadoop', 'fetch_nonlocal_groups': True, 'groups': ['hadoop'], 'uid': None}
  36. 2019-03-29 14:03:02,223 - File['/var/lib/ambari-agent/tmp/changeUid.sh'] {'content': StaticFile('changeToSecureUid.sh'), 'mode': 0555}
  37. 2019-03-29 14:03:02,224 - Execute['/var/lib/ambari-agent/tmp/changeUid.sh ambari-qa /tmp/hadoop-ambari-qa,/tmp/hsperfdata_ambari-qa,/home/ambari-qa,/tmp/ambari-qa,/tmp/sqoop-ambari-qa 0'] {'not_if': '(test $(id -u ambari-qa) -gt 1000) || (false)'}
  38. 2019-03-29 14:03:02,229 - Skipping Execute['/var/lib/ambari-agent/tmp/changeUid.sh ambari-qa /tmp/hadoop-ambari-qa,/tmp/hsperfdata_ambari-qa,/home/ambari-qa,/tmp/ambari-qa,/tmp/sqoop-ambari-qa 0'] due to not_if
  39. 2019-03-29 14:03:02,230 - Directory['/tmp/hbase-hbase'] {'owner': 'hbase', 'create_parents': True, 'mode': 0775, 'cd_access': 'a'}
  40. 2019-03-29 14:03:02,231 - File['/var/lib/ambari-agent/tmp/changeUid.sh'] {'content': StaticFile('changeToSecureUid.sh'), 'mode': 0555}
  41. 2019-03-29 14:03:02,232 - File['/var/lib/ambari-agent/tmp/changeUid.sh'] {'content': StaticFile('changeToSecureUid.sh'), 'mode': 0555}
  42. 2019-03-29 14:03:02,233 - call['/var/lib/ambari-agent/tmp/changeUid.sh hbase'] {}
  43. 2019-03-29 14:03:02,239 - call returned (0, '1007')
  44. 2019-03-29 14:03:02,240 - Execute['/var/lib/ambari-agent/tmp/changeUid.sh hbase /home/hbase,/tmp/hbase,/usr/bin/hbase,/var/log/hbase,/tmp/hbase-hbase 1007'] {'not_if': '(test $(id -u hbase) -gt 1000) || (false)'}
  45. 2019-03-29 14:03:02,244 - Skipping Execute['/var/lib/ambari-agent/tmp/changeUid.sh hbase /home/hbase,/tmp/hbase,/usr/bin/hbase,/var/log/hbase,/tmp/hbase-hbase 1007'] due to not_if
  46. 2019-03-29 14:03:02,244 - Group['hdfs'] {}
  47. 2019-03-29 14:03:02,245 - User['hdfs'] {'fetch_nonlocal_groups': True, 'groups': ['hdfs', 'hadoop', u'hdfs']}
  48. 2019-03-29 14:03:02,245 - FS Type: HDFS
  49. 2019-03-29 14:03:02,245 - Directory['/etc/hadoop'] {'mode': 0755}
  50. 2019-03-29 14:03:02,268 - File['/usr/yava/3.0.0.0-0000/hadoop/conf/hadoop-env.sh'] {'content': InlineTemplate(...), 'owner': 'root', 'group': 'hadoop'}
  51. 2019-03-29 14:03:02,268 - Directory['/var/lib/ambari-agent/tmp/hadoop_java_io_tmpdir'] {'owner': 'hdfs', 'group': 'hadoop', 'mode': 01777}
  52. 2019-03-29 14:03:02,287 - Execute[('setenforce', '0')] {'not_if': '(! which getenforce ) || (which getenforce && getenforce | grep -q Disabled)', 'sudo': True, 'only_if': 'test -f /selinux/enforce'}
  53. 2019-03-29 14:03:02,294 - Skipping Execute[('setenforce', '0')] due to not_if
  54. 2019-03-29 14:03:02,295 - Directory['/var/log/hadoop'] {'owner': 'root', 'create_parents': True, 'group': 'hadoop', 'mode': 0775, 'cd_access': 'a'}
  55. 2019-03-29 14:03:02,297 - Directory['/var/run/hadoop'] {'owner': 'root', 'create_parents': True, 'group': 'root', 'cd_access': 'a'}
  56. 2019-03-29 14:03:02,297 - Directory['/var/run/hadoop/hdfs'] {'owner': 'hdfs', 'cd_access': 'a'}
  57. 2019-03-29 14:03:02,298 - Directory['/tmp/hadoop-hdfs'] {'owner': 'hdfs', 'create_parents': True, 'cd_access': 'a'}
  58. 2019-03-29 14:03:02,302 - File['/usr/yava/3.0.0.0-0000/hadoop/conf/commons-logging.properties'] {'content': Template('commons-logging.properties.j2'), 'owner': 'root'}
  59. 2019-03-29 14:03:02,304 - File['/usr/yava/3.0.0.0-0000/hadoop/conf/health_check'] {'content': Template('health_check.j2'), 'owner': 'root'}
  60. 2019-03-29 14:03:02,312 - File['/usr/yava/3.0.0.0-0000/hadoop/conf/log4j.properties'] {'content': InlineTemplate(...), 'owner': 'hdfs', 'group': 'hadoop', 'mode': 0644}
  61. 2019-03-29 14:03:02,327 - File['/usr/yava/3.0.0.0-0000/hadoop/conf/hadoop-metrics2.properties'] {'content': InlineTemplate(...), 'owner': 'hdfs', 'group': 'hadoop'}
  62. 2019-03-29 14:03:02,328 - File['/usr/yava/3.0.0.0-0000/hadoop/conf/task-log4j.properties'] {'content': StaticFile('task-log4j.properties'), 'mode': 0755}
  63. 2019-03-29 14:03:02,334 - File['/etc/hadoop/conf/topology_mappings.data'] {'owner': 'hdfs', 'content': Template('topology_mappings.data.j2'), 'only_if': 'test -d /etc/hadoop/conf', 'group': 'hadoop', 'mode': 0644}
  64. 2019-03-29 14:03:02,339 - File['/etc/hadoop/conf/topology_script.py'] {'content': StaticFile('topology_script.py'), 'only_if': 'test -d /etc/hadoop/conf', 'mode': 0755}
  65. 2019-03-29 14:03:02,343 - Skipping unlimited key JCE policy check and setup since the Java VM is not managed by Ambari
  66. 2019-03-29 14:03:02,850 - Stack Feature Version Info: Cluster Stack=3.0, Command Stack=None, Command Version=3.0.0.0-0000 -> 3.0.0.0-0000
  67. 2019-03-29 14:03:02,859 - Using hadoop conf dir: /usr/yava/3.0.0.0-0000/hadoop/conf
  68. 2019-03-29 14:03:02,901 - Execute['source /usr/yava/current/atlas-server/conf/atlas-env.sh; /usr/yava/current/atlas-server/bin/atlas_stop.py'] {'user': 'atlas'}
  69. 2019-03-29 14:03:04,977 - File['/var/run/atlas/atlas.pid'] {'action': ['delete']}
  70. 2019-03-29 14:03:04,978 - Pid file /var/run/atlas/atlas.pid is empty or does not exist
  71. 2019-03-29 14:03:04,980 - Directory['/usr/yava/current/atlas-server/conf'] {'owner': 'atlas', 'group': 'hadoop', 'create_parents': True, 'mode': 0755, 'cd_access': 'a'}
  72. 2019-03-29 14:03:04,981 - Directory['/var/run/atlas'] {'owner': 'atlas', 'group': 'hadoop', 'create_parents': True, 'mode': 0755, 'cd_access': 'a'}
  73. 2019-03-29 14:03:04,982 - Directory['/usr/yava/current/atlas-server/conf/solr'] {'group': 'hadoop', 'cd_access': 'a', 'create_parents': True, 'mode': 0755, 'owner': 'atlas', 'recursive_ownership': True}
  74. 2019-03-29 14:03:04,983 - Directory['/var/log/atlas'] {'owner': 'atlas', 'group': 'hadoop', 'create_parents': True, 'mode': 0755, 'cd_access': 'a'}
  75. 2019-03-29 14:03:04,983 - Directory['/usr/yava/current/atlas-server/data'] {'owner': 'atlas', 'group': 'hadoop', 'create_parents': True, 'mode': 0644, 'cd_access': 'a'}
  76. 2019-03-29 14:03:04,983 - Changing permission for /usr/yava/current/atlas-server/data from 755 to 644
  77. 2019-03-29 14:03:04,984 - Directory['/usr/yava/current/atlas-server/server/webapp'] {'owner': 'atlas', 'group': 'hadoop', 'create_parents': True, 'mode': 0644, 'cd_access': 'a'}
  78. 2019-03-29 14:03:04,984 - Changing permission for /usr/yava/current/atlas-server/server/webapp from 755 to 644
  79. 2019-03-29 14:03:04,985 - File['/usr/yava/current/atlas-server/server/webapp/atlas.war'] {'content': StaticFile('/usr/yava/current/atlas-server/server/webapp/atlas.war')}
  80. 2019-03-29 14:03:05,663 - File['/usr/yava/current/atlas-server/conf/atlas-log4j.xml'] {'content': InlineTemplate(...), 'owner': 'atlas', 'group': 'hadoop', 'mode': 0644}
  81. 2019-03-29 14:03:05,671 - File['/usr/yava/current/atlas-server/conf/atlas-env.sh'] {'content': InlineTemplate(...), 'owner': 'atlas', 'group': 'hadoop', 'mode': 0755}
  82. 2019-03-29 14:03:05,672 - ModifyPropertiesFile['/usr/yava/current/atlas-server/conf/users-credentials.properties'] {'owner': 'atlas', 'properties': {u'admin': 'ROLE_ADMIN::696dbfe8958ce5993e03c0584a1d50f6a5542f1d24978c3b774a52cfadd3f4e7'}}
  83. 2019-03-29 14:03:05,674 - Modifying existing properties file: /usr/yava/current/atlas-server/conf/users-credentials.properties
  84. 2019-03-29 14:03:05,675 - File['/usr/yava/current/atlas-server/conf/users-credentials.properties'] {'owner': 'atlas', 'content': '#username=group::sha256-password\nadmin=ROLE_ADMIN::696dbfe8958ce5993e03c0584a1d50f6a5542f1d24978c3b774a52cfadd3f4e7\nrangertagsync=RANGER_TAG_SYNC::e3f67240f5117d1753c940dae9eea772d36ed5fe9bd9c94a300e40413f1afb9d\n', 'group': None, 'mode': None, 'encoding': 'utf-8'}
  85. 2019-03-29 14:03:05,676 - Execute[('chown', u'atlas:hadoop', u'/usr/yava/current/atlas-server/conf/atlas-simple-authz-policy.json')] {'sudo': True}
  86. 2019-03-29 14:03:05,715 - Execute[('chmod', '644', u'/usr/yava/current/atlas-server/conf/atlas-simple-authz-policy.json')] {'sudo': True}
  87. 2019-03-29 14:03:05,731 - Execute[('chown', u'atlas:hadoop', u'/usr/yava/current/atlas-server/conf/users-credentials.properties')] {'sudo': True}
  88. 2019-03-29 14:03:05,759 - Execute[('chmod', '644', u'/usr/yava/current/atlas-server/conf/users-credentials.properties')] {'sudo': True}
  89. 2019-03-29 14:03:05,809 - File['/usr/yava/current/atlas-server/conf/solr/solrconfig.xml'] {'content': InlineTemplate(...), 'owner': 'atlas', 'group': 'hadoop', 'mode': 0644}
  90. 2019-03-29 14:03:05,813 - Directory['/usr/lib/ambari-logsearch-logfeeder/conf'] {'create_parents': True, 'mode': 0755, 'cd_access': 'a'}
  91. 2019-03-29 14:03:05,814 - Generate Log Feeder config file: /usr/lib/ambari-logsearch-logfeeder/conf/input.config-atlas.json
  92. 2019-03-29 14:03:05,814 - File['/usr/lib/ambari-logsearch-logfeeder/conf/input.config-atlas.json'] {'content': Template('input.config-atlas.json.j2'), 'mode': 0644}
  93. 2019-03-29 14:03:05,815 - PropertiesFile['/usr/yava/current/atlas-server/conf/atlas-application.properties'] {'owner': 'atlas', 'group': 'hadoop', 'mode': 0600, 'properties': ...}
  94. 2019-03-29 14:03:05,819 - Generating properties file: /usr/yava/current/atlas-server/conf/atlas-application.properties
  95. 2019-03-29 14:03:05,819 - File['/usr/yava/current/atlas-server/conf/atlas-application.properties'] {'owner': 'atlas', 'content': InlineTemplate(...), 'group': 'hadoop', 'mode': 0600, 'encoding': 'UTF-8'}
  96. 2019-03-29 14:03:05,925 - Writing File['/usr/yava/current/atlas-server/conf/atlas-application.properties'] because contents don't match
  97. 2019-03-29 14:03:05,926 - TemplateConfig['/usr/yava/current/atlas-server/conf/atlas_jaas.conf'] {'owner': 'atlas'}
  98. 2019-03-29 14:03:05,927 - File['/usr/yava/current/atlas-server/conf/atlas_jaas.conf'] {'content': Template('atlas_jaas.conf.j2'), 'owner': 'atlas', 'group': None, 'mode': None}
  99. 2019-03-29 14:03:05,928 - Directory['/var/log/ambari-infra-solr-client'] {'create_parents': True, 'mode': 0755, 'cd_access': 'a'}
  100. 2019-03-29 14:03:05,928 - Directory['/usr/lib/ambari-infra-solr-client'] {'recursive_ownership': True, 'create_parents': True, 'mode': 0755, 'cd_access': 'a'}
  101. 2019-03-29 14:03:05,929 - File['/usr/lib/ambari-infra-solr-client/solrCloudCli.sh'] {'content': StaticFile('/usr/lib/ambari-infra-solr-client/solrCloudCli.sh'), 'mode': 0755}
  102. 2019-03-29 14:03:05,934 - File['/usr/lib/ambari-infra-solr-client/log4j.properties'] {'content': ..., 'mode': 0644}
  103. 2019-03-29 14:03:05,934 - File['/var/log/ambari-infra-solr-client/solr-client.log'] {'content': '', 'mode': 0664}
  104. 2019-03-29 14:03:05,934 - Writing File['/var/log/ambari-infra-solr-client/solr-client.log'] because contents don't match
  105. 2019-03-29 14:03:05,935 - Execute['ambari-sudo.sh JAVA_HOME=/usr/lib/jvm/java-1.8.0 /usr/lib/ambari-infra-solr-client/solrCloudCli.sh --zookeeper-connect-string yava-03.labs247.com:2181,yava-02.labs247.com:2181,yava-01.labs247.com:2181 --znode /infra-solr --check-znode --retry 5 --interval 10'] {}
  106. 2019-03-29 14:03:07,076 - Execute['ambari-sudo.sh JAVA_HOME=/usr/lib/jvm/java-1.8.0 /usr/lib/ambari-infra-solr-client/solrCloudCli.sh --zookeeper-connect-string yava-03.labs247.com:2181,yava-02.labs247.com:2181,yava-01.labs247.com:2181/infra-solr --jaas-file /usr/yava/current/atlas-server/conf/atlas_jaas.conf --download-config --config-dir /var/lib/ambari-agent/tmp/solr_config_atlas_configs_0.270109797647 --config-set atlas_configs --retry 30 --interval 5'] {'only_if': 'ambari-sudo.sh JAVA_HOME=/usr/lib/jvm/java-1.8.0 /usr/lib/ambari-infra-solr-client/solrCloudCli.sh --zookeeper-connect-string yava-03.labs247.com:2181,yava-02.labs247.com:2181,yava-01.labs247.com:2181/infra-solr --jaas-file /usr/yava/current/atlas-server/conf/atlas_jaas.conf --check-config --config-set atlas_configs --retry 30 --interval 5'}
  107. 2019-03-29 14:03:10,468 - File['/var/lib/ambari-agent/tmp/solr_config_atlas_configs_0.270109797647/solrconfig.xml'] {'content': InlineTemplate(...), 'only_if': 'test -d /var/lib/ambari-agent/tmp/solr_config_atlas_configs_0.270109797647'}
  108. 2019-03-29 14:03:10,472 - Execute['ambari-sudo.sh JAVA_HOME=/usr/lib/jvm/java-1.8.0 /usr/lib/ambari-infra-solr-client/solrCloudCli.sh --zookeeper-connect-string yava-03.labs247.com:2181,yava-02.labs247.com:2181,yava-01.labs247.com:2181/infra-solr --jaas-file /usr/yava/current/atlas-server/conf/atlas_jaas.conf --upload-config --config-dir /var/lib/ambari-agent/tmp/solr_config_atlas_configs_0.270109797647 --config-set atlas_configs --retry 30 --interval 5'] {'only_if': 'test -d /var/lib/ambari-agent/tmp/solr_config_atlas_configs_0.270109797647'}
  109. 2019-03-29 14:03:13,126 - Execute['ambari-sudo.sh JAVA_HOME=/usr/lib/jvm/java-1.8.0 /usr/lib/ambari-infra-solr-client/solrCloudCli.sh --zookeeper-connect-string yava-03.labs247.com:2181,yava-02.labs247.com:2181,yava-01.labs247.com:2181/infra-solr --jaas-file /usr/yava/current/atlas-server/conf/atlas_jaas.conf --upload-config --config-dir /usr/yava/current/atlas-server/conf/solr --config-set atlas_configs --retry 30 --interval 5'] {'not_if': 'test -d /var/lib/ambari-agent/tmp/solr_config_atlas_configs_0.270109797647'}
  110. 2019-03-29 14:03:13,139 - Skipping Execute['ambari-sudo.sh JAVA_HOME=/usr/lib/jvm/java-1.8.0 /usr/lib/ambari-infra-solr-client/solrCloudCli.sh --zookeeper-connect-string yava-03.labs247.com:2181,yava-02.labs247.com:2181,yava-01.labs247.com:2181/infra-solr --jaas-file /usr/yava/current/atlas-server/conf/atlas_jaas.conf --upload-config --config-dir /usr/yava/current/atlas-server/conf/solr --config-set atlas_configs --retry 30 --interval 5'] due to not_if
  111. 2019-03-29 14:03:13,140 - Directory['/var/lib/ambari-agent/tmp/solr_config_atlas_configs_0.270109797647'] {'action': ['delete'], 'create_parents': True}
  112. 2019-03-29 14:03:13,140 - Removing directory Directory['/var/lib/ambari-agent/tmp/solr_config_atlas_configs_0.270109797647'] and all its content
  113. 2019-03-29 14:03:13,140 - Adding [u'atlas_user', u'ranger_audit_user', u'dev'] roles to [u'atlas/yava-02.labs247.com@LABS247.COM'] if infra-solr is installed.
  114. 2019-03-29 14:03:13,141 - New service users after removing fully qualified names: [u'atlas@LABS247.COM']
  115. 2019-03-29 14:03:13,141 - Check authorization enabled command: /usr/bin/kinit -kt /etc/security/keytabs/ambari-infra-solr.service.keytab infra-solr/yava-02.labs247.com@LABS247.COM; curl -k -s --negotiate -u : http://yava-03.labs247.com:8886/solr/admin/authorization | grep authorization.enabled
  116. Set user-role settings command: /usr/bin/kinit -kt /etc/security/keytabs/ambari-infra-solr.service.keytab infra-solr/yava-02.labs247.com@LABS247.COM; curl -H 'Content-type:application/json' -d '{"set-user-role": {"atlas@LABS247.COM": ["atlas_user", "ranger_audit_user", "dev"]}}' -s -o /dev/null -w'%{http_code}' --negotiate -u: -k http://yava-03.labs247.com:8886/solr/admin/authorization | grep 200
  117. 2019-03-29 14:03:13,142 - Execute['/usr/bin/kinit -kt /etc/security/keytabs/ambari-infra-solr.service.keytab infra-solr/yava-02.labs247.com@LABS247.COM; curl -k -s --negotiate -u : http://yava-03.labs247.com:8886/solr/admin/authorization | grep authorization.enabled && /usr/bin/kinit -kt /etc/security/keytabs/ambari-infra-solr.service.keytab infra-solr/yava-02.labs247.com@LABS247.COM; curl -H 'Content-type:application/json' -d '{"set-user-role": {"atlas@LABS247.COM": ["atlas_user", "ranger_audit_user", "dev"]}}' -s -o /dev/null -w'%{http_code}' --negotiate -u: -k http://yava-03.labs247.com:8886/solr/admin/authorization | grep 200'] {'logoutput': True, 'tries': 30, 'user': 'infra-solr', 'try_sleep': 10}
  118. "authorization.enabled":true,
  119. 200
  120. 2019-03-29 14:03:13,581 - Execute['ambari-sudo.sh JAVA_HOME=/usr/lib/jvm/java-1.8.0 /usr/lib/ambari-infra-solr-client/solrCloudCli.sh --zookeeper-connect-string yava-03.labs247.com:2181,yava-02.labs247.com:2181,yava-01.labs247.com:2181/infra-solr --jaas-file /usr/yava/current/atlas-server/conf/atlas_jaas.conf --create-collection --collection vertex_index --config-set atlas_configs --shards 1 --replication 1 --max-shards 1 --retry 5 --interval 10'] {}
  121. 2019-03-29 14:03:16,476 - Execute['ambari-sudo.sh JAVA_HOME=/usr/lib/jvm/java-1.8.0 /usr/lib/ambari-infra-solr-client/solrCloudCli.sh --zookeeper-connect-string yava-03.labs247.com:2181,yava-02.labs247.com:2181,yava-01.labs247.com:2181/infra-solr --jaas-file /usr/yava/current/atlas-server/conf/atlas_jaas.conf --create-collection --collection edge_index --config-set atlas_configs --shards 1 --replication 1 --max-shards 1 --retry 5 --interval 10'] {}
  122. 2019-03-29 14:03:19,625 - Execute['ambari-sudo.sh JAVA_HOME=/usr/lib/jvm/java-1.8.0 /usr/lib/ambari-infra-solr-client/solrCloudCli.sh --zookeeper-connect-string yava-03.labs247.com:2181,yava-02.labs247.com:2181,yava-01.labs247.com:2181/infra-solr --jaas-file /usr/yava/current/atlas-server/conf/atlas_jaas.conf --create-collection --collection fulltext_index --config-set atlas_configs --shards 1 --replication 1 --max-shards 1 --retry 5 --interval 10'] {}
  123. 2019-03-29 14:03:22,951 - Execute['ambari-sudo.sh JAVA_HOME=/usr/lib/jvm/java-1.8.0 /usr/lib/ambari-infra-solr-client/solrCloudCli.sh --zookeeper-connect-string yava-03.labs247.com:2181,yava-02.labs247.com:2181,yava-01.labs247.com:2181 --znode /infra-solr/configs/atlas_configs --jaas-file /usr/yava/current/atlas-server/conf/atlas_jaas.conf --secure-znode --sasl-users atlas,infra-solr --retry 5 --interval 10'] {}
  124. 2019-03-29 14:03:24,116 - Execute['ambari-sudo.sh JAVA_HOME=/usr/lib/jvm/java-1.8.0 /usr/lib/ambari-infra-solr-client/solrCloudCli.sh --zookeeper-connect-string yava-03.labs247.com:2181,yava-02.labs247.com:2181,yava-01.labs247.com:2181 --znode /infra-solr/collections/vertex_index --jaas-file /usr/yava/current/atlas-server/conf/atlas_jaas.conf --secure-znode --sasl-users atlas,infra-solr --retry 5 --interval 10'] {}
  125. 2019-03-29 14:03:26,001 - Execute['ambari-sudo.sh JAVA_HOME=/usr/lib/jvm/java-1.8.0 /usr/lib/ambari-infra-solr-client/solrCloudCli.sh --zookeeper-connect-string yava-03.labs247.com:2181,yava-02.labs247.com:2181,yava-01.labs247.com:2181 --znode /infra-solr/collections/edge_index --jaas-file /usr/yava/current/atlas-server/conf/atlas_jaas.conf --secure-znode --sasl-users atlas,infra-solr --retry 5 --interval 10'] {}
  126. 2019-03-29 14:03:27,174 - Execute['ambari-sudo.sh JAVA_HOME=/usr/lib/jvm/java-1.8.0 /usr/lib/ambari-infra-solr-client/solrCloudCli.sh --zookeeper-connect-string yava-03.labs247.com:2181,yava-02.labs247.com:2181,yava-01.labs247.com:2181 --znode /infra-solr/collections/fulltext_index --jaas-file /usr/yava/current/atlas-server/conf/atlas_jaas.conf --secure-znode --sasl-users atlas,infra-solr --retry 5 --interval 10'] {}
  127. 2019-03-29 14:03:28,514 - File['/var/lib/ambari-agent/tmp/atlas_hbase_setup.rb'] {'content': Template('atlas_hbase_setup.rb.j2'), 'owner': 'hbase', 'group': 'hadoop'}
  128. 2019-03-29 14:03:28,515 - Stack Feature Version Info: Cluster Stack=3.0, Command Stack=None, Command Version=3.0.0.0-0000 -> 3.0.0.0-0000
  129. 2019-03-29 14:03:28,526 - File['/var/lib/ambari-agent/tmp/atlas_kafka_acl.sh'] {'content': Template('atlas_kafka_acl.sh.j2'), 'owner': 'kafka', 'group': 'hadoop'}
  130. 2019-03-29 14:03:28,530 - File['/usr/yava/current/kafka-broker/config/kafka-env.sh'] {'content': InlineTemplate(...), 'owner': 'kafka'}
  131. 2019-03-29 14:03:28,534 - File['/usr/yava/current/kafka-broker/config/kafka_jaas.conf'] {'content': Template('kafka_jaas.conf.j2'), 'owner': 'kafka', 'group': 'hadoop'}
  132. 2019-03-29 14:03:28,534 - XmlConfig['hdfs-site.xml'] {'group': 'hadoop', 'conf_dir': '/usr/yava/current/atlas-server/conf', 'mode': 0644, 'configuration_attributes': {u'final': {u'dfs.datanode.failed.volumes.tolerated': u'true', u'dfs.datanode.data.dir': u'true', u'dfs.namenode.name.dir': u'true', u'dfs.webhdfs.enabled': u'true'}}, 'owner': 'atlas', 'configurations': ...}
  133. 2019-03-29 14:03:28,546 - Generating config: /usr/yava/current/atlas-server/conf/hdfs-site.xml
  134. 2019-03-29 14:03:28,546 - File['/usr/yava/current/atlas-server/conf/hdfs-site.xml'] {'owner': 'atlas', 'content': InlineTemplate(...), 'group': 'hadoop', 'mode': 0644, 'encoding': 'UTF-8'}
  135. 2019-03-29 14:03:28,610 - XmlConfig['core-site.xml'] {'group': 'hadoop', 'conf_dir': '/usr/yava/current/atlas-server/conf', 'xml_include_file': None, 'mode': 0644, 'configuration_attributes': {u'final': {u'fs.defaultFS': u'true'}}, 'owner': 'atlas', 'configurations': ...}
  136. 2019-03-29 14:03:28,621 - Generating config: /usr/yava/current/atlas-server/conf/core-site.xml
  137. 2019-03-29 14:03:28,621 - File['/usr/yava/current/atlas-server/conf/core-site.xml'] {'owner': 'atlas', 'content': InlineTemplate(...), 'group': 'hadoop', 'mode': 0644, 'encoding': 'UTF-8'}
  138. 2019-03-29 14:03:28,662 - Directory['/usr/yava/current/atlas-server/'] {'owner': 'atlas', 'group': 'hadoop', 'recursive_ownership': True}
  139. 2019-03-29 14:03:28,684 - Atlas plugin is enabled, configuring Atlas plugin.
  140. 2019-03-29 14:03:28,684 - Ranger Atlas plugin is not enabled
  141. 2019-03-29 14:03:28,684 - Stack Feature Version Info: Cluster Stack=3.0, Command Stack=None, Command Version=3.0.0.0-0000 -> 3.0.0.0-0000
  142. 2019-03-29 14:03:28,689 - Execute['kinit -kt /etc/security/keytabs/hbase.headless.keytab hbase-yava@LABS247.COM; cat /var/lib/ambari-agent/tmp/atlas_hbase_setup.rb | hbase shell -n'] {'tries': 5, 'user': 'hbase', 'try_sleep': 10}
  143. 2019-03-29 14:03:54,852 - Execute['kinit -kt /etc/security/keytabs/kafka.service.keytab kafka/yava-02.labs247.com@LABS247.COM; bash /var/lib/ambari-agent/tmp/atlas_kafka_acl.sh'] {'tries': 5, 'user': 'kafka', 'try_sleep': 10}
  144. 2019-03-29 14:04:12,517 - Retrying after 10 seconds. Reason: Execution of 'kinit -kt /etc/security/keytabs/kafka.service.keytab kafka/yava-02.labs247.com@LABS247.COM; bash /var/lib/ambari-agent/tmp/atlas_kafka_acl.sh' returned 1. Topic ATLAS_HOOK already exists
  145. Topic ATLAS_ENTITIES already exists
  146. Error while executing ACL command: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  147. org.apache.zookeeper.KeeperException$NoAuthException: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  148. at org.apache.zookeeper.KeeperException.create(KeeperException.java:116)
  149. at org.apache.zookeeper.KeeperException.create(KeeperException.java:54)
  150. at kafka.zookeeper.AsyncResponse.maybeThrow(ZooKeeperClient.scala:494)
  151. at kafka.zk.KafkaZkClient.createRecursive(KafkaZkClient.scala:1416)
  152. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  153. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  154. at scala.collection.immutable.List.foreach(List.scala:392)
  155. at kafka.zk.KafkaZkClient.createAclPaths(KafkaZkClient.scala:933)
  156. at kafka.security.auth.SimpleAclAuthorizer.configure(SimpleAclAuthorizer.scala:96)
  157. at kafka.admin.AclCommand$.withAuthorizer(AclCommand.scala:78)
  158. at kafka.admin.AclCommand$.addAcl(AclCommand.scala:85)
  159. at kafka.admin.AclCommand$.main(AclCommand.scala:52)
  160. at kafka.admin.AclCommand.main(AclCommand.scala)
  161.  
  162. Error while executing ACL command: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  163. org.apache.zookeeper.KeeperException$NoAuthException: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  164. at org.apache.zookeeper.KeeperException.create(KeeperException.java:116)
  165. at org.apache.zookeeper.KeeperException.create(KeeperException.java:54)
  166. at kafka.zookeeper.AsyncResponse.maybeThrow(ZooKeeperClient.scala:494)
  167. at kafka.zk.KafkaZkClient.createRecursive(KafkaZkClient.scala:1416)
  168. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  169. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  170. at scala.collection.immutable.List.foreach(List.scala:392)
  171. at kafka.zk.KafkaZkClient.createAclPaths(KafkaZkClient.scala:933)
  172. at kafka.security.auth.SimpleAclAuthorizer.configure(SimpleAclAuthorizer.scala:96)
  173. at kafka.admin.AclCommand$.withAuthorizer(AclCommand.scala:78)
  174. at kafka.admin.AclCommand$.addAcl(AclCommand.scala:85)
  175. at kafka.admin.AclCommand$.main(AclCommand.scala:52)
  176. at kafka.admin.AclCommand.main(AclCommand.scala)
  177.  
  178. Error while executing ACL command: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  179. org.apache.zookeeper.KeeperException$NoAuthException: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  180. at org.apache.zookeeper.KeeperException.create(KeeperException.java:116)
  181. at org.apache.zookeeper.KeeperException.create(KeeperException.java:54)
  182. at kafka.zookeeper.AsyncResponse.maybeThrow(ZooKeeperClient.scala:494)
  183. at kafka.zk.KafkaZkClient.createRecursive(KafkaZkClient.scala:1416)
  184. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  185. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  186. at scala.collection.immutable.List.foreach(List.scala:392)
  187. at kafka.zk.KafkaZkClient.createAclPaths(KafkaZkClient.scala:933)
  188. at kafka.security.auth.SimpleAclAuthorizer.configure(SimpleAclAuthorizer.scala:96)
  189. at kafka.admin.AclCommand$.withAuthorizer(AclCommand.scala:78)
  190. at kafka.admin.AclCommand$.addAcl(AclCommand.scala:85)
  191. at kafka.admin.AclCommand$.main(AclCommand.scala:52)
  192. at kafka.admin.AclCommand.main(AclCommand.scala)
  193.  
  194. Error while executing ACL command: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  195. org.apache.zookeeper.KeeperException$NoAuthException: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  196. at org.apache.zookeeper.KeeperException.create(KeeperException.java:116)
  197. at org.apache.zookeeper.KeeperException.create(KeeperException.java:54)
  198. at kafka.zookeeper.AsyncResponse.maybeThrow(ZooKeeperClient.scala:494)
  199. at kafka.zk.KafkaZkClient.createRecursive(KafkaZkClient.scala:1416)
  200. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  201. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  202. at scala.collection.immutable.List.foreach(List.scala:392)
  203. at kafka.zk.KafkaZkClient.createAclPaths(KafkaZkClient.scala:933)
  204. at kafka.security.auth.SimpleAclAuthorizer.configure(SimpleAclAuthorizer.scala:96)
  205. at kafka.admin.AclCommand$.withAuthorizer(AclCommand.scala:78)
  206. at kafka.admin.AclCommand$.addAcl(AclCommand.scala:85)
  207. at kafka.admin.AclCommand$.main(AclCommand.scala:52)
  208. at kafka.admin.AclCommand.main(AclCommand.scala)
  209. 2019-03-29 14:04:41,456 - Retrying after 10 seconds. Reason: Execution of 'kinit -kt /etc/security/keytabs/kafka.service.keytab kafka/yava-02.labs247.com@LABS247.COM; bash /var/lib/ambari-agent/tmp/atlas_kafka_acl.sh' returned 1. Topic ATLAS_HOOK already exists
  210. Topic ATLAS_ENTITIES already exists
  211. Error while executing ACL command: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  212. org.apache.zookeeper.KeeperException$NoAuthException: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  213. at org.apache.zookeeper.KeeperException.create(KeeperException.java:116)
  214. at org.apache.zookeeper.KeeperException.create(KeeperException.java:54)
  215. at kafka.zookeeper.AsyncResponse.maybeThrow(ZooKeeperClient.scala:494)
  216. at kafka.zk.KafkaZkClient.createRecursive(KafkaZkClient.scala:1416)
  217. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  218. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  219. at scala.collection.immutable.List.foreach(List.scala:392)
  220. at kafka.zk.KafkaZkClient.createAclPaths(KafkaZkClient.scala:933)
  221. at kafka.security.auth.SimpleAclAuthorizer.configure(SimpleAclAuthorizer.scala:96)
  222. at kafka.admin.AclCommand$.withAuthorizer(AclCommand.scala:78)
  223. at kafka.admin.AclCommand$.addAcl(AclCommand.scala:85)
  224. at kafka.admin.AclCommand$.main(AclCommand.scala:52)
  225. at kafka.admin.AclCommand.main(AclCommand.scala)
  226.  
  227. Error while executing ACL command: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  228. org.apache.zookeeper.KeeperException$NoAuthException: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  229. at org.apache.zookeeper.KeeperException.create(KeeperException.java:116)
  230. at org.apache.zookeeper.KeeperException.create(KeeperException.java:54)
  231. at kafka.zookeeper.AsyncResponse.maybeThrow(ZooKeeperClient.scala:494)
  232. at kafka.zk.KafkaZkClient.createRecursive(KafkaZkClient.scala:1416)
  233. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  234. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  235. at scala.collection.immutable.List.foreach(List.scala:392)
  236. at kafka.zk.KafkaZkClient.createAclPaths(KafkaZkClient.scala:933)
  237. at kafka.security.auth.SimpleAclAuthorizer.configure(SimpleAclAuthorizer.scala:96)
  238. at kafka.admin.AclCommand$.withAuthorizer(AclCommand.scala:78)
  239. at kafka.admin.AclCommand$.addAcl(AclCommand.scala:85)
  240. at kafka.admin.AclCommand$.main(AclCommand.scala:52)
  241. at kafka.admin.AclCommand.main(AclCommand.scala)
  242.  
  243. Error while executing ACL command: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  244. org.apache.zookeeper.KeeperException$NoAuthException: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  245. at org.apache.zookeeper.KeeperException.create(KeeperException.java:116)
  246. at org.apache.zookeeper.KeeperException.create(KeeperException.java:54)
  247. at kafka.zookeeper.AsyncResponse.maybeThrow(ZooKeeperClient.scala:494)
  248. at kafka.zk.KafkaZkClient.createRecursive(KafkaZkClient.scala:1416)
  249. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  250. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  251. at scala.collection.immutable.List.foreach(List.scala:392)
  252. at kafka.zk.KafkaZkClient.createAclPaths(KafkaZkClient.scala:933)
  253. at kafka.security.auth.SimpleAclAuthorizer.configure(SimpleAclAuthorizer.scala:96)
  254. at kafka.admin.AclCommand$.withAuthorizer(AclCommand.scala:78)
  255. at kafka.admin.AclCommand$.addAcl(AclCommand.scala:85)
  256. at kafka.admin.AclCommand$.main(AclCommand.scala:52)
  257. at kafka.admin.AclCommand.main(AclCommand.scala)
  258.  
  259. Error while executing ACL command: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  260. org.apache.zookeeper.KeeperException$NoAuthException: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  261. at org.apache.zookeeper.KeeperException.create(KeeperException.java:116)
  262. at org.apache.zookeeper.KeeperException.create(KeeperException.java:54)
  263. at kafka.zookeeper.AsyncResponse.maybeThrow(ZooKeeperClient.scala:494)
  264. at kafka.zk.KafkaZkClient.createRecursive(KafkaZkClient.scala:1416)
  265. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  266. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  267. at scala.collection.immutable.List.foreach(List.scala:392)
  268. at kafka.zk.KafkaZkClient.createAclPaths(KafkaZkClient.scala:933)
  269. at kafka.security.auth.SimpleAclAuthorizer.configure(SimpleAclAuthorizer.scala:96)
  270. at kafka.admin.AclCommand$.withAuthorizer(AclCommand.scala:78)
  271. at kafka.admin.AclCommand$.addAcl(AclCommand.scala:85)
  272. at kafka.admin.AclCommand$.main(AclCommand.scala:52)
  273. at kafka.admin.AclCommand.main(AclCommand.scala)
  274. 2019-03-29 14:05:06,906 - Retrying after 10 seconds. Reason: Execution of 'kinit -kt /etc/security/keytabs/kafka.service.keytab kafka/yava-02.labs247.com@LABS247.COM; bash /var/lib/ambari-agent/tmp/atlas_kafka_acl.sh' returned 1. Topic ATLAS_HOOK already exists
  275. Topic ATLAS_ENTITIES already exists
  276. Error while executing ACL command: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  277. org.apache.zookeeper.KeeperException$NoAuthException: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  278. at org.apache.zookeeper.KeeperException.create(KeeperException.java:116)
  279. at org.apache.zookeeper.KeeperException.create(KeeperException.java:54)
  280. at kafka.zookeeper.AsyncResponse.maybeThrow(ZooKeeperClient.scala:494)
  281. at kafka.zk.KafkaZkClient.createRecursive(KafkaZkClient.scala:1416)
  282. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  283. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  284. at scala.collection.immutable.List.foreach(List.scala:392)
  285. at kafka.zk.KafkaZkClient.createAclPaths(KafkaZkClient.scala:933)
  286. at kafka.security.auth.SimpleAclAuthorizer.configure(SimpleAclAuthorizer.scala:96)
  287. at kafka.admin.AclCommand$.withAuthorizer(AclCommand.scala:78)
  288. at kafka.admin.AclCommand$.addAcl(AclCommand.scala:85)
  289. at kafka.admin.AclCommand$.main(AclCommand.scala:52)
  290. at kafka.admin.AclCommand.main(AclCommand.scala)
  291.  
  292. Error while executing ACL command: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  293. org.apache.zookeeper.KeeperException$NoAuthException: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  294. at org.apache.zookeeper.KeeperException.create(KeeperException.java:116)
  295. at org.apache.zookeeper.KeeperException.create(KeeperException.java:54)
  296. at kafka.zookeeper.AsyncResponse.maybeThrow(ZooKeeperClient.scala:494)
  297. at kafka.zk.KafkaZkClient.createRecursive(KafkaZkClient.scala:1416)
  298. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  299. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  300. at scala.collection.immutable.List.foreach(List.scala:392)
  301. at kafka.zk.KafkaZkClient.createAclPaths(KafkaZkClient.scala:933)
  302. at kafka.security.auth.SimpleAclAuthorizer.configure(SimpleAclAuthorizer.scala:96)
  303. at kafka.admin.AclCommand$.withAuthorizer(AclCommand.scala:78)
  304. at kafka.admin.AclCommand$.addAcl(AclCommand.scala:85)
  305. at kafka.admin.AclCommand$.main(AclCommand.scala:52)
  306. at kafka.admin.AclCommand.main(AclCommand.scala)
  307.  
  308. Error while executing ACL command: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  309. org.apache.zookeeper.KeeperException$NoAuthException: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  310. at org.apache.zookeeper.KeeperException.create(KeeperException.java:116)
  311. at org.apache.zookeeper.KeeperException.create(KeeperException.java:54)
  312. at kafka.zookeeper.AsyncResponse.maybeThrow(ZooKeeperClient.scala:494)
  313. at kafka.zk.KafkaZkClient.createRecursive(KafkaZkClient.scala:1416)
  314. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  315. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  316. at scala.collection.immutable.List.foreach(List.scala:392)
  317. at kafka.zk.KafkaZkClient.createAclPaths(KafkaZkClient.scala:933)
  318. at kafka.security.auth.SimpleAclAuthorizer.configure(SimpleAclAuthorizer.scala:96)
  319. at kafka.admin.AclCommand$.withAuthorizer(AclCommand.scala:78)
  320. at kafka.admin.AclCommand$.addAcl(AclCommand.scala:85)
  321. at kafka.admin.AclCommand$.main(AclCommand.scala:52)
  322. at kafka.admin.AclCommand.main(AclCommand.scala)
  323.  
  324. Error while executing ACL command: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  325. org.apache.zookeeper.KeeperException$NoAuthException: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  326. at org.apache.zookeeper.KeeperException.create(KeeperException.java:116)
  327. at org.apache.zookeeper.KeeperException.create(KeeperException.java:54)
  328. at kafka.zookeeper.AsyncResponse.maybeThrow(ZooKeeperClient.scala:494)
  329. at kafka.zk.KafkaZkClient.createRecursive(KafkaZkClient.scala:1416)
  330. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  331. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  332. at scala.collection.immutable.List.foreach(List.scala:392)
  333. at kafka.zk.KafkaZkClient.createAclPaths(KafkaZkClient.scala:933)
  334. at kafka.security.auth.SimpleAclAuthorizer.configure(SimpleAclAuthorizer.scala:96)
  335. at kafka.admin.AclCommand$.withAuthorizer(AclCommand.scala:78)
  336. at kafka.admin.AclCommand$.addAcl(AclCommand.scala:85)
  337. at kafka.admin.AclCommand$.main(AclCommand.scala:52)
  338. at kafka.admin.AclCommand.main(AclCommand.scala)
  339. 2019-03-29 14:05:29,963 - Retrying after 10 seconds. Reason: Execution of 'kinit -kt /etc/security/keytabs/kafka.service.keytab kafka/yava-02.labs247.com@LABS247.COM; bash /var/lib/ambari-agent/tmp/atlas_kafka_acl.sh' returned 1. Topic ATLAS_HOOK already exists
  340. Topic ATLAS_ENTITIES already exists
  341. Error while executing ACL command: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  342. org.apache.zookeeper.KeeperException$NoAuthException: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  343. at org.apache.zookeeper.KeeperException.create(KeeperException.java:116)
  344. at org.apache.zookeeper.KeeperException.create(KeeperException.java:54)
  345. at kafka.zookeeper.AsyncResponse.maybeThrow(ZooKeeperClient.scala:494)
  346. at kafka.zk.KafkaZkClient.createRecursive(KafkaZkClient.scala:1416)
  347. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  348. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  349. at scala.collection.immutable.List.foreach(List.scala:392)
  350. at kafka.zk.KafkaZkClient.createAclPaths(KafkaZkClient.scala:933)
  351. at kafka.security.auth.SimpleAclAuthorizer.configure(SimpleAclAuthorizer.scala:96)
  352. at kafka.admin.AclCommand$.withAuthorizer(AclCommand.scala:78)
  353. at kafka.admin.AclCommand$.addAcl(AclCommand.scala:85)
  354. at kafka.admin.AclCommand$.main(AclCommand.scala:52)
  355. at kafka.admin.AclCommand.main(AclCommand.scala)
  356.  
  357. Error while executing ACL command: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  358. org.apache.zookeeper.KeeperException$NoAuthException: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  359. at org.apache.zookeeper.KeeperException.create(KeeperException.java:116)
  360. at org.apache.zookeeper.KeeperException.create(KeeperException.java:54)
  361. at kafka.zookeeper.AsyncResponse.maybeThrow(ZooKeeperClient.scala:494)
  362. at kafka.zk.KafkaZkClient.createRecursive(KafkaZkClient.scala:1416)
  363. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  364. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  365. at scala.collection.immutable.List.foreach(List.scala:392)
  366. at kafka.zk.KafkaZkClient.createAclPaths(KafkaZkClient.scala:933)
  367. at kafka.security.auth.SimpleAclAuthorizer.configure(SimpleAclAuthorizer.scala:96)
  368. at kafka.admin.AclCommand$.withAuthorizer(AclCommand.scala:78)
  369. at kafka.admin.AclCommand$.addAcl(AclCommand.scala:85)
  370. at kafka.admin.AclCommand$.main(AclCommand.scala:52)
  371. at kafka.admin.AclCommand.main(AclCommand.scala)
  372.  
  373. Error while executing ACL command: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  374. org.apache.zookeeper.KeeperException$NoAuthException: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  375. at org.apache.zookeeper.KeeperException.create(KeeperException.java:116)
  376. at org.apache.zookeeper.KeeperException.create(KeeperException.java:54)
  377. at kafka.zookeeper.AsyncResponse.maybeThrow(ZooKeeperClient.scala:494)
  378. at kafka.zk.KafkaZkClient.createRecursive(KafkaZkClient.scala:1416)
  379. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  380. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  381. at scala.collection.immutable.List.foreach(List.scala:392)
  382. at kafka.zk.KafkaZkClient.createAclPaths(KafkaZkClient.scala:933)
  383. at kafka.security.auth.SimpleAclAuthorizer.configure(SimpleAclAuthorizer.scala:96)
  384. at kafka.admin.AclCommand$.withAuthorizer(AclCommand.scala:78)
  385. at kafka.admin.AclCommand$.addAcl(AclCommand.scala:85)
  386. at kafka.admin.AclCommand$.main(AclCommand.scala:52)
  387. at kafka.admin.AclCommand.main(AclCommand.scala)
  388.  
  389. Error while executing ACL command: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  390. org.apache.zookeeper.KeeperException$NoAuthException: KeeperErrorCode = NoAuth for /kafka-acl/Topic
  391. at org.apache.zookeeper.KeeperException.create(KeeperException.java:116)
  392. at org.apache.zookeeper.KeeperException.create(KeeperException.java:54)
  393. at kafka.zookeeper.AsyncResponse.maybeThrow(ZooKeeperClient.scala:494)
  394. at kafka.zk.KafkaZkClient.createRecursive(KafkaZkClient.scala:1416)
  395. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  396. at kafka.zk.KafkaZkClient$$anonfun$createAclPaths$1.apply(KafkaZkClient.scala:933)
  397. at scala.collection.immutable.List.foreach(List.scala:392)
  398. at kafka.zk.KafkaZkClient.createAclPaths(KafkaZkClient.scala:933)
  399. at kafka.security.auth.SimpleAclAuthorizer.configure(SimpleAclAuthorizer.scala:96)
  400. at kafka.admin.AclCommand$.withAuthorizer(AclCommand.scala:78)
  401. at kafka.admin.AclCommand$.addAcl(AclCommand.scala:85)
  402. at kafka.admin.AclCommand$.main(AclCommand.scala:52)
  403. at kafka.admin.AclCommand.main(AclCommand.scala)
  404. 2019-03-29 14:06:03,394 - Execute['source /usr/yava/current/atlas-server/conf/atlas-env.sh ; /usr/yava/current/atlas-server/bin/atlas_start.py'] {'not_if': 'ls /var/run/atlas/atlas.pid >/dev/null 2>&1 && ps -p `cat /var/run/atlas/atlas.pid` >/dev/null 2>&1', 'user': 'atlas'}
  405. 2019-03-29 14:06:37,660 - Component has started with pid(s): 12591
  406.  
  407. Command completed successfully!
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement