[
https://issues.apache.org/jira/browse/RANGER-2505?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16885288#comment-16885288
]
David Berger commented on RANGER-2505:
--------------------------------------
*Presto plugin debug log below:*
2019-07-15T14:30:42.008Z DEBUG dispatcher-query-11
org.apache.ranger.authorization.presto.authorizer.RangerSystemAccessControl ==>
RangerSystemAccessControl.checkCanSetUser(david.berger)
2019-07-15T14:30:42.019Z DEBUG dispatcher-query-12
io.prestosql.execution.QueryStateMachine Query 20190715_143041_00003_szi8m is
QUEUED
2019-07-15T14:30:42.021Z DEBUG dispatcher-query-12
io.prestosql.execution.QueryStateMachine Query 20190715_143041_00003_szi8m is
WAITING_FOR_RESOURCES
2019-07-15T14:30:42.044Z DEBUG Query-20190715_143041_00003_szi8m-456
io.prestosql.plugin.hive.metastore.thrift.ThriftHiveMetastoreClient Invocation
of get_table(dbname='default', tbl_name='dcm_activity') succeeded in 20.47ms
2019-07-15T14:30:42.096Z WARN Query-20190715_143041_00003_szi8m-456
org.apache.hadoop.security.ShellBasedUnixGroupsMapping unable to return groups
for user david.berger
PartialGroupNameException The user name 'david.berger' is not found. id:
‘david.berger’: no such user
id: ‘david.berger’: no such user
at
org.apache.hadoop.security.ShellBasedUnixGroupsMapping.resolvePartialGroupNames(ShellBasedUnixGroupsMapping.java:294)
at
org.apache.hadoop.security.ShellBasedUnixGroupsMapping.getUnixGroups(ShellBasedUnixGroupsMapping.java:207)
at
org.apache.hadoop.security.ShellBasedUnixGroupsMapping.getGroups(ShellBasedUnixGroupsMapping.java:97)
at
org.apache.hadoop.security.JniBasedUnixGroupsMappingWithFallback.getGroups(JniBasedUnixGroupsMappingWithFallback.java:51)
at
org.apache.hadoop.security.Groups$GroupCacheLoader.fetchGroupList(Groups.java:387)
at org.apache.hadoop.security.Groups$GroupCacheLoader.load(Groups.java:321)
at org.apache.hadoop.security.Groups$GroupCacheLoader.load(Groups.java:270)
at
com.google.common.cache.LocalCache$LoadingValueReference.loadFuture(LocalCache.java:3528)
at com.google.common.cache.LocalCache$Segment.loadSync(LocalCache.java:2277)
at
com.google.common.cache.LocalCache$Segment.lockedGetOrLoad(LocalCache.java:2154)
at com.google.common.cache.LocalCache$Segment.get(LocalCache.java:2044)
at com.google.common.cache.LocalCache.get(LocalCache.java:3952)
at com.google.common.cache.LocalCache.getOrLoad(LocalCache.java:3974)
at
com.google.common.cache.LocalCache$LocalLoadingCache.get(LocalCache.java:4958)
at org.apache.hadoop.security.Groups.getGroups(Groups.java:228)
at
org.apache.hadoop.security.UserGroupInformation.getGroups(UserGroupInformation.java:1587)
at
org.apache.hadoop.security.UserGroupInformation.getGroupNames(UserGroupInformation.java:1575)
at
org.apache.ranger.authorization.presto.authorizer.RangerSystemAccessControl.checkPermission(RangerSystemAccessControl.java:93)
at
org.apache.ranger.authorization.presto.authorizer.RangerSystemAccessControl.checkCanAccessCatalog(RangerSystemAccessControl.java:139)
at
org.apache.ranger.authorization.presto.authorizer.RangerSystemAccessControl.checkCanAccessCatalog(RangerSystemAccessControl.java:94)
at
io.prestosql.security.AccessControlManager.lambda$checkCanAccessCatalog$1(AccessControlManager.java:172)
at
io.prestosql.security.AccessControlManager.authenticationCheck(AccessControlManager.java:759)
at
io.prestosql.security.AccessControlManager.checkCanAccessCatalog(AccessControlManager.java:172)
at
io.prestosql.security.AccessControlManager.lambda$checkCanSelectFromColumns$65(AccessControlManager.java:589)
at
io.prestosql.security.AccessControlManager.authenticationCheck(AccessControlManager.java:759)
at
io.prestosql.security.AccessControlManager.checkCanSelectFromColumns(AccessControlManager.java:589)
at io.prestosql.sql.analyzer.Analyzer.lambda$null$0(Analyzer.java:81)
at java.util.LinkedHashMap.forEach(LinkedHashMap.java:684)
at io.prestosql.sql.analyzer.Analyzer.lambda$analyze$1(Analyzer.java:80)
at java.util.LinkedHashMap.forEach(LinkedHashMap.java:684)
at io.prestosql.sql.analyzer.Analyzer.analyze(Analyzer.java:79)
at io.prestosql.sql.analyzer.Analyzer.analyze(Analyzer.java:68)
at io.prestosql.execution.SqlQueryExecution.<init>(SqlQueryExecution.java:184)
at io.prestosql.execution.SqlQueryExecution.<init>(SqlQueryExecution.java:92)
at
io.prestosql.execution.SqlQueryExecution$SqlQueryExecutionFactory.createQueryExecution(SqlQueryExecution.java:706)
at
io.prestosql.dispatcher.LocalDispatchQueryFactory.lambda$createDispatchQuery$0(LocalDispatchQueryFactory.java:118)
at
com.google.common.util.concurrent.TrustedListenableFutureTask$TrustedFutureInterruptibleTask.runInterruptibly(TrustedListenableFutureTask.java:125)
at
com.google.common.util.concurrent.InterruptibleTask.run(InterruptibleTask.java:57)
at
com.google.common.util.concurrent.TrustedListenableFutureTask.run(TrustedListenableFutureTask.java:78)
at
java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
at
java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
at java.lang.Thread.run(Thread.java:748)
2019-07-15T14:30:42.098Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl ==>
RangerPolicyEngineImpl.preProcess(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName=\{null}
clusterType=\{null} context={} })
2019-07-15T14:30:42.099Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerAccessRequestImpl Old Remote/Client
IP Address=null, new IP Address=null
2019-07-15T14:30:42.100Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl <==
RangerPolicyEngineImpl.preProcess(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.100Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl ==>
RangerPolicyEngineImpl.evaluatePolicies(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }, policyType=0)
2019-07-15T14:30:42.100Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl ==>
RangerPolicyEngineImpl.zoneAwareAccessEvaluationWithNoAudit(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }, policyType =0)
2019-07-15T14:30:42.100Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl zoneName:[null]
2019-07-15T14:30:42.100Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl ==>
RangerPolicyEngineImpl.evaluatePoliciesNoAudit(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }, policyType =0, zoneName=null)
2019-07-15T14:30:42.100Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl ==>
RangerPolicyEngineImpl.evaluateTagPolicies(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }, policyType =0, zoneName=null,
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{false}
isAuditedDetermined=\{false} isAudited=\{false} policyType=\{0} policyId=\{-1}
zoneName=\{null} auditPolicyId=\{-1} policyVersion=\{null}
evaluatedPoliciesCount=\{0} reason=\{null} additionalInfo={}})
2019-07-15T14:30:42.100Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl <==
RangerPolicyEngineImpl.evaluateTagPolicies(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }, policyType =0, zoneName=null,
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{false}
isAuditedDetermined=\{false} isAudited=\{false} policyType=\{0} policyId=\{-1}
zoneName=\{null} auditPolicyId=\{-1} policyVersion=\{null}
evaluatedPoliciesCount=\{0} reason=\{null} additionalInfo={}})
2019-07-15T14:30:42.100Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyRepository ==>
RangerPolicyRepository.setAuditEnabledFromCache()
2019-07-15T14:30:42.100Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyRepository <==
RangerPolicyRepository.setAuditEnabledFromCache():false
2019-07-15T14:30:42.101Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.util.RangerResourceTrie ==>
RangerResourceTrie.getEvaluatorsForResource(hive)
2019-07-15T14:30:42.101Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.util.RangerResourceTrie <==
RangerResourceTrie.getEvaluatorsForResource(hive): evaluatorCount=4
2019-07-15T14:30:42.101Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyRepository <==
RangerPolicyRepository.getLikelyMatchPolicyEvaluators(hive): evaluatorCount=4
2019-07-15T14:30:42.101Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==>
RangerDefaultPolicyEvaluator.isApplicable(Mon Jul 15 14:30:42 UTC 2019)
2019-07-15T14:30:42.101Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <==
RangerDefaultPolicyEvaluator.isApplicable(Mon Jul 15 14:30:42 UTC 2019) : true
2019-07-15T14:30:42.102Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==>
RangerDefaultPolicyEvaluator.evaluate(policyId=3,
RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } },
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{false}
isAuditedDetermined=\{false} isAudited=\{false} policyType=\{0} policyId=\{-1}
zoneName=\{null} auditPolicyId=\{-1} policyVersion=\{null}
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}})
2019-07-15T14:30:42.102Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
==>
RangerDefaultPolicyResourceMatcher.getMatchType(RangerResourceImpl=\{ownerUser={null}
elements=\{catalog=hive; } }\{token:USER=david.berger})
2019-07-15T14:30:42.102Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
==>
RangerDefaultPolicyResourceMatcher.getMatchingHierarchy(RangerResourceImpl=\{ownerUser={null}
elements=\{catalog=hive; } })
2019-07-15T14:30:42.102Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.model.validation.RangerServiceDefHelper ==>
hierarchyHasAllResources(hierarchy=RangerResourceDef=\{itemId={1}
name=\{catalog} type=\{string} level=\{10} parent=\{null} mandatory=\{true}
lookupSupported=\{true} recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Catalog} description=\{Presto
Catalog} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={2} name=\{schema} type=\{string} level=\{20}
parent=\{catalog} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Schema} description=\{Presto
Schema} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={3} name=\{table} type=\{string} level=\{30}
parent=\{schema} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Table} description=\{Presto
Table} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={4} name=\{column} type=\{string} level=\{40}
parent=\{table} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Column} description=\{Presto
Column} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
}, resourceNames=catalog)
2019-07-15T14:30:42.103Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.model.validation.RangerServiceDefHelper <==
hierarchyHasAllResources(hierarchy=RangerResourceDef=\{itemId={1}
name=\{catalog} type=\{string} level=\{10} parent=\{null} mandatory=\{true}
lookupSupported=\{true} recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Catalog} description=\{Presto
Catalog} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={2} name=\{schema} type=\{string} level=\{20}
parent=\{catalog} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Schema} description=\{Presto
Schema} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={3} name=\{table} type=\{string} level=\{30}
parent=\{schema} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Table} description=\{Presto
Table} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={4} name=\{column} type=\{string} level=\{40}
parent=\{table} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Column} description=\{Presto
Column} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
}, resourceNames=catalog): true
2019-07-15T14:30:42.103Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
==> isHierarchyValidForResources(RangerResourceDef=\{itemId={1}
name=\{catalog} type=\{string} level=\{10} parent=\{null} mandatory=\{true}
lookupSupported=\{true} recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Catalog} description=\{Presto
Catalog} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={2} name=\{schema} type=\{string} level=\{20}
parent=\{catalog} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Schema} description=\{Presto
Schema} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={3} name=\{table} type=\{string} level=\{30}
parent=\{schema} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Table} description=\{Presto
Table} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={4} name=\{column} type=\{string} level=\{40}
parent=\{table} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Column} description=\{Presto
Column} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
})
2019-07-15T14:30:42.103Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
<== isHierarchyValidForResources(RangerResourceDef=\{itemId={1}
name=\{catalog} type=\{string} level=\{10} parent=\{null} mandatory=\{true}
lookupSupported=\{true} recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Catalog} description=\{Presto
Catalog} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={2} name=\{schema} type=\{string} level=\{20}
parent=\{catalog} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Schema} description=\{Presto
Schema} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={3} name=\{table} type=\{string} level=\{30}
parent=\{schema} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Table} description=\{Presto
Table} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={4} name=\{column} type=\{string} level=\{40}
parent=\{table} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Column} description=\{Presto
Column} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
}) : true
2019-07-15T14:30:42.104Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
<==
RangerDefaultPolicyResourceMatcher.getMatchingHierarchy(RangerResourceImpl=\{ownerUser={null}
elements=\{catalog=hive; } }): [RangerResourceDef=\{itemId={1} name=\{catalog}
type=\{string} level=\{10} parent=\{null} mandatory=\{true}
lookupSupported=\{true} recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Catalog} description=\{Presto
Catalog} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
}, RangerResourceDef=\{itemId={2} name=\{schema} type=\{string} level=\{20}
parent=\{catalog} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Schema} description=\{Presto
Schema} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
}, RangerResourceDef=\{itemId={3} name=\{table} type=\{string} level=\{30}
parent=\{schema} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Table} description=\{Presto
Table} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
}, RangerResourceDef=\{itemId={4} name=\{column} type=\{string} level=\{40}
parent=\{table} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Column} description=\{Presto
Column} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
}]
2019-07-15T14:30:42.104Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher ==>
RangerDefaultResourceMatcher.isMatch(hive, \{token:USER=david.berger})
2019-07-15T14:30:42.104Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerAbstractResourceMatcher
isAllValuesRequested(hive): false
2019-07-15T14:30:42.105Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher <==
RangerDefaultResourceMatcher.isMatch(hive, \{token:USER=david.berger}): true
2019-07-15T14:30:42.105Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher ==>
RangerDefaultResourceMatcher.isMatch(null, \{token:USER=david.berger})
2019-07-15T14:30:42.105Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerAbstractResourceMatcher
isAllValuesRequested(null): true
2019-07-15T14:30:42.105Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher <==
RangerDefaultResourceMatcher.isMatch(null, \{token:USER=david.berger}): true
2019-07-15T14:30:42.105Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher ==>
RangerDefaultResourceMatcher.isMatch(null, \{token:USER=david.berger})
2019-07-15T14:30:42.106Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerAbstractResourceMatcher
isAllValuesRequested(null): true
2019-07-15T14:30:42.106Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher <==
RangerDefaultResourceMatcher.isMatch(null, \{token:USER=david.berger}): true
2019-07-15T14:30:42.106Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher ==>
RangerDefaultResourceMatcher.isMatch(null, \{token:USER=david.berger})
2019-07-15T14:30:42.107Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerAbstractResourceMatcher
isAllValuesRequested(null): true
2019-07-15T14:30:42.107Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher <==
RangerDefaultResourceMatcher.isMatch(null, \{token:USER=david.berger}): true
2019-07-15T14:30:42.107Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
<==
RangerDefaultPolicyResourceMatcher.getMatchType(RangerResourceImpl=\{ownerUser={null}
elements=\{catalog=hive; } }\{token:USER=david.berger}):
ANCESTOR_WITH_WILDCARDS
2019-07-15T14:30:42.108Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==>
RangerDefaultPolicyEvaluator.matchPolicyCustomConditions(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.108Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <==
RangerDefaultPolicyEvaluator.matchCustomConditions(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }): true
2019-07-15T14:30:42.108Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==>
RangerDefaultPolicyEvaluator.evaluatePolicyItems(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } },
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{false}
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{-1}
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{null}
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}},
ANCESTOR_WITH_WILDCARDS)
2019-07-15T14:30:42.108Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator Using
policyItemEvaluators for access evaluation. PolicyId=[3]
2019-07-15T14:30:42.109Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==>
RangerDefaultPolicyEvaluator.getMatchingPolicyItem(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.109Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <==
RangerDefaultPolicyEvaluator.getMatchingPolicyItem(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }): null
2019-07-15T14:30:42.109Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==>
RangerDefaultPolicyEvaluator.getMatchingPolicyItem(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.109Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator ==>
RangerDefaultPolicyItemEvaluator.isMatch(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.109Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator ==>
RangerDefaultPolicyItemEvaluator.matchUserGroupAndOwner(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.110Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator ==>
RangerDefaultPolicyItemEvaluator.matchUserGroup(RangerPolicyItem=\{accessTypes={RangerPolicyItemAccess={type={select}
isAllowed=\{true} }RangerPolicyItemAccess=\{type={insert} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={create} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={drop} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={use} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={alter} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={admin} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={all} isAllowed=\{true} }} users=\{david.berger
} groups={} roles={} conditions={} delegateAdmin=\{true} }, david.berger, [],
null)
2019-07-15T14:30:42.110Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator <==
RangerDefaultPolicyItemEvaluator.matchUserGroup(RangerPolicyItem=\{accessTypes={RangerPolicyItemAccess={type={select}
isAllowed=\{true} }RangerPolicyItemAccess=\{type={insert} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={create} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={drop} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={use} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={alter} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={admin} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={all} isAllowed=\{true} }} users=\{david.berger
} groups={} roles={} conditions={} delegateAdmin=\{true} }, david.berger, [],
null): true
2019-07-15T14:30:42.110Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator <==
RangerDefaultPolicyItemEvaluator.matchUserGroupAndOwner(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }): true
2019-07-15T14:30:42.110Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator ==>
RangerDefaultPolicyItemEvaluator.matchCustomConditions(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.111Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator <==
RangerDefaultPolicyItemEvaluator.matchCustomConditions(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }): true
2019-07-15T14:30:42.111Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator <==
RangerDefaultPolicyItemEvaluator.isMatch(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }): true
2019-07-15T14:30:42.111Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <==
RangerDefaultPolicyEvaluator.getMatchingPolicyItem(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }):
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator@6bdfe52e
2019-07-15T14:30:42.111Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==>
RangerDefaultPolicyEvaluator.updateAccessResult(RangerAccessResult=\{isAccessDetermined={false}
isAllowed=\{false} isAuditedDetermined=\{true} isAudited=\{true}
policyType=\{0} policyId=\{-1} zoneName=\{null} auditPolicyId=\{3}
policyVersion=\{null} evaluatedPoliciesCount=\{1} reason=\{null}
additionalInfo={}}, ANCESTOR_WITH_WILDCARDS, true, null, 3)
2019-07-15T14:30:42.112Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <==
RangerDefaultPolicyEvaluator.updateAccessResult(RangerAccessResult=\{isAccessDetermined={false}
isAllowed=\{true} isAuditedDetermined=\{true} isAudited=\{true}
policyType=\{0} policyId=\{3} zoneName=\{null} auditPolicyId=\{3}
policyVersion=\{1} evaluatedPoliciesCount=\{1} reason=\{null}
additionalInfo={}}, ANCESTOR_WITH_WILDCARDS, true, null, 3)
2019-07-15T14:30:42.112Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <==
RangerDefaultPolicyEvaluator.evaluatePolicyItems(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } },
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{true}
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{3}
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{1}
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}},
ANCESTOR_WITH_WILDCARDS)
2019-07-15T14:30:42.112Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <==
RangerDefaultPolicyEvaluator.evaluate(policyId=3,
RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } },
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{true}
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{3}
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{1}
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}})
2019-07-15T14:30:42.112Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyRepository ==>
RangerPolicyRepository.storeAuditEnabledInCache()
2019-07-15T14:30:42.112Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyRepository <==
RangerPolicyRepository.storeAuditEnabledInCache()
2019-07-15T14:30:42.113Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl <==
RangerPolicyEngineImpl.evaluatePoliciesNoAudit(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }, policyType =0, zoneName=null):
RangerAccessResult=\{isAccessDetermined={true} isAllowed=\{true}
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{3}
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{1}
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}}
2019-07-15T14:30:42.113Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl <==
RangerPolicyEngineImpl.zoneAwareAccessEvaluationWithNoAudit(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }, policyType =0):
RangerAccessResult=\{isAccessDetermined={true} isAllowed=\{true}
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{3}
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{1}
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}}
2019-07-15T14:30:42.113Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler ==>
RangerDefaultAuditHandler.processResult(RangerAccessResult=\{isAccessDetermined={true}
isAllowed=\{true} isAuditedDetermined=\{true} isAudited=\{true}
policyType=\{0} policyId=\{3} zoneName=\{null} auditPolicyId=\{3}
policyVersion=\{1} evaluatedPoliciesCount=\{1} reason=\{null}
additionalInfo={}})
2019-07-15T14:30:42.113Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler ==>
RangerDefaultAuditHandler.getAuthzEvents(RangerAccessResult=\{isAccessDetermined={true}
isAllowed=\{true} isAuditedDetermined=\{true} isAudited=\{true}
policyType=\{0} policyId=\{3} zoneName=\{null} auditPolicyId=\{3}
policyVersion=\{1} evaluatedPoliciesCount=\{1} reason=\{null}
additionalInfo={}})
2019-07-15T14:30:42.114Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler <==
RangerDefaultAuditHandler.getAuthzEvents(RangerAccessResult=\{isAccessDetermined={true}
isAllowed=\{true} isAuditedDetermined=\{true} isAudited=\{true}
policyType=\{0} policyId=\{3} zoneName=\{null} auditPolicyId=\{3}
policyVersion=\{1} evaluatedPoliciesCount=\{1} reason=\{null}
additionalInfo={}}):
AuthzAuditEvent\{repositoryType=17;repositoryName=PrestoTestRepo;user=david.berger;eventTime=Mon
Jul 15 14:30:42 UTC
2019;accessType=null;resourcePath=hive;resourceType=catalog;action=select;accessResult=1;agentId=presto;policyId=3;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dave-pr-presto-coordinator-85b57659ff-m2gqx;logType=RangerAudit;eventId=0cadc2ee-a049-4a4c-8a2c-125290583460-20;seq_num=40;event_count=1;event_dur_ms=0;tags=[];clusterName=;zoneName=null;policyVersion=1;additionalInfo=null}
2019-07-15T14:30:42.114Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler ==>
RangerDefaultAuditHandler.logAuthzAudit(AuthzAuditEvent\{repositoryType=17;repositoryName=PrestoTestRepo;user=david.berger;eventTime=Mon
Jul 15 14:30:42 UTC
2019;accessType=null;resourcePath=hive;resourceType=catalog;action=select;accessResult=1;agentId=presto;policyId=3;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dave-pr-presto-coordinator-85b57659ff-m2gqx;logType=RangerAudit;eventId=0cadc2ee-a049-4a4c-8a2c-125290583460-20;seq_num=40;event_count=1;event_dur_ms=0;tags=[];clusterName=;zoneName=null;policyVersion=1;additionalInfo=null})
2019-07-15T14:30:42.114Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler <==
RangerDefaultAuditHandler.logAuthzAudit(AuthzAuditEvent\{repositoryType=17;repositoryName=PrestoTestRepo;user=david.berger;eventTime=Mon
Jul 15 14:30:42 UTC
2019;accessType=null;resourcePath=hive;resourceType=catalog;action=select;accessResult=1;agentId=presto;policyId=3;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dave-pr-presto-coordinator-85b57659ff-m2gqx;logType=RangerAudit;eventId=0cadc2ee-a049-4a4c-8a2c-125290583460-20;seq_num=41;event_count=1;event_dur_ms=0;tags=[];clusterName=;zoneName=null;policyVersion=1;additionalInfo=null})
2019-07-15T14:30:42.114Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler <==
RangerDefaultAuditHandler.processResult(RangerAccessResult=\{isAccessDetermined={true}
isAllowed=\{true} isAuditedDetermined=\{true} isAudited=\{true}
policyType=\{0} policyId=\{3} zoneName=\{null} auditPolicyId=\{3}
policyVersion=\{1} evaluatedPoliciesCount=\{1} reason=\{null}
additionalInfo={}})
2019-07-15T14:30:42.114Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl <==
RangerPolicyEngineImpl.evaluatePolicies(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger}
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={}
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null}
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }, policyType=0):
RangerAccessResult=\{isAccessDetermined={true} isAllowed=\{true}
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{3}
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{1}
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}}
2019-07-15T14:30:42.115Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl ==>
RangerPolicyEngineImpl.preProcess(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName=\{null} clusterType=\{null}
context={} })
2019-07-15T14:30:42.115Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerAccessRequestImpl Old Remote/Client
IP Address=null, new IP Address=null
2019-07-15T14:30:42.115Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl <==
RangerPolicyEngineImpl.preProcess(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.115Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl ==>
RangerPolicyEngineImpl.evaluatePolicies(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }, policyType=0)
2019-07-15T14:30:42.116Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl ==>
RangerPolicyEngineImpl.zoneAwareAccessEvaluationWithNoAudit(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }, policyType =0)
2019-07-15T14:30:42.116Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl zoneName:[null]
2019-07-15T14:30:42.116Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl ==>
RangerPolicyEngineImpl.evaluatePoliciesNoAudit(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }, policyType =0, zoneName=null)
2019-07-15T14:30:42.116Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl ==>
RangerPolicyEngineImpl.evaluateTagPolicies(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }, policyType =0, zoneName=null,
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{false}
isAuditedDetermined=\{false} isAudited=\{false} policyType=\{0} policyId=\{-1}
zoneName=\{null} auditPolicyId=\{-1} policyVersion=\{null}
evaluatedPoliciesCount=\{0} reason=\{null} additionalInfo={}})
2019-07-15T14:30:42.117Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl <==
RangerPolicyEngineImpl.evaluateTagPolicies(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }, policyType =0, zoneName=null,
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{false}
isAuditedDetermined=\{false} isAudited=\{false} policyType=\{0} policyId=\{-1}
zoneName=\{null} auditPolicyId=\{-1} policyVersion=\{null}
evaluatedPoliciesCount=\{0} reason=\{null} additionalInfo={}})
2019-07-15T14:30:42.117Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyRepository ==>
RangerPolicyRepository.setAuditEnabledFromCache()
2019-07-15T14:30:42.117Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyRepository <==
RangerPolicyRepository.setAuditEnabledFromCache():false
2019-07-15T14:30:42.117Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.util.RangerResourceTrie ==>
RangerResourceTrie.getEvaluatorsForResource(default)
2019-07-15T14:30:42.118Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.util.RangerResourceTrie <==
RangerResourceTrie.getEvaluatorsForResource(default): evaluatorCount=4
2019-07-15T14:30:42.118Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.util.RangerResourceTrie ==>
RangerResourceTrie.getEvaluatorsForResource(hive)
2019-07-15T14:30:42.118Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.util.RangerResourceTrie <==
RangerResourceTrie.getEvaluatorsForResource(hive): evaluatorCount=4
2019-07-15T14:30:42.118Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.util.RangerResourceTrie ==>
RangerResourceTrie.getEvaluatorsForResource(dcm_activity)
2019-07-15T14:30:42.118Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.util.RangerResourceTrie <==
RangerResourceTrie.getEvaluatorsForResource(dcm_activity): evaluatorCount=4
2019-07-15T14:30:42.118Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyRepository <==
RangerPolicyRepository.getLikelyMatchPolicyEvaluators(hive/default/dcm_activity):
evaluatorCount=4
2019-07-15T14:30:42.118Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==>
RangerDefaultPolicyEvaluator.isApplicable(Mon Jul 15 14:30:42 UTC 2019)
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <==
RangerDefaultPolicyEvaluator.isApplicable(Mon Jul 15 14:30:42 UTC 2019) : true
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==>
RangerDefaultPolicyEvaluator.evaluate(policyId=3,
RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } },
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{false}
isAuditedDetermined=\{false} isAudited=\{false} policyType=\{0} policyId=\{-1}
zoneName=\{null} auditPolicyId=\{-1} policyVersion=\{null}
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}})
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
==>
RangerDefaultPolicyResourceMatcher.getMatchType(RangerResourceImpl=\{ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; }
}\{token:USER=david.berger})
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
==>
RangerDefaultPolicyResourceMatcher.getMatchingHierarchy(RangerResourceImpl=\{ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } })
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.model.validation.RangerServiceDefHelper ==>
hierarchyHasAllResources(hierarchy=RangerResourceDef=\{itemId={1}
name=\{catalog} type=\{string} level=\{10} parent=\{null} mandatory=\{true}
lookupSupported=\{true} recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Catalog} description=\{Presto
Catalog} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={2} name=\{schema} type=\{string} level=\{20}
parent=\{catalog} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Schema} description=\{Presto
Schema} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={3} name=\{table} type=\{string} level=\{30}
parent=\{schema} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Table} description=\{Presto
Table} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={4} name=\{column} type=\{string} level=\{40}
parent=\{table} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Column} description=\{Presto
Column} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
}, resourceNames=schema,catalog,table)
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.model.validation.RangerServiceDefHelper <==
hierarchyHasAllResources(hierarchy=RangerResourceDef=\{itemId={1}
name=\{catalog} type=\{string} level=\{10} parent=\{null} mandatory=\{true}
lookupSupported=\{true} recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Catalog} description=\{Presto
Catalog} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={2} name=\{schema} type=\{string} level=\{20}
parent=\{catalog} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Schema} description=\{Presto
Schema} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={3} name=\{table} type=\{string} level=\{30}
parent=\{schema} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Table} description=\{Presto
Table} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={4} name=\{column} type=\{string} level=\{40}
parent=\{table} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Column} description=\{Presto
Column} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
}, resourceNames=schema,catalog,table): true
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
==> isHierarchyValidForResources(RangerResourceDef=\{itemId={1}
name=\{catalog} type=\{string} level=\{10} parent=\{null} mandatory=\{true}
lookupSupported=\{true} recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Catalog} description=\{Presto
Catalog} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={2} name=\{schema} type=\{string} level=\{20}
parent=\{catalog} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Schema} description=\{Presto
Schema} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={3} name=\{table} type=\{string} level=\{30}
parent=\{schema} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Table} description=\{Presto
Table} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={4} name=\{column} type=\{string} level=\{40}
parent=\{table} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Column} description=\{Presto
Column} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
})
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
<== isHierarchyValidForResources(RangerResourceDef=\{itemId={1}
name=\{catalog} type=\{string} level=\{10} parent=\{null} mandatory=\{true}
lookupSupported=\{true} recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Catalog} description=\{Presto
Catalog} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={2} name=\{schema} type=\{string} level=\{20}
parent=\{catalog} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Schema} description=\{Presto
Schema} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={3} name=\{table} type=\{string} level=\{30}
parent=\{schema} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Table} description=\{Presto
Table} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
},RangerResourceDef=\{itemId={4} name=\{column} type=\{string} level=\{40}
parent=\{table} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Column} description=\{Presto
Column} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
}) : true
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
<==
RangerDefaultPolicyResourceMatcher.getMatchingHierarchy(RangerResourceImpl=\{ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }):
[RangerResourceDef=\{itemId={1} name=\{catalog} type=\{string} level=\{10}
parent=\{null} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Catalog} description=\{Presto
Catalog} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
}, RangerResourceDef=\{itemId={2} name=\{schema} type=\{string} level=\{20}
parent=\{catalog} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Schema} description=\{Presto
Schema} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
}, RangerResourceDef=\{itemId={3} name=\{table} type=\{string} level=\{30}
parent=\{schema} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Table} description=\{Presto
Table} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
}, RangerResourceDef=\{itemId={4} name=\{column} type=\{string} level=\{40}
parent=\{table} mandatory=\{true} lookupSupported=\{true}
recursiveSupported=\{false} excludesSupported=\{true}
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={}
validationMessage={} uiHint={} label=\{Presto Column} description=\{Presto
Column} rbKeyLabel=\{null} rbKeyDescription=\{null}
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true}
}]
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher ==>
RangerDefaultResourceMatcher.isMatch(hive, \{token:USER=david.berger})
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerAbstractResourceMatcher
isAllValuesRequested(hive): false
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher <==
RangerDefaultResourceMatcher.isMatch(hive, \{token:USER=david.berger}): true
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher ==>
RangerDefaultResourceMatcher.isMatch(default, \{token:USER=david.berger})
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerAbstractResourceMatcher
isAllValuesRequested(default): false
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher <==
RangerDefaultResourceMatcher.isMatch(default, \{token:USER=david.berger}): true
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher ==>
RangerDefaultResourceMatcher.isMatch(dcm_activity, \{token:USER=david.berger})
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerAbstractResourceMatcher
isAllValuesRequested(dcm_activity): false
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher <==
RangerDefaultResourceMatcher.isMatch(dcm_activity, \{token:USER=david.berger}):
true
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher ==>
RangerDefaultResourceMatcher.isMatch(null, \{token:USER=david.berger})
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerAbstractResourceMatcher
isAllValuesRequested(null): true
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher <==
RangerDefaultResourceMatcher.isMatch(null, \{token:USER=david.berger}): true
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
<==
RangerDefaultPolicyResourceMatcher.getMatchType(RangerResourceImpl=\{ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; }
}\{token:USER=david.berger}): ANCESTOR_WITH_WILDCARDS
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==>
RangerDefaultPolicyEvaluator.matchPolicyCustomConditions(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <==
RangerDefaultPolicyEvaluator.matchCustomConditions(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }): true
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==>
RangerDefaultPolicyEvaluator.evaluatePolicyItems(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } },
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{false}
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{-1}
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{null}
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}},
ANCESTOR_WITH_WILDCARDS)
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator Using
policyItemEvaluators for access evaluation. PolicyId=[3]
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==>
RangerDefaultPolicyEvaluator.getMatchingPolicyItem(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <==
RangerDefaultPolicyEvaluator.getMatchingPolicyItem(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }): null
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==>
RangerDefaultPolicyEvaluator.getMatchingPolicyItem(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator ==>
RangerDefaultPolicyItemEvaluator.isMatch(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator ==>
RangerDefaultPolicyItemEvaluator.matchUserGroupAndOwner(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator ==>
RangerDefaultPolicyItemEvaluator.matchUserGroup(RangerPolicyItem=\{accessTypes={RangerPolicyItemAccess={type={select}
isAllowed=\{true} }RangerPolicyItemAccess=\{type={insert} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={create} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={drop} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={use} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={alter} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={admin} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={all} isAllowed=\{true} }} users=\{david.berger
} groups={} roles={} conditions={} delegateAdmin=\{true} }, david.berger, [],
null)
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator <==
RangerDefaultPolicyItemEvaluator.matchUserGroup(RangerPolicyItem=\{accessTypes={RangerPolicyItemAccess={type={select}
isAllowed=\{true} }RangerPolicyItemAccess=\{type={insert} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={create} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={drop} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={use} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={alter} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={admin} isAllowed=\{true}
}RangerPolicyItemAccess=\{type={all} isAllowed=\{true} }} users=\{david.berger
} groups={} roles={} conditions={} delegateAdmin=\{true} }, david.berger, [],
null): true
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator <==
RangerDefaultPolicyItemEvaluator.matchUserGroupAndOwner(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }): true
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator ==>
RangerDefaultPolicyItemEvaluator.matchCustomConditions(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator <==
RangerDefaultPolicyItemEvaluator.matchCustomConditions(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }): true
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator <==
RangerDefaultPolicyItemEvaluator.isMatch(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }): true
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <==
RangerDefaultPolicyEvaluator.getMatchingPolicyItem(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }):
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator@6bdfe52e
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==>
RangerDefaultPolicyEvaluator.updateAccessResult(RangerAccessResult=\{isAccessDetermined={false}
isAllowed=\{false} isAuditedDetermined=\{true} isAudited=\{true}
policyType=\{0} policyId=\{-1} zoneName=\{null} auditPolicyId=\{3}
policyVersion=\{null} evaluatedPoliciesCount=\{1} reason=\{null}
additionalInfo={}}, ANCESTOR_WITH_WILDCARDS, true, null, 3)
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <==
RangerDefaultPolicyEvaluator.updateAccessResult(RangerAccessResult=\{isAccessDetermined={false}
isAllowed=\{true} isAuditedDetermined=\{true} isAudited=\{true}
policyType=\{0} policyId=\{3} zoneName=\{null} auditPolicyId=\{3}
policyVersion=\{1} evaluatedPoliciesCount=\{1} reason=\{null}
additionalInfo={}}, ANCESTOR_WITH_WILDCARDS, true, null, 3)
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <==
RangerDefaultPolicyEvaluator.evaluatePolicyItems(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } },
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{true}
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{3}
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{1}
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}},
ANCESTOR_WITH_WILDCARDS)
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <==
RangerDefaultPolicyEvaluator.evaluate(policyId=3,
RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } },
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{true}
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{3}
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{1}
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}})
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyRepository ==>
RangerPolicyRepository.storeAuditEnabledInCache()
2019-07-15T14:30:42.122Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyRepository <==
RangerPolicyRepository.storeAuditEnabledInCache()
2019-07-15T14:30:42.122Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl <==
RangerPolicyEngineImpl.evaluatePoliciesNoAudit(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }, policyType =0, zoneName=null):
RangerAccessResult=\{isAccessDetermined={true} isAllowed=\{true}
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{3}
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{1}
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}}
2019-07-15T14:30:42.122Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl <==
RangerPolicyEngineImpl.zoneAwareAccessEvaluationWithNoAudit(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }, policyType =0):
RangerAccessResult=\{isAccessDetermined={true} isAllowed=\{true}
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{3}
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{1}
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}}
2019-07-15T14:30:42.122Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler ==>
RangerDefaultAuditHandler.processResult(RangerAccessResult=\{isAccessDetermined={true}
isAllowed=\{true} isAuditedDetermined=\{true} isAudited=\{true}
policyType=\{0} policyId=\{3} zoneName=\{null} auditPolicyId=\{3}
policyVersion=\{1} evaluatedPoliciesCount=\{1} reason=\{null}
additionalInfo={}})
2019-07-15T14:30:42.122Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler ==>
RangerDefaultAuditHandler.getAuthzEvents(RangerAccessResult=\{isAccessDetermined={true}
isAllowed=\{true} isAuditedDetermined=\{true} isAudited=\{true}
policyType=\{0} policyId=\{3} zoneName=\{null} auditPolicyId=\{3}
policyVersion=\{1} evaluatedPoliciesCount=\{1} reason=\{null}
additionalInfo={}})
2019-07-15T14:30:42.122Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler <==
RangerDefaultAuditHandler.getAuthzEvents(RangerAccessResult=\{isAccessDetermined={true}
isAllowed=\{true} isAuditedDetermined=\{true} isAudited=\{true}
policyType=\{0} policyId=\{3} zoneName=\{null} auditPolicyId=\{3}
policyVersion=\{1} evaluatedPoliciesCount=\{1} reason=\{null}
additionalInfo={}}):
AuthzAuditEvent\{repositoryType=17;repositoryName=PrestoTestRepo;user=david.berger;eventTime=Mon
Jul 15 14:30:42 UTC
2019;accessType=null;resourcePath=hive/default/dcm_activity;resourceType=table;action=select;accessResult=1;agentId=presto;policyId=3;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dave-pr-presto-coordinator-85b57659ff-m2gqx;logType=RangerAudit;eventId=0cadc2ee-a049-4a4c-8a2c-125290583460-21;seq_num=42;event_count=1;event_dur_ms=0;tags=[];clusterName=;zoneName=null;policyVersion=1;additionalInfo=null}
2019-07-15T14:30:42.122Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler ==>
RangerDefaultAuditHandler.logAuthzAudit(AuthzAuditEvent\{repositoryType=17;repositoryName=PrestoTestRepo;user=david.berger;eventTime=Mon
Jul 15 14:30:42 UTC
2019;accessType=null;resourcePath=hive/default/dcm_activity;resourceType=table;action=select;accessResult=1;agentId=presto;policyId=3;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dave-pr-presto-coordinator-85b57659ff-m2gqx;logType=RangerAudit;eventId=0cadc2ee-a049-4a4c-8a2c-125290583460-21;seq_num=42;event_count=1;event_dur_ms=0;tags=[];clusterName=;zoneName=null;policyVersion=1;additionalInfo=null})
2019-07-15T14:30:42.122Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler <==
RangerDefaultAuditHandler.logAuthzAudit(AuthzAuditEvent\{repositoryType=17;repositoryName=PrestoTestRepo;user=david.berger;eventTime=Mon
Jul 15 14:30:42 UTC
2019;accessType=null;resourcePath=hive/default/dcm_activity;resourceType=table;action=select;accessResult=1;agentId=presto;policyId=3;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dave-pr-presto-coordinator-85b57659ff-m2gqx;logType=RangerAudit;eventId=0cadc2ee-a049-4a4c-8a2c-125290583460-21;seq_num=43;event_count=1;event_dur_ms=0;tags=[];clusterName=;zoneName=null;policyVersion=1;additionalInfo=null})
2019-07-15T14:30:42.122Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler <==
RangerDefaultAuditHandler.processResult(RangerAccessResult=\{isAccessDetermined={true}
isAllowed=\{true} isAuditedDetermined=\{true} isAudited=\{true}
policyType=\{0} policyId=\{3} zoneName=\{null} auditPolicyId=\{3}
policyVersion=\{1} evaluatedPoliciesCount=\{1} reason=\{null}
additionalInfo={}})
2019-07-15T14:30:42.123Z DEBUG Query-20190715_143041_00003_szi8m-456
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl <==
RangerPolicyEngineImpl.evaluatePolicies(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
elements=\{schema=default; catalog=hive; table=dcm_activity; } }}
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null}
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null}
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null}
resourceMatchingScope=\{SELF} clusterName={} clusterType={}
context=\{token:USER={david.berger} } }, policyType=0):
RangerAccessResult=\{isAccessDetermined={true} isAllowed=\{true}
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{3}
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{1}
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}}
2019-07-15T14:30:42.123Z DEBUG dispatcher-query-14
io.prestosql.execution.QueryStateMachine Query 20190715_143041_00003_szi8m is
PLANNING
2019-07-15T14:30:42.135Z DEBUG dispatcher-query-13
io.prestosql.execution.QueryStateMachine Query 20190715_143041_00003_szi8m is
DISPATCHING
2019-07-15T14:30:42.232Z DEBUG Query-20190715_143041_00003_szi8m-455
io.prestosql.util.CompilerUtils Defining class:
io/prestosql/$gen/LongStateSerializer_20190715_143042_4
2019-07-15T14:30:42.241Z DEBUG Query-20190715_143041_00003_szi8m-455
io.prestosql.util.CompilerUtils Defining class:
io/prestosql/$gen/SingleLongState_20190715_143042_5
2019-07-15T14:30:42.249Z DEBUG Query-20190715_143041_00003_szi8m-455
io.prestosql.util.CompilerUtils Defining class:
io/prestosql/$gen/GroupedLongState_20190715_143042_6
2019-07-15T14:30:42.252Z DEBUG Query-20190715_143041_00003_szi8m-455
io.prestosql.util.CompilerUtils Defining class:
io/prestosql/$gen/LongStateFactory_20190715_143042_7
2019-07-15T14:30:42.301Z DEBUG Query-20190715_143041_00003_szi8m-455
io.prestosql.plugin.hive.metastore.thrift.ThriftHiveMetastoreClient Invocation
of get_table(dbname='default', tbl_name='dcm_activity') succeeded in 19.34ms
2019-07-15T14:30:42.324Z DEBUG Query-20190715_143041_00003_szi8m-455
io.prestosql.plugin.hive.metastore.thrift.ThriftHiveMetastoreClient Invocation
of get_table_statistics_req(request=TableStatsRequest(dbName:default,
tblName:dcm_activity, colNames:[event_time, user_id, advertiser_id,
campaign_id, ad_id, rendering_id, creative_version, site_id_dcm, placement_id,
country_code, state_or_region, browser_or_platform_id,
browser_or_platform_version, operating_system_id, u_value, activity_id,
tran_value, other_data, ord_value, interaction_time, conversion_id,
segment_value_1, floodlight_configuration, event_type, event_sub_type,
dbm_auction_id, dbm_request_time, dbm_advertiser_id, dbm_insertion_order_id,
dbm_line_item_id, dbm_creative_id, dbm_bid_price_usd,
dbm_bid_price_partner_currency, dbm_bid_price_advertiser_currency, dbm_url,
dbm_site_id, dbm_language, dbm_adx_page_categories,
dbm_matching_targeted_keywords, dbm_exchange_id,
dbm_attributed_inventory_source_external_id,
dbm_attributed_inventory_source_is_public, dbm_ad_position, dbm_country_code,
dbm_designated_market_area_dma_id, dbm_zip_or_postal_code,
dbm_state_or_region_id, dbm_city_id, dbm_operating_system_id,
dbm_browser_or_platform_id, dbm_browser_timezone_offset_minutes, dbm_net_speed,
dbm_matching_targeted_segments, dbm_isp_id, dbm_device_type,
dbm_mobile_make_id, dbm_mobile_model_id, partner2_id, total_conversions,
total_revenue, dbm_media_cost_usd, dbm_media_cost_partner_currency,
dbm_media_cost_advertiser_currency, dbm_revenue_usd,
dbm_revenue_partner_currency, dbm_revenue_advertiser_currency,
dbm_total_media_cost_usd, dbm_total_media_cost_partner_currency,
dbm_total_media_cost_advertiser_currency, dbm_cpm_fee_1_usd,
dbm_cpm_fee_1_partner_currency, dbm_cpm_fee_1_advertiser_currency,
dbm_cpm_fee_2_usd, dbm_cpm_fee_2_partner_currency,
dbm_cpm_fee_2_advertiser_currency, dbm_cpm_fee_3_usd,
dbm_cpm_fee_3_partner_currency, dbm_cpm_fee_3_advertiser_currency,
dbm_cpm_fee_4_usd, dbm_cpm_fee_4_partner_currency,
dbm_cpm_fee_4_advertiser_currency, dbm_cpm_fee_5_usd,
dbm_cpm_fee_5_partner_currency, dbm_cpm_fee_5_advertiser_currency,
dbm_media_fee_1_usd, dbm_media_fee_1_partner_currency,
dbm_media_fee_1_advertiser_currency, dbm_media_fee_2_usd,
dbm_media_fee_2_partner_currency, dbm_media_fee_2_advertiser_currency,
dbm_media_fee_3_usd, dbm_media_fee_3_partner_currency,
dbm_media_fee_3_advertiser_currency, dbm_media_fee_4_usd,
dbm_media_fee_4_partner_currency, dbm_media_fee_4_advertiser_currency,
dbm_media_fee_5_usd, dbm_media_fee_5_partner_currency,
dbm_media_fee_5_advertiser_currency, dbm_data_fees_usd,
dbm_data_fees_partner_currency, dbm_data_fees_advertiser_currency,
dbm_billable_cost_usd, dbm_billable_cost_partner_currency,
dbm_billable_cost_advertiser_currency, etl_timestamp, src_file])) succeeded in
20.88ms
> Presto 'Access Type' is empty in the audit log
> ----------------------------------------------
>
> Key: RANGER-2505
> URL: https://issues.apache.org/jira/browse/RANGER-2505
> Project: Ranger
> Issue Type: Bug
> Components: plugins, Ranger
> Affects Versions: 2.0.0
> Reporter: David Berger
> Priority: Major
> Attachments: Screen Shot 2019-07-12 at 15.02.41 pm.png
>
>
> In the UI the 'Access Type' isn't populated anymore. (see attached screenshot)
> This happened after I did a new build on the 8th of June.
> I'm sure it was working in an earlier 2.0-SNAPSHOT build but I haven't got
> those jars anymore. :(
> I tried a latest build from today but I'm having the same issue.
>
--
This message was sent by Atlassian JIRA
(v7.6.14#76016)