[ 
https://issues.apache.org/jira/browse/RANGER-2505?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16885288#comment-16885288
 ] 

David Berger commented on RANGER-2505:
--------------------------------------

*Presto plugin debug log below:*

2019-07-15T14:30:42.008Z DEBUG dispatcher-query-11 
org.apache.ranger.authorization.presto.authorizer.RangerSystemAccessControl ==> 
RangerSystemAccessControl.checkCanSetUser(david.berger)
2019-07-15T14:30:42.019Z DEBUG dispatcher-query-12 
io.prestosql.execution.QueryStateMachine Query 20190715_143041_00003_szi8m is 
QUEUED
2019-07-15T14:30:42.021Z DEBUG dispatcher-query-12 
io.prestosql.execution.QueryStateMachine Query 20190715_143041_00003_szi8m is 
WAITING_FOR_RESOURCES
2019-07-15T14:30:42.044Z DEBUG Query-20190715_143041_00003_szi8m-456 
io.prestosql.plugin.hive.metastore.thrift.ThriftHiveMetastoreClient Invocation 
of get_table(dbname='default', tbl_name='dcm_activity') succeeded in 20.47ms
2019-07-15T14:30:42.096Z WARN Query-20190715_143041_00003_szi8m-456 
org.apache.hadoop.security.ShellBasedUnixGroupsMapping unable to return groups 
for user david.berger
PartialGroupNameException The user name 'david.berger' is not found. id: 
‘david.berger’: no such user
id: ‘david.berger’: no such user

at 
org.apache.hadoop.security.ShellBasedUnixGroupsMapping.resolvePartialGroupNames(ShellBasedUnixGroupsMapping.java:294)
 at 
org.apache.hadoop.security.ShellBasedUnixGroupsMapping.getUnixGroups(ShellBasedUnixGroupsMapping.java:207)
 at 
org.apache.hadoop.security.ShellBasedUnixGroupsMapping.getGroups(ShellBasedUnixGroupsMapping.java:97)
 at 
org.apache.hadoop.security.JniBasedUnixGroupsMappingWithFallback.getGroups(JniBasedUnixGroupsMappingWithFallback.java:51)
 at 
org.apache.hadoop.security.Groups$GroupCacheLoader.fetchGroupList(Groups.java:387)
 at org.apache.hadoop.security.Groups$GroupCacheLoader.load(Groups.java:321)
 at org.apache.hadoop.security.Groups$GroupCacheLoader.load(Groups.java:270)
 at 
com.google.common.cache.LocalCache$LoadingValueReference.loadFuture(LocalCache.java:3528)
 at com.google.common.cache.LocalCache$Segment.loadSync(LocalCache.java:2277)
 at 
com.google.common.cache.LocalCache$Segment.lockedGetOrLoad(LocalCache.java:2154)
 at com.google.common.cache.LocalCache$Segment.get(LocalCache.java:2044)
 at com.google.common.cache.LocalCache.get(LocalCache.java:3952)
 at com.google.common.cache.LocalCache.getOrLoad(LocalCache.java:3974)
 at 
com.google.common.cache.LocalCache$LocalLoadingCache.get(LocalCache.java:4958)
 at org.apache.hadoop.security.Groups.getGroups(Groups.java:228)
 at 
org.apache.hadoop.security.UserGroupInformation.getGroups(UserGroupInformation.java:1587)
 at 
org.apache.hadoop.security.UserGroupInformation.getGroupNames(UserGroupInformation.java:1575)
 at 
org.apache.ranger.authorization.presto.authorizer.RangerSystemAccessControl.checkPermission(RangerSystemAccessControl.java:93)
 at 
org.apache.ranger.authorization.presto.authorizer.RangerSystemAccessControl.checkCanAccessCatalog(RangerSystemAccessControl.java:139)
 at 
org.apache.ranger.authorization.presto.authorizer.RangerSystemAccessControl.checkCanAccessCatalog(RangerSystemAccessControl.java:94)
 at 
io.prestosql.security.AccessControlManager.lambda$checkCanAccessCatalog$1(AccessControlManager.java:172)
 at 
io.prestosql.security.AccessControlManager.authenticationCheck(AccessControlManager.java:759)
 at 
io.prestosql.security.AccessControlManager.checkCanAccessCatalog(AccessControlManager.java:172)
 at 
io.prestosql.security.AccessControlManager.lambda$checkCanSelectFromColumns$65(AccessControlManager.java:589)
 at 
io.prestosql.security.AccessControlManager.authenticationCheck(AccessControlManager.java:759)
 at 
io.prestosql.security.AccessControlManager.checkCanSelectFromColumns(AccessControlManager.java:589)
 at io.prestosql.sql.analyzer.Analyzer.lambda$null$0(Analyzer.java:81)
 at java.util.LinkedHashMap.forEach(LinkedHashMap.java:684)
 at io.prestosql.sql.analyzer.Analyzer.lambda$analyze$1(Analyzer.java:80)
 at java.util.LinkedHashMap.forEach(LinkedHashMap.java:684)
 at io.prestosql.sql.analyzer.Analyzer.analyze(Analyzer.java:79)
 at io.prestosql.sql.analyzer.Analyzer.analyze(Analyzer.java:68)
 at io.prestosql.execution.SqlQueryExecution.<init>(SqlQueryExecution.java:184)
 at io.prestosql.execution.SqlQueryExecution.<init>(SqlQueryExecution.java:92)
 at 
io.prestosql.execution.SqlQueryExecution$SqlQueryExecutionFactory.createQueryExecution(SqlQueryExecution.java:706)
 at 
io.prestosql.dispatcher.LocalDispatchQueryFactory.lambda$createDispatchQuery$0(LocalDispatchQueryFactory.java:118)
 at 
com.google.common.util.concurrent.TrustedListenableFutureTask$TrustedFutureInterruptibleTask.runInterruptibly(TrustedListenableFutureTask.java:125)
 at 
com.google.common.util.concurrent.InterruptibleTask.run(InterruptibleTask.java:57)
 at 
com.google.common.util.concurrent.TrustedListenableFutureTask.run(TrustedListenableFutureTask.java:78)
 at 
java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
 at 
java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
 at java.lang.Thread.run(Thread.java:748)


2019-07-15T14:30:42.098Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl ==> 
RangerPolicyEngineImpl.preProcess(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName=\{null} 
clusterType=\{null} context={} })
2019-07-15T14:30:42.099Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerAccessRequestImpl Old Remote/Client 
IP Address=null, new IP Address=null
2019-07-15T14:30:42.100Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl <== 
RangerPolicyEngineImpl.preProcess(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.100Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl ==> 
RangerPolicyEngineImpl.evaluatePolicies(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, policyType=0)
2019-07-15T14:30:42.100Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl ==> 
RangerPolicyEngineImpl.zoneAwareAccessEvaluationWithNoAudit(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, policyType =0)
2019-07-15T14:30:42.100Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl zoneName:[null]
2019-07-15T14:30:42.100Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl ==> 
RangerPolicyEngineImpl.evaluatePoliciesNoAudit(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, policyType =0, zoneName=null)
2019-07-15T14:30:42.100Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl ==> 
RangerPolicyEngineImpl.evaluateTagPolicies(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, policyType =0, zoneName=null, 
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{false} 
isAuditedDetermined=\{false} isAudited=\{false} policyType=\{0} policyId=\{-1} 
zoneName=\{null} auditPolicyId=\{-1} policyVersion=\{null} 
evaluatedPoliciesCount=\{0} reason=\{null} additionalInfo={}})
2019-07-15T14:30:42.100Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl <== 
RangerPolicyEngineImpl.evaluateTagPolicies(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, policyType =0, zoneName=null, 
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{false} 
isAuditedDetermined=\{false} isAudited=\{false} policyType=\{0} policyId=\{-1} 
zoneName=\{null} auditPolicyId=\{-1} policyVersion=\{null} 
evaluatedPoliciesCount=\{0} reason=\{null} additionalInfo={}})
2019-07-15T14:30:42.100Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyRepository ==> 
RangerPolicyRepository.setAuditEnabledFromCache()
2019-07-15T14:30:42.100Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyRepository <== 
RangerPolicyRepository.setAuditEnabledFromCache():false
2019-07-15T14:30:42.101Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.util.RangerResourceTrie ==> 
RangerResourceTrie.getEvaluatorsForResource(hive)
2019-07-15T14:30:42.101Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.util.RangerResourceTrie <== 
RangerResourceTrie.getEvaluatorsForResource(hive): evaluatorCount=4
2019-07-15T14:30:42.101Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyRepository <== 
RangerPolicyRepository.getLikelyMatchPolicyEvaluators(hive): evaluatorCount=4
2019-07-15T14:30:42.101Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==> 
RangerDefaultPolicyEvaluator.isApplicable(Mon Jul 15 14:30:42 UTC 2019)
2019-07-15T14:30:42.101Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <== 
RangerDefaultPolicyEvaluator.isApplicable(Mon Jul 15 14:30:42 UTC 2019) : true
2019-07-15T14:30:42.102Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==> 
RangerDefaultPolicyEvaluator.evaluate(policyId=3, 
RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null} 
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, 
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{false} 
isAuditedDetermined=\{false} isAudited=\{false} policyType=\{0} policyId=\{-1} 
zoneName=\{null} auditPolicyId=\{-1} policyVersion=\{null} 
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}})
2019-07-15T14:30:42.102Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
 ==> 
RangerDefaultPolicyResourceMatcher.getMatchType(RangerResourceImpl=\{ownerUser={null}
 elements=\{catalog=hive; } }\{token:USER=david.berger})
2019-07-15T14:30:42.102Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
 ==> 
RangerDefaultPolicyResourceMatcher.getMatchingHierarchy(RangerResourceImpl=\{ownerUser={null}
 elements=\{catalog=hive; } })
2019-07-15T14:30:42.102Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.model.validation.RangerServiceDefHelper ==> 
hierarchyHasAllResources(hierarchy=RangerResourceDef=\{itemId={1} 
name=\{catalog} type=\{string} level=\{10} parent=\{null} mandatory=\{true} 
lookupSupported=\{true} recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Catalog} description=\{Presto 
Catalog} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={2} name=\{schema} type=\{string} level=\{20} 
parent=\{catalog} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Schema} description=\{Presto 
Schema} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={3} name=\{table} type=\{string} level=\{30} 
parent=\{schema} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Table} description=\{Presto 
Table} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={4} name=\{column} type=\{string} level=\{40} 
parent=\{table} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Column} description=\{Presto 
Column} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
}, resourceNames=catalog)
2019-07-15T14:30:42.103Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.model.validation.RangerServiceDefHelper <== 
hierarchyHasAllResources(hierarchy=RangerResourceDef=\{itemId={1} 
name=\{catalog} type=\{string} level=\{10} parent=\{null} mandatory=\{true} 
lookupSupported=\{true} recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Catalog} description=\{Presto 
Catalog} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={2} name=\{schema} type=\{string} level=\{20} 
parent=\{catalog} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Schema} description=\{Presto 
Schema} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={3} name=\{table} type=\{string} level=\{30} 
parent=\{schema} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Table} description=\{Presto 
Table} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={4} name=\{column} type=\{string} level=\{40} 
parent=\{table} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Column} description=\{Presto 
Column} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
}, resourceNames=catalog): true
2019-07-15T14:30:42.103Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
 ==> isHierarchyValidForResources(RangerResourceDef=\{itemId={1} 
name=\{catalog} type=\{string} level=\{10} parent=\{null} mandatory=\{true} 
lookupSupported=\{true} recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Catalog} description=\{Presto 
Catalog} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={2} name=\{schema} type=\{string} level=\{20} 
parent=\{catalog} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Schema} description=\{Presto 
Schema} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={3} name=\{table} type=\{string} level=\{30} 
parent=\{schema} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Table} description=\{Presto 
Table} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={4} name=\{column} type=\{string} level=\{40} 
parent=\{table} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Column} description=\{Presto 
Column} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
})
2019-07-15T14:30:42.103Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
 <== isHierarchyValidForResources(RangerResourceDef=\{itemId={1} 
name=\{catalog} type=\{string} level=\{10} parent=\{null} mandatory=\{true} 
lookupSupported=\{true} recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Catalog} description=\{Presto 
Catalog} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={2} name=\{schema} type=\{string} level=\{20} 
parent=\{catalog} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Schema} description=\{Presto 
Schema} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={3} name=\{table} type=\{string} level=\{30} 
parent=\{schema} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Table} description=\{Presto 
Table} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={4} name=\{column} type=\{string} level=\{40} 
parent=\{table} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Column} description=\{Presto 
Column} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
}) : true
2019-07-15T14:30:42.104Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
 <== 
RangerDefaultPolicyResourceMatcher.getMatchingHierarchy(RangerResourceImpl=\{ownerUser={null}
 elements=\{catalog=hive; } }): [RangerResourceDef=\{itemId={1} name=\{catalog} 
type=\{string} level=\{10} parent=\{null} mandatory=\{true} 
lookupSupported=\{true} recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Catalog} description=\{Presto 
Catalog} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
}, RangerResourceDef=\{itemId={2} name=\{schema} type=\{string} level=\{20} 
parent=\{catalog} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Schema} description=\{Presto 
Schema} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
}, RangerResourceDef=\{itemId={3} name=\{table} type=\{string} level=\{30} 
parent=\{schema} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Table} description=\{Presto 
Table} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
}, RangerResourceDef=\{itemId={4} name=\{column} type=\{string} level=\{40} 
parent=\{table} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Column} description=\{Presto 
Column} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
}]
2019-07-15T14:30:42.104Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher ==> 
RangerDefaultResourceMatcher.isMatch(hive, \{token:USER=david.berger})
2019-07-15T14:30:42.104Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerAbstractResourceMatcher 
isAllValuesRequested(hive): false
2019-07-15T14:30:42.105Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher <== 
RangerDefaultResourceMatcher.isMatch(hive, \{token:USER=david.berger}): true
2019-07-15T14:30:42.105Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher ==> 
RangerDefaultResourceMatcher.isMatch(null, \{token:USER=david.berger})
2019-07-15T14:30:42.105Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerAbstractResourceMatcher 
isAllValuesRequested(null): true
2019-07-15T14:30:42.105Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher <== 
RangerDefaultResourceMatcher.isMatch(null, \{token:USER=david.berger}): true
2019-07-15T14:30:42.105Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher ==> 
RangerDefaultResourceMatcher.isMatch(null, \{token:USER=david.berger})
2019-07-15T14:30:42.106Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerAbstractResourceMatcher 
isAllValuesRequested(null): true
2019-07-15T14:30:42.106Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher <== 
RangerDefaultResourceMatcher.isMatch(null, \{token:USER=david.berger}): true
2019-07-15T14:30:42.106Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher ==> 
RangerDefaultResourceMatcher.isMatch(null, \{token:USER=david.berger})
2019-07-15T14:30:42.107Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerAbstractResourceMatcher 
isAllValuesRequested(null): true
2019-07-15T14:30:42.107Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher <== 
RangerDefaultResourceMatcher.isMatch(null, \{token:USER=david.berger}): true
2019-07-15T14:30:42.107Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
 <== 
RangerDefaultPolicyResourceMatcher.getMatchType(RangerResourceImpl=\{ownerUser={null}
 elements=\{catalog=hive; } }\{token:USER=david.berger}): 
ANCESTOR_WITH_WILDCARDS
2019-07-15T14:30:42.108Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==> 
RangerDefaultPolicyEvaluator.matchPolicyCustomConditions(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.108Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <== 
RangerDefaultPolicyEvaluator.matchCustomConditions(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }): true
2019-07-15T14:30:42.108Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==> 
RangerDefaultPolicyEvaluator.evaluatePolicyItems(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, 
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{false} 
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{-1} 
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{null} 
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}}, 
ANCESTOR_WITH_WILDCARDS)
2019-07-15T14:30:42.108Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator Using 
policyItemEvaluators for access evaluation. PolicyId=[3]
2019-07-15T14:30:42.109Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==> 
RangerDefaultPolicyEvaluator.getMatchingPolicyItem(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.109Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <== 
RangerDefaultPolicyEvaluator.getMatchingPolicyItem(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }): null
2019-07-15T14:30:42.109Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==> 
RangerDefaultPolicyEvaluator.getMatchingPolicyItem(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.109Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator ==> 
RangerDefaultPolicyItemEvaluator.isMatch(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.109Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator ==> 
RangerDefaultPolicyItemEvaluator.matchUserGroupAndOwner(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.110Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator ==> 
RangerDefaultPolicyItemEvaluator.matchUserGroup(RangerPolicyItem=\{accessTypes={RangerPolicyItemAccess={type={select}
 isAllowed=\{true} }RangerPolicyItemAccess=\{type={insert} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={create} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={drop} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={use} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={alter} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={admin} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={all} isAllowed=\{true} }} users=\{david.berger 
} groups={} roles={} conditions={} delegateAdmin=\{true} }, david.berger, [], 
null)
2019-07-15T14:30:42.110Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator <== 
RangerDefaultPolicyItemEvaluator.matchUserGroup(RangerPolicyItem=\{accessTypes={RangerPolicyItemAccess={type={select}
 isAllowed=\{true} }RangerPolicyItemAccess=\{type={insert} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={create} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={drop} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={use} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={alter} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={admin} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={all} isAllowed=\{true} }} users=\{david.berger 
} groups={} roles={} conditions={} delegateAdmin=\{true} }, david.berger, [], 
null): true
2019-07-15T14:30:42.110Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator <== 
RangerDefaultPolicyItemEvaluator.matchUserGroupAndOwner(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }): true
2019-07-15T14:30:42.110Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator ==> 
RangerDefaultPolicyItemEvaluator.matchCustomConditions(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.111Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator <== 
RangerDefaultPolicyItemEvaluator.matchCustomConditions(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }): true
2019-07-15T14:30:42.111Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator <== 
RangerDefaultPolicyItemEvaluator.isMatch(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }): true
2019-07-15T14:30:42.111Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <== 
RangerDefaultPolicyEvaluator.getMatchingPolicyItem(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }): 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator@6bdfe52e
2019-07-15T14:30:42.111Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==> 
RangerDefaultPolicyEvaluator.updateAccessResult(RangerAccessResult=\{isAccessDetermined={false}
 isAllowed=\{false} isAuditedDetermined=\{true} isAudited=\{true} 
policyType=\{0} policyId=\{-1} zoneName=\{null} auditPolicyId=\{3} 
policyVersion=\{null} evaluatedPoliciesCount=\{1} reason=\{null} 
additionalInfo={}}, ANCESTOR_WITH_WILDCARDS, true, null, 3)
2019-07-15T14:30:42.112Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <== 
RangerDefaultPolicyEvaluator.updateAccessResult(RangerAccessResult=\{isAccessDetermined={false}
 isAllowed=\{true} isAuditedDetermined=\{true} isAudited=\{true} 
policyType=\{0} policyId=\{3} zoneName=\{null} auditPolicyId=\{3} 
policyVersion=\{1} evaluatedPoliciesCount=\{1} reason=\{null} 
additionalInfo={}}, ANCESTOR_WITH_WILDCARDS, true, null, 3)
2019-07-15T14:30:42.112Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <== 
RangerDefaultPolicyEvaluator.evaluatePolicyItems(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, 
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{true} 
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{3} 
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{1} 
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}}, 
ANCESTOR_WITH_WILDCARDS)
2019-07-15T14:30:42.112Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <== 
RangerDefaultPolicyEvaluator.evaluate(policyId=3, 
RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null} 
elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, 
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{true} 
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{3} 
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{1} 
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}})
2019-07-15T14:30:42.112Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyRepository ==> 
RangerPolicyRepository.storeAuditEnabledInCache()
2019-07-15T14:30:42.112Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyRepository <== 
RangerPolicyRepository.storeAuditEnabledInCache()
2019-07-15T14:30:42.113Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl <== 
RangerPolicyEngineImpl.evaluatePoliciesNoAudit(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, policyType =0, zoneName=null): 
RangerAccessResult=\{isAccessDetermined={true} isAllowed=\{true} 
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{3} 
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{1} 
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}}
2019-07-15T14:30:42.113Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl <== 
RangerPolicyEngineImpl.zoneAwareAccessEvaluationWithNoAudit(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, policyType =0): 
RangerAccessResult=\{isAccessDetermined={true} isAllowed=\{true} 
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{3} 
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{1} 
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}}
2019-07-15T14:30:42.113Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler ==> 
RangerDefaultAuditHandler.processResult(RangerAccessResult=\{isAccessDetermined={true}
 isAllowed=\{true} isAuditedDetermined=\{true} isAudited=\{true} 
policyType=\{0} policyId=\{3} zoneName=\{null} auditPolicyId=\{3} 
policyVersion=\{1} evaluatedPoliciesCount=\{1} reason=\{null} 
additionalInfo={}})
2019-07-15T14:30:42.113Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler ==> 
RangerDefaultAuditHandler.getAuthzEvents(RangerAccessResult=\{isAccessDetermined={true}
 isAllowed=\{true} isAuditedDetermined=\{true} isAudited=\{true} 
policyType=\{0} policyId=\{3} zoneName=\{null} auditPolicyId=\{3} 
policyVersion=\{1} evaluatedPoliciesCount=\{1} reason=\{null} 
additionalInfo={}})
2019-07-15T14:30:42.114Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler <== 
RangerDefaultAuditHandler.getAuthzEvents(RangerAccessResult=\{isAccessDetermined={true}
 isAllowed=\{true} isAuditedDetermined=\{true} isAudited=\{true} 
policyType=\{0} policyId=\{3} zoneName=\{null} auditPolicyId=\{3} 
policyVersion=\{1} evaluatedPoliciesCount=\{1} reason=\{null} 
additionalInfo={}}): 
AuthzAuditEvent\{repositoryType=17;repositoryName=PrestoTestRepo;user=david.berger;eventTime=Mon
 Jul 15 14:30:42 UTC 
2019;accessType=null;resourcePath=hive;resourceType=catalog;action=select;accessResult=1;agentId=presto;policyId=3;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dave-pr-presto-coordinator-85b57659ff-m2gqx;logType=RangerAudit;eventId=0cadc2ee-a049-4a4c-8a2c-125290583460-20;seq_num=40;event_count=1;event_dur_ms=0;tags=[];clusterName=;zoneName=null;policyVersion=1;additionalInfo=null}
2019-07-15T14:30:42.114Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler ==> 
RangerDefaultAuditHandler.logAuthzAudit(AuthzAuditEvent\{repositoryType=17;repositoryName=PrestoTestRepo;user=david.berger;eventTime=Mon
 Jul 15 14:30:42 UTC 
2019;accessType=null;resourcePath=hive;resourceType=catalog;action=select;accessResult=1;agentId=presto;policyId=3;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dave-pr-presto-coordinator-85b57659ff-m2gqx;logType=RangerAudit;eventId=0cadc2ee-a049-4a4c-8a2c-125290583460-20;seq_num=40;event_count=1;event_dur_ms=0;tags=[];clusterName=;zoneName=null;policyVersion=1;additionalInfo=null})
2019-07-15T14:30:42.114Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler <== 
RangerDefaultAuditHandler.logAuthzAudit(AuthzAuditEvent\{repositoryType=17;repositoryName=PrestoTestRepo;user=david.berger;eventTime=Mon
 Jul 15 14:30:42 UTC 
2019;accessType=null;resourcePath=hive;resourceType=catalog;action=select;accessResult=1;agentId=presto;policyId=3;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dave-pr-presto-coordinator-85b57659ff-m2gqx;logType=RangerAudit;eventId=0cadc2ee-a049-4a4c-8a2c-125290583460-20;seq_num=41;event_count=1;event_dur_ms=0;tags=[];clusterName=;zoneName=null;policyVersion=1;additionalInfo=null})
2019-07-15T14:30:42.114Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler <== 
RangerDefaultAuditHandler.processResult(RangerAccessResult=\{isAccessDetermined={true}
 isAllowed=\{true} isAuditedDetermined=\{true} isAudited=\{true} 
policyType=\{0} policyId=\{3} zoneName=\{null} auditPolicyId=\{3} 
policyVersion=\{1} evaluatedPoliciesCount=\{1} reason=\{null} 
additionalInfo={}})
2019-07-15T14:30:42.114Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl <== 
RangerPolicyEngineImpl.evaluatePolicies(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{catalog=hive; } }} accessType=\{select} user=\{david.berger} 
userGroups={} accessTime=\{null} clientIPAddress=\{null} forwardedAddresses={} 
remoteIPAddress=\{null} clientType=\{null} action=\{null} requestData=\{null} 
sessionId=\{null} resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, policyType=0): 
RangerAccessResult=\{isAccessDetermined={true} isAllowed=\{true} 
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{3} 
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{1} 
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}}
2019-07-15T14:30:42.115Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl ==> 
RangerPolicyEngineImpl.preProcess(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName=\{null} clusterType=\{null} 
context={} })
2019-07-15T14:30:42.115Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerAccessRequestImpl Old Remote/Client 
IP Address=null, new IP Address=null
2019-07-15T14:30:42.115Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl <== 
RangerPolicyEngineImpl.preProcess(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.115Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl ==> 
RangerPolicyEngineImpl.evaluatePolicies(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, policyType=0)
2019-07-15T14:30:42.116Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl ==> 
RangerPolicyEngineImpl.zoneAwareAccessEvaluationWithNoAudit(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, policyType =0)
2019-07-15T14:30:42.116Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl zoneName:[null]
2019-07-15T14:30:42.116Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl ==> 
RangerPolicyEngineImpl.evaluatePoliciesNoAudit(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, policyType =0, zoneName=null)
2019-07-15T14:30:42.116Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl ==> 
RangerPolicyEngineImpl.evaluateTagPolicies(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, policyType =0, zoneName=null, 
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{false} 
isAuditedDetermined=\{false} isAudited=\{false} policyType=\{0} policyId=\{-1} 
zoneName=\{null} auditPolicyId=\{-1} policyVersion=\{null} 
evaluatedPoliciesCount=\{0} reason=\{null} additionalInfo={}})
2019-07-15T14:30:42.117Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl <== 
RangerPolicyEngineImpl.evaluateTagPolicies(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, policyType =0, zoneName=null, 
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{false} 
isAuditedDetermined=\{false} isAudited=\{false} policyType=\{0} policyId=\{-1} 
zoneName=\{null} auditPolicyId=\{-1} policyVersion=\{null} 
evaluatedPoliciesCount=\{0} reason=\{null} additionalInfo={}})
2019-07-15T14:30:42.117Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyRepository ==> 
RangerPolicyRepository.setAuditEnabledFromCache()
2019-07-15T14:30:42.117Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyRepository <== 
RangerPolicyRepository.setAuditEnabledFromCache():false
2019-07-15T14:30:42.117Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.util.RangerResourceTrie ==> 
RangerResourceTrie.getEvaluatorsForResource(default)
2019-07-15T14:30:42.118Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.util.RangerResourceTrie <== 
RangerResourceTrie.getEvaluatorsForResource(default): evaluatorCount=4
2019-07-15T14:30:42.118Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.util.RangerResourceTrie ==> 
RangerResourceTrie.getEvaluatorsForResource(hive)
2019-07-15T14:30:42.118Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.util.RangerResourceTrie <== 
RangerResourceTrie.getEvaluatorsForResource(hive): evaluatorCount=4
2019-07-15T14:30:42.118Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.util.RangerResourceTrie ==> 
RangerResourceTrie.getEvaluatorsForResource(dcm_activity)
2019-07-15T14:30:42.118Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.util.RangerResourceTrie <== 
RangerResourceTrie.getEvaluatorsForResource(dcm_activity): evaluatorCount=4
2019-07-15T14:30:42.118Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyRepository <== 
RangerPolicyRepository.getLikelyMatchPolicyEvaluators(hive/default/dcm_activity):
 evaluatorCount=4
2019-07-15T14:30:42.118Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==> 
RangerDefaultPolicyEvaluator.isApplicable(Mon Jul 15 14:30:42 UTC 2019)
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <== 
RangerDefaultPolicyEvaluator.isApplicable(Mon Jul 15 14:30:42 UTC 2019) : true
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==> 
RangerDefaultPolicyEvaluator.evaluate(policyId=3, 
RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null} 
elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, 
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{false} 
isAuditedDetermined=\{false} isAudited=\{false} policyType=\{0} policyId=\{-1} 
zoneName=\{null} auditPolicyId=\{-1} policyVersion=\{null} 
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}})
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
 ==> 
RangerDefaultPolicyResourceMatcher.getMatchType(RangerResourceImpl=\{ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } 
}\{token:USER=david.berger})
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
 ==> 
RangerDefaultPolicyResourceMatcher.getMatchingHierarchy(RangerResourceImpl=\{ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } })
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.model.validation.RangerServiceDefHelper ==> 
hierarchyHasAllResources(hierarchy=RangerResourceDef=\{itemId={1} 
name=\{catalog} type=\{string} level=\{10} parent=\{null} mandatory=\{true} 
lookupSupported=\{true} recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Catalog} description=\{Presto 
Catalog} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={2} name=\{schema} type=\{string} level=\{20} 
parent=\{catalog} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Schema} description=\{Presto 
Schema} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={3} name=\{table} type=\{string} level=\{30} 
parent=\{schema} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Table} description=\{Presto 
Table} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={4} name=\{column} type=\{string} level=\{40} 
parent=\{table} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Column} description=\{Presto 
Column} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
}, resourceNames=schema,catalog,table)
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.model.validation.RangerServiceDefHelper <== 
hierarchyHasAllResources(hierarchy=RangerResourceDef=\{itemId={1} 
name=\{catalog} type=\{string} level=\{10} parent=\{null} mandatory=\{true} 
lookupSupported=\{true} recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Catalog} description=\{Presto 
Catalog} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={2} name=\{schema} type=\{string} level=\{20} 
parent=\{catalog} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Schema} description=\{Presto 
Schema} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={3} name=\{table} type=\{string} level=\{30} 
parent=\{schema} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Table} description=\{Presto 
Table} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={4} name=\{column} type=\{string} level=\{40} 
parent=\{table} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Column} description=\{Presto 
Column} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
}, resourceNames=schema,catalog,table): true
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
 ==> isHierarchyValidForResources(RangerResourceDef=\{itemId={1} 
name=\{catalog} type=\{string} level=\{10} parent=\{null} mandatory=\{true} 
lookupSupported=\{true} recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Catalog} description=\{Presto 
Catalog} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={2} name=\{schema} type=\{string} level=\{20} 
parent=\{catalog} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Schema} description=\{Presto 
Schema} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={3} name=\{table} type=\{string} level=\{30} 
parent=\{schema} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Table} description=\{Presto 
Table} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={4} name=\{column} type=\{string} level=\{40} 
parent=\{table} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Column} description=\{Presto 
Column} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
})
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
 <== isHierarchyValidForResources(RangerResourceDef=\{itemId={1} 
name=\{catalog} type=\{string} level=\{10} parent=\{null} mandatory=\{true} 
lookupSupported=\{true} recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Catalog} description=\{Presto 
Catalog} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={2} name=\{schema} type=\{string} level=\{20} 
parent=\{catalog} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Schema} description=\{Presto 
Schema} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={3} name=\{table} type=\{string} level=\{30} 
parent=\{schema} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Table} description=\{Presto 
Table} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
},RangerResourceDef=\{itemId={4} name=\{column} type=\{string} level=\{40} 
parent=\{table} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Column} description=\{Presto 
Column} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
}) : true
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
 <== 
RangerDefaultPolicyResourceMatcher.getMatchingHierarchy(RangerResourceImpl=\{ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }): 
[RangerResourceDef=\{itemId={1} name=\{catalog} type=\{string} level=\{10} 
parent=\{null} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Catalog} description=\{Presto 
Catalog} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
}, RangerResourceDef=\{itemId={2} name=\{schema} type=\{string} level=\{20} 
parent=\{catalog} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Schema} description=\{Presto 
Schema} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
}, RangerResourceDef=\{itemId={3} name=\{table} type=\{string} level=\{30} 
parent=\{schema} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Table} description=\{Presto 
Table} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
}, RangerResourceDef=\{itemId={4} name=\{column} type=\{string} level=\{40} 
parent=\{table} mandatory=\{true} lookupSupported=\{true} 
recursiveSupported=\{false} excludesSupported=\{true} 
matcher=\{org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher}
 matcherOptions=\{{wildCard=true, ignoreCase=true}} validationRegEx={} 
validationMessage={} uiHint={} label=\{Presto Column} description=\{Presto 
Column} rbKeyLabel=\{null} rbKeyDescription=\{null} 
rbKeyValidationMessage=\{null} accessTypeRestrictions=\{[]} isValidLeaf=\{true} 
}]
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher ==> 
RangerDefaultResourceMatcher.isMatch(hive, \{token:USER=david.berger})
2019-07-15T14:30:42.119Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerAbstractResourceMatcher 
isAllValuesRequested(hive): false
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher <== 
RangerDefaultResourceMatcher.isMatch(hive, \{token:USER=david.berger}): true
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher ==> 
RangerDefaultResourceMatcher.isMatch(default, \{token:USER=david.berger})
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerAbstractResourceMatcher 
isAllValuesRequested(default): false
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher <== 
RangerDefaultResourceMatcher.isMatch(default, \{token:USER=david.berger}): true
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher ==> 
RangerDefaultResourceMatcher.isMatch(dcm_activity, \{token:USER=david.berger})
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerAbstractResourceMatcher 
isAllValuesRequested(dcm_activity): false
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher <== 
RangerDefaultResourceMatcher.isMatch(dcm_activity, \{token:USER=david.berger}): 
true
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher ==> 
RangerDefaultResourceMatcher.isMatch(null, \{token:USER=david.berger})
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerAbstractResourceMatcher 
isAllValuesRequested(null): true
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher <== 
RangerDefaultResourceMatcher.isMatch(null, \{token:USER=david.berger}): true
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyresourcematcher.RangerDefaultPolicyResourceMatcher
 <== 
RangerDefaultPolicyResourceMatcher.getMatchType(RangerResourceImpl=\{ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } 
}\{token:USER=david.berger}): ANCESTOR_WITH_WILDCARDS
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==> 
RangerDefaultPolicyEvaluator.matchPolicyCustomConditions(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <== 
RangerDefaultPolicyEvaluator.matchCustomConditions(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }): true
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==> 
RangerDefaultPolicyEvaluator.evaluatePolicyItems(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, 
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{false} 
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{-1} 
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{null} 
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}}, 
ANCESTOR_WITH_WILDCARDS)
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator Using 
policyItemEvaluators for access evaluation. PolicyId=[3]
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==> 
RangerDefaultPolicyEvaluator.getMatchingPolicyItem(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.120Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <== 
RangerDefaultPolicyEvaluator.getMatchingPolicyItem(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }): null
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==> 
RangerDefaultPolicyEvaluator.getMatchingPolicyItem(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator ==> 
RangerDefaultPolicyItemEvaluator.isMatch(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator ==> 
RangerDefaultPolicyItemEvaluator.matchUserGroupAndOwner(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator ==> 
RangerDefaultPolicyItemEvaluator.matchUserGroup(RangerPolicyItem=\{accessTypes={RangerPolicyItemAccess={type={select}
 isAllowed=\{true} }RangerPolicyItemAccess=\{type={insert} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={create} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={drop} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={use} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={alter} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={admin} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={all} isAllowed=\{true} }} users=\{david.berger 
} groups={} roles={} conditions={} delegateAdmin=\{true} }, david.berger, [], 
null)
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator <== 
RangerDefaultPolicyItemEvaluator.matchUserGroup(RangerPolicyItem=\{accessTypes={RangerPolicyItemAccess={type={select}
 isAllowed=\{true} }RangerPolicyItemAccess=\{type={insert} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={create} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={drop} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={use} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={alter} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={admin} isAllowed=\{true} 
}RangerPolicyItemAccess=\{type={all} isAllowed=\{true} }} users=\{david.berger 
} groups={} roles={} conditions={} delegateAdmin=\{true} }, david.berger, [], 
null): true
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator <== 
RangerDefaultPolicyItemEvaluator.matchUserGroupAndOwner(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }): true
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator ==> 
RangerDefaultPolicyItemEvaluator.matchCustomConditions(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } })
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator <== 
RangerDefaultPolicyItemEvaluator.matchCustomConditions(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }): true
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator <== 
RangerDefaultPolicyItemEvaluator.isMatch(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }): true
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <== 
RangerDefaultPolicyEvaluator.getMatchingPolicyItem(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }): 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyItemEvaluator@6bdfe52e
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator ==> 
RangerDefaultPolicyEvaluator.updateAccessResult(RangerAccessResult=\{isAccessDetermined={false}
 isAllowed=\{false} isAuditedDetermined=\{true} isAudited=\{true} 
policyType=\{0} policyId=\{-1} zoneName=\{null} auditPolicyId=\{3} 
policyVersion=\{null} evaluatedPoliciesCount=\{1} reason=\{null} 
additionalInfo={}}, ANCESTOR_WITH_WILDCARDS, true, null, 3)
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <== 
RangerDefaultPolicyEvaluator.updateAccessResult(RangerAccessResult=\{isAccessDetermined={false}
 isAllowed=\{true} isAuditedDetermined=\{true} isAudited=\{true} 
policyType=\{0} policyId=\{3} zoneName=\{null} auditPolicyId=\{3} 
policyVersion=\{1} evaluatedPoliciesCount=\{1} reason=\{null} 
additionalInfo={}}, ANCESTOR_WITH_WILDCARDS, true, null, 3)
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <== 
RangerDefaultPolicyEvaluator.evaluatePolicyItems(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, 
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{true} 
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{3} 
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{1} 
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}}, 
ANCESTOR_WITH_WILDCARDS)
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyevaluator.RangerDefaultPolicyEvaluator <== 
RangerDefaultPolicyEvaluator.evaluate(policyId=3, 
RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null} 
elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, 
RangerAccessResult=\{isAccessDetermined={false} isAllowed=\{true} 
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{3} 
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{1} 
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}})
2019-07-15T14:30:42.121Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyRepository ==> 
RangerPolicyRepository.storeAuditEnabledInCache()
2019-07-15T14:30:42.122Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyRepository <== 
RangerPolicyRepository.storeAuditEnabledInCache()
2019-07-15T14:30:42.122Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl <== 
RangerPolicyEngineImpl.evaluatePoliciesNoAudit(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, policyType =0, zoneName=null): 
RangerAccessResult=\{isAccessDetermined={true} isAllowed=\{true} 
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{3} 
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{1} 
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}}
2019-07-15T14:30:42.122Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl <== 
RangerPolicyEngineImpl.zoneAwareAccessEvaluationWithNoAudit(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, policyType =0): 
RangerAccessResult=\{isAccessDetermined={true} isAllowed=\{true} 
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{3} 
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{1} 
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}}
2019-07-15T14:30:42.122Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler ==> 
RangerDefaultAuditHandler.processResult(RangerAccessResult=\{isAccessDetermined={true}
 isAllowed=\{true} isAuditedDetermined=\{true} isAudited=\{true} 
policyType=\{0} policyId=\{3} zoneName=\{null} auditPolicyId=\{3} 
policyVersion=\{1} evaluatedPoliciesCount=\{1} reason=\{null} 
additionalInfo={}})
2019-07-15T14:30:42.122Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler ==> 
RangerDefaultAuditHandler.getAuthzEvents(RangerAccessResult=\{isAccessDetermined={true}
 isAllowed=\{true} isAuditedDetermined=\{true} isAudited=\{true} 
policyType=\{0} policyId=\{3} zoneName=\{null} auditPolicyId=\{3} 
policyVersion=\{1} evaluatedPoliciesCount=\{1} reason=\{null} 
additionalInfo={}})
2019-07-15T14:30:42.122Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler <== 
RangerDefaultAuditHandler.getAuthzEvents(RangerAccessResult=\{isAccessDetermined={true}
 isAllowed=\{true} isAuditedDetermined=\{true} isAudited=\{true} 
policyType=\{0} policyId=\{3} zoneName=\{null} auditPolicyId=\{3} 
policyVersion=\{1} evaluatedPoliciesCount=\{1} reason=\{null} 
additionalInfo={}}): 
AuthzAuditEvent\{repositoryType=17;repositoryName=PrestoTestRepo;user=david.berger;eventTime=Mon
 Jul 15 14:30:42 UTC 
2019;accessType=null;resourcePath=hive/default/dcm_activity;resourceType=table;action=select;accessResult=1;agentId=presto;policyId=3;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dave-pr-presto-coordinator-85b57659ff-m2gqx;logType=RangerAudit;eventId=0cadc2ee-a049-4a4c-8a2c-125290583460-21;seq_num=42;event_count=1;event_dur_ms=0;tags=[];clusterName=;zoneName=null;policyVersion=1;additionalInfo=null}
2019-07-15T14:30:42.122Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler ==> 
RangerDefaultAuditHandler.logAuthzAudit(AuthzAuditEvent\{repositoryType=17;repositoryName=PrestoTestRepo;user=david.berger;eventTime=Mon
 Jul 15 14:30:42 UTC 
2019;accessType=null;resourcePath=hive/default/dcm_activity;resourceType=table;action=select;accessResult=1;agentId=presto;policyId=3;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dave-pr-presto-coordinator-85b57659ff-m2gqx;logType=RangerAudit;eventId=0cadc2ee-a049-4a4c-8a2c-125290583460-21;seq_num=42;event_count=1;event_dur_ms=0;tags=[];clusterName=;zoneName=null;policyVersion=1;additionalInfo=null})
2019-07-15T14:30:42.122Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler <== 
RangerDefaultAuditHandler.logAuthzAudit(AuthzAuditEvent\{repositoryType=17;repositoryName=PrestoTestRepo;user=david.berger;eventTime=Mon
 Jul 15 14:30:42 UTC 
2019;accessType=null;resourcePath=hive/default/dcm_activity;resourceType=table;action=select;accessResult=1;agentId=presto;policyId=3;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dave-pr-presto-coordinator-85b57659ff-m2gqx;logType=RangerAudit;eventId=0cadc2ee-a049-4a4c-8a2c-125290583460-21;seq_num=43;event_count=1;event_dur_ms=0;tags=[];clusterName=;zoneName=null;policyVersion=1;additionalInfo=null})
2019-07-15T14:30:42.122Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler <== 
RangerDefaultAuditHandler.processResult(RangerAccessResult=\{isAccessDetermined={true}
 isAllowed=\{true} isAuditedDetermined=\{true} isAudited=\{true} 
policyType=\{0} policyId=\{3} zoneName=\{null} auditPolicyId=\{3} 
policyVersion=\{1} evaluatedPoliciesCount=\{1} reason=\{null} 
additionalInfo={}})
2019-07-15T14:30:42.123Z DEBUG Query-20190715_143041_00003_szi8m-456 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl <== 
RangerPolicyEngineImpl.evaluatePolicies(RangerAccessRequestImpl=\{resource={RangerResourceImpl={ownerUser={null}
 elements=\{schema=default; catalog=hive; table=dcm_activity; } }} 
accessType=\{select} user=\{david.berger} userGroups={} accessTime=\{null} 
clientIPAddress=\{null} forwardedAddresses={} remoteIPAddress=\{null} 
clientType=\{null} action=\{null} requestData=\{null} sessionId=\{null} 
resourceMatchingScope=\{SELF} clusterName={} clusterType={} 
context=\{token:USER={david.berger} } }, policyType=0): 
RangerAccessResult=\{isAccessDetermined={true} isAllowed=\{true} 
isAuditedDetermined=\{true} isAudited=\{true} policyType=\{0} policyId=\{3} 
zoneName=\{null} auditPolicyId=\{3} policyVersion=\{1} 
evaluatedPoliciesCount=\{1} reason=\{null} additionalInfo={}}
2019-07-15T14:30:42.123Z DEBUG dispatcher-query-14 
io.prestosql.execution.QueryStateMachine Query 20190715_143041_00003_szi8m is 
PLANNING
2019-07-15T14:30:42.135Z DEBUG dispatcher-query-13 
io.prestosql.execution.QueryStateMachine Query 20190715_143041_00003_szi8m is 
DISPATCHING
2019-07-15T14:30:42.232Z DEBUG Query-20190715_143041_00003_szi8m-455 
io.prestosql.util.CompilerUtils Defining class: 
io/prestosql/$gen/LongStateSerializer_20190715_143042_4
2019-07-15T14:30:42.241Z DEBUG Query-20190715_143041_00003_szi8m-455 
io.prestosql.util.CompilerUtils Defining class: 
io/prestosql/$gen/SingleLongState_20190715_143042_5
2019-07-15T14:30:42.249Z DEBUG Query-20190715_143041_00003_szi8m-455 
io.prestosql.util.CompilerUtils Defining class: 
io/prestosql/$gen/GroupedLongState_20190715_143042_6
2019-07-15T14:30:42.252Z DEBUG Query-20190715_143041_00003_szi8m-455 
io.prestosql.util.CompilerUtils Defining class: 
io/prestosql/$gen/LongStateFactory_20190715_143042_7
2019-07-15T14:30:42.301Z DEBUG Query-20190715_143041_00003_szi8m-455 
io.prestosql.plugin.hive.metastore.thrift.ThriftHiveMetastoreClient Invocation 
of get_table(dbname='default', tbl_name='dcm_activity') succeeded in 19.34ms
2019-07-15T14:30:42.324Z DEBUG Query-20190715_143041_00003_szi8m-455 
io.prestosql.plugin.hive.metastore.thrift.ThriftHiveMetastoreClient Invocation 
of get_table_statistics_req(request=TableStatsRequest(dbName:default, 
tblName:dcm_activity, colNames:[event_time, user_id, advertiser_id, 
campaign_id, ad_id, rendering_id, creative_version, site_id_dcm, placement_id, 
country_code, state_or_region, browser_or_platform_id, 
browser_or_platform_version, operating_system_id, u_value, activity_id, 
tran_value, other_data, ord_value, interaction_time, conversion_id, 
segment_value_1, floodlight_configuration, event_type, event_sub_type, 
dbm_auction_id, dbm_request_time, dbm_advertiser_id, dbm_insertion_order_id, 
dbm_line_item_id, dbm_creative_id, dbm_bid_price_usd, 
dbm_bid_price_partner_currency, dbm_bid_price_advertiser_currency, dbm_url, 
dbm_site_id, dbm_language, dbm_adx_page_categories, 
dbm_matching_targeted_keywords, dbm_exchange_id, 
dbm_attributed_inventory_source_external_id, 
dbm_attributed_inventory_source_is_public, dbm_ad_position, dbm_country_code, 
dbm_designated_market_area_dma_id, dbm_zip_or_postal_code, 
dbm_state_or_region_id, dbm_city_id, dbm_operating_system_id, 
dbm_browser_or_platform_id, dbm_browser_timezone_offset_minutes, dbm_net_speed, 
dbm_matching_targeted_segments, dbm_isp_id, dbm_device_type, 
dbm_mobile_make_id, dbm_mobile_model_id, partner2_id, total_conversions, 
total_revenue, dbm_media_cost_usd, dbm_media_cost_partner_currency, 
dbm_media_cost_advertiser_currency, dbm_revenue_usd, 
dbm_revenue_partner_currency, dbm_revenue_advertiser_currency, 
dbm_total_media_cost_usd, dbm_total_media_cost_partner_currency, 
dbm_total_media_cost_advertiser_currency, dbm_cpm_fee_1_usd, 
dbm_cpm_fee_1_partner_currency, dbm_cpm_fee_1_advertiser_currency, 
dbm_cpm_fee_2_usd, dbm_cpm_fee_2_partner_currency, 
dbm_cpm_fee_2_advertiser_currency, dbm_cpm_fee_3_usd, 
dbm_cpm_fee_3_partner_currency, dbm_cpm_fee_3_advertiser_currency, 
dbm_cpm_fee_4_usd, dbm_cpm_fee_4_partner_currency, 
dbm_cpm_fee_4_advertiser_currency, dbm_cpm_fee_5_usd, 
dbm_cpm_fee_5_partner_currency, dbm_cpm_fee_5_advertiser_currency, 
dbm_media_fee_1_usd, dbm_media_fee_1_partner_currency, 
dbm_media_fee_1_advertiser_currency, dbm_media_fee_2_usd, 
dbm_media_fee_2_partner_currency, dbm_media_fee_2_advertiser_currency, 
dbm_media_fee_3_usd, dbm_media_fee_3_partner_currency, 
dbm_media_fee_3_advertiser_currency, dbm_media_fee_4_usd, 
dbm_media_fee_4_partner_currency, dbm_media_fee_4_advertiser_currency, 
dbm_media_fee_5_usd, dbm_media_fee_5_partner_currency, 
dbm_media_fee_5_advertiser_currency, dbm_data_fees_usd, 
dbm_data_fees_partner_currency, dbm_data_fees_advertiser_currency, 
dbm_billable_cost_usd, dbm_billable_cost_partner_currency, 
dbm_billable_cost_advertiser_currency, etl_timestamp, src_file])) succeeded in 
20.88ms

> Presto 'Access Type' is empty in the audit log
> ----------------------------------------------
>
>                 Key: RANGER-2505
>                 URL: https://issues.apache.org/jira/browse/RANGER-2505
>             Project: Ranger
>          Issue Type: Bug
>          Components: plugins, Ranger
>    Affects Versions: 2.0.0
>            Reporter: David Berger
>            Priority: Major
>         Attachments: Screen Shot 2019-07-12 at 15.02.41 pm.png
>
>
> In the UI the 'Access Type' isn't populated anymore. (see attached screenshot)
> This happened after I did a new build on the 8th of June.
> I'm sure it was working in an earlier 2.0-SNAPSHOT build but I haven't got 
> those jars anymore. :(
> I tried a latest build from today but I'm having the same issue.
>  



--
This message was sent by Atlassian JIRA
(v7.6.14#76016)

Reply via email to