yikuanlee commented on issue #5817:
URL: https://github.com/apache/iceberg/issues/5817#issuecomment-1255364692

   Also, Hive metastore reported that iceberg table report 
   AllRequestedHiveResources={db2iuser/t32_iceberg; null://null; } 
   not sure why iceberg won't return full hdfs directory but  null://null 
instead.
   ```
   2022-09-22 17:30:48,009 DEBUG org.apache.ranger.perf.resourcetrie.retrieval: 
[pool-5-thread-17]: [PERF] 
RangerPolicyRepository.getLikelyMatchEvaluators(resource=null://null): 0
   2022-09-22 17:30:48,009 DEBUG 
org.apache.ranger.plugin.policyengine.RangerPolicyRepository: 
[pool-5-thread-17]: <== 
RangerPolicyRepository.getLikelyMatchPolicyEvaluators(null://null): 
evaluatorCount=0
   2022-09-22 17:30:48,009 DEBUG 
org.apache.ranger.plugin.policyengine.RangerPolicyRepository: 
[pool-5-thread-17]: ==> RangerPolicyRepository.storeAuditEnabledInCache()
   2022-09-22 17:30:48,010 DEBUG 
org.apache.ranger.plugin.policyengine.RangerPolicyRepository: 
[pool-5-thread-17]: <== RangerPolicyRepository.storeAuditEnabledInCache()
   2022-09-22 17:30:48,010 DEBUG 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl: 
[pool-5-thread-17]: <== 
RangerPolicyEngineImpl.evaluatePoliciesNoAudit(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={db2iuser}
 elements={} }} accessType={rwstorage} user={db2iuser} userGroups={hive 
db2iuser } userRoles={} accessTime={Thu Sep 22 17:30:47 UTC 2022} 
clientIPAddress={10.89.0.3} forwardedAddresses={} remoteIPAddress={10.89.0.3} 
clientType={HIVEMETASTORE} action={ALTERTABLE_ADDCOLS} requestData={alter table 
t32_iceberg} sessionId={HiveMetaStore} resourceMatchingScope={SELF} 
clusterName={DV} clusterType={} 
context={REQUESTED_RESOURCES={AllRequestedHiveResources={db2iuser/t32_iceberg; 
null://null; } } token:OWNER={db2iuser} token:USER={db2iuser} } }, policyType 
=0, zoneName=null): RangerAccessResult={isAccessDetermined={true} 
isAllowed={false} isAuditedDetermined={false} isAudited={false} 
auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicy
 Id={-1} policyVersion={null} evaluatedPoliciesCount={0} reason={null} 
additionalInfo={}}
   2022-09-22 17:30:48,010 DEBUG 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl: 
[pool-5-thread-17]: <== 
RangerPolicyEngineImpl.zoneAwareAccessEvaluationWithNoAudit(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={db2iuser}
 elements={} }} accessType={rwstorage} user={db2iuser} userGroups={hive 
db2iuser } userRoles={} accessTime={Thu Sep 22 17:30:47 UTC 2022} 
clientIPAddress={10.89.0.3} forwardedAddresses={} remoteIPAddress={10.89.0.3} 
clientType={HIVEMETASTORE} action={ALTERTABLE_ADDCOLS} requestData={alter table 
t32_iceberg} sessionId={HiveMetaStore} resourceMatchingScope={SELF} 
clusterName={DV} clusterType={} 
context={REQUESTED_RESOURCES={AllRequestedHiveResources={db2iuser/t32_iceberg; 
null://null; } } token:OWNER={db2iuser} token:USER={db2iuser} } }, policyType 
=0): RangerAccessResult={isAccessDetermined={true} isAllowed={false} 
isAuditedDetermined={false} isAudited={false} auditLogId={null} policyType={0} 
policyId={-1} zoneName={null} auditPolicyId
 ={-1} policyVersion={null} evaluatedPoliciesCount={0} reason={null} 
additionalInfo={}}
   2022-09-22 17:30:48,011 DEBUG org.apache.ranger.perf.policyengine.request: 
[pool-5-thread-17]: [PERF] 
RangerPolicyEngine.evaluatePolicies(requestHashCode=53a8da6e_0): 4
   2022-09-22 17:30:48,011 DEBUG 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl: 
[pool-5-thread-17]: <== 
RangerPolicyEngineImpl.evaluatePolicies(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={db2iuser}
 elements={} }} accessType={rwstorage} user={db2iuser} userGroups={hive 
db2iuser } userRoles={} accessTime={Thu Sep 22 17:30:47 UTC 2022} 
clientIPAddress={10.89.0.3} forwardedAddresses={} remoteIPAddress={10.89.0.3} 
clientType={HIVEMETASTORE} action={ALTERTABLE_ADDCOLS} requestData={alter table 
t32_iceberg} sessionId={HiveMetaStore} resourceMatchingScope={SELF} 
clusterName={DV} clusterType={} 
context={REQUESTED_RESOURCES={AllRequestedHiveResources={db2iuser/t32_iceberg; 
null://null; } } token:OWNER={db2iuser} token:USER={db2iuser} } }, 
policyType=0): RangerAccessResult={isAccessDetermined={true} isAllowed={false} 
isAuditedDetermined={false} isAudited={false} auditLogId={null} policyType={0} 
policyId={-1} zoneName={null} auditPolicyId={-1} policyVersion={
 null} evaluatedPoliciesCount={0} reason={null} additionalInfo={}}
   2022-09-22 17:30:48,011 DEBUG 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl: 
[pool-5-thread-17]: ==> 
RangerPolicyEngineImpl.evaluateAuditPolicies(result=RangerAccessResult={isAccessDetermined={true}
 isAllowed={false} isAuditedDetermined={false} isAudited={false} 
auditLogId={null} policyType={0} policyId={-1} zoneName={null} 
auditPolicyId={-1} policyVersion={null} evaluatedPoliciesCount={0} 
reason={null} additionalInfo={}})
   2022-09-22 17:30:48,011 DEBUG 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl: 
[pool-5-thread-17]: ==> 
RangerPolicyEngineImpl.evaluateTagAuditPolicies(request=RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={db2iuser}
 elements={} }} accessType={rwstorage} user={db2iuser} userGroups={hive 
db2iuser } userRoles={} accessTime={Thu Sep 22 17:30:47 UTC 2022} 
clientIPAddress={10.89.0.3} forwardedAddresses={} remoteIPAddress={10.89.0.3} 
clientType={HIVEMETASTORE} action={ALTERTABLE_ADDCOLS} requestData={alter table 
t32_iceberg} sessionId={HiveMetaStore} resourceMatchingScope={SELF} 
clusterName={DV} clusterType={} 
context={REQUESTED_RESOURCES={AllRequestedHiveResources={db2iuser/t32_iceberg; 
null://null; } } token:OWNER={db2iuser} token:USER={db2iuser} } }, 
result=RangerAccessResult={isAccessDetermined={true} isAllowed={false} 
isAuditedDetermined={false} isAudited={false} auditLogId={null} policyType={0} 
policyId={-1} zoneName={null} auditPolicyId={-1} policyV
 ersion={null} evaluatedPoliciesCount={0} reason={null} additionalInfo={}})
   2022-09-22 17:30:48,012 DEBUG 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl: 
[pool-5-thread-17]: <== 
RangerPolicyEngineImpl.evaluateTagAuditPolicies(request=RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={db2iuser}
 elements={} }} accessType={rwstorage} user={db2iuser} userGroups={hive 
db2iuser } userRoles={} accessTime={Thu Sep 22 17:30:47 UTC 2022} 
clientIPAddress={10.89.0.3} forwardedAddresses={} remoteIPAddress={10.89.0.3} 
clientType={HIVEMETASTORE} action={ALTERTABLE_ADDCOLS} requestData={alter table 
t32_iceberg} sessionId={HiveMetaStore} resourceMatchingScope={SELF} 
clusterName={DV} clusterType={} 
context={REQUESTED_RESOURCES={AllRequestedHiveResources={db2iuser/t32_iceberg; 
null://null; } } token:OWNER={db2iuser} token:USER={db2iuser} } }, 
result=RangerAccessResult={isAccessDetermined={true} isAllowed={false} 
isAuditedDetermined={false} isAudited={false} auditLogId={null} policyType={0} 
policyId={-1} zoneName={null} auditPolicyId={-1} policyV
 ersion={null} evaluatedPoliciesCount={0} reason={null} additionalInfo={}})
   2022-09-22 17:30:48,012 DEBUG 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl: 
[pool-5-thread-17]: ==> 
RangerPolicyEngineImpl.evaluateResourceAuditPolicies(request=RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={db2iuser}
 elements={} }} accessType={rwstorage} user={db2iuser} userGroups={hive 
db2iuser } userRoles={} accessTime={Thu Sep 22 17:30:47 UTC 2022} 
clientIPAddress={10.89.0.3} forwardedAddresses={} remoteIPAddress={10.89.0.3} 
clientType={HIVEMETASTORE} action={ALTERTABLE_ADDCOLS} requestData={alter table 
t32_iceberg} sessionId={HiveMetaStore} resourceMatchingScope={SELF} 
clusterName={DV} clusterType={} 
context={REQUESTED_RESOURCES={AllRequestedHiveResources={db2iuser/t32_iceberg; 
null://null; } } token:OWNER={db2iuser} token:USER={db2iuser} } }, 
result=RangerAccessResult={isAccessDetermined={true} isAllowed={false} 
isAuditedDetermined={false} isAudited={false} auditLogId={null} policyType={0} 
policyId={-1} zoneName={null} auditPolicyId={-1} po
 licyVersion={null} evaluatedPoliciesCount={0} reason={null} additionalInfo={}})
   2022-09-22 17:30:48,012 DEBUG org.apache.ranger.perf.resourcetrie.retrieval: 
[pool-5-thread-17]: [PERF] 
RangerPolicyRepository.getLikelyMatchEvaluators(resource=null://null): 0
   2022-09-22 17:30:48,012 DEBUG 
org.apache.ranger.plugin.policyengine.RangerPolicyRepository: 
[pool-5-thread-17]: <== 
RangerPolicyRepository.getLikelyMatchPolicyEvaluators(null://null): 
evaluatorCount=0
   2022-09-22 17:30:48,012 DEBUG 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl: 
[pool-5-thread-17]: <== 
RangerPolicyEngineImpl.evaluateResourceAuditPolicies(request=RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={db2iuser}
 elements={} }} accessType={rwstorage} user={db2iuser} userGroups={hive 
db2iuser } userRoles={} accessTime={Thu Sep 22 17:30:47 UTC 2022} 
clientIPAddress={10.89.0.3} forwardedAddresses={} remoteIPAddress={10.89.0.3} 
clientType={HIVEMETASTORE} action={ALTERTABLE_ADDCOLS} requestData={alter table 
t32_iceberg} sessionId={HiveMetaStore} resourceMatchingScope={SELF} 
clusterName={DV} clusterType={} 
context={REQUESTED_RESOURCES={AllRequestedHiveResources={db2iuser/t32_iceberg; 
null://null; } } token:OWNER={db2iuser} token:USER={db2iuser} } }, 
result=RangerAccessResult={isAccessDetermined={true} isAllowed={false} 
isAuditedDetermined={false} isAudited={false} auditLogId={null} policyType={0} 
policyId={-1} zoneName={null} auditPolicyId={-1} po
 licyVersion={null} evaluatedPoliciesCount={0} reason={null} 
additionalInfo={}}): ret=false
   2022-09-22 17:30:48,012 DEBUG 
org.apache.ranger.plugin.policyengine.RangerPolicyEngineImpl: 
[pool-5-thread-17]: <== 
RangerPolicyEngineImpl.evaluateAuditPolicies(result=RangerAccessResult={isAccessDetermined={true}
 isAllowed={false} isAuditedDetermined={false} isAudited={false} 
auditLogId={null} policyType={0} policyId={-1} zoneName={null} 
auditPolicyId={-1} policyVersion={null} evaluatedPoliciesCount={0} 
reason={null} additionalInfo={}})
   2022-09-22 17:30:48,039 DEBUG 
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler: [pool-5-thread-17]: 
==> 
RangerDefaultAuditHandler.logAuthzAudit(AuthzAuditEvent{repositoryType=3;repositoryName=cm_hive;user=db2iuser;eventTime=Thu
 Sep 22 17:30:47 UTC 
2022;accessType=ALTER;resourcePath=db2iuser/t32_iceberg;resourceType=@table;action=alter;accessResult=1;agentId=hiveMetastore;policyId=8;resultReason=null;aclEnforcer=ranger-acl;sessionId=HiveMetaStore;clientType=HIVEMETASTORE;clientIP=10.89.0.3;requestData=alter
 table 
t32_iceberg;agentHostname=cms.dv.net;logType=RangerAudit;eventId=ab214aac-e979-4888-8052-1a243f638e07-0;seq_num=0;event_count=1;event_dur_ms=0;tags=[];clusterName=DV;zoneName=null;policyVersion=5;additionalInfo={"remote-ip-address":10.89.0.3,
 "forwarded-ip-addresses":[]})
   2022-09-22 17:30:48,039 DEBUG 
org.apache.ranger.plugin.audit.RangerDefaultAuditHandler: [pool-5-thread-17]: 
<== 
RangerDefaultAuditHandler.logAuthzAudit(AuthzAuditEvent{repositoryType=3;repositoryName=cm_hive;user=db2iuser;eventTime=Thu
 Sep 22 17:30:47 UTC 
2022;accessType=ALTER;resourcePath=db2iuser/t32_iceberg;resourceType=@table;action=alter;accessResult=1;agentId=hiveMetastore;policyId=8;resultReason=null;aclEnforcer=ranger-acl;sessionId=HiveMetaStore;clientType=HIVEMETASTORE;clientIP=10.89.0.3;requestData=alter
 table 
t32_iceberg;agentHostname=cms.dv.net;logType=RangerAudit;eventId=ab214aac-e979-4888-8052-1a243f638e07-0;seq_num=1;event_count=1;event_dur_ms=0;tags=[];clusterName=DV;zoneName=null;policyVersion=5;additionalInfo={"remote-ip-address":10.89.0.3,
 "forwarded-ip-addresses":[]})
   2022-09-22 17:30:48,040 DEBUG org.apache.ranger.perf.hiveauth.request: 
[pool-5-thread-17]: [PERF] 
RangerHiveAuthorizer.checkPrivileges(hiveOpType=ALTERTABLE_ADDCOLS): 55
   2022-09-22 17:30:48,042 ERROR 
org.apache.hadoop.hive.ql.security.authorization.plugin.metastore.HiveMetaStoreAuthorizer:
 [pool-5-thread-17]: HiveMetaStoreAuthorizer.onEvent(): failed
   org.apache.hadoop.hive.metastore.api.MetaException: Permission denied: user 
[db2iuser] does not have [RWSTORAGE] privilege on [null://null]
           at 
org.apache.hadoop.hive.ql.security.authorization.plugin.metastore.HiveMetaStoreAuthorizer.checkPrivileges(HiveMetaStoreAuthorizer.java:532)
 ~[hive-exec-3.1.3000.7.1.7.0-551.jar:3.1.3000.7.1.7.0-551]
           at 
org.apache.hadoop.hive.ql.security.authorization.plugin.metastore.HiveMetaStoreAuthorizer.onEvent(HiveMetaStoreAuthorizer.java:106)
 [hive-exec-3.1.3000.7.1.7.0-551.jar:3.1.3000.7.1.7.0-551]
           at 
org.apache.hadoop.hive.metastore.HiveMetaStore$HMSHandler.firePreEvent(HiveMetaStore.java:3979)
 [hive-exec-3.1.3000.7.1.7.0-551.jar:3.1.3000.7.1.7.0-551]
           at 
org.apache.hadoop.hive.metastore.HiveMetaStore$HMSHandler.alter_table_core(HiveMetaStore.java:5879)
 [hive-exec-3.1.3000.7.1.7.0-551.jar:3.1.3000.7.1.7.0-551]
           at 
org.apache.hadoop.hive.metastore.HiveMetaStore$HMSHandler.alter_table_req(HiveMetaStore.java:5825)
 [hive-exec-3.1.3000.7.1.7.0-551.jar:3.1.3000.7.1.7.0-551]
           at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) 
~[?:1.8.0_232]
           at 
sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) 
~[?:1.8.0_232]
           at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
 ~[?:1.8.0_232]
           at java.lang.reflect.Method.invoke(Method.java:498) ~[?:1.8.0_232]
           at 
org.apache.hadoop.hive.metastore.RetryingHMSHandler.invokeInternal(RetryingHMSHandler.java:147)
 [hive-exec-3.1.3000.7.1.7.0-551.jar:3.1.3000.7.1.7.0-551]
           at 
org.apache.hadoop.hive.metastore.RetryingHMSHandler.invoke(RetryingHMSHandler.java:108)
 [hive-exec-3.1.3000.7.1.7.0-551.jar:3.1.3000.7.1.7.0-551]
           at com.sun.proxy.$Proxy28.alter_table_req(Unknown Source) [?:?]
           at 
org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$Processor$alter_table_req.getResult(ThriftHiveMetastore.java:17439)
 [hive-exec-3.1.3000.7.1.7.0-551.jar:3.1.3000.7.1.7.0-551]
           at 
org.apache.hadoop.hive.metastore.api.ThriftHiveMetastore$Processor$alter_table_req.getResult(ThriftHiveMetastore.java:17423)
 [hive-exec-3.1.3000.7.1.7.0-551.jar:3.1.3000.7.1.7.0-551]
           at 
org.apache.thrift.ProcessFunction.process(ProcessFunction.java:39) 
[hive-exec-3.1.3000.7.1.7.0-551.jar:3.1.3000.7.1.7.0-551]
           at 
org.apache.hadoop.hive.metastore.TUGIBasedProcessor$1.run(TUGIBasedProcessor.java:111)
 [hive-exec-3.1.3000.7.1.7.0-551.jar:3.1.3000.7.1.7.0-551]
           at 
org.apache.hadoop.hive.metastore.TUGIBasedProcessor$1.run(TUGIBasedProcessor.java:107)
 [hive-exec-3.1.3000.7.1.7.0-551.jar:3.1.3000.7.1.7.0-551]
           at java.security.AccessController.doPrivileged(Native Method) 
~[?:1.8.0_232]
           at javax.security.auth.Subject.doAs(Subject.java:422) [?:1.8.0_232]
           at 
org.apache.hadoop.security.UserGroupInformation.doAs(UserGroupInformation.java:1898)
 [hadoop-common-3.1.1.7.1.7.0-551.jar:?]
           at 
org.apache.hadoop.hive.metastore.TUGIBasedProcessor.process(TUGIBasedProcessor.java:119)
 [hive-exec-3.1.3000.7.1.7.0-551.jar:3.1.3000.7.1.7.0-551]
           at 
org.apache.thrift.server.TThreadPoolServer$WorkerProcess.run(TThreadPoolServer.java:286)
 [hive-exec-3.1.3000.7.1.7.0-551.jar:3.1.3000.7.1.7.0-551]
           at 
java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) 
[?:1.8.0_232]
           at 
java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) 
[?:1.8.0_232]
           at java.lang.Thread.run(Thread.java:748) [?:1.8.0_232]
   ```


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to