[jira] [Updated] (HIVE-3277) Enable Metastore audit logging for non-secure connections

2012-09-24 Thread Sean Mackrory (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-3277?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sean Mackrory updated HIVE-3277:


Attachment: HIVE-3277.patch

> Enable Metastore audit logging for non-secure connections
> -
>
> Key: HIVE-3277
> URL: https://issues.apache.org/jira/browse/HIVE-3277
> Project: Hive
>  Issue Type: Improvement
>  Components: Logging, Metastore, Security
>Reporter: Carl Steinbach
> Attachments: HIVE-3277.patch
>
>


--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HIVE-3277) Enable Metastore audit logging for non-secure connections

2012-09-24 Thread Sean Mackrory (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-3277?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sean Mackrory updated HIVE-3277:


Status: Patch Available  (was: Open)

This patch uses the alternative method of determining the IP address in the 
event that there is no SASL connection. I've tested this out on a 
pseudo-distributed Hadoop cluster and audit logging worked.

> Enable Metastore audit logging for non-secure connections
> -
>
> Key: HIVE-3277
> URL: https://issues.apache.org/jira/browse/HIVE-3277
> Project: Hive
>  Issue Type: Improvement
>  Components: Logging, Metastore, Security
>Reporter: Carl Steinbach
> Attachments: HIVE-3277.patch
>
>


--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HIVE-3277) Enable Metastore audit logging for non-secure connections

2012-09-24 Thread Sean Mackrory (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-3277?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sean Mackrory updated HIVE-3277:


Attachment: (was: HIVE-3277.patch)

> Enable Metastore audit logging for non-secure connections
> -
>
> Key: HIVE-3277
> URL: https://issues.apache.org/jira/browse/HIVE-3277
> Project: Hive
>  Issue Type: Improvement
>  Components: Logging, Metastore, Security
>Reporter: Carl Steinbach
>Assignee: Sean Mackrory
> Attachments: HIVE-3277.patch.1
>
>


--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HIVE-3277) Enable Metastore audit logging for non-secure connections

2012-09-24 Thread Sean Mackrory (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-3277?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sean Mackrory updated HIVE-3277:


Attachment: HIVE-3277.patch.1

My apologies - original patch was malformed.

> Enable Metastore audit logging for non-secure connections
> -
>
> Key: HIVE-3277
> URL: https://issues.apache.org/jira/browse/HIVE-3277
> Project: Hive
>  Issue Type: Improvement
>  Components: Logging, Metastore, Security
>Reporter: Carl Steinbach
>Assignee: Sean Mackrory
> Attachments: HIVE-3277.patch.1
>
>


--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (HIVE-3277) Enable Metastore audit logging for non-secure connections

2012-09-24 Thread Sean Mackrory (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-3277?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13462121#comment-13462121
 ] 

Sean Mackrory commented on HIVE-3277:
-

Code review: https://reviews.apache.org/r/7236/

> Enable Metastore audit logging for non-secure connections
> -
>
> Key: HIVE-3277
> URL: https://issues.apache.org/jira/browse/HIVE-3277
> Project: Hive
>  Issue Type: Improvement
>  Components: Logging, Metastore, Security
>Reporter: Carl Steinbach
>Assignee: Sean Mackrory
> Attachments: HIVE-3277.patch.1
>
>


--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HIVE-3277) Enable Metastore audit logging for non-secure connections

2012-09-24 Thread Sean Mackrory (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-3277?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sean Mackrory updated HIVE-3277:


Attachment: HIVE-3277.patch.2

Second patch fixes a code style issue

> Enable Metastore audit logging for non-secure connections
> -
>
> Key: HIVE-3277
> URL: https://issues.apache.org/jira/browse/HIVE-3277
> Project: Hive
>  Issue Type: Improvement
>  Components: Logging, Metastore, Security
>Reporter: Carl Steinbach
>Assignee: Sean Mackrory
> Attachments: HIVE-3277.patch.1, HIVE-3277.patch.2
>
>


--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Created] (HIVE-3505) log4j template has logging threshold that hides all audit logs

2012-09-24 Thread Sean Mackrory (JIRA)
Sean Mackrory created HIVE-3505:
---

 Summary: log4j template has logging threshold that hides all audit 
logs
 Key: HIVE-3505
 URL: https://issues.apache.org/jira/browse/HIVE-3505
 Project: Hive
  Issue Type: Bug
Reporter: Sean Mackrory


With the "template" for log4j configuration provided in the tarball, audit 
logging is hidden (it's logged as "INFO"). By making the log threshold a 
parameter, this information remains hidden when using the CLI (which is 
desired) but can be overridden when starting services to enable audit-logging.

(This is primarily so that Hive is more functional out-of-the-box as installed 
by Apache Bigtop).

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HIVE-3505) log4j template has logging threshold that hides all audit logs

2012-09-24 Thread Sean Mackrory (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-3505?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sean Mackrory updated HIVE-3505:


Attachment: HIVE-3505.patch.1

> log4j template has logging threshold that hides all audit logs
> --
>
> Key: HIVE-3505
> URL: https://issues.apache.org/jira/browse/HIVE-3505
> Project: Hive
>  Issue Type: Bug
>Reporter: Sean Mackrory
> Attachments: HIVE-3505.patch.1
>
>
> With the "template" for log4j configuration provided in the tarball, audit 
> logging is hidden (it's logged as "INFO"). By making the log threshold a 
> parameter, this information remains hidden when using the CLI (which is 
> desired) but can be overridden when starting services to enable audit-logging.
> (This is primarily so that Hive is more functional out-of-the-box as 
> installed by Apache Bigtop).

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HIVE-3505) log4j template has logging threshold that hides all audit logs

2012-09-24 Thread Sean Mackrory (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-3505?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sean Mackrory updated HIVE-3505:


Status: Patch Available  (was: Open)

Code review here: https://reviews.apache.org/r/7238/

> log4j template has logging threshold that hides all audit logs
> --
>
> Key: HIVE-3505
> URL: https://issues.apache.org/jira/browse/HIVE-3505
> Project: Hive
>  Issue Type: Bug
>Reporter: Sean Mackrory
> Attachments: HIVE-3505.patch.1
>
>
> With the "template" for log4j configuration provided in the tarball, audit 
> logging is hidden (it's logged as "INFO"). By making the log threshold a 
> parameter, this information remains hidden when using the CLI (which is 
> desired) but can be overridden when starting services to enable audit-logging.
> (This is primarily so that Hive is more functional out-of-the-box as 
> installed by Apache Bigtop).

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HIVE-3505) log4j template has logging threshold that hides all audit logs

2012-09-24 Thread Sean Mackrory (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-3505?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sean Mackrory updated HIVE-3505:


Attachment: HIVE-3505.patch.2

This patch fixes a typo that existed on these lines before this fix. This patch 
is also in SVN format (as opposed to git).

> log4j template has logging threshold that hides all audit logs
> --
>
> Key: HIVE-3505
> URL: https://issues.apache.org/jira/browse/HIVE-3505
> Project: Hive
>  Issue Type: Bug
>  Components: Logging
>Reporter: Sean Mackrory
>Assignee: Sean Mackrory
> Attachments: HIVE-3505.patch.1, HIVE-3505.patch.2
>
>
> With the "template" for log4j configuration provided in the tarball, audit 
> logging is hidden (it's logged as "INFO"). By making the log threshold a 
> parameter, this information remains hidden when using the CLI (which is 
> desired) but can be overridden when starting services to enable audit-logging.
> (This is primarily so that Hive is more functional out-of-the-box as 
> installed by Apache Bigtop).

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (HIVE-3505) log4j template has logging threshold that hides all audit logs

2012-09-24 Thread Sean Mackrory (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-3505?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13462221#comment-13462221
 ] 

Sean Mackrory commented on HIVE-3505:
-

log4j.threshold and hive.root.logger specify two different levels. Should they 
actually be the same, in reality or should only one be paramterized? Which 
would be most intuitive considering how this file gets used?

> log4j template has logging threshold that hides all audit logs
> --
>
> Key: HIVE-3505
> URL: https://issues.apache.org/jira/browse/HIVE-3505
> Project: Hive
>  Issue Type: Bug
>  Components: Logging
>Reporter: Sean Mackrory
>Assignee: Sean Mackrory
> Attachments: HIVE-3505.patch.1, HIVE-3505.patch.2
>
>
> With the "template" for log4j configuration provided in the tarball, audit 
> logging is hidden (it's logged as "INFO"). By making the log threshold a 
> parameter, this information remains hidden when using the CLI (which is 
> desired) but can be overridden when starting services to enable audit-logging.
> (This is primarily so that Hive is more functional out-of-the-box as 
> installed by Apache Bigtop).

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HIVE-3505) log4j template has logging threshold that hides all audit logs

2012-09-24 Thread Sean Mackrory (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-3505?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sean Mackrory updated HIVE-3505:


Attachment: HIVE-3505.patch.3

New patch applies the same change to hive-exec-log4j.properties

> log4j template has logging threshold that hides all audit logs
> --
>
> Key: HIVE-3505
> URL: https://issues.apache.org/jira/browse/HIVE-3505
> Project: Hive
>  Issue Type: Bug
>  Components: Logging
>Reporter: Sean Mackrory
>Assignee: Sean Mackrory
> Attachments: HIVE-3505.patch.1, HIVE-3505.patch.2, HIVE-3505.patch.3
>
>
> With the "template" for log4j configuration provided in the tarball, audit 
> logging is hidden (it's logged as "INFO"). By making the log threshold a 
> parameter, this information remains hidden when using the CLI (which is 
> desired) but can be overridden when starting services to enable audit-logging.
> (This is primarily so that Hive is more functional out-of-the-box as 
> installed by Apache Bigtop).

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HIVE-3505) log4j template has logging threshold that hides all audit logs

2012-09-24 Thread Sean Mackrory (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-3505?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sean Mackrory updated HIVE-3505:


Attachment: HIVE-3505.patch.4

> log4j template has logging threshold that hides all audit logs
> --
>
> Key: HIVE-3505
> URL: https://issues.apache.org/jira/browse/HIVE-3505
> Project: Hive
>  Issue Type: Bug
>  Components: Logging
>Reporter: Sean Mackrory
>Assignee: Sean Mackrory
> Attachments: HIVE-3505.patch.1, HIVE-3505.patch.2, HIVE-3505.patch.3, 
> HIVE-3505.patch.4
>
>
> With the "template" for log4j configuration provided in the tarball, audit 
> logging is hidden (it's logged as "INFO"). By making the log threshold a 
> parameter, this information remains hidden when using the CLI (which is 
> desired) but can be overridden when starting services to enable audit-logging.
> (This is primarily so that Hive is more functional out-of-the-box as 
> installed by Apache Bigtop).

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HIVE-3277) Enable Metastore audit logging for non-secure connections

2012-09-27 Thread Sean Mackrory (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-3277?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sean Mackrory updated HIVE-3277:


Resolution: Fixed
Status: Resolved  (was: Patch Available)

> Enable Metastore audit logging for non-secure connections
> -
>
> Key: HIVE-3277
> URL: https://issues.apache.org/jira/browse/HIVE-3277
> Project: Hive
>  Issue Type: Improvement
>  Components: Logging, Metastore, Security
>Reporter: Carl Steinbach
>Assignee: Sean Mackrory
> Attachments: HIVE-3277.patch.1, HIVE-3277.patch.2
>
>


--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Updated] (HIVE-4070) Like operator in Hive is case sensitive while in MySQL (and most likely other DBs) it's case insensitive

2013-02-25 Thread Sean Mackrory (JIRA)

 [ 
https://issues.apache.org/jira/browse/HIVE-4070?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sean Mackrory updated HIVE-4070:


Summary: Like operator in Hive is case sensitive while in MySQL (and most 
likely other DBs) it's case insensitive  (was: Like operator in Hive is case 
sensitive while in MySQL (and most likely other DBs) it's case sensitive)

> Like operator in Hive is case sensitive while in MySQL (and most likely other 
> DBs) it's case insensitive
> 
>
> Key: HIVE-4070
> URL: https://issues.apache.org/jira/browse/HIVE-4070
> Project: Hive
>  Issue Type: Bug
>  Components: UDF
>Affects Versions: 0.10.0
>Reporter: Mark Grover
>Assignee: Mark Grover
> Fix For: 0.11.0
>
>
> Hive's like operator seems to be case sensitive.
> See 
> https://github.com/apache/hive/blob/trunk/ql/src/java/org/apache/hadoop/hive/ql/udf/UDFLike.java#L164
> However, MySQL's like operator is case insensitive. I don't have other DB's 
> (like PostgreSQL) installed and handy but I am guessing their LIKE is case 
> insensitive as well.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (HIVE-4070) Like operator in Hive is case sensitive while in MySQL (and most likely other DBs) it's case sensitive

2013-02-25 Thread Sean Mackrory (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-4070?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13585944#comment-13585944
 ] 

Sean Mackrory commented on HIVE-4070:
-

Though admittedly it was a question of mine trying to clarify HiveQL that 
spawned this thought, I don't necessarily think HiveQL's LIKE operator _should_ 
be case insensitive. It would certainly make HiveQL more consistent with SQL if 
it was, but when running extremely long queries over certain types of data, I 
could see it being a nice feature that LIKE gives you the flexibility of 
wild-cards without the overhead of case insensitivity. There's always the 
option of using RLIKE when one is looking for a very flexible match, but I 
think this is a toss-up between compliance with SQL's behavior and being able 
to limit the overhead of the query when possible.

> Like operator in Hive is case sensitive while in MySQL (and most likely other 
> DBs) it's case sensitive
> --
>
> Key: HIVE-4070
> URL: https://issues.apache.org/jira/browse/HIVE-4070
> Project: Hive
>  Issue Type: Bug
>  Components: UDF
>Affects Versions: 0.10.0
>Reporter: Mark Grover
>Assignee: Mark Grover
> Fix For: 0.11.0
>
>
> Hive's like operator seems to be case sensitive.
> See 
> https://github.com/apache/hive/blob/trunk/ql/src/java/org/apache/hadoop/hive/ql/udf/UDFLike.java#L164
> However, MySQL's like operator is case insensitive. I don't have other DB's 
> (like PostgreSQL) installed and handy but I am guessing their LIKE is case 
> insensitive as well.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira


[jira] [Commented] (HIVE-3819) Creating a table on Hive without Hadoop daemons running returns a misleading error

2013-03-14 Thread Sean Mackrory (JIRA)

[ 
https://issues.apache.org/jira/browse/HIVE-3819?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13602318#comment-13602318
 ] 

Sean Mackrory commented on HIVE-3819:
-

I just ran into this error while Hadoop daemons were running but the problem 
was that the Hive Metastore was running (backed by the embedded Derby database) 
and the hive client was running in embedded mode and also trying to connect to 
the embedded Derby database. Perhaps there are multiple common 
misconfigurations that result in this error.

> Creating a table on Hive without Hadoop daemons running returns a misleading 
> error
> --
>
> Key: HIVE-3819
> URL: https://issues.apache.org/jira/browse/HIVE-3819
> Project: Hive
>  Issue Type: Bug
>  Components: CLI, Metastore
>Reporter: Mark Grover
>
> I was running hive without running the underlying hadoop daemon's running. 
> Hadoop was configured to run in pseudo-distributed mode. However, when I 
> tried to create a hive table, I got this rather misleading error:
> {code}
> FAILED: Error in metadata: java.lang.RuntimeException: Unable to instantiate 
> org.apache.hadoop.hive.metastore.HiveMetaStoreClient
> FAILED: Execution Error, return code 1 from 
> org.apache.hadoop.hive.ql.exec.DDLTask
> {code}
> We should look into making this error message less misleading (more about 
> hadoop daemons not running instead of metastore client not being 
> instantiable).

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira