Diagnosed failure

RangerClientTestExtraJVMArgs.SmokeTest: /home/jenkins-slave/workspace/build_and_test_flaky/src/kudu/ranger/ranger_client-test.cc:429: Failure
Failed
Bad status: Timed out: process with PID 24238 is not yet bound to any port at the specified addresses; last attempt running lsof returned 'Not found: could not find pattern of a bound port in lsof output: p24238
f310
n127.0.0.1:57192->127.0.0.1:56935
f311
n127.0.0.1:57170->127.0.0.1:56935
f312
n127.0.0.1:57168->127.0.0.1:56935
f313
n127.0.0.1:57194->127.0.0.1:56935
f314
n127.0.0.1:57208->127.0.0.1:56935'
I20250626 14:06:31.036618 23932 mini_ranger.cc:66] Stopping Ranger...
I20250626 14:06:31.067430 23932 mini_ranger.cc:68] Stopped Ranger
2025-06-26 14:06:31.067 UTC [23949] LOG:  received smart shutdown request
2025-06-26 14:06:31.070 UTC [23949] LOG:  background worker "logical replication launcher" (PID 23957) exited with exit code 1
2025-06-26 14:06:31.070 UTC [23952] LOG:  shutting down
2025-06-26 14:06:31.072 UTC [23952] LOG:  checkpoint starting: shutdown immediate
2025-06-26 14:06:31.397 UTC [23952] LOG:  checkpoint complete: wrote 1468 buffers (9.0%); 0 WAL file(s) added, 0 removed, 0 recycled; write=0.020 s, sync=0.303 s, total=0.327 s; sync files=815, longest=0.005 s, average=0.001 s; distance=8396 kB, estimate=8396 kB; lsn=0/1CADC08, redo lsn=0/1CADC08
2025-06-26 14:06:31.402 UTC [23949] LOG:  database system is shut down
I20250626 14:06:31.410703 23932 test_util.cc:183] -----------------------------------------------
I20250626 14:06:31.410761 23932 test_util.cc:184] Had failures, leaving test files at /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.SmokeTest.1750946659125028-23932-0

Full log

[==========] Running 22 tests from 3 test suites.
[----------] Global test environment set-up.
[----------] 19 tests from RangerClientTest
[ RUN      ] RangerClientTest.TestAuthorizeCreateTableUnauthorized
[       OK ] RangerClientTest.TestAuthorizeCreateTableUnauthorized (2 ms)
[ RUN      ] RangerClientTest.TestAuthorizeCreateTableAuthorized
[       OK ] RangerClientTest.TestAuthorizeCreateTableAuthorized (0 ms)
[ RUN      ] RangerClientTest.TestAuthorizeListNoTables
[       OK ] RangerClientTest.TestAuthorizeListNoTables (0 ms)
[ RUN      ] RangerClientTest.TestAuthorizeListNoTablesAuthorized
[       OK ] RangerClientTest.TestAuthorizeListNoTablesAuthorized (0 ms)
[ RUN      ] RangerClientTest.TestAuthorizeMetadataSubsetOfTablesAuthorized
[       OK ] RangerClientTest.TestAuthorizeMetadataSubsetOfTablesAuthorized (0 ms)
[ RUN      ] RangerClientTest.TestAuthorizeMetadataAllAuthorized
[       OK ] RangerClientTest.TestAuthorizeMetadataAllAuthorized (0 ms)
[ RUN      ] RangerClientTest.TestAuthorizeMetadataAllNonRanger
WARNING: Logging before InitGoogleLogging() is written to STDERR
W20250626 14:04:19.132174 23932 ranger_client.cc:528] Denying action on table with invalid name .bar. Use 'kudu table rename_table' to rename it to a Ranger-compatible name.
W20250626 14:04:19.132280 23932 ranger_client.cc:528] Denying action on table with invalid name foo.. Use 'kudu table rename_table' to rename it to a Ranger-compatible name.
[       OK ] RangerClientTest.TestAuthorizeMetadataAllNonRanger (0 ms)
[ RUN      ] RangerClientTest.TestAuthorizeMetadataNoneAuthorizedContainsNonRanger
W20250626 14:04:19.132773 23932 ranger_client.cc:528] Denying action on table with invalid name foo.. Use 'kudu table rename_table' to rename it to a Ranger-compatible name.
W20250626 14:04:19.132812 23932 ranger_client.cc:528] Denying action on table with invalid name .bar. Use 'kudu table rename_table' to rename it to a Ranger-compatible name.
[       OK ] RangerClientTest.TestAuthorizeMetadataNoneAuthorizedContainsNonRanger (0 ms)
[ RUN      ] RangerClientTest.TestAuthorizeMetadataAllAuthorizedContainsNonRanger
W20250626 14:04:19.133319 23932 ranger_client.cc:528] Denying action on table with invalid name foo.. Use 'kudu table rename_table' to rename it to a Ranger-compatible name.
[       OK ] RangerClientTest.TestAuthorizeMetadataAllAuthorizedContainsNonRanger (0 ms)
[ RUN      ] RangerClientTest.TestAuthorizeScanSubsetAuthorized
[       OK ] RangerClientTest.TestAuthorizeScanSubsetAuthorized (0 ms)
[ RUN      ] RangerClientTest.TestAuthorizeScanAllColumnsAuthorized
[       OK ] RangerClientTest.TestAuthorizeScanAllColumnsAuthorized (0 ms)
[ RUN      ] RangerClientTest.TestAuthorizeScanNoColumnsAuthorized
[       OK ] RangerClientTest.TestAuthorizeScanNoColumnsAuthorized (0 ms)
[ RUN      ] RangerClientTest.TestAuthorizeActionsNoneAuthorized
[       OK ] RangerClientTest.TestAuthorizeActionsNoneAuthorized (0 ms)
[ RUN      ] RangerClientTest.TestAuthorizeActionsSomeAuthorized
[       OK ] RangerClientTest.TestAuthorizeActionsSomeAuthorized (0 ms)
[ RUN      ] RangerClientTest.TestAuthorizeActionsAllAuthorized
[       OK ] RangerClientTest.TestAuthorizeActionsAllAuthorized (0 ms)
[ RUN      ] RangerClientTest.TestInvalidJARFails
E20250626 14:04:19.136641 23932 ranger_client.cc:390] --ranger_jar_path has invalid JAR file path: /this/is/not/a/real/location/hopefully.jar
[       OK ] RangerClientTest.TestInvalidJARFails (0 ms)
[ RUN      ] RangerClientTest.TestEmptyKeytabFile
E20250626 14:04:19.137180 23932 ranger_client.cc:397] --keytab_file is not set
[       OK ] RangerClientTest.TestEmptyKeytabFile (0 ms)
[ RUN      ] RangerClientTest.TestMultipleInvalidJARsLeftUnchecked
[       OK ] RangerClientTest.TestMultipleInvalidJARsLeftUnchecked (0 ms)
[ RUN      ] RangerClientTest.TestDefaultJARPath
[       OK ] RangerClientTest.TestDefaultJARPath (0 ms)
[----------] 19 tests from RangerClientTest (10 ms total)

[----------] 2 tests from RangerClientTestExtraJVMArgs
[ RUN      ] RangerClientTestExtraJVMArgs.SmokeTest
I20250626 14:04:19.138545 23932 mini_postgres.cc:62] Running initdb...
The files belonging to this database system will be owned by user "slave".
This user must also own the server process.

The database cluster will be initialized with locale "C".
The default database encoding has accordingly been set to "SQL_ASCII".
The default text search configuration will be set to "english".

Data page checksums are disabled.

creating directory /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.SmokeTest.1750946659125028-23932-0/postgres ... ok
creating subdirectories ... ok
selecting dynamic shared memory implementation ... posix
selecting default "max_connections" ... 100
selecting default "shared_buffers" ... 128MB
selecting default time zone ... Etc/UTC
creating configuration files ... ok
running bootstrap script ... ok
performing post-bootstrap initialization ... ok
syncing data to disk ... ok

initdb: warning: enabling "trust" authentication for local connections
initdb: hint: You can change this by editing pg_hba.conf or using the option -A, or --auth-local and --auth-host, the next time you run initdb.

Success. You can now start the database server using:

    /tmp/dist-test-taskuJePZZ/build/debug/bin/postgres/pg_ctl -D /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.SmokeTest.1750946659125028-23932-0/postgres -l logfile start

2025-06-26 14:04:21.220 UTC [23949] LOG:  starting PostgreSQL 17.2 on x86_64-pc-linux-gnu, compiled by gcc (Ubuntu 7.5.0-3ubuntu1~18.04) 7.5.0, 64-bit
2025-06-26 14:04:21.220 UTC [23949] LOG:  listening on IPv4 address "127.0.0.1", port 56935
2025-06-26 14:04:21.223 UTC [23949] LOG:  listening on Unix socket "/tmp/.s.PGSQL.56935"
2025-06-26 14:04:21.227 UTC [23954] LOG:  database system was shut down at 2025-06-26 14:04:20 UTC
2025-06-26 14:04:21.230 UTC [23949] LOG:  database system is ready to accept connections
I20250626 14:04:22.971486 23932 mini_postgres.cc:96] Postgres bound to 56935
2025-06-26 14:04:22.976 UTC [23960] FATAL:  database "slave" does not exist
127.0.0.1:56935 - accepting connections
I20250626 14:04:22.977241 23932 mini_ranger.cc:161] Starting Ranger...
I20250626 14:04:22.992242 23932 mini_ranger.cc:84] Created miniranger Postgres user
I20250626 14:04:23.045975 23932 mini_ranger.cc:87] Created ranger Postgres database
I20250626 14:04:23.046051 23932 mini_ranger.cc:178] Starting Ranger out of /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.SmokeTest.1750946659125028-23932-0/ranger-admin
2025-06-26 14:04:23,278  [I] DB FLAVOR :POSTGRES
2025-06-26 14:04:23,278  [I] --------- Verifying Ranger DB connection ---------
2025-06-26 14:04:23,278  [I] Checking connection..
2025-06-26 14:04:23,278  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select 1;"
2025-06-26 14:04:23,560  [I] Checking connection passed.
2025-06-26 14:04:23,560  [I] --------- Verifying version history table ---------
2025-06-26 14:04:23,560  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_db_version_h') as temp;"
2025-06-26 14:04:23,858  [I] Table x_db_version_h does not exist in database ranger
2025-06-26 14:04:23,859  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_db_version_h') as temp;"
2025-06-26 14:04:24,135  [I] Table x_db_version_h does not exist in database ranger
2025-06-26 14:04:24,135  [I] Importing x_db_version_h table schema to database ranger from file: create_dbversion_catalog.sql
2025-06-26 14:04:24,135  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -input /tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/db/postgres/create_dbversion_catalog.sql 
2025-06-26 14:04:24.416 UTC [24027] WARNING:  there is no transaction in progress
2025-06-26 14:04:24,421  [I] create_dbversion_catalog.sql file imported successfully
2025-06-26 14:04:24,421  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_db_version_h') as temp;"
2025-06-26 14:04:24,740  [I] Table x_db_version_h already exists in database 'ranger'
2025-06-26 14:04:24,740  [I] --------- Importing Ranger Core DB Schema ---------
2025-06-26 14:04:24,740  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select version from x_db_version_h where version = 'CORE_DB_SCHEMA' and active = 'Y';"
2025-06-26 14:04:25,024  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select version from x_db_version_h where version = 'CORE_DB_SCHEMA' and active = 'N';"
2025-06-26 14:04:25,305  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "insert into x_db_version_h (version, inst_at, inst_by, updated_at, updated_by,active) values ('CORE_DB_SCHEMA', current_timestamp, 'Ranger 2.1.0', current_timestamp, 'dist-test-slave-5xmx.c.gcp-upstream.internal','N') ;"
2025-06-26 14:04:25,586  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_portal_user') as temp;"
2025-06-26 14:04:25,872  [I] Table x_portal_user does not exist in database ranger
2025-06-26 14:04:25,873  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_policy_ref_group') as temp;"
2025-06-26 14:04:26,168  [I] Table x_policy_ref_group does not exist in database ranger
2025-06-26 14:04:26,169  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select version from x_db_version_h where version = 'DB_PATCHES' and active = 'Y';"
2025-06-26 14:04:26,470  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select version from x_db_version_h where version = 'JAVA_PATCHES' and active = 'Y';"
2025-06-26 14:04:26,756  [I] Importing DB schema to database ranger from file: ranger_core_db_postgres.sql
2025-06-26 14:04:26,756  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -input /tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/db/postgres/optimized/current/ranger_core_db_postgres.sql 
2025-06-26 14:04:27.510 UTC [24144] WARNING:  there is no transaction in progress
2025-06-26 14:04:27.519 UTC [24144] WARNING:  there is no transaction in progress
2025-06-26 14:04:27.529 UTC [24144] WARNING:  there is no transaction in progress
2025-06-26 14:04:27.538 UTC [24144] WARNING:  there is no transaction in progress
2025-06-26 14:04:27.547 UTC [24144] WARNING:  there is no transaction in progress
2025-06-26 14:04:27.557 UTC [24144] WARNING:  there is no transaction in progress
2025-06-26 14:04:27.596 UTC [24144] WARNING:  there is no transaction in progress
2025-06-26 14:04:27.600 UTC [24144] WARNING:  there is no transaction in progress
2025-06-26 14:04:27.610 UTC [24144] WARNING:  there is no transaction in progress
2025-06-26 14:04:27.619 UTC [24144] WARNING:  there is no transaction in progress
2025-06-26 14:04:27.627 UTC [24144] WARNING:  there is no transaction in progress
2025-06-26 14:04:27.635 UTC [24144] WARNING:  there is no transaction in progress
2025-06-26 14:04:27.642 UTC [24144] WARNING:  there is no transaction in progress
2025-06-26 14:04:27.646 UTC [24144] WARNING:  there is no transaction in progress
2025-06-26 14:04:27.649 UTC [24144] WARNING:  there is no transaction in progress
2025-06-26 14:04:27.651 UTC [24144] WARNING:  there is no transaction in progress
2025-06-26 14:04:27,983  [I] ranger_core_db_postgres.sql file imported successfully
2025-06-26 14:04:27,984  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "update x_db_version_h set inst_by='Ranger 2.1.0' where active='Y' and updated_by='localhost';"
2025-06-26 14:04:28,282  [I] Patches status entries updated from base ranger version to current installed ranger version:Ranger 2.1.0
2025-06-26 14:04:28,282  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_portal_user') as temp;"
2025-06-26 14:04:28,561  [I] Table x_portal_user already exists in database 'ranger'
2025-06-26 14:04:28,561  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_policy_ref_group') as temp;"
2025-06-26 14:04:28,853  [I] Table x_policy_ref_group already exists in database 'ranger'
2025-06-26 14:04:28,854  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select version from x_db_version_h where version = 'DB_PATCHES' and active = 'Y';"
2025-06-26 14:04:29,150  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select version from x_db_version_h where version = 'JAVA_PATCHES' and active = 'Y';"
2025-06-26 14:04:29,453  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "update x_db_version_h set active='Y' where version='CORE_DB_SCHEMA' and active='N' and updated_by='dist-test-slave-5xmx.c.gcp-upstream.internal';"
2025-06-26 14:04:29,735  [I] CORE_DB_SCHEMA import status has been updated
2025-06-26 14:04:29,736  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select version from x_db_version_h where version = 'DB_PATCHES' and inst_by = 'Ranger 2.1.0' and active = 'Y';"
2025-06-26 14:04:30,043  [I] DB_PATCHES have already been applied
I20250626 14:04:30.048753 23932 mini_ranger.cc:191] Using Ranger class path: /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.SmokeTest.1750946659125028-23932-0/ranger-admin:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/ews/lib/*:/usr/lib/jvm/java-1.8.0-openjdk-amd64/lib/*:/tmp/dist-test-taskuJePZZ/thirdparty/src/hadoop-3.4.1/*:/tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/ews/webapp
I20250626 14:04:30.048808 23932 mini_ranger.cc:193] Using host: 127.0.0.1
I20250626 14:04:30.050550 23932 mini_ranger.cc:227] Ranger admin URL: http://127.0.0.1:46081
Jun 26, 2025 2:04:30 PM org.apache.ranger.server.tomcat.EmbeddedServer getKeyManagers
WARNING: Config 'ranger.keystore.file' or 'ranger.service.https.attrib.keystore.file' is not found or contains blank value
Jun 26, 2025 2:04:30 PM org.apache.ranger.server.tomcat.EmbeddedServer getTrustManagers
WARNING: Config 'ranger.truststore.file' is not found or contains blank value!
Jun 26, 2025 2:04:30 PM org.apache.ranger.server.tomcat.EmbeddedServer start
INFO: Deriving webapp folder from catalina.base property. folder=/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.SmokeTest.1750946659125028-23932-0/ranger-admin/ews/webapp
Jun 26, 2025 2:04:30 PM org.apache.ranger.server.tomcat.EmbeddedServer start
INFO: Webapp file =/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.SmokeTest.1750946659125028-23932-0/ranger-admin/ews/webapp, webAppName = /
Jun 26, 2025 2:04:30 PM org.apache.ranger.server.tomcat.EmbeddedServer start
INFO: Adding webapp [/] = path [/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.SmokeTest.1750946659125028-23932-0/ranger-admin/ews/webapp] .....
Jun 26, 2025 2:04:30 PM org.apache.catalina.core.StandardContext setPath
WARNING: A context path must either be an empty string or start with a '/' and do not end with a '/'. The path [/] does not meet these criteria and has been changed to []
Jun 26, 2025 2:04:30 PM org.apache.ranger.server.tomcat.EmbeddedServer start
INFO: Finished init of webapp [/] = path [/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.SmokeTest.1750946659125028-23932-0/ranger-admin/ews/webapp].
Jun 26, 2025 2:04:30 PM org.apache.ranger.server.tomcat.EmbeddedServer startServer
INFO: Server Name : miniranger
Jun 26, 2025 2:04:30 PM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["http-bio-46081"]
Jun 26, 2025 2:04:30 PM org.apache.coyote.AbstractProtocol init
SEVERE: Failed to initialize end point associated with ProtocolHandler ["http-bio-46081"]
java.net.BindException: Address already in use (Bind failed) <null>:46081
	at org.apache.tomcat.util.net.JIoEndpoint.bind(JIoEndpoint.java:414)
	at org.apache.tomcat.util.net.AbstractEndpoint.init(AbstractEndpoint.java:750)
	at org.apache.coyote.AbstractProtocol.init(AbstractProtocol.java:467)
	at org.apache.coyote.http11.AbstractHttp11JsseProtocol.init(AbstractHttp11JsseProtocol.java:119)
	at org.apache.catalina.connector.Connector.initInternal(Connector.java:1030)
	at org.apache.catalina.util.LifecycleBase.init(LifecycleBase.java:136)
	at org.apache.catalina.core.StandardService.initInternal(StandardService.java:560)
	at org.apache.catalina.util.LifecycleBase.init(LifecycleBase.java:136)
	at org.apache.catalina.core.StandardServer.initInternal(StandardServer.java:826)
	at org.apache.catalina.util.LifecycleBase.init(LifecycleBase.java:136)
	at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:173)
	at org.apache.catalina.startup.Tomcat.start(Tomcat.java:469)
	at org.apache.ranger.server.tomcat.EmbeddedServer.startServer(EmbeddedServer.java:322)
	at org.apache.ranger.server.tomcat.EmbeddedServer.start(EmbeddedServer.java:290)
	at org.apache.ranger.server.tomcat.EmbeddedServer.main(EmbeddedServer.java:84)
Caused by: java.net.BindException: Address already in use (Bind failed)
	at java.net.PlainSocketImpl.socketBind(Native Method)
	at java.net.AbstractPlainSocketImpl.bind(AbstractPlainSocketImpl.java:387)
	at java.net.ServerSocket.bind(ServerSocket.java:390)
	at java.net.ServerSocket.<init>(ServerSocket.java:252)
	at java.net.ServerSocket.<init>(ServerSocket.java:196)
	at org.apache.tomcat.util.net.DefaultServerSocketFactory.createSocket(DefaultServerSocketFactory.java:49)
	at org.apache.tomcat.util.net.JIoEndpoint.bind(JIoEndpoint.java:401)
	... 14 more

Jun 26, 2025 2:04:30 PM org.apache.catalina.core.StandardService initInternal
SEVERE: Failed to initialize connector [Connector[HTTP/1.1-46081]]
org.apache.catalina.LifecycleException: Protocol handler initialization failed
	at org.apache.catalina.connector.Connector.initInternal(Connector.java:1032)
	at org.apache.catalina.util.LifecycleBase.init(LifecycleBase.java:136)
	at org.apache.catalina.core.StandardService.initInternal(StandardService.java:560)
	at org.apache.catalina.util.LifecycleBase.init(LifecycleBase.java:136)
	at org.apache.catalina.core.StandardServer.initInternal(StandardServer.java:826)
	at org.apache.catalina.util.LifecycleBase.init(LifecycleBase.java:136)
	at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:173)
	at org.apache.catalina.startup.Tomcat.start(Tomcat.java:469)
	at org.apache.ranger.server.tomcat.EmbeddedServer.startServer(EmbeddedServer.java:322)
	at org.apache.ranger.server.tomcat.EmbeddedServer.start(EmbeddedServer.java:290)
	at org.apache.ranger.server.tomcat.EmbeddedServer.main(EmbeddedServer.java:84)
Caused by: java.net.BindException: Address already in use (Bind failed) <null>:46081
	at org.apache.tomcat.util.net.JIoEndpoint.bind(JIoEndpoint.java:414)
	at org.apache.tomcat.util.net.AbstractEndpoint.init(AbstractEndpoint.java:750)
	at org.apache.coyote.AbstractProtocol.init(AbstractProtocol.java:467)
	at org.apache.coyote.http11.AbstractHttp11JsseProtocol.init(AbstractHttp11JsseProtocol.java:119)
	at org.apache.catalina.connector.Connector.initInternal(Connector.java:1030)
	... 10 more
Caused by: java.net.BindException: Address already in use (Bind failed)
	at java.net.PlainSocketImpl.socketBind(Native Method)
	at java.net.AbstractPlainSocketImpl.bind(AbstractPlainSocketImpl.java:387)
	at java.net.ServerSocket.bind(ServerSocket.java:390)
	at java.net.ServerSocket.<init>(ServerSocket.java:252)
	at java.net.ServerSocket.<init>(ServerSocket.java:196)
	at org.apache.tomcat.util.net.DefaultServerSocketFactory.createSocket(DefaultServerSocketFactory.java:49)
	at org.apache.tomcat.util.net.JIoEndpoint.bind(JIoEndpoint.java:401)
	... 14 more

Jun 26, 2025 2:04:30 PM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 26, 2025 2:04:30 PM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet Engine: Apache Tomcat/7.0.105
Jun 26, 2025 2:04:31 PM org.apache.catalina.loader.WebappClassLoaderBase validateJarFile
INFO: validateJarFile(/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/ews/webapp/WEB-INF/lib/javax.servlet-api-3.1.0.jar) - jar not loaded. See Servlet Spec 3.0, section 10.7.2. Offending class: javax/servlet/Servlet.class
Jun 26, 2025 2:04:31 PM org.apache.catalina.loader.WebappClassLoaderBase validateJarFile
INFO: validateJarFile(/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/ews/webapp/WEB-INF/lib/tomcat-el-api-7.0.105.jar) - jar not loaded. See Servlet Spec 3.0, section 10.7.2. Offending class: javax/el/Expression.class
Jun 26, 2025 2:04:31 PM org.apache.catalina.startup.ContextConfig getDefaultWebXmlFragment
INFO: No global web.xml found
Jun 26, 2025 2:04:31 PM org.apache.catalina.startup.TaglibUriRule body
INFO: TLD skipped. URI: urn:com:sun:jersey:api:view is already defined
Jun 26, 2025 2:04:31 PM org.apache.catalina.startup.TldConfig execute
INFO: At least one JAR was scanned for TLDs yet contained no TLDs. Enable debug logging for this logger for a complete list of JARs that were scanned but no TLDs were found in them. Skipping unneeded JARs during scanning can improve startup time and JSP compilation time.
Jun 26, 2025 2:04:31 PM org.apache.catalina.core.ApplicationContext log
INFO: Set web app root system property: 'webapp.root' = [/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/ews/webapp/]
Jun 26, 2025 2:04:31 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring root WebApplicationContext
Jun 26, 2025 2:04:53 PM com.sun.jersey.api.core.PackagesResourceConfig init
INFO: Scanning for root resource and provider classes in the packages:
  org.apache.ranger.rest
  org.apache.ranger.common
  xa.rest
Jun 26, 2025 2:04:53 PM com.sun.jersey.api.core.ScanningResourceConfig logClasses
INFO: Root resource classes found:
  class org.apache.ranger.rest.RoleREST
  class org.apache.ranger.rest.XKeyREST
  class org.apache.ranger.rest.UserREST
  class org.apache.ranger.rest.TagREST
  class org.apache.ranger.rest.PublicAPIs
  class org.apache.ranger.rest.MetricsREST
  class org.apache.ranger.rest.AssetREST
  class org.apache.ranger.rest.XUserREST
  class org.apache.ranger.rest.XAuditREST
  class org.apache.ranger.rest.PublicAPIsv2
  class org.apache.ranger.rest.ServiceREST
  class org.apache.ranger.rest.SecurityZoneREST
Jun 26, 2025 2:04:53 PM com.sun.jersey.api.core.ScanningResourceConfig logClasses
INFO: Provider classes found:
  class org.apache.ranger.common.RangerJAXBContextResolver
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.servlet.SpringServlet getContext
INFO: Using default applicationContext
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, assetREST, of type org.apache.ranger.rest.AssetREST as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, metricsREST, of type org.apache.ranger.rest.MetricsREST as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, publicAPIs, of type org.apache.ranger.rest.PublicAPIs as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, publicAPIsv2, of type org.apache.ranger.rest.PublicAPIsv2 as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, roleREST, of type org.apache.ranger.rest.RoleREST as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, securityZoneREST, of type org.apache.ranger.rest.SecurityZoneREST as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, serviceREST, of type org.apache.ranger.rest.ServiceREST as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, tagREST, of type org.apache.ranger.rest.TagREST as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, userREST, of type org.apache.ranger.rest.UserREST as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, XAuditREST, of type org.apache.ranger.rest.XAuditREST as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, XKeyREST, of type org.apache.ranger.rest.XKeyREST as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, XUserREST, of type org.apache.ranger.rest.XUserREST as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.server.impl.application.WebApplicationImpl _initiate
INFO: Initiating Jersey application, version 'Jersey: 1.19.3 10/24/2016 03:58 PM'
Jun 26, 2025 2:04:54 PM com.sun.jersey.spi.inject.Errors processErrorMessages
WARNING: The following warnings have been detected with resource and/or provider classes:
  WARNING: A HTTP GET method, public void org.apache.ranger.rest.ServiceREST.getPoliciesInExcel(javax.servlet.http.HttpServletRequest,javax.servlet.http.HttpServletResponse), MUST return a non-void type.
  WARNING: A HTTP GET method, public void org.apache.ranger.rest.ServiceREST.getPoliciesInJson(javax.servlet.http.HttpServletRequest,javax.servlet.http.HttpServletResponse,java.lang.Boolean), MUST return a non-void type.
  WARNING: A HTTP GET method, public void org.apache.ranger.rest.ServiceREST.getPoliciesInCsv(javax.servlet.http.HttpServletRequest,javax.servlet.http.HttpServletResponse) throws java.io.IOException, MUST return a non-void type.
I20250626 14:06:31.036391 23932 mini_ranger.cc:160] Time spent starting Ranger: real 128.059s	user 0.001s	sys 0.066s
/home/jenkins-slave/workspace/build_and_test_flaky/src/kudu/ranger/ranger_client-test.cc:429: Failure
Failed
Bad status: Timed out: process with PID 24238 is not yet bound to any port at the specified addresses; last attempt running lsof returned 'Not found: could not find pattern of a bound port in lsof output: p24238
f310
n127.0.0.1:57192->127.0.0.1:56935
f311
n127.0.0.1:57170->127.0.0.1:56935
f312
n127.0.0.1:57168->127.0.0.1:56935
f313
n127.0.0.1:57194->127.0.0.1:56935
f314
n127.0.0.1:57208->127.0.0.1:56935'
I20250626 14:06:31.036618 23932 mini_ranger.cc:66] Stopping Ranger...
I20250626 14:06:31.067430 23932 mini_ranger.cc:68] Stopped Ranger
2025-06-26 14:06:31.067 UTC [23949] LOG:  received smart shutdown request
2025-06-26 14:06:31.070 UTC [23949] LOG:  background worker "logical replication launcher" (PID 23957) exited with exit code 1
2025-06-26 14:06:31.070 UTC [23952] LOG:  shutting down
2025-06-26 14:06:31.072 UTC [23952] LOG:  checkpoint starting: shutdown immediate
2025-06-26 14:06:31.397 UTC [23952] LOG:  checkpoint complete: wrote 1468 buffers (9.0%); 0 WAL file(s) added, 0 removed, 0 recycled; write=0.020 s, sync=0.303 s, total=0.327 s; sync files=815, longest=0.005 s, average=0.001 s; distance=8396 kB, estimate=8396 kB; lsn=0/1CADC08, redo lsn=0/1CADC08
2025-06-26 14:06:31.402 UTC [23949] LOG:  database system is shut down
I20250626 14:06:31.410703 23932 test_util.cc:183] -----------------------------------------------
I20250626 14:06:31.410761 23932 test_util.cc:184] Had failures, leaving test files at /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.SmokeTest.1750946659125028-23932-0
[  FAILED  ] RangerClientTestExtraJVMArgs.SmokeTest (132272 ms)
[ RUN      ] RangerClientTestExtraJVMArgs.TestCrashOnInvalidArguments

[WARNING] /home/jenkins-slave/workspace/build_and_test_flaky/thirdparty/src/googletest-release-1.12.1/googletest/src/gtest-death-test.cc:1108:: Death tests use fork(), which is unsafe particularly in a threaded context. For this test, Google Test detected 2 threads. See https://github.com/google/googletest/blob/master/docs/advanced.md#death-tests-and-threads for more explanation and suggested solutions, especially if this is the last message you see before your test times out.
The files belonging to this database system will be owned by user "slave".
This user must also own the server process.

The database cluster will be initialized with locale "C".
The default database encoding has accordingly been set to "SQL_ASCII".
The default text search configuration will be set to "english".

Data page checksums are disabled.

creating directory /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.TestCrashOnInvalidArguments.1750946659125028-24390-0/postgres ... ok
creating subdirectories ... ok
selecting dynamic shared memory implementation ... posix
selecting default "max_connections" ... 100
selecting default "shared_buffers" ... 128MB
selecting default time zone ... Etc/UTC
creating configuration files ... ok
running bootstrap script ... ok
performing post-bootstrap initialization ... ok
syncing data to disk ... ok


Success. You can now start the database server using:

    /tmp/dist-test-taskuJePZZ/build/debug/bin/postgres/pg_ctl -D /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.TestCrashOnInvalidArguments.1750946659125028-24390-0/postgres -l logfile start

127.0.0.1:35015 - accepting connections
[       OK ] RangerClientTestExtraJVMArgs.TestCrashOnInvalidArguments (31595 ms)
[----------] 2 tests from RangerClientTestExtraJVMArgs (163868 ms total)

[----------] 1 test from RangerClientTestBase
[ RUN      ] RangerClientTestBase.TestLogging
I20250626 14:07:03.007373 23932 mini_postgres.cc:62] Running initdb...
The files belonging to this database system will be owned by user "slave".
This user must also own the server process.

The database cluster will be initialized with locale "C".
The default database encoding has accordingly been set to "SQL_ASCII".
The default text search configuration will be set to "english".

Data page checksums are disabled.

creating directory /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/postgres ... ok
creating subdirectories ... ok
selecting dynamic shared memory implementation ... posix
selecting default "max_connections" ... 100
selecting default "shared_buffers" ... 128MB
selecting default time zone ... Etc/UTC
creating configuration files ... ok
running bootstrap script ... ok
performing post-bootstrap initialization ... ok
syncing data to disk ... ok

initdb: warning: enabling "trust" authentication for local connections
initdb: hint: You can change this by editing pg_hba.conf or using the option -A, or --auth-local and --auth-host, the next time you run initdb.

Success. You can now start the database server using:

    /tmp/dist-test-taskuJePZZ/build/debug/bin/postgres/pg_ctl -D /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/postgres -l logfile start

2025-06-26 14:07:05.048 UTC [24757] LOG:  starting PostgreSQL 17.2 on x86_64-pc-linux-gnu, compiled by gcc (Ubuntu 7.5.0-3ubuntu1~18.04) 7.5.0, 64-bit
2025-06-26 14:07:05.048 UTC [24757] LOG:  listening on IPv4 address "127.0.0.1", port 57909
2025-06-26 14:07:05.050 UTC [24757] LOG:  listening on Unix socket "/tmp/.s.PGSQL.57909"
2025-06-26 14:07:05.054 UTC [24762] LOG:  database system was shut down at 2025-06-26 14:07:04 UTC
2025-06-26 14:07:05.057 UTC [24757] LOG:  database system is ready to accept connections
I20250626 14:07:06.789211 23932 mini_postgres.cc:96] Postgres bound to 57909
2025-06-26 14:07:06.793 UTC [24768] FATAL:  database "slave" does not exist
127.0.0.1:57909 - accepting connections
I20250626 14:07:06.794198 23932 mini_ranger.cc:161] Starting Ranger...
I20250626 14:07:06.809639 23932 mini_ranger.cc:84] Created miniranger Postgres user
I20250626 14:07:06.868516 23932 mini_ranger.cc:87] Created ranger Postgres database
I20250626 14:07:06.868582 23932 mini_ranger.cc:178] Starting Ranger out of /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/ranger-admin
2025-06-26 14:07:07,096  [I] DB FLAVOR :POSTGRES
2025-06-26 14:07:07,096  [I] --------- Verifying Ranger DB connection ---------
2025-06-26 14:07:07,096  [I] Checking connection..
2025-06-26 14:07:07,096  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select 1;"
2025-06-26 14:07:07,406  [I] Checking connection passed.
2025-06-26 14:07:07,406  [I] --------- Verifying version history table ---------
2025-06-26 14:07:07,407  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_db_version_h') as temp;"
2025-06-26 14:07:07,703  [I] Table x_db_version_h does not exist in database ranger
2025-06-26 14:07:07,704  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_db_version_h') as temp;"
2025-06-26 14:07:07,991  [I] Table x_db_version_h does not exist in database ranger
2025-06-26 14:07:07,992  [I] Importing x_db_version_h table schema to database ranger from file: create_dbversion_catalog.sql
2025-06-26 14:07:07,992  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -input /tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/db/postgres/create_dbversion_catalog.sql 
2025-06-26 14:07:08.268 UTC [24835] WARNING:  there is no transaction in progress
2025-06-26 14:07:08,273  [I] create_dbversion_catalog.sql file imported successfully
2025-06-26 14:07:08,274  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_db_version_h') as temp;"
2025-06-26 14:07:08,590  [I] Table x_db_version_h already exists in database 'ranger'
2025-06-26 14:07:08,591  [I] --------- Importing Ranger Core DB Schema ---------
2025-06-26 14:07:08,591  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select version from x_db_version_h where version = 'CORE_DB_SCHEMA' and active = 'Y';"
2025-06-26 14:07:08,878  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select version from x_db_version_h where version = 'CORE_DB_SCHEMA' and active = 'N';"
2025-06-26 14:07:09,183  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "insert into x_db_version_h (version, inst_at, inst_by, updated_at, updated_by,active) values ('CORE_DB_SCHEMA', current_timestamp, 'Ranger 2.1.0', current_timestamp, 'dist-test-slave-5xmx.c.gcp-upstream.internal','N') ;"
2025-06-26 14:07:09,477  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_portal_user') as temp;"
2025-06-26 14:07:09,780  [I] Table x_portal_user does not exist in database ranger
2025-06-26 14:07:09,781  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_policy_ref_group') as temp;"
2025-06-26 14:07:10,076  [I] Table x_policy_ref_group does not exist in database ranger
2025-06-26 14:07:10,077  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select version from x_db_version_h where version = 'DB_PATCHES' and active = 'Y';"
2025-06-26 14:07:10,384  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select version from x_db_version_h where version = 'JAVA_PATCHES' and active = 'Y';"
2025-06-26 14:07:10,668  [I] Importing DB schema to database ranger from file: ranger_core_db_postgres.sql
2025-06-26 14:07:10,669  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -input /tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/db/postgres/optimized/current/ranger_core_db_postgres.sql 
2025-06-26 14:07:11.417 UTC [24952] WARNING:  there is no transaction in progress
2025-06-26 14:07:11.428 UTC [24952] WARNING:  there is no transaction in progress
2025-06-26 14:07:11.438 UTC [24952] WARNING:  there is no transaction in progress
2025-06-26 14:07:11.448 UTC [24952] WARNING:  there is no transaction in progress
2025-06-26 14:07:11.458 UTC [24952] WARNING:  there is no transaction in progress
2025-06-26 14:07:11.468 UTC [24952] WARNING:  there is no transaction in progress
2025-06-26 14:07:11.509 UTC [24952] WARNING:  there is no transaction in progress
2025-06-26 14:07:11.513 UTC [24952] WARNING:  there is no transaction in progress
2025-06-26 14:07:11.521 UTC [24952] WARNING:  there is no transaction in progress
2025-06-26 14:07:11.529 UTC [24952] WARNING:  there is no transaction in progress
2025-06-26 14:07:11.536 UTC [24952] WARNING:  there is no transaction in progress
2025-06-26 14:07:11.545 UTC [24952] WARNING:  there is no transaction in progress
2025-06-26 14:07:11.552 UTC [24952] WARNING:  there is no transaction in progress
2025-06-26 14:07:11.555 UTC [24952] WARNING:  there is no transaction in progress
2025-06-26 14:07:11.558 UTC [24952] WARNING:  there is no transaction in progress
2025-06-26 14:07:11.561 UTC [24952] WARNING:  there is no transaction in progress
2025-06-26 14:07:11,889  [I] ranger_core_db_postgres.sql file imported successfully
2025-06-26 14:07:11,890  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "update x_db_version_h set inst_by='Ranger 2.1.0' where active='Y' and updated_by='localhost';"
2025-06-26 14:07:12,180  [I] Patches status entries updated from base ranger version to current installed ranger version:Ranger 2.1.0
2025-06-26 14:07:12,181  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_portal_user') as temp;"
2025-06-26 14:07:12,466  [I] Table x_portal_user already exists in database 'ranger'
2025-06-26 14:07:12,467  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_policy_ref_group') as temp;"
2025-06-26 14:07:12,775  [I] Table x_policy_ref_group already exists in database 'ranger'
2025-06-26 14:07:12,775  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select version from x_db_version_h where version = 'DB_PATCHES' and active = 'Y';"
2025-06-26 14:07:13,065  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select version from x_db_version_h where version = 'JAVA_PATCHES' and active = 'Y';"
2025-06-26 14:07:13,339  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "update x_db_version_h set active='Y' where version='CORE_DB_SCHEMA' and active='N' and updated_by='dist-test-slave-5xmx.c.gcp-upstream.internal';"
2025-06-26 14:07:13,638  [I] CORE_DB_SCHEMA import status has been updated
2025-06-26 14:07:13,639  [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java  -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \;  -query "select version from x_db_version_h where version = 'DB_PATCHES' and inst_by = 'Ranger 2.1.0' and active = 'Y';"
2025-06-26 14:07:13,924  [I] DB_PATCHES have already been applied
I20250626 14:07:13.930011 23932 mini_ranger.cc:191] Using Ranger class path: /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/ranger-admin:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/ews/lib/*:/usr/lib/jvm/java-1.8.0-openjdk-amd64/lib/*:/tmp/dist-test-taskuJePZZ/thirdparty/src/hadoop-3.4.1/*:/tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/ews/webapp
I20250626 14:07:13.930063 23932 mini_ranger.cc:193] Using host: 127.0.0.1
I20250626 14:07:13.931699 23932 mini_ranger.cc:227] Ranger admin URL: http://127.0.0.1:35455
Jun 26, 2025 2:07:14 PM org.apache.ranger.server.tomcat.EmbeddedServer getKeyManagers
WARNING: Config 'ranger.keystore.file' or 'ranger.service.https.attrib.keystore.file' is not found or contains blank value
Jun 26, 2025 2:07:14 PM org.apache.ranger.server.tomcat.EmbeddedServer getTrustManagers
WARNING: Config 'ranger.truststore.file' is not found or contains blank value!
Jun 26, 2025 2:07:14 PM org.apache.ranger.server.tomcat.EmbeddedServer start
INFO: Deriving webapp folder from catalina.base property. folder=/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/ranger-admin/ews/webapp
Jun 26, 2025 2:07:14 PM org.apache.ranger.server.tomcat.EmbeddedServer start
INFO: Webapp file =/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/ranger-admin/ews/webapp, webAppName = /
Jun 26, 2025 2:07:14 PM org.apache.ranger.server.tomcat.EmbeddedServer start
INFO: Adding webapp [/] = path [/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/ranger-admin/ews/webapp] .....
Jun 26, 2025 2:07:14 PM org.apache.catalina.core.StandardContext setPath
WARNING: A context path must either be an empty string or start with a '/' and do not end with a '/'. The path [/] does not meet these criteria and has been changed to []
Jun 26, 2025 2:07:14 PM org.apache.ranger.server.tomcat.EmbeddedServer start
INFO: Finished init of webapp [/] = path [/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/ranger-admin/ews/webapp].
Jun 26, 2025 2:07:14 PM org.apache.ranger.server.tomcat.EmbeddedServer startServer
INFO: Server Name : miniranger
Jun 26, 2025 2:07:14 PM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["http-bio-35455"]
Jun 26, 2025 2:07:14 PM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 26, 2025 2:07:14 PM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet Engine: Apache Tomcat/7.0.105
Jun 26, 2025 2:07:15 PM org.apache.catalina.loader.WebappClassLoaderBase validateJarFile
INFO: validateJarFile(/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/ews/webapp/WEB-INF/lib/javax.servlet-api-3.1.0.jar) - jar not loaded. See Servlet Spec 3.0, section 10.7.2. Offending class: javax/servlet/Servlet.class
Jun 26, 2025 2:07:15 PM org.apache.catalina.loader.WebappClassLoaderBase validateJarFile
INFO: validateJarFile(/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/ews/webapp/WEB-INF/lib/tomcat-el-api-7.0.105.jar) - jar not loaded. See Servlet Spec 3.0, section 10.7.2. Offending class: javax/el/Expression.class
Jun 26, 2025 2:07:15 PM org.apache.catalina.startup.ContextConfig getDefaultWebXmlFragment
INFO: No global web.xml found
Jun 26, 2025 2:07:15 PM org.apache.catalina.startup.TaglibUriRule body
INFO: TLD skipped. URI: urn:com:sun:jersey:api:view is already defined
Jun 26, 2025 2:07:15 PM org.apache.catalina.startup.TldConfig execute
INFO: At least one JAR was scanned for TLDs yet contained no TLDs. Enable debug logging for this logger for a complete list of JARs that were scanned but no TLDs were found in them. Skipping unneeded JARs during scanning can improve startup time and JSP compilation time.
Jun 26, 2025 2:07:15 PM org.apache.catalina.core.ApplicationContext log
INFO: Set web app root system property: 'webapp.root' = [/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/ews/webapp/]
Jun 26, 2025 2:07:15 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring root WebApplicationContext
I20250626 14:07:15.945531 23932 mini_ranger.cc:160] Time spent starting Ranger: real 9.151s	user 0.004s	sys 0.002s
Jun 26, 2025 2:07:32 PM com.sun.jersey.api.core.PackagesResourceConfig init
INFO: Scanning for root resource and provider classes in the packages:
  org.apache.ranger.rest
  org.apache.ranger.common
  xa.rest
Jun 26, 2025 2:07:32 PM com.sun.jersey.api.core.ScanningResourceConfig logClasses
INFO: Root resource classes found:
  class org.apache.ranger.rest.UserREST
  class org.apache.ranger.rest.ServiceREST
  class org.apache.ranger.rest.XAuditREST
  class org.apache.ranger.rest.XUserREST
  class org.apache.ranger.rest.TagREST
  class org.apache.ranger.rest.PublicAPIsv2
  class org.apache.ranger.rest.SecurityZoneREST
  class org.apache.ranger.rest.MetricsREST
  class org.apache.ranger.rest.PublicAPIs
  class org.apache.ranger.rest.XKeyREST
  class org.apache.ranger.rest.AssetREST
  class org.apache.ranger.rest.RoleREST
Jun 26, 2025 2:07:32 PM com.sun.jersey.api.core.ScanningResourceConfig logClasses
INFO: Provider classes found:
  class org.apache.ranger.common.RangerJAXBContextResolver
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.servlet.SpringServlet getContext
INFO: Using default applicationContext
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, assetREST, of type org.apache.ranger.rest.AssetREST as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, metricsREST, of type org.apache.ranger.rest.MetricsREST as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, publicAPIs, of type org.apache.ranger.rest.PublicAPIs as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, publicAPIsv2, of type org.apache.ranger.rest.PublicAPIsv2 as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, roleREST, of type org.apache.ranger.rest.RoleREST as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, securityZoneREST, of type org.apache.ranger.rest.SecurityZoneREST as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, serviceREST, of type org.apache.ranger.rest.ServiceREST as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, tagREST, of type org.apache.ranger.rest.TagREST as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, userREST, of type org.apache.ranger.rest.UserREST as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, XAuditREST, of type org.apache.ranger.rest.XAuditREST as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, XKeyREST, of type org.apache.ranger.rest.XKeyREST as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, XUserREST, of type org.apache.ranger.rest.XUserREST as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.server.impl.application.WebApplicationImpl _initiate
INFO: Initiating Jersey application, version 'Jersey: 1.19.3 10/24/2016 03:58 PM'
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.inject.Errors processErrorMessages
WARNING: The following warnings have been detected with resource and/or provider classes:
  WARNING: A HTTP GET method, public void org.apache.ranger.rest.ServiceREST.getPoliciesInExcel(javax.servlet.http.HttpServletRequest,javax.servlet.http.HttpServletResponse), MUST return a non-void type.
  WARNING: A HTTP GET method, public void org.apache.ranger.rest.ServiceREST.getPoliciesInJson(javax.servlet.http.HttpServletRequest,javax.servlet.http.HttpServletResponse,java.lang.Boolean), MUST return a non-void type.
  WARNING: A HTTP GET method, public void org.apache.ranger.rest.ServiceREST.getPoliciesInCsv(javax.servlet.http.HttpServletRequest,javax.servlet.http.HttpServletResponse) throws java.io.IOException, MUST return a non-void type.
Jun 26, 2025 2:07:33 PM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["http-bio-35455"]
I20250626 14:07:34.341527 23932 mini_ranger.cc:261] Created Kudu service
I20250626 14:07:34.663743 23932 ranger_client.cc:318] Using new properties file: /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/log_conf/kudu-ranger-subprocess-log4j2.properties
2025-06-26 14:07:35.350 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-audit.xml)
2025-06-26 14:07:35.358 [DEBUG - main] (RangerConfiguration.java:95) Conf file path ranger-kudu-audit.xml does not exists
2025-06-26 14:07:35.358 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-audit.xml): couldn't find resource file location
2025-06-26 14:07:35.358 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-audit.xml), result=false
2025-06-26 14:07:35.359 [DEBUG - main] (RangerPluginConfig.java:248) ==> addAuditResource(Service Type: kudu
2025-06-26 14:07:35.360 [DEBUG - main] (RangerPluginConfig.java:271) <== addAuditResource(Service Type: kudu)
2025-06-26 14:07:35.360 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-security.xml)
2025-06-26 14:07:35.360 [INFO - main] (RangerConfiguration.java:50) addResourceIfReadable(ranger-kudu-security.xml): resource file is file:/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/ranger-kudu-security.xml
2025-06-26 14:07:35.393 [DEBUG - main] (MutableMetricsFactory.java:43) field org.apache.hadoop.metrics2.lib.MutableRate org.apache.hadoop.security.UserGroupInformation$UgiMetrics.getGroups with annotation @org.apache.hadoop.metrics2.annotation.Metric(always=false, sampleName=Ops, valueName=Time, about=, interval=10, type=DEFAULT, value=[GetGroups])
2025-06-26 14:07:35.398 [DEBUG - main] (MutableMetricsFactory.java:43) field org.apache.hadoop.metrics2.lib.MutableRate org.apache.hadoop.security.UserGroupInformation$UgiMetrics.loginFailure with annotation @org.apache.hadoop.metrics2.annotation.Metric(always=false, sampleName=Ops, valueName=Time, about=, interval=10, type=DEFAULT, value=[Rate of failed kerberos logins and latency (milliseconds)])
2025-06-26 14:07:35.399 [DEBUG - main] (MutableMetricsFactory.java:43) field org.apache.hadoop.metrics2.lib.MutableRate org.apache.hadoop.security.UserGroupInformation$UgiMetrics.loginSuccess with annotation @org.apache.hadoop.metrics2.annotation.Metric(always=false, sampleName=Ops, valueName=Time, about=, interval=10, type=DEFAULT, value=[Rate of successful kerberos logins and latency (milliseconds)])
2025-06-26 14:07:35.399 [DEBUG - main] (MutableMetricsFactory.java:43) field private org.apache.hadoop.metrics2.lib.MutableGaugeInt org.apache.hadoop.security.UserGroupInformation$UgiMetrics.renewalFailures with annotation @org.apache.hadoop.metrics2.annotation.Metric(always=false, sampleName=Ops, valueName=Time, about=, interval=10, type=DEFAULT, value=[Renewal failures since last successful login])
2025-06-26 14:07:35.400 [DEBUG - main] (MutableMetricsFactory.java:43) field private org.apache.hadoop.metrics2.lib.MutableGaugeLong org.apache.hadoop.security.UserGroupInformation$UgiMetrics.renewalFailuresTotal with annotation @org.apache.hadoop.metrics2.annotation.Metric(always=false, sampleName=Ops, valueName=Time, about=, interval=10, type=DEFAULT, value=[Renewal failures since startup])
2025-06-26 14:07:35.400 [DEBUG - main] (MetricsSystemImpl.java:231) UgiMetrics, User and group related metrics
2025-06-26 14:07:35.402 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-security.xml), result=true
2025-06-26 14:07:35.403 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-policymgr-ssl.xml)
2025-06-26 14:07:35.403 [DEBUG - main] (RangerConfiguration.java:95) Conf file path ranger-kudu-policymgr-ssl.xml does not exists
2025-06-26 14:07:35.403 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-policymgr-ssl.xml): couldn't find resource file location
2025-06-26 14:07:35.403 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-policymgr-ssl.xml), result=false
2025-06-26 14:07:35.403 [DEBUG - main] (RangerPluginConfig.java:277) ==> addSslConfigResource(Service Type: kudu
2025-06-26 14:07:35.433 [DEBUG - main] (RangerPluginConfig.java:299) <== addSslConfigResource(Service Type: kudu)
2025-06-26 14:07:35.434 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-kudu-audit.xml)
2025-06-26 14:07:35.434 [DEBUG - main] (RangerConfiguration.java:95) Conf file path ranger-kudu-kudu-audit.xml does not exists
2025-06-26 14:07:35.434 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-kudu-audit.xml): couldn't find resource file location
2025-06-26 14:07:35.434 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-kudu-audit.xml), result=false
2025-06-26 14:07:35.434 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-kudu-security.xml)
2025-06-26 14:07:35.435 [DEBUG - main] (RangerConfiguration.java:95) Conf file path ranger-kudu-kudu-security.xml does not exists
2025-06-26 14:07:35.435 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-kudu-security.xml): couldn't find resource file location
2025-06-26 14:07:35.435 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-kudu-security.xml), result=false
2025-06-26 14:07:35.435 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-kudu-policymgr-ssl.xml)
2025-06-26 14:07:35.435 [DEBUG - main] (RangerConfiguration.java:95) Conf file path ranger-kudu-kudu-policymgr-ssl.xml does not exists
2025-06-26 14:07:35.435 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-kudu-policymgr-ssl.xml): couldn't find resource file location
2025-06-26 14:07:35.436 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-kudu-policymgr-ssl.xml), result=false
2025-06-26 14:07:35.436 [DEBUG - main] (RangerPluginConfig.java:99) ranger.plugin.kudu.use.x-forwarded-for.ipaddress:false
2025-06-26 14:07:35.437 [DEBUG - main] (RangerPluginConfig.java:100) ranger.plugin.kudu.trusted.proxy.ipaddresses:[null]
2025-06-26 14:07:35.438 [INFO - main] (RangerPluginConfig.java:116) PolicyEngineOptions: { evaluatorType: auto, evaluateDelegateAdminOnly: false, disableContextEnrichers: false, disableCustomConditions: false, disableTagPolicyEvaluation: false, enableTagEnricherWithLocalRefresher: false, disableTrieLookupPrefilter: false, optimizeTrieForRetrieval: false, cacheAuditResult: false }
2025-06-26 14:07:35.440 [DEBUG - main] (RangerPluginConfig.java:170) superUsers=[], superGroups=[]
2025-06-26 14:07:35.440 [DEBUG - main] (RangerPluginConfig.java:161) auditExcludedUsers=[], auditExcludedGroups=[], auditExcludedRoles=[]
2025-06-26 14:07:35.523 [DEBUG - main] (MiscUtil.java:839) ==> MiscUtil.initLocalHost()
2025-06-26 14:07:35.523 [DEBUG - main] (MiscUtil.java:848) <== MiscUtil.initLocalHost()
2025-06-26 14:07:35.559 [DEBUG - main] (Shell.java:874) setsid exited with exit code 0
2025-06-26 14:07:35.559 [DEBUG - main] (SecurityUtil.java:136) Setting hadoop.security.token.service.use_ip to true
2025-06-26 14:07:35.575 [DEBUG - main] (Groups.java:476)  Creating new Groups object
2025-06-26 14:07:35.591 [DEBUG - main] (Groups.java:150) Group mapping impl=org.apache.hadoop.security.NullGroupsMapping; cacheTimeout=300000; warningDeltaMs=5000
2025-06-26 14:07:35.592 [INFO - main] (AuditProviderFactory.java:76) AuditProviderFactory: creating..
2025-06-26 14:07:35.593 [INFO - main] (AuditProviderFactory.java:114) AuditProviderFactory: initializing..
2025-06-26 14:07:35.593 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.cache.dir=/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/policy-cache
2025-06-26 14:07:35.593 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.source.impl=org.apache.ranger.admin.client.RangerAdminRESTClient
2025-06-26 14:07:35.593 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.rest.url=http://127.0.0.1:35455
2025-06-26 14:07:35.593 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.pollIntervalMs=30000
2025-06-26 14:07:35.593 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.service.name=kudu
2025-06-26 14:07:35.594 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.access.cluster.name=Cluster 1
2025-06-26 14:07:35.594 [INFO - main] (AuditProviderFactory.java:279) No v3 audit configuration found. Trying v2 audit configurations
2025-06-26 14:07:35.595 [INFO - Ranger async Audit cleanup] (AuditProviderFactory.java:497) RangerAsyncAuditCleanup: Waiting to audit cleanup start signal
2025-06-26 14:07:35.608 [DEBUG - main] (PolicyRefresher.java:67) ==> PolicyRefresher(serviceName=kudu).PolicyRefresher()
2025-06-26 14:07:35.609 [DEBUG - main] (RangerBasePlugin.java:605) ==> RangerBasePlugin.createAdminClient(kudu, kudu, ranger.plugin.kudu)
2025-06-26 14:07:35.609 [DEBUG - main] (RangerBasePlugin.java:618) Value for property[ranger.plugin.kudu.policy.source.impl] was [org.apache.ranger.admin.client.RangerAdminRESTClient].
2025-06-26 14:07:35.613 [DEBUG - main] (RangerAdminRESTClient.java:775) ==> RangerAdminRESTClient.init(http://127.0.0.1:35455, null)
2025-06-26 14:07:35.617 [DEBUG - main] (RangerAdminRESTClient.java:783) <== RangerAdminRESTClient.init(http://127.0.0.1:35455, null)
2025-06-26 14:07:35.618 [DEBUG - main] (RangerBasePlugin.java:638) <== RangerBasePlugin.createAdminClient(kudu, kudu, ranger.plugin.kudu): policySourceImpl=org.apache.ranger.admin.client.RangerAdminRESTClient, client=org.apache.ranger.admin.client.RangerAdminRESTClient@7a35b0f5
2025-06-26 14:07:35.619 [DEBUG - main] (RangerRolesProvider.java:62) ==> RangerRolesProvider(serviceName=kudu).RangerRolesProvider()
2025-06-26 14:07:35.620 [DEBUG - main] (RangerRolesProvider.java:94) <== RangerRolesProvider(serviceName=kudu).RangerRolesProvider()
2025-06-26 14:07:35.620 [DEBUG - main] (PolicyRefresher.java:102) <== PolicyRefresher(serviceName=kudu).PolicyRefresher()
2025-06-26 14:07:35.620 [INFO - main] (RangerBasePlugin.java:183) Created PolicyRefresher Thread(PolicyRefresher(serviceName=kudu)-14)
2025-06-26 14:07:35.620 [DEBUG - main] (PolicyRefresher.java:489) ==> PolicyRefresher(serviceName=kudu).loadRoles()
2025-06-26 14:07:35.621 [DEBUG - main] (RangerRolesProvider.java:109) ==> RangerRolesProvider(serviceName= kudu serviceType= kudu).loadUserGroupRoles()
2025-06-26 14:07:35.622 [DEBUG - main] (RangerRolesProvider.java:118) In-Use memory: 58471272, Free memory:180800664
2025-06-26 14:07:35.622 [DEBUG - main] (RangerRolesProvider.java:171) ==> RangerRolesProvider(serviceName=kudu).loadUserGroupRolesFromAdmin()
2025-06-26 14:07:35.622 [DEBUG - main] (RangerAdminRESTClient.java:210) ==> RangerAdminRESTClient.getRolesIfUpdated(-1, 0)
2025-06-26 14:07:35.627 [DEBUG - main] (UserGroupInformation.java:245) Hadoop login
2025-06-26 14:07:35.627 [DEBUG - main] (UserGroupInformation.java:191) hadoop login commit
2025-06-26 14:07:35.646 [DEBUG - main] (UserGroupInformation.java:213) Using local user: UnixPrincipal: slave
2025-06-26 14:07:35.648 [DEBUG - main] (UserGroupInformation.java:217) Using user: "UnixPrincipal: slave" with name: slave
2025-06-26 14:07:35.648 [DEBUG - main] (UserGroupInformation.java:229) User entry: "slave"
2025-06-26 14:07:35.649 [DEBUG - main] (UserGroupInformation.java:801) UGI loginUser: slave (auth:SIMPLE)
2025-06-26 14:07:35.649 [DEBUG - main] (RangerAdminRESTClient.java:244) Checking Roles updated as user : slave (auth:SIMPLE)
2025-06-26 14:07:36.200 [DEBUG - main] (RangerAdminRESTClient.java:283) <== RangerAdminRESTClient.getRolesIfUpdated(-1, 0): 
2025-06-26 14:07:36.200 [DEBUG - main] (RangerRolesProvider.java:277) ==> RangerRolesProvider(serviceName=kudu).saveToCache()
2025-06-26 14:07:36.208 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerRolesProvider.saveToCache(serviceName=kudu): 8
2025-06-26 14:07:36.208 [DEBUG - main] (RangerRolesProvider.java:330) <== RangerRolesProvider.saveToCache(serviceName=kudu)
2025-06-26 14:07:36.208 [INFO - main] (RangerRolesProvider.java:190) RangerRolesProvider(serviceName=kudu): found updated version. lastKnownRoleVersion=-1; newVersion=1
2025-06-26 14:07:36.208 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerRolesProvider.loadUserGroupRolesFromAdmin(serviceName=kudu): 586
2025-06-26 14:07:36.209 [DEBUG - main] (RangerRolesProvider.java:207) <== RangerRolesProvider(serviceName=kudu serviceType= kudu ).loadUserGroupRolesFromAdmin()
2025-06-26 14:07:36.209 [DEBUG - main] (RangerRolesProvider.java:135) In-Use memory: 14385984, Free memory:224951488
2025-06-26 14:07:36.209 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerRolesProvider.loadUserGroupRoles(serviceName=kudu): 587
2025-06-26 14:07:36.209 [DEBUG - main] (RangerRolesProvider.java:164) <== RangerRolesProvider(serviceName=kudu).loadUserGroupRoles()
2025-06-26 14:07:36.210 [DEBUG - main] (PolicyRefresher.java:496) <== PolicyRefresher(serviceName=kudu).loadRoles()
2025-06-26 14:07:36.210 [DEBUG - main] (PolicyRefresher.java:232) ==> PolicyRefresher(serviceName=kudu).loadPolicy()
2025-06-26 14:07:36.210 [DEBUG - main] (PolicyRefresher.java:241) In-Use memory: 14385984, Free memory:224951488
2025-06-26 14:07:36.210 [DEBUG - main] (PolicyRefresher.java:294) ==> PolicyRefresher(serviceName=kudu).loadPolicyfromPolicyAdmin()
2025-06-26 14:07:36.210 [DEBUG - main] (RangerAdminRESTClient.java:129) ==> RangerAdminRESTClient.getServicePoliciesIfUpdated(-1, 0)
2025-06-26 14:07:36.210 [DEBUG - main] (RangerAdminRESTClient.java:165) Checking Service policy if updated with old api call
2025-06-26 14:07:36.411 [DEBUG - main] (RangerAdminRESTClient.java:201) <== RangerAdminRESTClient.getServicePoliciesIfUpdated(-1, 0): serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null
2025-06-26 14:07:36.412 [INFO - main] (PolicyRefresher.java:319) PolicyRefresher(serviceName=kudu): found updated version. lastKnownVersion=-1; newVersion=2
2025-06-26 14:07:36.412 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] PolicyRefresher.loadPolicyFromPolicyAdmin(serviceName=kudu): 202
2025-06-26 14:07:36.412 [DEBUG - main] (PolicyRefresher.java:337) <== PolicyRefresher(serviceName=kudu).loadPolicyfromPolicyAdmin()
2025-06-26 14:07:36.412 [DEBUG - main] (PolicyRefresher.java:258) In-Use memory: 29708480, Free memory:209628992
2025-06-26 14:07:36.413 [DEBUG - main] (RangerBasePlugin.java:194) ==> setPolicies(serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null)
2025-06-26 14:07:36.414 [DEBUG - main] (RangerPolicyDeltaUtil.java:160) ==> hasPolicyDeltas(servicePolicies:[serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null]
2025-06-26 14:07:36.417 [DEBUG - main] (RangerPolicyDeltaUtil.java:193) <== hasPolicyDeltas(servicePolicies:[serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null], ret:[false]
2025-06-26 14:07:36.418 [DEBUG - main] (RangerBasePlugin.java:243) Creating engine from policies
2025-06-26 14:07:36.422 [DEBUG - main] (PolicyEngine.java:164) ==> PolicyEngine(, serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null, org.apache.ranger.plugin.policyengine.RangerPluginContext@42721fe)
2025-06-26 14:07:36.423 [DEBUG - main] (PolicyEngine.java:175) In-Use memory: 30993872, Free memory:208343600
2025-06-26 14:07:36.432 [DEBUG - main] (RangerPolicyRepository.java:299) RangerPolicyRepository : building policy-repository for service[kudu], and zone:[null] with auditMode[AUDIT_DEFAULT]
2025-06-26 14:07:36.433 [DEBUG - main] (RangerServiceDefHelper.java:139) ==> RangerServiceDefHelper(). The RangerServiceDef: RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }
2025-06-26 14:07:36.435 [DEBUG - main] (RangerServiceDefHelper.java:397) Created graph for resources: _nodes={database=[table], column=[], table=[column]}
2025-06-26 14:07:36.435 [DEBUG - main] (RangerServiceDefHelper.java:605) Returning sources: [database]
2025-06-26 14:07:36.435 [DEBUG - main] (RangerServiceDefHelper.java:625) Returning sinks: [column]
2025-06-26 14:07:36.435 [DEBUG - main] (RangerServiceDefHelper.java:605) Returning sources: [database]
2025-06-26 14:07:36.436 [DEBUG - main] (RangerServiceDefHelper.java:625) Returning sinks: [column]
2025-06-26 14:07:36.436 [DEBUG - main] (RangerServiceDefHelper.java:397) Created graph for resources: null
2025-06-26 14:07:36.436 [DEBUG - main] (RangerServiceDefHelper.java:397) Created graph for resources: null
2025-06-26 14:07:36.437 [DEBUG - main] (RangerServiceDefHelper.java:330) Found [3] resource hierarchies for service [kudu] update-date[Thu Jun 26 14:07:23 UTC 2025]: {0=[[RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }], [RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }], [RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }]], 1=[], 2=[]}
2025-06-26 14:07:36.437 [DEBUG - main] (RangerPolicyRepository.java:1077) ==> RangerPolicyRepository.buildPolicyEvaluator(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }},RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, PolicyEngineOptions: { evaluatorType: auto, evaluateDelegateAdminOnly: false, disableContextEnrichers: false, disableCustomConditions: false, disableTagPolicyEvaluation: false, enableTagEnricherWithLocalRefresher: false, disableTrieLookupPrefilter: false, optimizeTrieForRetrieval: false, cacheAuditResult: false })
2025-06-26 14:07:36.438 [DEBUG - main] (RangerPolicyRepository.java:1101) ==> RangerPolicyRepository.scrubPolicy(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }})
2025-06-26 14:07:36.438 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:36.438 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:36.438 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:36.438 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:36.438 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:36.439 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:36.439 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:36.439 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:36.439 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:36.439 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:36.439 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:36.440 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:36.440 [DEBUG - main] (RangerPolicyRepository.java:1128) <== RangerPolicyRepository.scrubPolicy(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}): false
2025-06-26 14:07:36.444 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:71) ==> RangerOptimizedPolicyEvaluator.init()
2025-06-26 14:07:36.445 [DEBUG - main] (RangerDefaultPolicyEvaluator.java:107) ==> RangerDefaultPolicyEvaluator.init()
2025-06-26 14:07:36.445 [DEBUG - main] (RangerAbstractPolicyEvaluator.java:54) ==> RangerAbstractPolicyEvaluator.init(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}, RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} })
2025-06-26 14:07:36.446 [DEBUG - main] (RangerAbstractPolicyEvaluator.java:62) <== RangerAbstractPolicyEvaluator.init(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}, RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} })
2025-06-26 14:07:36.448 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:118) ==> RangerDefaultPolicyResourceMatcher.init()
2025-06-26 14:07:36.453 [DEBUG - main] (RangerServiceDefHelper.java:204) ==> getResourceHierarchies(policyType=0, keys=database,table)
2025-06-26 14:07:36.453 [DEBUG - main] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:36.454 [DEBUG - main] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): true
2025-06-26 14:07:36.454 [DEBUG - main] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:36.454 [DEBUG - main] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): true
2025-06-26 14:07:36.456 [DEBUG - main] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:36.456 [DEBUG - main] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): false
2025-06-26 14:07:36.456 [DEBUG - main] (RangerServiceDefHelper.java:216) <== getResourceHierarchies(policyType=0, keys=database,table) : [RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }],[RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }]
2025-06-26 14:07:36.457 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:635) ==> isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} })
2025-06-26 14:07:36.457 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:661) <== isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }) : true
2025-06-26 14:07:36.457 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:635) ==> isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} })
2025-06-26 14:07:36.457 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:661) <== isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }) : true
2025-06-26 14:07:36.458 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:759) ==> RangerDefaultPolicyResourceMatcher.createResourceMatcher(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} })
2025-06-26 14:07:36.460 [DEBUG - main] (RangerAbstractResourceMatcher.java:81) ==> RangerAbstractResourceMatcher.init()
2025-06-26 14:07:36.460 [DEBUG - main] (ResourceMatcher.java:69) ==> setDelimiters(value= db, startDelimiter={, endDelimiter=}, escapeChar=\, prefix=
2025-06-26 14:07:36.461 [DEBUG - main] (ResourceMatcher.java:78) <== setDelimiters(value= db, startDelimiter={, endDelimiter=}, escapeChar=\, prefix=
2025-06-26 14:07:36.461 [DEBUG - main] (RangerAbstractResourceMatcher.java:131) <== RangerAbstractResourceMatcher.init()
2025-06-26 14:07:36.461 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:792) <== RangerDefaultPolicyResourceMatcher.createResourceMatcher(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }): RangerDefaultResourceMatcher={RangerAbstractResourceMatcher={resourceDef={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} policyResource={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} optIgnoreCase={true} optWildCard={true} policyValues={db,} policyIsExcludes={false} isMatchAny={false} options={wildCard=true;ignoreCase=true;} }}
2025-06-26 14:07:36.461 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:759) ==> RangerDefaultPolicyResourceMatcher.createResourceMatcher(RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} })
2025-06-26 14:07:36.462 [DEBUG - main] (RangerAbstractResourceMatcher.java:81) ==> RangerAbstractResourceMatcher.init()
2025-06-26 14:07:36.462 [DEBUG - main] (ResourceMatcher.java:69) ==> setDelimiters(value= table, startDelimiter={, endDelimiter=}, escapeChar=\, prefix=
2025-06-26 14:07:36.462 [DEBUG - main] (ResourceMatcher.java:78) <== setDelimiters(value= table, startDelimiter={, endDelimiter=}, escapeChar=\, prefix=
2025-06-26 14:07:36.462 [DEBUG - main] (RangerAbstractResourceMatcher.java:131) <== RangerAbstractResourceMatcher.init()
2025-06-26 14:07:36.462 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:792) <== RangerDefaultPolicyResourceMatcher.createResourceMatcher(RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }): RangerDefaultResourceMatcher={RangerAbstractResourceMatcher={resourceDef={RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} policyResource={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} optIgnoreCase={true} optWildCard={true} policyValues={table,} policyIsExcludes={false} isMatchAny={false} options={wildCard=true;ignoreCase=true;} }}
2025-06-26 14:07:36.462 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:170) RangerDefaultPolicyResourceMatcher.init(): no matcher created for column. Continuing ...
2025-06-26 14:07:36.463 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerDefaultPolicyResourceMatcher.init(): 13
2025-06-26 14:07:36.463 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:227) <== RangerDefaultPolicyResourceMatcher.init(): ret=true
2025-06-26 14:07:36.464 [DEBUG - main] (RangerDefaultPolicyItemEvaluator.java:61) ==> RangerDefaultPolicyItemEvaluator(policyId=1, policyItem=RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }, serviceType=kudu, conditionsDisabled=false)
2025-06-26 14:07:36.465 [DEBUG - main] (RangerDefaultPolicyItemEvaluator.java:73) <== RangerDefaultPolicyItemEvaluator(policyId=1, conditionsCount=0)
2025-06-26 14:07:36.465 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerPolicyEvaluator.init(policyId=1, policyName=db;table;): 20
2025-06-26 14:07:36.466 [DEBUG - main] (RangerDefaultPolicyEvaluator.java:187) <== RangerDefaultPolicyEvaluator.init()
2025-06-26 14:07:36.466 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:335) ==> RangerOptimizedPolicyEvaluator.checkIfHasAllPerms()
2025-06-26 14:07:36.466 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:352) ==> RangerOptimizedPolicyEvaluator.checkIfHasAllPerms(), false
2025-06-26 14:07:36.466 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:147) ==> RangerOptimizedPolicyEvaluator.computeEvalOrder()
2025-06-26 14:07:36.467 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:230) <== RangerOptimizedPolicyEvaluator.computeEvalOrder(), policyName:db;table;, priority:9971
2025-06-26 14:07:36.467 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:111) <== RangerOptimizedPolicyEvaluator.init()
2025-06-26 14:07:36.467 [DEBUG - main] (RangerPolicyRepository.java:1093) <== RangerPolicyRepository.buildPolicyEvaluator(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }},RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }): RangerDefaultPolicyEvaluator={RangerAbstractPolicyEvaluator={policy={RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}} }resourceMatcher={RangerDefaultPolicyResourceMatcher={isInitialized=true, matchers={{RangerDefaultResourceMatcher={RangerAbstractResourceMatcher={resourceDef={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} policyResource={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} optIgnoreCase={true} optWildCard={true} policyValues={db,} policyIsExcludes={false} isMatchAny={false} options={wildCard=true;ignoreCase=true;} }}} {RangerDefaultResourceMatcher={RangerAbstractResourceMatcher={resourceDef={RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} policyResource={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} optIgnoreCase={true} optWildCard={true} policyValues={table,} policyIsExcludes={false} isMatchAny={false} options={wildCard=true;ignoreCase=true;} }}} } }} }
2025-06-26 14:07:36.468 [INFO - main] (RangerPolicyRepository.java:953) This policy engine contains 1 policy evaluators
2025-06-26 14:07:36.468 [DEBUG - main] (RangerPolicyRepository.java:968) policy evaluation order: 1 policies
2025-06-26 14:07:36.468 [DEBUG - main] (RangerPolicyRepository.java:974) policy evaluation order: #1 - policy id=1; name=db;table;; evalOrder=9971
2025-06-26 14:07:36.468 [DEBUG - main] (RangerPolicyRepository.java:977) dataMask policy evaluation order: 0 policies
2025-06-26 14:07:36.468 [DEBUG - main] (RangerPolicyRepository.java:985) rowFilter policy evaluation order: 0 policies
2025-06-26 14:07:36.470 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(database, evaluatorCount=1, isOptimizedForRetrieval=false)
2025-06-26 14:07:36.470 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(database, evaluatorCount=1, isMultiThreaded=false)
2025-06-26 14:07:36.471 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=database): 1
2025-06-26 14:07:36.471 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(database, evaluatorCount=1, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@6b00f608
2025-06-26 14:07:36.471 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=database): 1
2025-06-26 14:07:36.472 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=2; leafNodeCount=1; singleChildNodeCount=1; maxDepth=2; evaluatorListCount=1; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.472 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(database, evaluatorCount=1, isOptimizedForRetrieval=false): resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=2; leafNodeCount=1; singleChildNodeCount=1; maxDepth=2; evaluatorListCount=1; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.472 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(table, evaluatorCount=1, isOptimizedForRetrieval=false)
2025-06-26 14:07:36.472 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(table, evaluatorCount=1, isMultiThreaded=false)
2025-06-26 14:07:36.472 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=table): 0
2025-06-26 14:07:36.473 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(table, evaluatorCount=1, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@1d131e1b
2025-06-26 14:07:36.473 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=table): 1
2025-06-26 14:07:36.473 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=2; leafNodeCount=1; singleChildNodeCount=1; maxDepth=2; evaluatorListCount=1; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.473 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(table, evaluatorCount=1, isOptimizedForRetrieval=false): resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=2; leafNodeCount=1; singleChildNodeCount=1; maxDepth=2; evaluatorListCount=1; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.473 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(column, evaluatorCount=1, isOptimizedForRetrieval=false)
2025-06-26 14:07:36.473 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(column, evaluatorCount=1, isMultiThreaded=false)
2025-06-26 14:07:36.473 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=column): 0
2025-06-26 14:07:36.474 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(column, evaluatorCount=1, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@71cf1b07
2025-06-26 14:07:36.474 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=column): 1
2025-06-26 14:07:36.474 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=1; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.474 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(column, evaluatorCount=1, isOptimizedForRetrieval=false): resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=1; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.474 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(database, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:36.474 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(database, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:36.474 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=database): 0
2025-06-26 14:07:36.475 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(database, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@615091b8
2025-06-26 14:07:36.475 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=database): 1
2025-06-26 14:07:36.475 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.475 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(database, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.475 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(table, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:36.476 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(table, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:36.476 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=table): 0
2025-06-26 14:07:36.476 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(table, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@4fce136b
2025-06-26 14:07:36.476 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=table): 0
2025-06-26 14:07:36.476 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.476 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(table, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.477 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(column, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:36.477 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(column, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:36.477 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=column): 0
2025-06-26 14:07:36.477 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(column, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@4aa83f4f
2025-06-26 14:07:36.477 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=column): 0
2025-06-26 14:07:36.477 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.477 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(column, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.478 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(database, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:36.478 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(database, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:36.478 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=database): 0
2025-06-26 14:07:36.478 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(database, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@43b6123e
2025-06-26 14:07:36.478 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=database): 0
2025-06-26 14:07:36.478 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.478 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(database, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.478 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(table, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:36.478 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(table, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:36.479 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=table): 0
2025-06-26 14:07:36.479 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(table, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@260e86a1
2025-06-26 14:07:36.479 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=table): 1
2025-06-26 14:07:36.479 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.479 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(table, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.479 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(column, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:36.479 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(column, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:36.480 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=column): 0
2025-06-26 14:07:36.480 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(column, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@19648c40
2025-06-26 14:07:36.480 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=column): 1
2025-06-26 14:07:36.480 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.480 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(column, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.480 [DEBUG - main] (PolicyEngine.java:204) PolicyEngine : No tag-policy-repository for service kudu
2025-06-26 14:07:36.480 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerPolicyEngine.init(hashCode=40844aab): 58
2025-06-26 14:07:36.480 [DEBUG - main] (PolicyEngine.java:242) In-Use memory: 34825704, Free memory:204511768
2025-06-26 14:07:36.480 [DEBUG - main] (PolicyEngine.java:246) <== PolicyEngine()
2025-06-26 14:07:36.481 [DEBUG - main] (PolicyRefresher.java:403) ==> PolicyRefresher(serviceName=kudu).saveToCache()
2025-06-26 14:07:36.493 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] PolicyRefresher.saveToCache(serviceName=kudu): 11
2025-06-26 14:07:36.493 [DEBUG - main] (PolicyRefresher.java:457) <== PolicyRefresher(serviceName=kudu).saveToCache()
2025-06-26 14:07:36.494 [DEBUG - main] (RangerBasePlugin.java:312) <== setPolicies(serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null)
2025-06-26 14:07:36.494 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] PolicyRefresher.loadPolicy(serviceName=kudu): 284
2025-06-26 14:07:36.494 [DEBUG - main] (PolicyRefresher.java:287) <== PolicyRefresher(serviceName=kudu).loadPolicy()
2025-06-26 14:07:36.495 [DEBUG - PolicyRefresher(serviceName=kudu)-14] (PolicyRefresher.java:200) ==> PolicyRefresher(serviceName=kudu).run()
2025-06-26 14:07:36.496 [DEBUG - main] (PolicyRefresher.java:154) Scheduled policyDownloadRefresher to download policies every 30000 milliseconds
2025-06-26 14:07:36.496 [INFO - main] (RangerKuduAuthorizer.java:91) Finished Ranger Kudu plugin initialization
2025-06-26 14:07:36.521 [DEBUG - pool-3-thread-1] (QueueUtil.java:56) Message: org.apache.kudu.subprocess.InboundRequest@2f18ef78 has been put on the queue
2025-06-26 14:07:36.522 [DEBUG - pool-4-thread-1] (QueueUtil.java:41) Message: org.apache.kudu.subprocess.InboundRequest@2f18ef78 has been taken from the queue
2025-06-26 14:07:36.626 [DEBUG - pool-4-thread-1] (Groups.java:344) GroupCacheLoader - load.
2025-06-26 14:07:36.629 [DEBUG - pool-4-thread-1] (UserGroupInformation.java:1796) Failed to get groups for user user
java.io.IOException: No groups found for user user
	at org.apache.hadoop.security.Groups.noGroupsForUser(Groups.java:198) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.security.Groups.access$400(Groups.java:74) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.security.Groups$GroupCacheLoader.load(Groups.java:366) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.security.Groups$GroupCacheLoader.load(Groups.java:302) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache$LoadingValueReference.loadFuture(LocalCache.java:3570) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache$Segment.loadSync(LocalCache.java:2312) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache$Segment.lockedGetOrLoad(LocalCache.java:2189) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache$Segment.get(LocalCache.java:2079) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache.get(LocalCache.java:4011) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache.getOrLoad(LocalCache.java:4034) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache$LocalLoadingCache.get(LocalCache.java:5010) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.security.Groups.getGroupInternal(Groups.java:260) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.security.Groups.getGroups(Groups.java:216) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.security.UserGroupInformation.getGroups(UserGroupInformation.java:1794) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.kudu.subprocess.ranger.authorization.RangerKuduAuthorizer.getUserGroups(RangerKuduAuthorizer.java:246) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.kudu.subprocess.ranger.authorization.RangerKuduAuthorizer.authorizeRequests(RangerKuduAuthorizer.java:178) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.kudu.subprocess.ranger.authorization.RangerKuduAuthorizer.authorize(RangerKuduAuthorizer.java:117) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.kudu.subprocess.ranger.RangerProtocolHandler.executeRequest(RangerProtocolHandler.java:50) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.kudu.subprocess.ranger.RangerProtocolHandler.executeRequest(RangerProtocolHandler.java:36) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.kudu.subprocess.ProtocolHandler.unpackAndExecuteRequest(ProtocolHandler.java:53) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.kudu.subprocess.MessageParser.parseAndExecuteRequest(MessageParser.java:106) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.kudu.subprocess.MessageParser.run(MessageParser.java:65) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at java.util.concurrent.CompletableFuture$AsyncRun.run(CompletableFuture.java:1640) [?:1.8.0_275]
	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) [?:1.8.0_275]
	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) [?:1.8.0_275]
	at java.lang.Thread.run(Thread.java:748) [?:1.8.0_275]
2025-06-26 14:07:36.638 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:95) ==> RangerPolicyEngineImpl.evaluatePolicies(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={null} clusterType={null} context={} }, policyType=0)
2025-06-26 14:07:36.639 [INFO - pool-4-thread-1] (RangerPolicyEngineImpl.java:105) RangerPolicyEngineImpl.evaluatePolicies(457bc5fa_0, RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={null} clusterType={null} context={} })
2025-06-26 14:07:36.639 [DEBUG - pool-4-thread-1] (RangerAccessRequestImpl.java:275) Old Remote/Client IP Address=null, new IP Address=null
2025-06-26 14:07:36.640 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:435) ==> RangerPolicyEngineImpl.zoneAwareAccessEvaluationWithNoAudit(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0)
2025-06-26 14:07:36.640 [DEBUG - pool-4-thread-1] (PolicyEngine.java:316) ==> PolicyEngine.getMatchedZonesForResourceAndChildren(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } })
2025-06-26 14:07:36.640 [DEBUG - pool-4-thread-1] (PolicyEngine.java:326) <== PolicyEngine.getMatchedZonesForResourceAndChildren(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }) : null
2025-06-26 14:07:36.641 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:444) zoneNames:[null]
2025-06-26 14:07:36.641 [DEBUG - pool-4-thread-1] (PolicyEngine.java:347) zoneName:[null]
2025-06-26 14:07:36.641 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:510) ==> RangerPolicyEngineImpl.evaluatePoliciesNoAudit(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0, zoneName=null)
2025-06-26 14:07:36.642 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:608) ==> RangerPolicyEngineImpl.evaluateTagPolicies(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0, zoneName=null, RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={false} isAudited={false} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={-1} policyVersion={null} evaluatedPoliciesCount={0} reason={null} additionalInfo={}})
2025-06-26 14:07:36.643 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:686) <== RangerPolicyEngineImpl.evaluateTagPolicies(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0, zoneName=null, RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={false} isAudited={false} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={-1} policyVersion={null} evaluatedPoliciesCount={0} reason={null} additionalInfo={}})
2025-06-26 14:07:36.643 [DEBUG - pool-4-thread-1] (RangerPolicyRepository.java:544) ==> RangerPolicyRepository.setAuditEnabledFromCache()
2025-06-26 14:07:36.643 [DEBUG - pool-4-thread-1] (RangerPolicyRepository.java:555) <== RangerPolicyRepository.setAuditEnabledFromCache():false
2025-06-26 14:07:36.643 [DEBUG - pool-4-thread-1] (RangerResourceTrie.java:504) ==> RangerResourceTrie.getEvaluatorsForResource(db)
2025-06-26 14:07:36.643 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.getEvaluatorsForResource(resource=db): 0
2025-06-26 14:07:36.643 [DEBUG - pool-4-thread-1] (RangerResourceTrie.java:549) <== RangerResourceTrie.getEvaluatorsForResource(db): evaluatorCount=1
2025-06-26 14:07:36.644 [DEBUG - pool-4-thread-1] (RangerResourceTrie.java:504) ==> RangerResourceTrie.getEvaluatorsForResource(table)
2025-06-26 14:07:36.644 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.getEvaluatorsForResource(resource=table): 0
2025-06-26 14:07:36.644 [DEBUG - pool-4-thread-1] (RangerResourceTrie.java:549) <== RangerResourceTrie.getEvaluatorsForResource(table): evaluatorCount=1
2025-06-26 14:07:36.644 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:106) [PERF] RangerPolicyRepository.getLikelyMatchEvaluators(resource=db/table): 1
2025-06-26 14:07:36.645 [DEBUG - pool-4-thread-1] (RangerPolicyRepository.java:774) <== RangerPolicyRepository.getLikelyMatchPolicyEvaluators(db/table): evaluatorCount=1
2025-06-26 14:07:36.645 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:194) ==> RangerDefaultPolicyEvaluator.isApplicable(Thu Jun 26 14:07:36 UTC 2025)
2025-06-26 14:07:36.645 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:211) <== RangerDefaultPolicyEvaluator.isApplicable(Thu Jun 26 14:07:36 UTC 2025) : true
2025-06-26 14:07:36.645 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:220) ==> RangerDefaultPolicyEvaluator.evaluate(policyId=1, RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={false} isAudited={false} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={-1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}})
2025-06-26 14:07:36.645 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:550) ==> RangerDefaultPolicyResourceMatcher.getMatchType(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }{token:USER=user})
2025-06-26 14:07:36.646 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:692) ==> RangerDefaultPolicyResourceMatcher.getMatchingHierarchy(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } })
2025-06-26 14:07:36.646 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:204) ==> getResourceHierarchies(policyType=0, keys=database,table)
2025-06-26 14:07:36.646 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:36.646 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): true
2025-06-26 14:07:36.646 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:36.647 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): true
2025-06-26 14:07:36.647 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:36.647 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): false
2025-06-26 14:07:36.647 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:216) <== getResourceHierarchies(policyType=0, keys=database,table) : [RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }],[RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }]
2025-06-26 14:07:36.647 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:635) ==> isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} })
2025-06-26 14:07:36.648 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:661) <== isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }) : true
2025-06-26 14:07:36.648 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:720) <== RangerDefaultPolicyResourceMatcher.getMatchingHierarchy(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }): [RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }]
2025-06-26 14:07:36.648 [DEBUG - pool-4-thread-1] (RangerDefaultResourceMatcher.java:36) ==> RangerDefaultResourceMatcher.isMatch(db, {token:USER=user})
2025-06-26 14:07:36.648 [DEBUG - pool-4-thread-1] (RangerAbstractResourceMatcher.java:286) isAllValuesRequested(db): false
2025-06-26 14:07:36.649 [DEBUG - pool-4-thread-1] (RangerDefaultResourceMatcher.java:85) <== RangerDefaultResourceMatcher.isMatch(db, {token:USER=user}): true
2025-06-26 14:07:36.649 [DEBUG - pool-4-thread-1] (RangerDefaultResourceMatcher.java:36) ==> RangerDefaultResourceMatcher.isMatch(table, {token:USER=user})
2025-06-26 14:07:36.649 [DEBUG - pool-4-thread-1] (RangerAbstractResourceMatcher.java:286) isAllValuesRequested(table): false
2025-06-26 14:07:36.649 [DEBUG - pool-4-thread-1] (RangerDefaultResourceMatcher.java:85) <== RangerDefaultResourceMatcher.isMatch(table, {token:USER=user}): true
2025-06-26 14:07:36.649 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:101) [PERF] RangerDefaultPolicyResourceMatcher.getMatchType(): 3
2025-06-26 14:07:36.649 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:627) <== RangerDefaultPolicyResourceMatcher.getMatchType(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }{token:USER=user}): SELF
2025-06-26 14:07:36.650 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:1264) ==> RangerDefaultPolicyEvaluator.matchPolicyCustomConditions(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } })
2025-06-26 14:07:36.650 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:1304) <== RangerDefaultPolicyEvaluator.matchCustomConditions(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }): true
2025-06-26 14:07:36.650 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:101) [PERF] RangerPolicyEvaluator.evaluate(requestHashCode=457bc5fa,policyId=1, policyName=db;table;): 5
2025-06-26 14:07:36.650 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:276) <== RangerDefaultPolicyEvaluator.evaluate(policyId=1, RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}})
2025-06-26 14:07:36.650 [DEBUG - pool-4-thread-1] (RangerPolicyRepository.java:563) ==> RangerPolicyRepository.storeAuditEnabledInCache()
2025-06-26 14:07:36.650 [DEBUG - pool-4-thread-1] (RangerPolicyRepository.java:571) <== RangerPolicyRepository.storeAuditEnabledInCache()
2025-06-26 14:07:36.650 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:600) <== RangerPolicyEngineImpl.evaluatePoliciesNoAudit(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0, zoneName=null): RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}}
2025-06-26 14:07:36.650 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:502) <== RangerPolicyEngineImpl.zoneAwareAccessEvaluationWithNoAudit(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0): RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}}
2025-06-26 14:07:36.650 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:101) [PERF] RangerPolicyEngine.evaluatePolicies(requestHashCode=457bc5fa_0): 11
2025-06-26 14:07:36.651 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:129) <== RangerPolicyEngineImpl.evaluatePolicies(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType=0): RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}}
2025-06-26 14:07:36.651 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:72) ==> RangerDefaultAuditHandler.processResult(RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}})
2025-06-26 14:07:36.651 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:104) ==> RangerDefaultAuditHandler.getAuthzEvents(RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}})
2025-06-26 14:07:36.652 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:294) generateNextAuditEventId(): 5b736bfa-c481-4959-8468-e8102bc83944-0
2025-06-26 14:07:36.652 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:150) <== RangerDefaultAuditHandler.getAuthzEvents(RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={5b736bfa-c481-4959-8468-e8102bc83944-0} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}}): AuthzAuditEvent{repositoryType=105;repositoryName=kudu;user=user;eventTime=Thu Jun 26 14:07:36 UTC 2025;accessType=all;resourcePath=db/table;resourceType=table;action=all;accessResult=0;agentId=kudu;policyId=-1;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dist-test-slave-5xmx;logType=RangerAudit;eventId=5b736bfa-c481-4959-8468-e8102bc83944-0;seq_num=0;event_count=1;event_dur_ms=0;tags=[];clusterName=Cluster 1;zoneName=null;policyVersion=null;additionalInfo=null}
2025-06-26 14:07:36.652 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:189) ==> RangerDefaultAuditHandler.logAuthzAudit(AuthzAuditEvent{repositoryType=105;repositoryName=kudu;user=user;eventTime=Thu Jun 26 14:07:36 UTC 2025;accessType=all;resourcePath=db/table;resourceType=table;action=all;accessResult=0;agentId=kudu;policyId=-1;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dist-test-slave-5xmx;logType=RangerAudit;eventId=5b736bfa-c481-4959-8468-e8102bc83944-0;seq_num=0;event_count=1;event_dur_ms=0;tags=[];clusterName=Cluster 1;zoneName=null;policyVersion=null;additionalInfo=null})
2025-06-26 14:07:36.652 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:202) <== RangerDefaultAuditHandler.logAuthzAudit(AuthzAuditEvent{repositoryType=105;repositoryName=kudu;user=user;eventTime=Thu Jun 26 14:07:36 UTC 2025;accessType=all;resourcePath=db/table;resourceType=table;action=all;accessResult=0;agentId=kudu;policyId=-1;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dist-test-slave-5xmx;logType=RangerAudit;eventId=5b736bfa-c481-4959-8468-e8102bc83944-0;seq_num=1;event_count=1;event_dur_ms=0;tags=[];clusterName=Cluster 1;zoneName=null;policyVersion=null;additionalInfo=null})
2025-06-26 14:07:36.652 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:80) <== RangerDefaultAuditHandler.processResult(RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={5b736bfa-c481-4959-8468-e8102bc83944-0} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}})
2025-06-26 14:07:36.653 [DEBUG - pool-4-thread-1] (RangerKuduAuthorizer.java:192) RangerAccessRequest [RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }] receives result [RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={5b736bfa-c481-4959-8468-e8102bc83944-0} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}}]
2025-06-26 14:07:36.659 [DEBUG - pool-4-thread-1] (QueueUtil.java:56) Message: org.apache.kudu.subprocess.OutboundResponse@5e85e7a5 has been put on the queue
2025-06-26 14:07:36.659 [DEBUG - pool-5-thread-1] (QueueUtil.java:41) Message: org.apache.kudu.subprocess.OutboundResponse@5e85e7a5 has been taken from the queue
I20250626 14:07:36.669098 25108 server.cc:273] Received an EOF from the subprocess
W20250626 14:07:36.669360 25095 server.cc:408] The subprocess has exited with status 9
I20250626 14:07:36.673282 25109 server.cc:440] outbound queue shut down: Aborted: 
I20250626 14:07:36.673301 25105 server.cc:366] get failed, inbound queue shut down: Aborted: 
I20250626 14:07:36.673308 25107 server.cc:366] get failed, inbound queue shut down: Aborted: 
I20250626 14:07:36.673302 25106 server.cc:366] get failed, inbound queue shut down: Aborted: 
W20250626 14:07:36.673638 23932 subprocess_protocol.cc:66] error closing read fd: Bad file descriptor
I20250626 14:07:36.673724 23932 ranger_client.cc:318] Using existing properties file: /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/log_conf/kudu-ranger-subprocess-log4j2.properties
2025-06-26 14:07:37.325 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-audit.xml)
2025-06-26 14:07:37.332 [DEBUG - main] (RangerConfiguration.java:95) Conf file path ranger-kudu-audit.xml does not exists
2025-06-26 14:07:37.332 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-audit.xml): couldn't find resource file location
2025-06-26 14:07:37.333 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-audit.xml), result=false
2025-06-26 14:07:37.333 [DEBUG - main] (RangerPluginConfig.java:248) ==> addAuditResource(Service Type: kudu
2025-06-26 14:07:37.334 [DEBUG - main] (RangerPluginConfig.java:271) <== addAuditResource(Service Type: kudu)
2025-06-26 14:07:37.334 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-security.xml)
2025-06-26 14:07:37.335 [INFO - main] (RangerConfiguration.java:50) addResourceIfReadable(ranger-kudu-security.xml): resource file is file:/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/ranger-kudu-security.xml
2025-06-26 14:07:37.372 [DEBUG - main] (MutableMetricsFactory.java:43) field org.apache.hadoop.metrics2.lib.MutableRate org.apache.hadoop.security.UserGroupInformation$UgiMetrics.getGroups with annotation @org.apache.hadoop.metrics2.annotation.Metric(always=false, sampleName=Ops, valueName=Time, about=, interval=10, type=DEFAULT, value=[GetGroups])
2025-06-26 14:07:37.377 [DEBUG - main] (MutableMetricsFactory.java:43) field org.apache.hadoop.metrics2.lib.MutableRate org.apache.hadoop.security.UserGroupInformation$UgiMetrics.loginFailure with annotation @org.apache.hadoop.metrics2.annotation.Metric(always=false, sampleName=Ops, valueName=Time, about=, interval=10, type=DEFAULT, value=[Rate of failed kerberos logins and latency (milliseconds)])
2025-06-26 14:07:37.378 [DEBUG - main] (MutableMetricsFactory.java:43) field org.apache.hadoop.metrics2.lib.MutableRate org.apache.hadoop.security.UserGroupInformation$UgiMetrics.loginSuccess with annotation @org.apache.hadoop.metrics2.annotation.Metric(always=false, sampleName=Ops, valueName=Time, about=, interval=10, type=DEFAULT, value=[Rate of successful kerberos logins and latency (milliseconds)])
2025-06-26 14:07:37.378 [DEBUG - main] (MutableMetricsFactory.java:43) field private org.apache.hadoop.metrics2.lib.MutableGaugeInt org.apache.hadoop.security.UserGroupInformation$UgiMetrics.renewalFailures with annotation @org.apache.hadoop.metrics2.annotation.Metric(always=false, sampleName=Ops, valueName=Time, about=, interval=10, type=DEFAULT, value=[Renewal failures since last successful login])
2025-06-26 14:07:37.379 [DEBUG - main] (MutableMetricsFactory.java:43) field private org.apache.hadoop.metrics2.lib.MutableGaugeLong org.apache.hadoop.security.UserGroupInformation$UgiMetrics.renewalFailuresTotal with annotation @org.apache.hadoop.metrics2.annotation.Metric(always=false, sampleName=Ops, valueName=Time, about=, interval=10, type=DEFAULT, value=[Renewal failures since startup])
2025-06-26 14:07:37.380 [DEBUG - main] (MetricsSystemImpl.java:231) UgiMetrics, User and group related metrics
2025-06-26 14:07:37.382 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-security.xml), result=true
2025-06-26 14:07:37.382 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-policymgr-ssl.xml)
2025-06-26 14:07:37.383 [DEBUG - main] (RangerConfiguration.java:95) Conf file path ranger-kudu-policymgr-ssl.xml does not exists
2025-06-26 14:07:37.383 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-policymgr-ssl.xml): couldn't find resource file location
2025-06-26 14:07:37.383 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-policymgr-ssl.xml), result=false
2025-06-26 14:07:37.383 [DEBUG - main] (RangerPluginConfig.java:277) ==> addSslConfigResource(Service Type: kudu
2025-06-26 14:07:37.413 [DEBUG - main] (RangerPluginConfig.java:299) <== addSslConfigResource(Service Type: kudu)
2025-06-26 14:07:37.413 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-kudu-audit.xml)
2025-06-26 14:07:37.414 [DEBUG - main] (RangerConfiguration.java:95) Conf file path ranger-kudu-kudu-audit.xml does not exists
2025-06-26 14:07:37.414 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-kudu-audit.xml): couldn't find resource file location
2025-06-26 14:07:37.414 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-kudu-audit.xml), result=false
2025-06-26 14:07:37.414 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-kudu-security.xml)
2025-06-26 14:07:37.415 [DEBUG - main] (RangerConfiguration.java:95) Conf file path ranger-kudu-kudu-security.xml does not exists
2025-06-26 14:07:37.415 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-kudu-security.xml): couldn't find resource file location
2025-06-26 14:07:37.415 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-kudu-security.xml), result=false
2025-06-26 14:07:37.415 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-kudu-policymgr-ssl.xml)
2025-06-26 14:07:37.415 [DEBUG - main] (RangerConfiguration.java:95) Conf file path ranger-kudu-kudu-policymgr-ssl.xml does not exists
2025-06-26 14:07:37.415 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-kudu-policymgr-ssl.xml): couldn't find resource file location
2025-06-26 14:07:37.416 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-kudu-policymgr-ssl.xml), result=false
2025-06-26 14:07:37.417 [DEBUG - main] (RangerPluginConfig.java:99) ranger.plugin.kudu.use.x-forwarded-for.ipaddress:false
2025-06-26 14:07:37.417 [DEBUG - main] (RangerPluginConfig.java:100) ranger.plugin.kudu.trusted.proxy.ipaddresses:[null]
2025-06-26 14:07:37.418 [INFO - main] (RangerPluginConfig.java:116) PolicyEngineOptions: { evaluatorType: auto, evaluateDelegateAdminOnly: false, disableContextEnrichers: false, disableCustomConditions: false, disableTagPolicyEvaluation: false, enableTagEnricherWithLocalRefresher: false, disableTrieLookupPrefilter: false, optimizeTrieForRetrieval: false, cacheAuditResult: false }
2025-06-26 14:07:37.420 [DEBUG - main] (RangerPluginConfig.java:170) superUsers=[], superGroups=[]
2025-06-26 14:07:37.421 [DEBUG - main] (RangerPluginConfig.java:161) auditExcludedUsers=[], auditExcludedGroups=[], auditExcludedRoles=[]
2025-06-26 14:07:37.496 [DEBUG - main] (MiscUtil.java:839) ==> MiscUtil.initLocalHost()
2025-06-26 14:07:37.497 [DEBUG - main] (MiscUtil.java:848) <== MiscUtil.initLocalHost()
2025-06-26 14:07:37.542 [DEBUG - main] (Shell.java:874) setsid exited with exit code 0
2025-06-26 14:07:37.542 [DEBUG - main] (SecurityUtil.java:136) Setting hadoop.security.token.service.use_ip to true
2025-06-26 14:07:37.563 [DEBUG - main] (Groups.java:476)  Creating new Groups object
2025-06-26 14:07:37.578 [DEBUG - main] (Groups.java:150) Group mapping impl=org.apache.hadoop.security.NullGroupsMapping; cacheTimeout=300000; warningDeltaMs=5000
2025-06-26 14:07:37.579 [INFO - main] (AuditProviderFactory.java:76) AuditProviderFactory: creating..
2025-06-26 14:07:37.579 [INFO - main] (AuditProviderFactory.java:114) AuditProviderFactory: initializing..
2025-06-26 14:07:37.580 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.cache.dir=/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/policy-cache
2025-06-26 14:07:37.580 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.source.impl=org.apache.ranger.admin.client.RangerAdminRESTClient
2025-06-26 14:07:37.580 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.rest.url=http://127.0.0.1:35455
2025-06-26 14:07:37.580 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.pollIntervalMs=30000
2025-06-26 14:07:37.581 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.service.name=kudu
2025-06-26 14:07:37.581 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.access.cluster.name=Cluster 1
2025-06-26 14:07:37.581 [INFO - main] (AuditProviderFactory.java:279) No v3 audit configuration found. Trying v2 audit configurations
2025-06-26 14:07:37.582 [INFO - Ranger async Audit cleanup] (AuditProviderFactory.java:497) RangerAsyncAuditCleanup: Waiting to audit cleanup start signal
2025-06-26 14:07:37.596 [DEBUG - main] (PolicyRefresher.java:67) ==> PolicyRefresher(serviceName=kudu).PolicyRefresher()
2025-06-26 14:07:37.596 [DEBUG - main] (RangerBasePlugin.java:605) ==> RangerBasePlugin.createAdminClient(kudu, kudu, ranger.plugin.kudu)
2025-06-26 14:07:37.597 [DEBUG - main] (RangerBasePlugin.java:618) Value for property[ranger.plugin.kudu.policy.source.impl] was [org.apache.ranger.admin.client.RangerAdminRESTClient].
2025-06-26 14:07:37.601 [DEBUG - main] (RangerAdminRESTClient.java:775) ==> RangerAdminRESTClient.init(http://127.0.0.1:35455, null)
2025-06-26 14:07:37.604 [DEBUG - main] (RangerAdminRESTClient.java:783) <== RangerAdminRESTClient.init(http://127.0.0.1:35455, null)
2025-06-26 14:07:37.605 [DEBUG - main] (RangerBasePlugin.java:638) <== RangerBasePlugin.createAdminClient(kudu, kudu, ranger.plugin.kudu): policySourceImpl=org.apache.ranger.admin.client.RangerAdminRESTClient, client=org.apache.ranger.admin.client.RangerAdminRESTClient@7a35b0f5
2025-06-26 14:07:37.606 [DEBUG - main] (RangerRolesProvider.java:62) ==> RangerRolesProvider(serviceName=kudu).RangerRolesProvider()
2025-06-26 14:07:37.607 [DEBUG - main] (RangerRolesProvider.java:94) <== RangerRolesProvider(serviceName=kudu).RangerRolesProvider()
2025-06-26 14:07:37.607 [DEBUG - main] (PolicyRefresher.java:102) <== PolicyRefresher(serviceName=kudu).PolicyRefresher()
2025-06-26 14:07:37.607 [INFO - main] (RangerBasePlugin.java:183) Created PolicyRefresher Thread(PolicyRefresher(serviceName=kudu)-14)
2025-06-26 14:07:37.607 [DEBUG - main] (PolicyRefresher.java:489) ==> PolicyRefresher(serviceName=kudu).loadRoles()
2025-06-26 14:07:37.608 [DEBUG - main] (RangerRolesProvider.java:109) ==> RangerRolesProvider(serviceName= kudu serviceType= kudu).loadUserGroupRoles()
2025-06-26 14:07:37.609 [DEBUG - main] (RangerRolesProvider.java:118) In-Use memory: 58471424, Free memory:180800512
2025-06-26 14:07:37.609 [DEBUG - main] (RangerRolesProvider.java:171) ==> RangerRolesProvider(serviceName=kudu).loadUserGroupRolesFromAdmin()
2025-06-26 14:07:37.609 [DEBUG - main] (RangerAdminRESTClient.java:210) ==> RangerAdminRESTClient.getRolesIfUpdated(-1, 0)
2025-06-26 14:07:37.613 [DEBUG - main] (UserGroupInformation.java:245) Hadoop login
2025-06-26 14:07:37.614 [DEBUG - main] (UserGroupInformation.java:191) hadoop login commit
2025-06-26 14:07:37.630 [DEBUG - main] (UserGroupInformation.java:213) Using local user: UnixPrincipal: slave
2025-06-26 14:07:37.632 [DEBUG - main] (UserGroupInformation.java:217) Using user: "UnixPrincipal: slave" with name: slave
2025-06-26 14:07:37.633 [DEBUG - main] (UserGroupInformation.java:229) User entry: "slave"
2025-06-26 14:07:37.633 [DEBUG - main] (UserGroupInformation.java:801) UGI loginUser: slave (auth:SIMPLE)
2025-06-26 14:07:37.633 [DEBUG - main] (RangerAdminRESTClient.java:244) Checking Roles updated as user : slave (auth:SIMPLE)
2025-06-26 14:07:37.970 [DEBUG - main] (RangerAdminRESTClient.java:283) <== RangerAdminRESTClient.getRolesIfUpdated(-1, 0): 
2025-06-26 14:07:37.970 [DEBUG - main] (RangerRolesProvider.java:277) ==> RangerRolesProvider(serviceName=kudu).saveToCache()
2025-06-26 14:07:37.978 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerRolesProvider.saveToCache(serviceName=kudu): 8
2025-06-26 14:07:37.979 [DEBUG - main] (RangerRolesProvider.java:330) <== RangerRolesProvider.saveToCache(serviceName=kudu)
2025-06-26 14:07:37.979 [INFO - main] (RangerRolesProvider.java:190) RangerRolesProvider(serviceName=kudu): found updated version. lastKnownRoleVersion=-1; newVersion=1
2025-06-26 14:07:37.979 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerRolesProvider.loadUserGroupRolesFromAdmin(serviceName=kudu): 370
2025-06-26 14:07:37.979 [DEBUG - main] (RangerRolesProvider.java:207) <== RangerRolesProvider(serviceName=kudu serviceType= kudu ).loadUserGroupRolesFromAdmin()
2025-06-26 14:07:37.979 [DEBUG - main] (RangerRolesProvider.java:135) In-Use memory: 14383560, Free memory:224953912
2025-06-26 14:07:37.980 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerRolesProvider.loadUserGroupRoles(serviceName=kudu): 371
2025-06-26 14:07:37.980 [DEBUG - main] (RangerRolesProvider.java:164) <== RangerRolesProvider(serviceName=kudu).loadUserGroupRoles()
2025-06-26 14:07:37.980 [DEBUG - main] (PolicyRefresher.java:496) <== PolicyRefresher(serviceName=kudu).loadRoles()
2025-06-26 14:07:37.980 [DEBUG - main] (PolicyRefresher.java:232) ==> PolicyRefresher(serviceName=kudu).loadPolicy()
2025-06-26 14:07:37.981 [DEBUG - main] (PolicyRefresher.java:241) In-Use memory: 14383560, Free memory:224953912
2025-06-26 14:07:37.981 [DEBUG - main] (PolicyRefresher.java:294) ==> PolicyRefresher(serviceName=kudu).loadPolicyfromPolicyAdmin()
2025-06-26 14:07:37.981 [DEBUG - main] (RangerAdminRESTClient.java:129) ==> RangerAdminRESTClient.getServicePoliciesIfUpdated(-1, 0)
2025-06-26 14:07:37.981 [DEBUG - main] (RangerAdminRESTClient.java:165) Checking Service policy if updated with old api call
2025-06-26 14:07:38.099 [DEBUG - main] (RangerAdminRESTClient.java:201) <== RangerAdminRESTClient.getServicePoliciesIfUpdated(-1, 0): serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null
2025-06-26 14:07:38.099 [INFO - main] (PolicyRefresher.java:319) PolicyRefresher(serviceName=kudu): found updated version. lastKnownVersion=-1; newVersion=2
2025-06-26 14:07:38.099 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] PolicyRefresher.loadPolicyFromPolicyAdmin(serviceName=kudu): 118
2025-06-26 14:07:38.100 [DEBUG - main] (PolicyRefresher.java:337) <== PolicyRefresher(serviceName=kudu).loadPolicyfromPolicyAdmin()
2025-06-26 14:07:38.100 [DEBUG - main] (PolicyRefresher.java:258) In-Use memory: 29706144, Free memory:209631328
2025-06-26 14:07:38.100 [DEBUG - main] (RangerBasePlugin.java:194) ==> setPolicies(serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null)
2025-06-26 14:07:38.101 [DEBUG - main] (RangerPolicyDeltaUtil.java:160) ==> hasPolicyDeltas(servicePolicies:[serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null]
2025-06-26 14:07:38.103 [DEBUG - main] (RangerPolicyDeltaUtil.java:193) <== hasPolicyDeltas(servicePolicies:[serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null], ret:[false]
2025-06-26 14:07:38.103 [DEBUG - main] (RangerBasePlugin.java:243) Creating engine from policies
2025-06-26 14:07:38.107 [DEBUG - main] (PolicyEngine.java:164) ==> PolicyEngine(, serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null, org.apache.ranger.plugin.policyengine.RangerPluginContext@42721fe)
2025-06-26 14:07:38.107 [DEBUG - main] (PolicyEngine.java:175) In-Use memory: 30991552, Free memory:208345920
2025-06-26 14:07:38.113 [DEBUG - main] (RangerPolicyRepository.java:299) RangerPolicyRepository : building policy-repository for service[kudu], and zone:[null] with auditMode[AUDIT_DEFAULT]
2025-06-26 14:07:38.114 [DEBUG - main] (RangerServiceDefHelper.java:139) ==> RangerServiceDefHelper(). The RangerServiceDef: RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }
2025-06-26 14:07:38.116 [DEBUG - main] (RangerServiceDefHelper.java:397) Created graph for resources: _nodes={database=[table], column=[], table=[column]}
2025-06-26 14:07:38.116 [DEBUG - main] (RangerServiceDefHelper.java:605) Returning sources: [database]
2025-06-26 14:07:38.116 [DEBUG - main] (RangerServiceDefHelper.java:625) Returning sinks: [column]
2025-06-26 14:07:38.116 [DEBUG - main] (RangerServiceDefHelper.java:605) Returning sources: [database]
2025-06-26 14:07:38.116 [DEBUG - main] (RangerServiceDefHelper.java:625) Returning sinks: [column]
2025-06-26 14:07:38.117 [DEBUG - main] (RangerServiceDefHelper.java:397) Created graph for resources: null
2025-06-26 14:07:38.117 [DEBUG - main] (RangerServiceDefHelper.java:397) Created graph for resources: null
2025-06-26 14:07:38.117 [DEBUG - main] (RangerServiceDefHelper.java:330) Found [3] resource hierarchies for service [kudu] update-date[Thu Jun 26 14:07:23 UTC 2025]: {0=[[RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }], [RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }], [RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }]], 1=[], 2=[]}
2025-06-26 14:07:38.118 [DEBUG - main] (RangerPolicyRepository.java:1077) ==> RangerPolicyRepository.buildPolicyEvaluator(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }},RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, PolicyEngineOptions: { evaluatorType: auto, evaluateDelegateAdminOnly: false, disableContextEnrichers: false, disableCustomConditions: false, disableTagPolicyEvaluation: false, enableTagEnricherWithLocalRefresher: false, disableTrieLookupPrefilter: false, optimizeTrieForRetrieval: false, cacheAuditResult: false })
2025-06-26 14:07:38.118 [DEBUG - main] (RangerPolicyRepository.java:1101) ==> RangerPolicyRepository.scrubPolicy(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }})
2025-06-26 14:07:38.119 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:38.119 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:38.119 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:38.119 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:38.119 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:38.119 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:38.120 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:38.120 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:38.120 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:38.120 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:38.120 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:38.120 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1): 
2025-06-26 14:07:38.121 [DEBUG - main] (RangerPolicyRepository.java:1128) <== RangerPolicyRepository.scrubPolicy(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}): false
2025-06-26 14:07:38.124 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:71) ==> RangerOptimizedPolicyEvaluator.init()
2025-06-26 14:07:38.124 [DEBUG - main] (RangerDefaultPolicyEvaluator.java:107) ==> RangerDefaultPolicyEvaluator.init()
2025-06-26 14:07:38.124 [DEBUG - main] (RangerAbstractPolicyEvaluator.java:54) ==> RangerAbstractPolicyEvaluator.init(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}, RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} })
2025-06-26 14:07:38.125 [DEBUG - main] (RangerAbstractPolicyEvaluator.java:62) <== RangerAbstractPolicyEvaluator.init(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}, RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} })
2025-06-26 14:07:38.127 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:118) ==> RangerDefaultPolicyResourceMatcher.init()
2025-06-26 14:07:38.130 [DEBUG - main] (RangerServiceDefHelper.java:204) ==> getResourceHierarchies(policyType=0, keys=database,table)
2025-06-26 14:07:38.131 [DEBUG - main] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:38.131 [DEBUG - main] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): true
2025-06-26 14:07:38.131 [DEBUG - main] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:38.131 [DEBUG - main] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): true
2025-06-26 14:07:38.133 [DEBUG - main] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:38.133 [DEBUG - main] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): false
2025-06-26 14:07:38.133 [DEBUG - main] (RangerServiceDefHelper.java:216) <== getResourceHierarchies(policyType=0, keys=database,table) : [RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }],[RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }]
2025-06-26 14:07:38.133 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:635) ==> isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} })
2025-06-26 14:07:38.133 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:661) <== isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }) : true
2025-06-26 14:07:38.134 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:635) ==> isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} })
2025-06-26 14:07:38.134 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:661) <== isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }) : true
2025-06-26 14:07:38.134 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:759) ==> RangerDefaultPolicyResourceMatcher.createResourceMatcher(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} })
2025-06-26 14:07:38.137 [DEBUG - main] (RangerAbstractResourceMatcher.java:81) ==> RangerAbstractResourceMatcher.init()
2025-06-26 14:07:38.137 [DEBUG - main] (ResourceMatcher.java:69) ==> setDelimiters(value= db, startDelimiter={, endDelimiter=}, escapeChar=\, prefix=
2025-06-26 14:07:38.137 [DEBUG - main] (ResourceMatcher.java:78) <== setDelimiters(value= db, startDelimiter={, endDelimiter=}, escapeChar=\, prefix=
2025-06-26 14:07:38.138 [DEBUG - main] (RangerAbstractResourceMatcher.java:131) <== RangerAbstractResourceMatcher.init()
2025-06-26 14:07:38.138 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:792) <== RangerDefaultPolicyResourceMatcher.createResourceMatcher(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }): RangerDefaultResourceMatcher={RangerAbstractResourceMatcher={resourceDef={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} policyResource={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} optIgnoreCase={true} optWildCard={true} policyValues={db,} policyIsExcludes={false} isMatchAny={false} options={wildCard=true;ignoreCase=true;} }}
2025-06-26 14:07:38.138 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:759) ==> RangerDefaultPolicyResourceMatcher.createResourceMatcher(RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} })
2025-06-26 14:07:38.138 [DEBUG - main] (RangerAbstractResourceMatcher.java:81) ==> RangerAbstractResourceMatcher.init()
2025-06-26 14:07:38.138 [DEBUG - main] (ResourceMatcher.java:69) ==> setDelimiters(value= table, startDelimiter={, endDelimiter=}, escapeChar=\, prefix=
2025-06-26 14:07:38.138 [DEBUG - main] (ResourceMatcher.java:78) <== setDelimiters(value= table, startDelimiter={, endDelimiter=}, escapeChar=\, prefix=
2025-06-26 14:07:38.138 [DEBUG - main] (RangerAbstractResourceMatcher.java:131) <== RangerAbstractResourceMatcher.init()
2025-06-26 14:07:38.138 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:792) <== RangerDefaultPolicyResourceMatcher.createResourceMatcher(RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }): RangerDefaultResourceMatcher={RangerAbstractResourceMatcher={resourceDef={RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} policyResource={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} optIgnoreCase={true} optWildCard={true} policyValues={table,} policyIsExcludes={false} isMatchAny={false} options={wildCard=true;ignoreCase=true;} }}
2025-06-26 14:07:38.139 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:170) RangerDefaultPolicyResourceMatcher.init(): no matcher created for column. Continuing ...
2025-06-26 14:07:38.139 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerDefaultPolicyResourceMatcher.init(): 12
2025-06-26 14:07:38.139 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:227) <== RangerDefaultPolicyResourceMatcher.init(): ret=true
2025-06-26 14:07:38.140 [DEBUG - main] (RangerDefaultPolicyItemEvaluator.java:61) ==> RangerDefaultPolicyItemEvaluator(policyId=1, policyItem=RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }, serviceType=kudu, conditionsDisabled=false)
2025-06-26 14:07:38.141 [DEBUG - main] (RangerDefaultPolicyItemEvaluator.java:73) <== RangerDefaultPolicyItemEvaluator(policyId=1, conditionsCount=0)
2025-06-26 14:07:38.142 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerPolicyEvaluator.init(policyId=1, policyName=db;table;): 18
2025-06-26 14:07:38.142 [DEBUG - main] (RangerDefaultPolicyEvaluator.java:187) <== RangerDefaultPolicyEvaluator.init()
2025-06-26 14:07:38.142 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:335) ==> RangerOptimizedPolicyEvaluator.checkIfHasAllPerms()
2025-06-26 14:07:38.142 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:352) ==> RangerOptimizedPolicyEvaluator.checkIfHasAllPerms(), false
2025-06-26 14:07:38.142 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:147) ==> RangerOptimizedPolicyEvaluator.computeEvalOrder()
2025-06-26 14:07:38.143 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:230) <== RangerOptimizedPolicyEvaluator.computeEvalOrder(), policyName:db;table;, priority:9971
2025-06-26 14:07:38.143 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:111) <== RangerOptimizedPolicyEvaluator.init()
2025-06-26 14:07:38.143 [DEBUG - main] (RangerPolicyRepository.java:1093) <== RangerPolicyRepository.buildPolicyEvaluator(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }},RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }): RangerDefaultPolicyEvaluator={RangerAbstractPolicyEvaluator={policy={RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}} }resourceMatcher={RangerDefaultPolicyResourceMatcher={isInitialized=true, matchers={{RangerDefaultResourceMatcher={RangerAbstractResourceMatcher={resourceDef={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} policyResource={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} optIgnoreCase={true} optWildCard={true} policyValues={db,} policyIsExcludes={false} isMatchAny={false} options={wildCard=true;ignoreCase=true;} }}} {RangerDefaultResourceMatcher={RangerAbstractResourceMatcher={resourceDef={RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} policyResource={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} optIgnoreCase={true} optWildCard={true} policyValues={table,} policyIsExcludes={false} isMatchAny={false} options={wildCard=true;ignoreCase=true;} }}} } }} }
2025-06-26 14:07:38.143 [INFO - main] (RangerPolicyRepository.java:953) This policy engine contains 1 policy evaluators
2025-06-26 14:07:38.143 [DEBUG - main] (RangerPolicyRepository.java:968) policy evaluation order: 1 policies
2025-06-26 14:07:38.144 [DEBUG - main] (RangerPolicyRepository.java:974) policy evaluation order: #1 - policy id=1; name=db;table;; evalOrder=9971
2025-06-26 14:07:38.144 [DEBUG - main] (RangerPolicyRepository.java:977) dataMask policy evaluation order: 0 policies
2025-06-26 14:07:38.144 [DEBUG - main] (RangerPolicyRepository.java:985) rowFilter policy evaluation order: 0 policies
2025-06-26 14:07:38.145 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(database, evaluatorCount=1, isOptimizedForRetrieval=false)
2025-06-26 14:07:38.146 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(database, evaluatorCount=1, isMultiThreaded=false)
2025-06-26 14:07:38.147 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=database): 0
2025-06-26 14:07:38.147 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(database, evaluatorCount=1, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@6b00f608
2025-06-26 14:07:38.147 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=database): 2
2025-06-26 14:07:38.147 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=2; leafNodeCount=1; singleChildNodeCount=1; maxDepth=2; evaluatorListCount=1; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.147 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(database, evaluatorCount=1, isOptimizedForRetrieval=false): resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=2; leafNodeCount=1; singleChildNodeCount=1; maxDepth=2; evaluatorListCount=1; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.147 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(table, evaluatorCount=1, isOptimizedForRetrieval=false)
2025-06-26 14:07:38.147 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(table, evaluatorCount=1, isMultiThreaded=false)
2025-06-26 14:07:38.148 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=table): 1
2025-06-26 14:07:38.148 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(table, evaluatorCount=1, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@1d131e1b
2025-06-26 14:07:38.148 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=table): 1
2025-06-26 14:07:38.148 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=2; leafNodeCount=1; singleChildNodeCount=1; maxDepth=2; evaluatorListCount=1; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.148 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(table, evaluatorCount=1, isOptimizedForRetrieval=false): resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=2; leafNodeCount=1; singleChildNodeCount=1; maxDepth=2; evaluatorListCount=1; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.148 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(column, evaluatorCount=1, isOptimizedForRetrieval=false)
2025-06-26 14:07:38.148 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(column, evaluatorCount=1, isMultiThreaded=false)
2025-06-26 14:07:38.148 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=column): 0
2025-06-26 14:07:38.148 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(column, evaluatorCount=1, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@71cf1b07
2025-06-26 14:07:38.148 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=column): 0
2025-06-26 14:07:38.149 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=1; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.149 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(column, evaluatorCount=1, isOptimizedForRetrieval=false): resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=1; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.149 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(database, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:38.149 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(database, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:38.149 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=database): 0
2025-06-26 14:07:38.149 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(database, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@615091b8
2025-06-26 14:07:38.149 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=database): 0
2025-06-26 14:07:38.149 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.150 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(database, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.150 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(table, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:38.150 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(table, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:38.150 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=table): 0
2025-06-26 14:07:38.150 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(table, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@4fce136b
2025-06-26 14:07:38.150 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=table): 0
2025-06-26 14:07:38.150 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.150 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(table, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.151 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(column, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:38.151 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(column, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:38.151 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=column): 0
2025-06-26 14:07:38.151 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(column, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@4aa83f4f
2025-06-26 14:07:38.151 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=column): 0
2025-06-26 14:07:38.151 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.151 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(column, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.151 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(database, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:38.152 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(database, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:38.152 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=database): 0
2025-06-26 14:07:38.152 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(database, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@43b6123e
2025-06-26 14:07:38.152 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=database): 0
2025-06-26 14:07:38.152 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.152 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(database, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.152 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(table, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:38.152 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(table, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:38.153 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=table): 0
2025-06-26 14:07:38.153 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(table, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@260e86a1
2025-06-26 14:07:38.153 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=table): 1
2025-06-26 14:07:38.153 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.153 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(table, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.153 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(column, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:38.153 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(column, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:38.154 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=column): 0
2025-06-26 14:07:38.154 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(column, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@19648c40
2025-06-26 14:07:38.154 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=column): 1
2025-06-26 14:07:38.154 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.154 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(column, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.154 [DEBUG - main] (PolicyEngine.java:204) PolicyEngine : No tag-policy-repository for service kudu
2025-06-26 14:07:38.154 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerPolicyEngine.init(hashCode=40844aab): 47
2025-06-26 14:07:38.154 [DEBUG - main] (PolicyEngine.java:242) In-Use memory: 34823504, Free memory:204513968
2025-06-26 14:07:38.154 [DEBUG - main] (PolicyEngine.java:246) <== PolicyEngine()
2025-06-26 14:07:38.155 [DEBUG - main] (PolicyRefresher.java:403) ==> PolicyRefresher(serviceName=kudu).saveToCache()
2025-06-26 14:07:38.167 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] PolicyRefresher.saveToCache(serviceName=kudu): 11
2025-06-26 14:07:38.167 [DEBUG - main] (PolicyRefresher.java:457) <== PolicyRefresher(serviceName=kudu).saveToCache()
2025-06-26 14:07:38.168 [DEBUG - main] (RangerBasePlugin.java:312) <== setPolicies(serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null)
2025-06-26 14:07:38.168 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] PolicyRefresher.loadPolicy(serviceName=kudu): 188
2025-06-26 14:07:38.168 [DEBUG - main] (PolicyRefresher.java:287) <== PolicyRefresher(serviceName=kudu).loadPolicy()
2025-06-26 14:07:38.169 [DEBUG - PolicyRefresher(serviceName=kudu)-14] (PolicyRefresher.java:200) ==> PolicyRefresher(serviceName=kudu).run()
2025-06-26 14:07:38.169 [DEBUG - main] (PolicyRefresher.java:154) Scheduled policyDownloadRefresher to download policies every 30000 milliseconds
2025-06-26 14:07:38.170 [INFO - main] (RangerKuduAuthorizer.java:91) Finished Ranger Kudu plugin initialization
2025-06-26 14:07:38.195 [DEBUG - pool-3-thread-1] (QueueUtil.java:56) Message: org.apache.kudu.subprocess.InboundRequest@498a9bda has been put on the queue
2025-06-26 14:07:38.195 [DEBUG - pool-4-thread-1] (QueueUtil.java:41) Message: org.apache.kudu.subprocess.InboundRequest@498a9bda has been taken from the queue
2025-06-26 14:07:38.286 [DEBUG - pool-4-thread-1] (Groups.java:344) GroupCacheLoader - load.
2025-06-26 14:07:38.289 [DEBUG - pool-4-thread-1] (UserGroupInformation.java:1796) Failed to get groups for user user
java.io.IOException: No groups found for user user
	at org.apache.hadoop.security.Groups.noGroupsForUser(Groups.java:198) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.security.Groups.access$400(Groups.java:74) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.security.Groups$GroupCacheLoader.load(Groups.java:366) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.security.Groups$GroupCacheLoader.load(Groups.java:302) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache$LoadingValueReference.loadFuture(LocalCache.java:3570) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache$Segment.loadSync(LocalCache.java:2312) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache$Segment.lockedGetOrLoad(LocalCache.java:2189) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache$Segment.get(LocalCache.java:2079) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache.get(LocalCache.java:4011) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache.getOrLoad(LocalCache.java:4034) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache$LocalLoadingCache.get(LocalCache.java:5010) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.security.Groups.getGroupInternal(Groups.java:260) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.security.Groups.getGroups(Groups.java:216) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.hadoop.security.UserGroupInformation.getGroups(UserGroupInformation.java:1794) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.kudu.subprocess.ranger.authorization.RangerKuduAuthorizer.getUserGroups(RangerKuduAuthorizer.java:246) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.kudu.subprocess.ranger.authorization.RangerKuduAuthorizer.authorizeRequests(RangerKuduAuthorizer.java:178) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.kudu.subprocess.ranger.authorization.RangerKuduAuthorizer.authorize(RangerKuduAuthorizer.java:117) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.kudu.subprocess.ranger.RangerProtocolHandler.executeRequest(RangerProtocolHandler.java:50) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.kudu.subprocess.ranger.RangerProtocolHandler.executeRequest(RangerProtocolHandler.java:36) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.kudu.subprocess.ProtocolHandler.unpackAndExecuteRequest(ProtocolHandler.java:53) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.kudu.subprocess.MessageParser.parseAndExecuteRequest(MessageParser.java:106) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at org.apache.kudu.subprocess.MessageParser.run(MessageParser.java:65) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
	at java.util.concurrent.CompletableFuture$AsyncRun.run(CompletableFuture.java:1640) [?:1.8.0_275]
	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) [?:1.8.0_275]
	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) [?:1.8.0_275]
	at java.lang.Thread.run(Thread.java:748) [?:1.8.0_275]
2025-06-26 14:07:38.296 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:95) ==> RangerPolicyEngineImpl.evaluatePolicies(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={null} clusterType={null} context={} }, policyType=0)
2025-06-26 14:07:38.297 [INFO - pool-4-thread-1] (RangerPolicyEngineImpl.java:105) RangerPolicyEngineImpl.evaluatePolicies(bf39e75_0, RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={null} clusterType={null} context={} })
2025-06-26 14:07:38.297 [DEBUG - pool-4-thread-1] (RangerAccessRequestImpl.java:275) Old Remote/Client IP Address=null, new IP Address=null
2025-06-26 14:07:38.298 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:435) ==> RangerPolicyEngineImpl.zoneAwareAccessEvaluationWithNoAudit(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0)
2025-06-26 14:07:38.298 [DEBUG - pool-4-thread-1] (PolicyEngine.java:316) ==> PolicyEngine.getMatchedZonesForResourceAndChildren(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } })
2025-06-26 14:07:38.298 [DEBUG - pool-4-thread-1] (PolicyEngine.java:326) <== PolicyEngine.getMatchedZonesForResourceAndChildren(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }) : null
2025-06-26 14:07:38.298 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:444) zoneNames:[null]
2025-06-26 14:07:38.298 [DEBUG - pool-4-thread-1] (PolicyEngine.java:347) zoneName:[null]
2025-06-26 14:07:38.298 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:510) ==> RangerPolicyEngineImpl.evaluatePoliciesNoAudit(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0, zoneName=null)
2025-06-26 14:07:38.299 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:608) ==> RangerPolicyEngineImpl.evaluateTagPolicies(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0, zoneName=null, RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={false} isAudited={false} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={-1} policyVersion={null} evaluatedPoliciesCount={0} reason={null} additionalInfo={}})
2025-06-26 14:07:38.300 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:686) <== RangerPolicyEngineImpl.evaluateTagPolicies(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0, zoneName=null, RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={false} isAudited={false} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={-1} policyVersion={null} evaluatedPoliciesCount={0} reason={null} additionalInfo={}})
2025-06-26 14:07:38.300 [DEBUG - pool-4-thread-1] (RangerPolicyRepository.java:544) ==> RangerPolicyRepository.setAuditEnabledFromCache()
2025-06-26 14:07:38.300 [DEBUG - pool-4-thread-1] (RangerPolicyRepository.java:555) <== RangerPolicyRepository.setAuditEnabledFromCache():false
2025-06-26 14:07:38.300 [DEBUG - pool-4-thread-1] (RangerResourceTrie.java:504) ==> RangerResourceTrie.getEvaluatorsForResource(db)
2025-06-26 14:07:38.300 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.getEvaluatorsForResource(resource=db): 0
2025-06-26 14:07:38.301 [DEBUG - pool-4-thread-1] (RangerResourceTrie.java:549) <== RangerResourceTrie.getEvaluatorsForResource(db): evaluatorCount=1
2025-06-26 14:07:38.301 [DEBUG - pool-4-thread-1] (RangerResourceTrie.java:504) ==> RangerResourceTrie.getEvaluatorsForResource(table)
2025-06-26 14:07:38.301 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.getEvaluatorsForResource(resource=table): 0
2025-06-26 14:07:38.301 [DEBUG - pool-4-thread-1] (RangerResourceTrie.java:549) <== RangerResourceTrie.getEvaluatorsForResource(table): evaluatorCount=1
2025-06-26 14:07:38.301 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:106) [PERF] RangerPolicyRepository.getLikelyMatchEvaluators(resource=db/table): 1
2025-06-26 14:07:38.301 [DEBUG - pool-4-thread-1] (RangerPolicyRepository.java:774) <== RangerPolicyRepository.getLikelyMatchPolicyEvaluators(db/table): evaluatorCount=1
2025-06-26 14:07:38.302 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:194) ==> RangerDefaultPolicyEvaluator.isApplicable(Thu Jun 26 14:07:38 UTC 2025)
2025-06-26 14:07:38.302 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:211) <== RangerDefaultPolicyEvaluator.isApplicable(Thu Jun 26 14:07:38 UTC 2025) : true
2025-06-26 14:07:38.302 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:220) ==> RangerDefaultPolicyEvaluator.evaluate(policyId=1, RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={false} isAudited={false} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={-1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}})
2025-06-26 14:07:38.302 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:550) ==> RangerDefaultPolicyResourceMatcher.getMatchType(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }{token:USER=user})
2025-06-26 14:07:38.303 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:692) ==> RangerDefaultPolicyResourceMatcher.getMatchingHierarchy(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } })
2025-06-26 14:07:38.303 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:204) ==> getResourceHierarchies(policyType=0, keys=database,table)
2025-06-26 14:07:38.303 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:38.303 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): true
2025-06-26 14:07:38.304 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:38.304 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): true
2025-06-26 14:07:38.304 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:38.304 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): false
2025-06-26 14:07:38.304 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:216) <== getResourceHierarchies(policyType=0, keys=database,table) : [RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }],[RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }]
2025-06-26 14:07:38.305 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:635) ==> isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} })
2025-06-26 14:07:38.305 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:661) <== isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }) : true
2025-06-26 14:07:38.305 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:720) <== RangerDefaultPolicyResourceMatcher.getMatchingHierarchy(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }): [RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }]
2025-06-26 14:07:38.305 [DEBUG - pool-4-thread-1] (RangerDefaultResourceMatcher.java:36) ==> RangerDefaultResourceMatcher.isMatch(db, {token:USER=user})
2025-06-26 14:07:38.305 [DEBUG - pool-4-thread-1] (RangerAbstractResourceMatcher.java:286) isAllValuesRequested(db): false
2025-06-26 14:07:38.306 [DEBUG - pool-4-thread-1] (RangerDefaultResourceMatcher.java:85) <== RangerDefaultResourceMatcher.isMatch(db, {token:USER=user}): true
2025-06-26 14:07:38.306 [DEBUG - pool-4-thread-1] (RangerDefaultResourceMatcher.java:36) ==> RangerDefaultResourceMatcher.isMatch(table, {token:USER=user})
2025-06-26 14:07:38.306 [DEBUG - pool-4-thread-1] (RangerAbstractResourceMatcher.java:286) isAllValuesRequested(table): false
2025-06-26 14:07:38.306 [DEBUG - pool-4-thread-1] (RangerDefaultResourceMatcher.java:85) <== RangerDefaultResourceMatcher.isMatch(table, {token:USER=user}): true
2025-06-26 14:07:38.306 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:101) [PERF] RangerDefaultPolicyResourceMatcher.getMatchType(): 3
2025-06-26 14:07:38.306 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:627) <== RangerDefaultPolicyResourceMatcher.getMatchType(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }{token:USER=user}): SELF
2025-06-26 14:07:38.306 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:1264) ==> RangerDefaultPolicyEvaluator.matchPolicyCustomConditions(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } })
2025-06-26 14:07:38.307 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:1304) <== RangerDefaultPolicyEvaluator.matchCustomConditions(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }): true
2025-06-26 14:07:38.307 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:101) [PERF] RangerPolicyEvaluator.evaluate(requestHashCode=bf39e75,policyId=1, policyName=db;table;): 5
2025-06-26 14:07:38.307 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:276) <== RangerDefaultPolicyEvaluator.evaluate(policyId=1, RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}})
2025-06-26 14:07:38.307 [DEBUG - pool-4-thread-1] (RangerPolicyRepository.java:563) ==> RangerPolicyRepository.storeAuditEnabledInCache()
2025-06-26 14:07:38.307 [DEBUG - pool-4-thread-1] (RangerPolicyRepository.java:571) <== RangerPolicyRepository.storeAuditEnabledInCache()
2025-06-26 14:07:38.307 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:600) <== RangerPolicyEngineImpl.evaluatePoliciesNoAudit(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0, zoneName=null): RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}}
2025-06-26 14:07:38.308 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:502) <== RangerPolicyEngineImpl.zoneAwareAccessEvaluationWithNoAudit(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0): RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}}
2025-06-26 14:07:38.308 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:101) [PERF] RangerPolicyEngine.evaluatePolicies(requestHashCode=bf39e75_0): 12
2025-06-26 14:07:38.308 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:129) <== RangerPolicyEngineImpl.evaluatePolicies(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType=0): RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}}
2025-06-26 14:07:38.308 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:72) ==> RangerDefaultAuditHandler.processResult(RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}})
2025-06-26 14:07:38.308 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:104) ==> RangerDefaultAuditHandler.getAuthzEvents(RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}})
2025-06-26 14:07:38.309 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:294) generateNextAuditEventId(): 68e7f035-3a2b-4c82-ad70-34608f829b58-0
2025-06-26 14:07:38.309 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:150) <== RangerDefaultAuditHandler.getAuthzEvents(RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={68e7f035-3a2b-4c82-ad70-34608f829b58-0} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}}): AuthzAuditEvent{repositoryType=105;repositoryName=kudu;user=user;eventTime=Thu Jun 26 14:07:38 UTC 2025;accessType=all;resourcePath=db/table;resourceType=table;action=all;accessResult=0;agentId=kudu;policyId=-1;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dist-test-slave-5xmx;logType=RangerAudit;eventId=68e7f035-3a2b-4c82-ad70-34608f829b58-0;seq_num=0;event_count=1;event_dur_ms=0;tags=[];clusterName=Cluster 1;zoneName=null;policyVersion=null;additionalInfo=null}
2025-06-26 14:07:38.309 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:189) ==> RangerDefaultAuditHandler.logAuthzAudit(AuthzAuditEvent{repositoryType=105;repositoryName=kudu;user=user;eventTime=Thu Jun 26 14:07:38 UTC 2025;accessType=all;resourcePath=db/table;resourceType=table;action=all;accessResult=0;agentId=kudu;policyId=-1;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dist-test-slave-5xmx;logType=RangerAudit;eventId=68e7f035-3a2b-4c82-ad70-34608f829b58-0;seq_num=0;event_count=1;event_dur_ms=0;tags=[];clusterName=Cluster 1;zoneName=null;policyVersion=null;additionalInfo=null})
2025-06-26 14:07:38.310 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:202) <== RangerDefaultAuditHandler.logAuthzAudit(AuthzAuditEvent{repositoryType=105;repositoryName=kudu;user=user;eventTime=Thu Jun 26 14:07:38 UTC 2025;accessType=all;resourcePath=db/table;resourceType=table;action=all;accessResult=0;agentId=kudu;policyId=-1;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dist-test-slave-5xmx;logType=RangerAudit;eventId=68e7f035-3a2b-4c82-ad70-34608f829b58-0;seq_num=1;event_count=1;event_dur_ms=0;tags=[];clusterName=Cluster 1;zoneName=null;policyVersion=null;additionalInfo=null})
2025-06-26 14:07:38.310 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:80) <== RangerDefaultAuditHandler.processResult(RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={68e7f035-3a2b-4c82-ad70-34608f829b58-0} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}})
2025-06-26 14:07:38.310 [DEBUG - pool-4-thread-1] (RangerKuduAuthorizer.java:192) RangerAccessRequest [RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }] receives result [RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={68e7f035-3a2b-4c82-ad70-34608f829b58-0} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}}]
2025-06-26 14:07:38.316 [DEBUG - pool-4-thread-1] (QueueUtil.java:56) Message: org.apache.kudu.subprocess.OutboundResponse@29402c9c has been put on the queue
2025-06-26 14:07:38.316 [DEBUG - pool-5-thread-1] (QueueUtil.java:41) Message: org.apache.kudu.subprocess.OutboundResponse@29402c9c has been taken from the queue
I20250626 14:07:38.326120 25141 server.cc:273] Received an EOF from the subprocess
W20250626 14:07:38.326328 25128 server.cc:408] The subprocess has exited with status 9
I20250626 14:07:38.330200 25142 server.cc:440] outbound queue shut down: Aborted: 
I20250626 14:07:38.330209 25140 server.cc:366] get failed, inbound queue shut down: Aborted: 
I20250626 14:07:38.330233 25138 server.cc:366] get failed, inbound queue shut down: Aborted: 
I20250626 14:07:38.330225 25139 server.cc:366] get failed, inbound queue shut down: Aborted: 
W20250626 14:07:38.330585 23932 subprocess_protocol.cc:66] error closing read fd: Bad file descriptor
I20250626 14:07:38.330914 23932 ranger_client.cc:318] Using overwritten properties file: /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/log_conf/kudu-ranger-subprocess-log4j2.properties
2025-06-26 14:07:38.922 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-audit.xml): couldn't find resource file location
2025-06-26 14:07:38.927 [INFO - main] (RangerConfiguration.java:50) addResourceIfReadable(ranger-kudu-security.xml): resource file is file:/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/ranger-kudu-security.xml
2025-06-26 14:07:38.967 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-policymgr-ssl.xml): couldn't find resource file location
2025-06-26 14:07:38.999 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-kudu-audit.xml): couldn't find resource file location
2025-06-26 14:07:39.000 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-kudu-security.xml): couldn't find resource file location
2025-06-26 14:07:39.000 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-kudu-policymgr-ssl.xml): couldn't find resource file location
2025-06-26 14:07:39.002 [INFO - main] (RangerPluginConfig.java:116) PolicyEngineOptions: { evaluatorType: auto, evaluateDelegateAdminOnly: false, disableContextEnrichers: false, disableCustomConditions: false, disableTagPolicyEvaluation: false, enableTagEnricherWithLocalRefresher: false, disableTrieLookupPrefilter: false, optimizeTrieForRetrieval: false, cacheAuditResult: false }
2025-06-26 14:07:39.169 [INFO - main] (AuditProviderFactory.java:76) AuditProviderFactory: creating..
2025-06-26 14:07:39.171 [INFO - main] (AuditProviderFactory.java:114) AuditProviderFactory: initializing..
2025-06-26 14:07:39.171 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.cache.dir=/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/policy-cache
2025-06-26 14:07:39.171 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.source.impl=org.apache.ranger.admin.client.RangerAdminRESTClient
2025-06-26 14:07:39.171 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.rest.url=http://127.0.0.1:35455
2025-06-26 14:07:39.172 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.pollIntervalMs=30000
2025-06-26 14:07:39.172 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.service.name=kudu
2025-06-26 14:07:39.172 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.access.cluster.name=Cluster 1
2025-06-26 14:07:39.172 [INFO - main] (AuditProviderFactory.java:279) No v3 audit configuration found. Trying v2 audit configurations
2025-06-26 14:07:39.173 [INFO - Ranger async Audit cleanup] (AuditProviderFactory.java:497) RangerAsyncAuditCleanup: Waiting to audit cleanup start signal
2025-06-26 14:07:39.201 [INFO - main] (RangerBasePlugin.java:183) Created PolicyRefresher Thread(PolicyRefresher(serviceName=kudu)-14)
2025-06-26 14:07:39.532 [INFO - main] (RangerRolesProvider.java:190) RangerRolesProvider(serviceName=kudu): found updated version. lastKnownRoleVersion=-1; newVersion=1
2025-06-26 14:07:39.702 [INFO - main] (PolicyRefresher.java:319) PolicyRefresher(serviceName=kudu): found updated version. lastKnownVersion=-1; newVersion=2
2025-06-26 14:07:39.727 [INFO - main] (RangerPolicyRepository.java:953) This policy engine contains 1 policy evaluators
2025-06-26 14:07:39.745 [INFO - main] (RangerKuduAuthorizer.java:91) Finished Ranger Kudu plugin initialization
I20250626 14:07:39.887693 25172 server.cc:273] Received an EOF from the subprocess
W20250626 14:07:39.887918 25159 server.cc:408] The subprocess has exited with status 9
I20250626 14:07:39.892128 25170 server.cc:366] get failed, inbound queue shut down: Aborted: 
I20250626 14:07:39.892141 25173 server.cc:440] outbound queue shut down: Aborted: 
I20250626 14:07:39.892149 25169 server.cc:366] get failed, inbound queue shut down: Aborted: 
I20250626 14:07:39.892149 25171 server.cc:366] get failed, inbound queue shut down: Aborted: 
W20250626 14:07:39.892570 23932 subprocess_protocol.cc:66] error closing read fd: Bad file descriptor
I20250626 14:07:39.892629 23932 mini_ranger.cc:66] Stopping Ranger...
I20250626 14:07:40.225692 23932 mini_ranger.cc:68] Stopped Ranger
2025-06-26 14:07:40.225 UTC [24757] LOG:  received smart shutdown request
2025-06-26 14:07:40.228 UTC [24757] LOG:  background worker "logical replication launcher" (PID 24765) exited with exit code 1
2025-06-26 14:07:40.229 UTC [24760] LOG:  shutting down
2025-06-26 14:07:40.230 UTC [24760] LOG:  checkpoint starting: shutdown immediate
2025-06-26 14:07:40.911 UTC [24760] LOG:  checkpoint complete: wrote 1501 buffers (9.2%); 0 WAL file(s) added, 0 removed, 0 recycled; write=0.020 s, sync=0.658 s, total=0.682 s; sync files=799, longest=0.007 s, average=0.001 s; distance=7940 kB, estimate=7940 kB; lsn=0/1C3BA90, redo lsn=0/1C3BA90
2025-06-26 14:07:40.916 UTC [24757] LOG:  database system is shut down
[       OK ] RangerClientTestBase.TestLogging (37967 ms)
[----------] 1 test from RangerClientTestBase (37967 ms total)

[----------] Global test environment tear-down
[==========] 22 tests from 3 test suites ran. (201847 ms total)
[  PASSED  ] 21 tests.
[  FAILED  ] 1 test, listed below:
[  FAILED  ] RangerClientTestExtraJVMArgs.SmokeTest

 1 FAILED TEST