[==========] Running 22 tests from 3 test suites.
[----------] Global test environment set-up.
[----------] 19 tests from RangerClientTest
[ RUN ] RangerClientTest.TestAuthorizeCreateTableUnauthorized
[ OK ] RangerClientTest.TestAuthorizeCreateTableUnauthorized (2 ms)
[ RUN ] RangerClientTest.TestAuthorizeCreateTableAuthorized
[ OK ] RangerClientTest.TestAuthorizeCreateTableAuthorized (0 ms)
[ RUN ] RangerClientTest.TestAuthorizeListNoTables
[ OK ] RangerClientTest.TestAuthorizeListNoTables (0 ms)
[ RUN ] RangerClientTest.TestAuthorizeListNoTablesAuthorized
[ OK ] RangerClientTest.TestAuthorizeListNoTablesAuthorized (0 ms)
[ RUN ] RangerClientTest.TestAuthorizeMetadataSubsetOfTablesAuthorized
[ OK ] RangerClientTest.TestAuthorizeMetadataSubsetOfTablesAuthorized (0 ms)
[ RUN ] RangerClientTest.TestAuthorizeMetadataAllAuthorized
[ OK ] RangerClientTest.TestAuthorizeMetadataAllAuthorized (0 ms)
[ RUN ] RangerClientTest.TestAuthorizeMetadataAllNonRanger
WARNING: Logging before InitGoogleLogging() is written to STDERR
W20250626 14:04:19.132174 23932 ranger_client.cc:528] Denying action on table with invalid name .bar. Use 'kudu table rename_table' to rename it to a Ranger-compatible name.
W20250626 14:04:19.132280 23932 ranger_client.cc:528] Denying action on table with invalid name foo.. Use 'kudu table rename_table' to rename it to a Ranger-compatible name.
[ OK ] RangerClientTest.TestAuthorizeMetadataAllNonRanger (0 ms)
[ RUN ] RangerClientTest.TestAuthorizeMetadataNoneAuthorizedContainsNonRanger
W20250626 14:04:19.132773 23932 ranger_client.cc:528] Denying action on table with invalid name foo.. Use 'kudu table rename_table' to rename it to a Ranger-compatible name.
W20250626 14:04:19.132812 23932 ranger_client.cc:528] Denying action on table with invalid name .bar. Use 'kudu table rename_table' to rename it to a Ranger-compatible name.
[ OK ] RangerClientTest.TestAuthorizeMetadataNoneAuthorizedContainsNonRanger (0 ms)
[ RUN ] RangerClientTest.TestAuthorizeMetadataAllAuthorizedContainsNonRanger
W20250626 14:04:19.133319 23932 ranger_client.cc:528] Denying action on table with invalid name foo.. Use 'kudu table rename_table' to rename it to a Ranger-compatible name.
[ OK ] RangerClientTest.TestAuthorizeMetadataAllAuthorizedContainsNonRanger (0 ms)
[ RUN ] RangerClientTest.TestAuthorizeScanSubsetAuthorized
[ OK ] RangerClientTest.TestAuthorizeScanSubsetAuthorized (0 ms)
[ RUN ] RangerClientTest.TestAuthorizeScanAllColumnsAuthorized
[ OK ] RangerClientTest.TestAuthorizeScanAllColumnsAuthorized (0 ms)
[ RUN ] RangerClientTest.TestAuthorizeScanNoColumnsAuthorized
[ OK ] RangerClientTest.TestAuthorizeScanNoColumnsAuthorized (0 ms)
[ RUN ] RangerClientTest.TestAuthorizeActionsNoneAuthorized
[ OK ] RangerClientTest.TestAuthorizeActionsNoneAuthorized (0 ms)
[ RUN ] RangerClientTest.TestAuthorizeActionsSomeAuthorized
[ OK ] RangerClientTest.TestAuthorizeActionsSomeAuthorized (0 ms)
[ RUN ] RangerClientTest.TestAuthorizeActionsAllAuthorized
[ OK ] RangerClientTest.TestAuthorizeActionsAllAuthorized (0 ms)
[ RUN ] RangerClientTest.TestInvalidJARFails
E20250626 14:04:19.136641 23932 ranger_client.cc:390] --ranger_jar_path has invalid JAR file path: /this/is/not/a/real/location/hopefully.jar
[ OK ] RangerClientTest.TestInvalidJARFails (0 ms)
[ RUN ] RangerClientTest.TestEmptyKeytabFile
E20250626 14:04:19.137180 23932 ranger_client.cc:397] --keytab_file is not set
[ OK ] RangerClientTest.TestEmptyKeytabFile (0 ms)
[ RUN ] RangerClientTest.TestMultipleInvalidJARsLeftUnchecked
[ OK ] RangerClientTest.TestMultipleInvalidJARsLeftUnchecked (0 ms)
[ RUN ] RangerClientTest.TestDefaultJARPath
[ OK ] RangerClientTest.TestDefaultJARPath (0 ms)
[----------] 19 tests from RangerClientTest (10 ms total)
[----------] 2 tests from RangerClientTestExtraJVMArgs
[ RUN ] RangerClientTestExtraJVMArgs.SmokeTest
I20250626 14:04:19.138545 23932 mini_postgres.cc:62] Running initdb...
The files belonging to this database system will be owned by user "slave".
This user must also own the server process.
The database cluster will be initialized with locale "C".
The default database encoding has accordingly been set to "SQL_ASCII".
The default text search configuration will be set to "english".
Data page checksums are disabled.
creating directory /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.SmokeTest.1750946659125028-23932-0/postgres ... ok
creating subdirectories ... ok
selecting dynamic shared memory implementation ... posix
selecting default "max_connections" ... 100
selecting default "shared_buffers" ... 128MB
selecting default time zone ... Etc/UTC
creating configuration files ... ok
running bootstrap script ... ok
performing post-bootstrap initialization ... ok
syncing data to disk ... ok
initdb: warning: enabling "trust" authentication for local connections
initdb: hint: You can change this by editing pg_hba.conf or using the option -A, or --auth-local and --auth-host, the next time you run initdb.
Success. You can now start the database server using:
/tmp/dist-test-taskuJePZZ/build/debug/bin/postgres/pg_ctl -D /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.SmokeTest.1750946659125028-23932-0/postgres -l logfile start
2025-06-26 14:04:21.220 UTC [23949] LOG: starting PostgreSQL 17.2 on x86_64-pc-linux-gnu, compiled by gcc (Ubuntu 7.5.0-3ubuntu1~18.04) 7.5.0, 64-bit
2025-06-26 14:04:21.220 UTC [23949] LOG: listening on IPv4 address "127.0.0.1", port 56935
2025-06-26 14:04:21.223 UTC [23949] LOG: listening on Unix socket "/tmp/.s.PGSQL.56935"
2025-06-26 14:04:21.227 UTC [23954] LOG: database system was shut down at 2025-06-26 14:04:20 UTC
2025-06-26 14:04:21.230 UTC [23949] LOG: database system is ready to accept connections
I20250626 14:04:22.971486 23932 mini_postgres.cc:96] Postgres bound to 56935
2025-06-26 14:04:22.976 UTC [23960] FATAL: database "slave" does not exist
127.0.0.1:56935 - accepting connections
I20250626 14:04:22.977241 23932 mini_ranger.cc:161] Starting Ranger...
I20250626 14:04:22.992242 23932 mini_ranger.cc:84] Created miniranger Postgres user
I20250626 14:04:23.045975 23932 mini_ranger.cc:87] Created ranger Postgres database
I20250626 14:04:23.046051 23932 mini_ranger.cc:178] Starting Ranger out of /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.SmokeTest.1750946659125028-23932-0/ranger-admin
2025-06-26 14:04:23,278 [I] DB FLAVOR :POSTGRES
2025-06-26 14:04:23,278 [I] --------- Verifying Ranger DB connection ---------
2025-06-26 14:04:23,278 [I] Checking connection..
2025-06-26 14:04:23,278 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select 1;"
2025-06-26 14:04:23,560 [I] Checking connection passed.
2025-06-26 14:04:23,560 [I] --------- Verifying version history table ---------
2025-06-26 14:04:23,560 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_db_version_h') as temp;"
2025-06-26 14:04:23,858 [I] Table x_db_version_h does not exist in database ranger
2025-06-26 14:04:23,859 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_db_version_h') as temp;"
2025-06-26 14:04:24,135 [I] Table x_db_version_h does not exist in database ranger
2025-06-26 14:04:24,135 [I] Importing x_db_version_h table schema to database ranger from file: create_dbversion_catalog.sql
2025-06-26 14:04:24,135 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -input /tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/db/postgres/create_dbversion_catalog.sql
2025-06-26 14:04:24.416 UTC [24027] WARNING: there is no transaction in progress
2025-06-26 14:04:24,421 [I] create_dbversion_catalog.sql file imported successfully
2025-06-26 14:04:24,421 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_db_version_h') as temp;"
2025-06-26 14:04:24,740 [I] Table x_db_version_h already exists in database 'ranger'
2025-06-26 14:04:24,740 [I] --------- Importing Ranger Core DB Schema ---------
2025-06-26 14:04:24,740 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select version from x_db_version_h where version = 'CORE_DB_SCHEMA' and active = 'Y';"
2025-06-26 14:04:25,024 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select version from x_db_version_h where version = 'CORE_DB_SCHEMA' and active = 'N';"
2025-06-26 14:04:25,305 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -query "insert into x_db_version_h (version, inst_at, inst_by, updated_at, updated_by,active) values ('CORE_DB_SCHEMA', current_timestamp, 'Ranger 2.1.0', current_timestamp, 'dist-test-slave-5xmx.c.gcp-upstream.internal','N') ;"
2025-06-26 14:04:25,586 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_portal_user') as temp;"
2025-06-26 14:04:25,872 [I] Table x_portal_user does not exist in database ranger
2025-06-26 14:04:25,873 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_policy_ref_group') as temp;"
2025-06-26 14:04:26,168 [I] Table x_policy_ref_group does not exist in database ranger
2025-06-26 14:04:26,169 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select version from x_db_version_h where version = 'DB_PATCHES' and active = 'Y';"
2025-06-26 14:04:26,470 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select version from x_db_version_h where version = 'JAVA_PATCHES' and active = 'Y';"
2025-06-26 14:04:26,756 [I] Importing DB schema to database ranger from file: ranger_core_db_postgres.sql
2025-06-26 14:04:26,756 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -input /tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/db/postgres/optimized/current/ranger_core_db_postgres.sql
2025-06-26 14:04:27.510 UTC [24144] WARNING: there is no transaction in progress
2025-06-26 14:04:27.519 UTC [24144] WARNING: there is no transaction in progress
2025-06-26 14:04:27.529 UTC [24144] WARNING: there is no transaction in progress
2025-06-26 14:04:27.538 UTC [24144] WARNING: there is no transaction in progress
2025-06-26 14:04:27.547 UTC [24144] WARNING: there is no transaction in progress
2025-06-26 14:04:27.557 UTC [24144] WARNING: there is no transaction in progress
2025-06-26 14:04:27.596 UTC [24144] WARNING: there is no transaction in progress
2025-06-26 14:04:27.600 UTC [24144] WARNING: there is no transaction in progress
2025-06-26 14:04:27.610 UTC [24144] WARNING: there is no transaction in progress
2025-06-26 14:04:27.619 UTC [24144] WARNING: there is no transaction in progress
2025-06-26 14:04:27.627 UTC [24144] WARNING: there is no transaction in progress
2025-06-26 14:04:27.635 UTC [24144] WARNING: there is no transaction in progress
2025-06-26 14:04:27.642 UTC [24144] WARNING: there is no transaction in progress
2025-06-26 14:04:27.646 UTC [24144] WARNING: there is no transaction in progress
2025-06-26 14:04:27.649 UTC [24144] WARNING: there is no transaction in progress
2025-06-26 14:04:27.651 UTC [24144] WARNING: there is no transaction in progress
2025-06-26 14:04:27,983 [I] ranger_core_db_postgres.sql file imported successfully
2025-06-26 14:04:27,984 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -query "update x_db_version_h set inst_by='Ranger 2.1.0' where active='Y' and updated_by='localhost';"
2025-06-26 14:04:28,282 [I] Patches status entries updated from base ranger version to current installed ranger version:Ranger 2.1.0
2025-06-26 14:04:28,282 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_portal_user') as temp;"
2025-06-26 14:04:28,561 [I] Table x_portal_user already exists in database 'ranger'
2025-06-26 14:04:28,561 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_policy_ref_group') as temp;"
2025-06-26 14:04:28,853 [I] Table x_policy_ref_group already exists in database 'ranger'
2025-06-26 14:04:28,854 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select version from x_db_version_h where version = 'DB_PATCHES' and active = 'Y';"
2025-06-26 14:04:29,150 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select version from x_db_version_h where version = 'JAVA_PATCHES' and active = 'Y';"
2025-06-26 14:04:29,453 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -query "update x_db_version_h set active='Y' where version='CORE_DB_SCHEMA' and active='N' and updated_by='dist-test-slave-5xmx.c.gcp-upstream.internal';"
2025-06-26 14:04:29,735 [I] CORE_DB_SCHEMA import status has been updated
2025-06-26 14:04:29,736 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:56935/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select version from x_db_version_h where version = 'DB_PATCHES' and inst_by = 'Ranger 2.1.0' and active = 'Y';"
2025-06-26 14:04:30,043 [I] DB_PATCHES have already been applied
I20250626 14:04:30.048753 23932 mini_ranger.cc:191] Using Ranger class path: /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.SmokeTest.1750946659125028-23932-0/ranger-admin:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/ews/lib/*:/usr/lib/jvm/java-1.8.0-openjdk-amd64/lib/*:/tmp/dist-test-taskuJePZZ/thirdparty/src/hadoop-3.4.1/*:/tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/ews/webapp
I20250626 14:04:30.048808 23932 mini_ranger.cc:193] Using host: 127.0.0.1
I20250626 14:04:30.050550 23932 mini_ranger.cc:227] Ranger admin URL: http://127.0.0.1:46081
Jun 26, 2025 2:04:30 PM org.apache.ranger.server.tomcat.EmbeddedServer getKeyManagers
WARNING: Config 'ranger.keystore.file' or 'ranger.service.https.attrib.keystore.file' is not found or contains blank value
Jun 26, 2025 2:04:30 PM org.apache.ranger.server.tomcat.EmbeddedServer getTrustManagers
WARNING: Config 'ranger.truststore.file' is not found or contains blank value!
Jun 26, 2025 2:04:30 PM org.apache.ranger.server.tomcat.EmbeddedServer start
INFO: Deriving webapp folder from catalina.base property. folder=/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.SmokeTest.1750946659125028-23932-0/ranger-admin/ews/webapp
Jun 26, 2025 2:04:30 PM org.apache.ranger.server.tomcat.EmbeddedServer start
INFO: Webapp file =/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.SmokeTest.1750946659125028-23932-0/ranger-admin/ews/webapp, webAppName = /
Jun 26, 2025 2:04:30 PM org.apache.ranger.server.tomcat.EmbeddedServer start
INFO: Adding webapp [/] = path [/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.SmokeTest.1750946659125028-23932-0/ranger-admin/ews/webapp] .....
Jun 26, 2025 2:04:30 PM org.apache.catalina.core.StandardContext setPath
WARNING: A context path must either be an empty string or start with a '/' and do not end with a '/'. The path [/] does not meet these criteria and has been changed to []
Jun 26, 2025 2:04:30 PM org.apache.ranger.server.tomcat.EmbeddedServer start
INFO: Finished init of webapp [/] = path [/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.SmokeTest.1750946659125028-23932-0/ranger-admin/ews/webapp].
Jun 26, 2025 2:04:30 PM org.apache.ranger.server.tomcat.EmbeddedServer startServer
INFO: Server Name : miniranger
Jun 26, 2025 2:04:30 PM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["http-bio-46081"]
Jun 26, 2025 2:04:30 PM org.apache.coyote.AbstractProtocol init
SEVERE: Failed to initialize end point associated with ProtocolHandler ["http-bio-46081"]
java.net.BindException: Address already in use (Bind failed) <null>:46081
at org.apache.tomcat.util.net.JIoEndpoint.bind(JIoEndpoint.java:414)
at org.apache.tomcat.util.net.AbstractEndpoint.init(AbstractEndpoint.java:750)
at org.apache.coyote.AbstractProtocol.init(AbstractProtocol.java:467)
at org.apache.coyote.http11.AbstractHttp11JsseProtocol.init(AbstractHttp11JsseProtocol.java:119)
at org.apache.catalina.connector.Connector.initInternal(Connector.java:1030)
at org.apache.catalina.util.LifecycleBase.init(LifecycleBase.java:136)
at org.apache.catalina.core.StandardService.initInternal(StandardService.java:560)
at org.apache.catalina.util.LifecycleBase.init(LifecycleBase.java:136)
at org.apache.catalina.core.StandardServer.initInternal(StandardServer.java:826)
at org.apache.catalina.util.LifecycleBase.init(LifecycleBase.java:136)
at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:173)
at org.apache.catalina.startup.Tomcat.start(Tomcat.java:469)
at org.apache.ranger.server.tomcat.EmbeddedServer.startServer(EmbeddedServer.java:322)
at org.apache.ranger.server.tomcat.EmbeddedServer.start(EmbeddedServer.java:290)
at org.apache.ranger.server.tomcat.EmbeddedServer.main(EmbeddedServer.java:84)
Caused by: java.net.BindException: Address already in use (Bind failed)
at java.net.PlainSocketImpl.socketBind(Native Method)
at java.net.AbstractPlainSocketImpl.bind(AbstractPlainSocketImpl.java:387)
at java.net.ServerSocket.bind(ServerSocket.java:390)
at java.net.ServerSocket.<init>(ServerSocket.java:252)
at java.net.ServerSocket.<init>(ServerSocket.java:196)
at org.apache.tomcat.util.net.DefaultServerSocketFactory.createSocket(DefaultServerSocketFactory.java:49)
at org.apache.tomcat.util.net.JIoEndpoint.bind(JIoEndpoint.java:401)
... 14 more
Jun 26, 2025 2:04:30 PM org.apache.catalina.core.StandardService initInternal
SEVERE: Failed to initialize connector [Connector[HTTP/1.1-46081]]
org.apache.catalina.LifecycleException: Protocol handler initialization failed
at org.apache.catalina.connector.Connector.initInternal(Connector.java:1032)
at org.apache.catalina.util.LifecycleBase.init(LifecycleBase.java:136)
at org.apache.catalina.core.StandardService.initInternal(StandardService.java:560)
at org.apache.catalina.util.LifecycleBase.init(LifecycleBase.java:136)
at org.apache.catalina.core.StandardServer.initInternal(StandardServer.java:826)
at org.apache.catalina.util.LifecycleBase.init(LifecycleBase.java:136)
at org.apache.catalina.util.LifecycleBase.start(LifecycleBase.java:173)
at org.apache.catalina.startup.Tomcat.start(Tomcat.java:469)
at org.apache.ranger.server.tomcat.EmbeddedServer.startServer(EmbeddedServer.java:322)
at org.apache.ranger.server.tomcat.EmbeddedServer.start(EmbeddedServer.java:290)
at org.apache.ranger.server.tomcat.EmbeddedServer.main(EmbeddedServer.java:84)
Caused by: java.net.BindException: Address already in use (Bind failed) <null>:46081
at org.apache.tomcat.util.net.JIoEndpoint.bind(JIoEndpoint.java:414)
at org.apache.tomcat.util.net.AbstractEndpoint.init(AbstractEndpoint.java:750)
at org.apache.coyote.AbstractProtocol.init(AbstractProtocol.java:467)
at org.apache.coyote.http11.AbstractHttp11JsseProtocol.init(AbstractHttp11JsseProtocol.java:119)
at org.apache.catalina.connector.Connector.initInternal(Connector.java:1030)
... 10 more
Caused by: java.net.BindException: Address already in use (Bind failed)
at java.net.PlainSocketImpl.socketBind(Native Method)
at java.net.AbstractPlainSocketImpl.bind(AbstractPlainSocketImpl.java:387)
at java.net.ServerSocket.bind(ServerSocket.java:390)
at java.net.ServerSocket.<init>(ServerSocket.java:252)
at java.net.ServerSocket.<init>(ServerSocket.java:196)
at org.apache.tomcat.util.net.DefaultServerSocketFactory.createSocket(DefaultServerSocketFactory.java:49)
at org.apache.tomcat.util.net.JIoEndpoint.bind(JIoEndpoint.java:401)
... 14 more
Jun 26, 2025 2:04:30 PM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 26, 2025 2:04:30 PM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet Engine: Apache Tomcat/7.0.105
Jun 26, 2025 2:04:31 PM org.apache.catalina.loader.WebappClassLoaderBase validateJarFile
INFO: validateJarFile(/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/ews/webapp/WEB-INF/lib/javax.servlet-api-3.1.0.jar) - jar not loaded. See Servlet Spec 3.0, section 10.7.2. Offending class: javax/servlet/Servlet.class
Jun 26, 2025 2:04:31 PM org.apache.catalina.loader.WebappClassLoaderBase validateJarFile
INFO: validateJarFile(/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/ews/webapp/WEB-INF/lib/tomcat-el-api-7.0.105.jar) - jar not loaded. See Servlet Spec 3.0, section 10.7.2. Offending class: javax/el/Expression.class
Jun 26, 2025 2:04:31 PM org.apache.catalina.startup.ContextConfig getDefaultWebXmlFragment
INFO: No global web.xml found
Jun 26, 2025 2:04:31 PM org.apache.catalina.startup.TaglibUriRule body
INFO: TLD skipped. URI: urn:com:sun:jersey:api:view is already defined
Jun 26, 2025 2:04:31 PM org.apache.catalina.startup.TldConfig execute
INFO: At least one JAR was scanned for TLDs yet contained no TLDs. Enable debug logging for this logger for a complete list of JARs that were scanned but no TLDs were found in them. Skipping unneeded JARs during scanning can improve startup time and JSP compilation time.
Jun 26, 2025 2:04:31 PM org.apache.catalina.core.ApplicationContext log
INFO: Set web app root system property: 'webapp.root' = [/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/ews/webapp/]
Jun 26, 2025 2:04:31 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring root WebApplicationContext
Jun 26, 2025 2:04:53 PM com.sun.jersey.api.core.PackagesResourceConfig init
INFO: Scanning for root resource and provider classes in the packages:
org.apache.ranger.rest
org.apache.ranger.common
xa.rest
Jun 26, 2025 2:04:53 PM com.sun.jersey.api.core.ScanningResourceConfig logClasses
INFO: Root resource classes found:
class org.apache.ranger.rest.RoleREST
class org.apache.ranger.rest.XKeyREST
class org.apache.ranger.rest.UserREST
class org.apache.ranger.rest.TagREST
class org.apache.ranger.rest.PublicAPIs
class org.apache.ranger.rest.MetricsREST
class org.apache.ranger.rest.AssetREST
class org.apache.ranger.rest.XUserREST
class org.apache.ranger.rest.XAuditREST
class org.apache.ranger.rest.PublicAPIsv2
class org.apache.ranger.rest.ServiceREST
class org.apache.ranger.rest.SecurityZoneREST
Jun 26, 2025 2:04:53 PM com.sun.jersey.api.core.ScanningResourceConfig logClasses
INFO: Provider classes found:
class org.apache.ranger.common.RangerJAXBContextResolver
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.servlet.SpringServlet getContext
INFO: Using default applicationContext
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, assetREST, of type org.apache.ranger.rest.AssetREST as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, metricsREST, of type org.apache.ranger.rest.MetricsREST as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, publicAPIs, of type org.apache.ranger.rest.PublicAPIs as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, publicAPIsv2, of type org.apache.ranger.rest.PublicAPIsv2 as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, roleREST, of type org.apache.ranger.rest.RoleREST as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, securityZoneREST, of type org.apache.ranger.rest.SecurityZoneREST as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, serviceREST, of type org.apache.ranger.rest.ServiceREST as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, tagREST, of type org.apache.ranger.rest.TagREST as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, userREST, of type org.apache.ranger.rest.UserREST as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, XAuditREST, of type org.apache.ranger.rest.XAuditREST as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, XKeyREST, of type org.apache.ranger.rest.XKeyREST as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, XUserREST, of type org.apache.ranger.rest.XUserREST as a root resource class
Jun 26, 2025 2:04:53 PM com.sun.jersey.server.impl.application.WebApplicationImpl _initiate
INFO: Initiating Jersey application, version 'Jersey: 1.19.3 10/24/2016 03:58 PM'
Jun 26, 2025 2:04:54 PM com.sun.jersey.spi.inject.Errors processErrorMessages
WARNING: The following warnings have been detected with resource and/or provider classes:
WARNING: A HTTP GET method, public void org.apache.ranger.rest.ServiceREST.getPoliciesInExcel(javax.servlet.http.HttpServletRequest,javax.servlet.http.HttpServletResponse), MUST return a non-void type.
WARNING: A HTTP GET method, public void org.apache.ranger.rest.ServiceREST.getPoliciesInJson(javax.servlet.http.HttpServletRequest,javax.servlet.http.HttpServletResponse,java.lang.Boolean), MUST return a non-void type.
WARNING: A HTTP GET method, public void org.apache.ranger.rest.ServiceREST.getPoliciesInCsv(javax.servlet.http.HttpServletRequest,javax.servlet.http.HttpServletResponse) throws java.io.IOException, MUST return a non-void type.
I20250626 14:06:31.036391 23932 mini_ranger.cc:160] Time spent starting Ranger: real 128.059s user 0.001s sys 0.066s
/home/jenkins-slave/workspace/build_and_test_flaky/src/kudu/ranger/ranger_client-test.cc:429: Failure
Failed
Bad status: Timed out: process with PID 24238 is not yet bound to any port at the specified addresses; last attempt running lsof returned 'Not found: could not find pattern of a bound port in lsof output: p24238
f310
n127.0.0.1:57192->127.0.0.1:56935
f311
n127.0.0.1:57170->127.0.0.1:56935
f312
n127.0.0.1:57168->127.0.0.1:56935
f313
n127.0.0.1:57194->127.0.0.1:56935
f314
n127.0.0.1:57208->127.0.0.1:56935'
I20250626 14:06:31.036618 23932 mini_ranger.cc:66] Stopping Ranger...
I20250626 14:06:31.067430 23932 mini_ranger.cc:68] Stopped Ranger
2025-06-26 14:06:31.067 UTC [23949] LOG: received smart shutdown request
2025-06-26 14:06:31.070 UTC [23949] LOG: background worker "logical replication launcher" (PID 23957) exited with exit code 1
2025-06-26 14:06:31.070 UTC [23952] LOG: shutting down
2025-06-26 14:06:31.072 UTC [23952] LOG: checkpoint starting: shutdown immediate
2025-06-26 14:06:31.397 UTC [23952] LOG: checkpoint complete: wrote 1468 buffers (9.0%); 0 WAL file(s) added, 0 removed, 0 recycled; write=0.020 s, sync=0.303 s, total=0.327 s; sync files=815, longest=0.005 s, average=0.001 s; distance=8396 kB, estimate=8396 kB; lsn=0/1CADC08, redo lsn=0/1CADC08
2025-06-26 14:06:31.402 UTC [23949] LOG: database system is shut down
I20250626 14:06:31.410703 23932 test_util.cc:183] -----------------------------------------------
I20250626 14:06:31.410761 23932 test_util.cc:184] Had failures, leaving test files at /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.SmokeTest.1750946659125028-23932-0
[ FAILED ] RangerClientTestExtraJVMArgs.SmokeTest (132272 ms)
[ RUN ] RangerClientTestExtraJVMArgs.TestCrashOnInvalidArguments
[WARNING] /home/jenkins-slave/workspace/build_and_test_flaky/thirdparty/src/googletest-release-1.12.1/googletest/src/gtest-death-test.cc:1108:: Death tests use fork(), which is unsafe particularly in a threaded context. For this test, Google Test detected 2 threads. See https://github.com/google/googletest/blob/master/docs/advanced.md#death-tests-and-threads for more explanation and suggested solutions, especially if this is the last message you see before your test times out.
The files belonging to this database system will be owned by user "slave".
This user must also own the server process.
The database cluster will be initialized with locale "C".
The default database encoding has accordingly been set to "SQL_ASCII".
The default text search configuration will be set to "english".
Data page checksums are disabled.
creating directory /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.TestCrashOnInvalidArguments.1750946659125028-24390-0/postgres ... ok
creating subdirectories ... ok
selecting dynamic shared memory implementation ... posix
selecting default "max_connections" ... 100
selecting default "shared_buffers" ... 128MB
selecting default time zone ... Etc/UTC
creating configuration files ... ok
running bootstrap script ... ok
performing post-bootstrap initialization ... ok
syncing data to disk ... ok
Success. You can now start the database server using:
/tmp/dist-test-taskuJePZZ/build/debug/bin/postgres/pg_ctl -D /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestExtraJVMArgs.TestCrashOnInvalidArguments.1750946659125028-24390-0/postgres -l logfile start
127.0.0.1:35015 - accepting connections
[ OK ] RangerClientTestExtraJVMArgs.TestCrashOnInvalidArguments (31595 ms)
[----------] 2 tests from RangerClientTestExtraJVMArgs (163868 ms total)
[----------] 1 test from RangerClientTestBase
[ RUN ] RangerClientTestBase.TestLogging
I20250626 14:07:03.007373 23932 mini_postgres.cc:62] Running initdb...
The files belonging to this database system will be owned by user "slave".
This user must also own the server process.
The database cluster will be initialized with locale "C".
The default database encoding has accordingly been set to "SQL_ASCII".
The default text search configuration will be set to "english".
Data page checksums are disabled.
creating directory /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/postgres ... ok
creating subdirectories ... ok
selecting dynamic shared memory implementation ... posix
selecting default "max_connections" ... 100
selecting default "shared_buffers" ... 128MB
selecting default time zone ... Etc/UTC
creating configuration files ... ok
running bootstrap script ... ok
performing post-bootstrap initialization ... ok
syncing data to disk ... ok
initdb: warning: enabling "trust" authentication for local connections
initdb: hint: You can change this by editing pg_hba.conf or using the option -A, or --auth-local and --auth-host, the next time you run initdb.
Success. You can now start the database server using:
/tmp/dist-test-taskuJePZZ/build/debug/bin/postgres/pg_ctl -D /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/postgres -l logfile start
2025-06-26 14:07:05.048 UTC [24757] LOG: starting PostgreSQL 17.2 on x86_64-pc-linux-gnu, compiled by gcc (Ubuntu 7.5.0-3ubuntu1~18.04) 7.5.0, 64-bit
2025-06-26 14:07:05.048 UTC [24757] LOG: listening on IPv4 address "127.0.0.1", port 57909
2025-06-26 14:07:05.050 UTC [24757] LOG: listening on Unix socket "/tmp/.s.PGSQL.57909"
2025-06-26 14:07:05.054 UTC [24762] LOG: database system was shut down at 2025-06-26 14:07:04 UTC
2025-06-26 14:07:05.057 UTC [24757] LOG: database system is ready to accept connections
I20250626 14:07:06.789211 23932 mini_postgres.cc:96] Postgres bound to 57909
2025-06-26 14:07:06.793 UTC [24768] FATAL: database "slave" does not exist
127.0.0.1:57909 - accepting connections
I20250626 14:07:06.794198 23932 mini_ranger.cc:161] Starting Ranger...
I20250626 14:07:06.809639 23932 mini_ranger.cc:84] Created miniranger Postgres user
I20250626 14:07:06.868516 23932 mini_ranger.cc:87] Created ranger Postgres database
I20250626 14:07:06.868582 23932 mini_ranger.cc:178] Starting Ranger out of /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/ranger-admin
2025-06-26 14:07:07,096 [I] DB FLAVOR :POSTGRES
2025-06-26 14:07:07,096 [I] --------- Verifying Ranger DB connection ---------
2025-06-26 14:07:07,096 [I] Checking connection..
2025-06-26 14:07:07,096 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select 1;"
2025-06-26 14:07:07,406 [I] Checking connection passed.
2025-06-26 14:07:07,406 [I] --------- Verifying version history table ---------
2025-06-26 14:07:07,407 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_db_version_h') as temp;"
2025-06-26 14:07:07,703 [I] Table x_db_version_h does not exist in database ranger
2025-06-26 14:07:07,704 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_db_version_h') as temp;"
2025-06-26 14:07:07,991 [I] Table x_db_version_h does not exist in database ranger
2025-06-26 14:07:07,992 [I] Importing x_db_version_h table schema to database ranger from file: create_dbversion_catalog.sql
2025-06-26 14:07:07,992 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -input /tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/db/postgres/create_dbversion_catalog.sql
2025-06-26 14:07:08.268 UTC [24835] WARNING: there is no transaction in progress
2025-06-26 14:07:08,273 [I] create_dbversion_catalog.sql file imported successfully
2025-06-26 14:07:08,274 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_db_version_h') as temp;"
2025-06-26 14:07:08,590 [I] Table x_db_version_h already exists in database 'ranger'
2025-06-26 14:07:08,591 [I] --------- Importing Ranger Core DB Schema ---------
2025-06-26 14:07:08,591 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select version from x_db_version_h where version = 'CORE_DB_SCHEMA' and active = 'Y';"
2025-06-26 14:07:08,878 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select version from x_db_version_h where version = 'CORE_DB_SCHEMA' and active = 'N';"
2025-06-26 14:07:09,183 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -query "insert into x_db_version_h (version, inst_at, inst_by, updated_at, updated_by,active) values ('CORE_DB_SCHEMA', current_timestamp, 'Ranger 2.1.0', current_timestamp, 'dist-test-slave-5xmx.c.gcp-upstream.internal','N') ;"
2025-06-26 14:07:09,477 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_portal_user') as temp;"
2025-06-26 14:07:09,780 [I] Table x_portal_user does not exist in database ranger
2025-06-26 14:07:09,781 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_policy_ref_group') as temp;"
2025-06-26 14:07:10,076 [I] Table x_policy_ref_group does not exist in database ranger
2025-06-26 14:07:10,077 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select version from x_db_version_h where version = 'DB_PATCHES' and active = 'Y';"
2025-06-26 14:07:10,384 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select version from x_db_version_h where version = 'JAVA_PATCHES' and active = 'Y';"
2025-06-26 14:07:10,668 [I] Importing DB schema to database ranger from file: ranger_core_db_postgres.sql
2025-06-26 14:07:10,669 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -input /tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/db/postgres/optimized/current/ranger_core_db_postgres.sql
2025-06-26 14:07:11.417 UTC [24952] WARNING: there is no transaction in progress
2025-06-26 14:07:11.428 UTC [24952] WARNING: there is no transaction in progress
2025-06-26 14:07:11.438 UTC [24952] WARNING: there is no transaction in progress
2025-06-26 14:07:11.448 UTC [24952] WARNING: there is no transaction in progress
2025-06-26 14:07:11.458 UTC [24952] WARNING: there is no transaction in progress
2025-06-26 14:07:11.468 UTC [24952] WARNING: there is no transaction in progress
2025-06-26 14:07:11.509 UTC [24952] WARNING: there is no transaction in progress
2025-06-26 14:07:11.513 UTC [24952] WARNING: there is no transaction in progress
2025-06-26 14:07:11.521 UTC [24952] WARNING: there is no transaction in progress
2025-06-26 14:07:11.529 UTC [24952] WARNING: there is no transaction in progress
2025-06-26 14:07:11.536 UTC [24952] WARNING: there is no transaction in progress
2025-06-26 14:07:11.545 UTC [24952] WARNING: there is no transaction in progress
2025-06-26 14:07:11.552 UTC [24952] WARNING: there is no transaction in progress
2025-06-26 14:07:11.555 UTC [24952] WARNING: there is no transaction in progress
2025-06-26 14:07:11.558 UTC [24952] WARNING: there is no transaction in progress
2025-06-26 14:07:11.561 UTC [24952] WARNING: there is no transaction in progress
2025-06-26 14:07:11,889 [I] ranger_core_db_postgres.sql file imported successfully
2025-06-26 14:07:11,890 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -query "update x_db_version_h set inst_by='Ranger 2.1.0' where active='Y' and updated_by='localhost';"
2025-06-26 14:07:12,180 [I] Patches status entries updated from base ranger version to current installed ranger version:Ranger 2.1.0
2025-06-26 14:07:12,181 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_portal_user') as temp;"
2025-06-26 14:07:12,466 [I] Table x_portal_user already exists in database 'ranger'
2025-06-26 14:07:12,467 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select * from (select table_name from information_schema.tables where table_catalog='ranger' and table_name = 'x_policy_ref_group') as temp;"
2025-06-26 14:07:12,775 [I] Table x_policy_ref_group already exists in database 'ranger'
2025-06-26 14:07:12,775 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select version from x_db_version_h where version = 'DB_PATCHES' and active = 'Y';"
2025-06-26 14:07:13,065 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select version from x_db_version_h where version = 'JAVA_PATCHES' and active = 'Y';"
2025-06-26 14:07:13,339 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -query "update x_db_version_h set active='Y' where version='CORE_DB_SCHEMA' and active='N' and updated_by='dist-test-slave-5xmx.c.gcp-upstream.internal';"
2025-06-26 14:07:13,638 [I] CORE_DB_SCHEMA import status has been updated
2025-06-26 14:07:13,639 [JISQL] /usr/lib/jvm/java-1.8.0-openjdk-amd64/bin/java -cp /tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/jisql/lib/* org.apache.util.sql.Jisql -driver postgresql -cstring jdbc:postgresql://127.0.0.1:57909/ranger -u miniranger -p '********' -noheader -trim -c \; -query "select version from x_db_version_h where version = 'DB_PATCHES' and inst_by = 'Ranger 2.1.0' and active = 'Y';"
2025-06-26 14:07:13,924 [I] DB_PATCHES have already been applied
I20250626 14:07:13.930011 23932 mini_ranger.cc:191] Using Ranger class path: /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/ranger-admin:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/ews/lib/*:/usr/lib/jvm/java-1.8.0-openjdk-amd64/lib/*:/tmp/dist-test-taskuJePZZ/thirdparty/src/hadoop-3.4.1/*:/tmp/dist-test-taskuJePZZ/build/debug/bin/postgresql.jar:/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/ews/webapp
I20250626 14:07:13.930063 23932 mini_ranger.cc:193] Using host: 127.0.0.1
I20250626 14:07:13.931699 23932 mini_ranger.cc:227] Ranger admin URL: http://127.0.0.1:35455
Jun 26, 2025 2:07:14 PM org.apache.ranger.server.tomcat.EmbeddedServer getKeyManagers
WARNING: Config 'ranger.keystore.file' or 'ranger.service.https.attrib.keystore.file' is not found or contains blank value
Jun 26, 2025 2:07:14 PM org.apache.ranger.server.tomcat.EmbeddedServer getTrustManagers
WARNING: Config 'ranger.truststore.file' is not found or contains blank value!
Jun 26, 2025 2:07:14 PM org.apache.ranger.server.tomcat.EmbeddedServer start
INFO: Deriving webapp folder from catalina.base property. folder=/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/ranger-admin/ews/webapp
Jun 26, 2025 2:07:14 PM org.apache.ranger.server.tomcat.EmbeddedServer start
INFO: Webapp file =/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/ranger-admin/ews/webapp, webAppName = /
Jun 26, 2025 2:07:14 PM org.apache.ranger.server.tomcat.EmbeddedServer start
INFO: Adding webapp [/] = path [/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/ranger-admin/ews/webapp] .....
Jun 26, 2025 2:07:14 PM org.apache.catalina.core.StandardContext setPath
WARNING: A context path must either be an empty string or start with a '/' and do not end with a '/'. The path [/] does not meet these criteria and has been changed to []
Jun 26, 2025 2:07:14 PM org.apache.ranger.server.tomcat.EmbeddedServer start
INFO: Finished init of webapp [/] = path [/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/ranger-admin/ews/webapp].
Jun 26, 2025 2:07:14 PM org.apache.ranger.server.tomcat.EmbeddedServer startServer
INFO: Server Name : miniranger
Jun 26, 2025 2:07:14 PM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["http-bio-35455"]
Jun 26, 2025 2:07:14 PM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jun 26, 2025 2:07:14 PM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet Engine: Apache Tomcat/7.0.105
Jun 26, 2025 2:07:15 PM org.apache.catalina.loader.WebappClassLoaderBase validateJarFile
INFO: validateJarFile(/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/ews/webapp/WEB-INF/lib/javax.servlet-api-3.1.0.jar) - jar not loaded. See Servlet Spec 3.0, section 10.7.2. Offending class: javax/servlet/Servlet.class
Jun 26, 2025 2:07:15 PM org.apache.catalina.loader.WebappClassLoaderBase validateJarFile
INFO: validateJarFile(/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/ews/webapp/WEB-INF/lib/tomcat-el-api-7.0.105.jar) - jar not loaded. See Servlet Spec 3.0, section 10.7.2. Offending class: javax/el/Expression.class
Jun 26, 2025 2:07:15 PM org.apache.catalina.startup.ContextConfig getDefaultWebXmlFragment
INFO: No global web.xml found
Jun 26, 2025 2:07:15 PM org.apache.catalina.startup.TaglibUriRule body
INFO: TLD skipped. URI: urn:com:sun:jersey:api:view is already defined
Jun 26, 2025 2:07:15 PM org.apache.catalina.startup.TldConfig execute
INFO: At least one JAR was scanned for TLDs yet contained no TLDs. Enable debug logging for this logger for a complete list of JARs that were scanned but no TLDs were found in them. Skipping unneeded JARs during scanning can improve startup time and JSP compilation time.
Jun 26, 2025 2:07:15 PM org.apache.catalina.core.ApplicationContext log
INFO: Set web app root system property: 'webapp.root' = [/tmp/dist-test-taskuJePZZ/thirdparty/src/ranger-2.1.0-admin/ews/webapp/]
Jun 26, 2025 2:07:15 PM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring root WebApplicationContext
I20250626 14:07:15.945531 23932 mini_ranger.cc:160] Time spent starting Ranger: real 9.151s user 0.004s sys 0.002s
Jun 26, 2025 2:07:32 PM com.sun.jersey.api.core.PackagesResourceConfig init
INFO: Scanning for root resource and provider classes in the packages:
org.apache.ranger.rest
org.apache.ranger.common
xa.rest
Jun 26, 2025 2:07:32 PM com.sun.jersey.api.core.ScanningResourceConfig logClasses
INFO: Root resource classes found:
class org.apache.ranger.rest.UserREST
class org.apache.ranger.rest.ServiceREST
class org.apache.ranger.rest.XAuditREST
class org.apache.ranger.rest.XUserREST
class org.apache.ranger.rest.TagREST
class org.apache.ranger.rest.PublicAPIsv2
class org.apache.ranger.rest.SecurityZoneREST
class org.apache.ranger.rest.MetricsREST
class org.apache.ranger.rest.PublicAPIs
class org.apache.ranger.rest.XKeyREST
class org.apache.ranger.rest.AssetREST
class org.apache.ranger.rest.RoleREST
Jun 26, 2025 2:07:32 PM com.sun.jersey.api.core.ScanningResourceConfig logClasses
INFO: Provider classes found:
class org.apache.ranger.common.RangerJAXBContextResolver
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.servlet.SpringServlet getContext
INFO: Using default applicationContext
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, assetREST, of type org.apache.ranger.rest.AssetREST as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, metricsREST, of type org.apache.ranger.rest.MetricsREST as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, publicAPIs, of type org.apache.ranger.rest.PublicAPIs as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, publicAPIsv2, of type org.apache.ranger.rest.PublicAPIsv2 as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, roleREST, of type org.apache.ranger.rest.RoleREST as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, securityZoneREST, of type org.apache.ranger.rest.SecurityZoneREST as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, serviceREST, of type org.apache.ranger.rest.ServiceREST as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, tagREST, of type org.apache.ranger.rest.TagREST as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, userREST, of type org.apache.ranger.rest.UserREST as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, XAuditREST, of type org.apache.ranger.rest.XAuditREST as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, XKeyREST, of type org.apache.ranger.rest.XKeyREST as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.spring.container.SpringComponentProviderFactory registerSpringBeans
INFO: Registering Spring bean, XUserREST, of type org.apache.ranger.rest.XUserREST as a root resource class
Jun 26, 2025 2:07:33 PM com.sun.jersey.server.impl.application.WebApplicationImpl _initiate
INFO: Initiating Jersey application, version 'Jersey: 1.19.3 10/24/2016 03:58 PM'
Jun 26, 2025 2:07:33 PM com.sun.jersey.spi.inject.Errors processErrorMessages
WARNING: The following warnings have been detected with resource and/or provider classes:
WARNING: A HTTP GET method, public void org.apache.ranger.rest.ServiceREST.getPoliciesInExcel(javax.servlet.http.HttpServletRequest,javax.servlet.http.HttpServletResponse), MUST return a non-void type.
WARNING: A HTTP GET method, public void org.apache.ranger.rest.ServiceREST.getPoliciesInJson(javax.servlet.http.HttpServletRequest,javax.servlet.http.HttpServletResponse,java.lang.Boolean), MUST return a non-void type.
WARNING: A HTTP GET method, public void org.apache.ranger.rest.ServiceREST.getPoliciesInCsv(javax.servlet.http.HttpServletRequest,javax.servlet.http.HttpServletResponse) throws java.io.IOException, MUST return a non-void type.
Jun 26, 2025 2:07:33 PM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["http-bio-35455"]
I20250626 14:07:34.341527 23932 mini_ranger.cc:261] Created Kudu service
I20250626 14:07:34.663743 23932 ranger_client.cc:318] Using new properties file: /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/log_conf/kudu-ranger-subprocess-log4j2.properties
2025-06-26 14:07:35.350 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-audit.xml)
2025-06-26 14:07:35.358 [DEBUG - main] (RangerConfiguration.java:95) Conf file path ranger-kudu-audit.xml does not exists
2025-06-26 14:07:35.358 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-audit.xml): couldn't find resource file location
2025-06-26 14:07:35.358 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-audit.xml), result=false
2025-06-26 14:07:35.359 [DEBUG - main] (RangerPluginConfig.java:248) ==> addAuditResource(Service Type: kudu
2025-06-26 14:07:35.360 [DEBUG - main] (RangerPluginConfig.java:271) <== addAuditResource(Service Type: kudu)
2025-06-26 14:07:35.360 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-security.xml)
2025-06-26 14:07:35.360 [INFO - main] (RangerConfiguration.java:50) addResourceIfReadable(ranger-kudu-security.xml): resource file is file:/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/ranger-kudu-security.xml
2025-06-26 14:07:35.393 [DEBUG - main] (MutableMetricsFactory.java:43) field org.apache.hadoop.metrics2.lib.MutableRate org.apache.hadoop.security.UserGroupInformation$UgiMetrics.getGroups with annotation @org.apache.hadoop.metrics2.annotation.Metric(always=false, sampleName=Ops, valueName=Time, about=, interval=10, type=DEFAULT, value=[GetGroups])
2025-06-26 14:07:35.398 [DEBUG - main] (MutableMetricsFactory.java:43) field org.apache.hadoop.metrics2.lib.MutableRate org.apache.hadoop.security.UserGroupInformation$UgiMetrics.loginFailure with annotation @org.apache.hadoop.metrics2.annotation.Metric(always=false, sampleName=Ops, valueName=Time, about=, interval=10, type=DEFAULT, value=[Rate of failed kerberos logins and latency (milliseconds)])
2025-06-26 14:07:35.399 [DEBUG - main] (MutableMetricsFactory.java:43) field org.apache.hadoop.metrics2.lib.MutableRate org.apache.hadoop.security.UserGroupInformation$UgiMetrics.loginSuccess with annotation @org.apache.hadoop.metrics2.annotation.Metric(always=false, sampleName=Ops, valueName=Time, about=, interval=10, type=DEFAULT, value=[Rate of successful kerberos logins and latency (milliseconds)])
2025-06-26 14:07:35.399 [DEBUG - main] (MutableMetricsFactory.java:43) field private org.apache.hadoop.metrics2.lib.MutableGaugeInt org.apache.hadoop.security.UserGroupInformation$UgiMetrics.renewalFailures with annotation @org.apache.hadoop.metrics2.annotation.Metric(always=false, sampleName=Ops, valueName=Time, about=, interval=10, type=DEFAULT, value=[Renewal failures since last successful login])
2025-06-26 14:07:35.400 [DEBUG - main] (MutableMetricsFactory.java:43) field private org.apache.hadoop.metrics2.lib.MutableGaugeLong org.apache.hadoop.security.UserGroupInformation$UgiMetrics.renewalFailuresTotal with annotation @org.apache.hadoop.metrics2.annotation.Metric(always=false, sampleName=Ops, valueName=Time, about=, interval=10, type=DEFAULT, value=[Renewal failures since startup])
2025-06-26 14:07:35.400 [DEBUG - main] (MetricsSystemImpl.java:231) UgiMetrics, User and group related metrics
2025-06-26 14:07:35.402 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-security.xml), result=true
2025-06-26 14:07:35.403 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-policymgr-ssl.xml)
2025-06-26 14:07:35.403 [DEBUG - main] (RangerConfiguration.java:95) Conf file path ranger-kudu-policymgr-ssl.xml does not exists
2025-06-26 14:07:35.403 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-policymgr-ssl.xml): couldn't find resource file location
2025-06-26 14:07:35.403 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-policymgr-ssl.xml), result=false
2025-06-26 14:07:35.403 [DEBUG - main] (RangerPluginConfig.java:277) ==> addSslConfigResource(Service Type: kudu
2025-06-26 14:07:35.433 [DEBUG - main] (RangerPluginConfig.java:299) <== addSslConfigResource(Service Type: kudu)
2025-06-26 14:07:35.434 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-kudu-audit.xml)
2025-06-26 14:07:35.434 [DEBUG - main] (RangerConfiguration.java:95) Conf file path ranger-kudu-kudu-audit.xml does not exists
2025-06-26 14:07:35.434 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-kudu-audit.xml): couldn't find resource file location
2025-06-26 14:07:35.434 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-kudu-audit.xml), result=false
2025-06-26 14:07:35.434 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-kudu-security.xml)
2025-06-26 14:07:35.435 [DEBUG - main] (RangerConfiguration.java:95) Conf file path ranger-kudu-kudu-security.xml does not exists
2025-06-26 14:07:35.435 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-kudu-security.xml): couldn't find resource file location
2025-06-26 14:07:35.435 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-kudu-security.xml), result=false
2025-06-26 14:07:35.435 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-kudu-policymgr-ssl.xml)
2025-06-26 14:07:35.435 [DEBUG - main] (RangerConfiguration.java:95) Conf file path ranger-kudu-kudu-policymgr-ssl.xml does not exists
2025-06-26 14:07:35.435 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-kudu-policymgr-ssl.xml): couldn't find resource file location
2025-06-26 14:07:35.436 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-kudu-policymgr-ssl.xml), result=false
2025-06-26 14:07:35.436 [DEBUG - main] (RangerPluginConfig.java:99) ranger.plugin.kudu.use.x-forwarded-for.ipaddress:false
2025-06-26 14:07:35.437 [DEBUG - main] (RangerPluginConfig.java:100) ranger.plugin.kudu.trusted.proxy.ipaddresses:[null]
2025-06-26 14:07:35.438 [INFO - main] (RangerPluginConfig.java:116) PolicyEngineOptions: { evaluatorType: auto, evaluateDelegateAdminOnly: false, disableContextEnrichers: false, disableCustomConditions: false, disableTagPolicyEvaluation: false, enableTagEnricherWithLocalRefresher: false, disableTrieLookupPrefilter: false, optimizeTrieForRetrieval: false, cacheAuditResult: false }
2025-06-26 14:07:35.440 [DEBUG - main] (RangerPluginConfig.java:170) superUsers=[], superGroups=[]
2025-06-26 14:07:35.440 [DEBUG - main] (RangerPluginConfig.java:161) auditExcludedUsers=[], auditExcludedGroups=[], auditExcludedRoles=[]
2025-06-26 14:07:35.523 [DEBUG - main] (MiscUtil.java:839) ==> MiscUtil.initLocalHost()
2025-06-26 14:07:35.523 [DEBUG - main] (MiscUtil.java:848) <== MiscUtil.initLocalHost()
2025-06-26 14:07:35.559 [DEBUG - main] (Shell.java:874) setsid exited with exit code 0
2025-06-26 14:07:35.559 [DEBUG - main] (SecurityUtil.java:136) Setting hadoop.security.token.service.use_ip to true
2025-06-26 14:07:35.575 [DEBUG - main] (Groups.java:476) Creating new Groups object
2025-06-26 14:07:35.591 [DEBUG - main] (Groups.java:150) Group mapping impl=org.apache.hadoop.security.NullGroupsMapping; cacheTimeout=300000; warningDeltaMs=5000
2025-06-26 14:07:35.592 [INFO - main] (AuditProviderFactory.java:76) AuditProviderFactory: creating..
2025-06-26 14:07:35.593 [INFO - main] (AuditProviderFactory.java:114) AuditProviderFactory: initializing..
2025-06-26 14:07:35.593 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.cache.dir=/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/policy-cache
2025-06-26 14:07:35.593 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.source.impl=org.apache.ranger.admin.client.RangerAdminRESTClient
2025-06-26 14:07:35.593 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.rest.url=http://127.0.0.1:35455
2025-06-26 14:07:35.593 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.pollIntervalMs=30000
2025-06-26 14:07:35.593 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.service.name=kudu
2025-06-26 14:07:35.594 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.access.cluster.name=Cluster 1
2025-06-26 14:07:35.594 [INFO - main] (AuditProviderFactory.java:279) No v3 audit configuration found. Trying v2 audit configurations
2025-06-26 14:07:35.595 [INFO - Ranger async Audit cleanup] (AuditProviderFactory.java:497) RangerAsyncAuditCleanup: Waiting to audit cleanup start signal
2025-06-26 14:07:35.608 [DEBUG - main] (PolicyRefresher.java:67) ==> PolicyRefresher(serviceName=kudu).PolicyRefresher()
2025-06-26 14:07:35.609 [DEBUG - main] (RangerBasePlugin.java:605) ==> RangerBasePlugin.createAdminClient(kudu, kudu, ranger.plugin.kudu)
2025-06-26 14:07:35.609 [DEBUG - main] (RangerBasePlugin.java:618) Value for property[ranger.plugin.kudu.policy.source.impl] was [org.apache.ranger.admin.client.RangerAdminRESTClient].
2025-06-26 14:07:35.613 [DEBUG - main] (RangerAdminRESTClient.java:775) ==> RangerAdminRESTClient.init(http://127.0.0.1:35455, null)
2025-06-26 14:07:35.617 [DEBUG - main] (RangerAdminRESTClient.java:783) <== RangerAdminRESTClient.init(http://127.0.0.1:35455, null)
2025-06-26 14:07:35.618 [DEBUG - main] (RangerBasePlugin.java:638) <== RangerBasePlugin.createAdminClient(kudu, kudu, ranger.plugin.kudu): policySourceImpl=org.apache.ranger.admin.client.RangerAdminRESTClient, client=org.apache.ranger.admin.client.RangerAdminRESTClient@7a35b0f5
2025-06-26 14:07:35.619 [DEBUG - main] (RangerRolesProvider.java:62) ==> RangerRolesProvider(serviceName=kudu).RangerRolesProvider()
2025-06-26 14:07:35.620 [DEBUG - main] (RangerRolesProvider.java:94) <== RangerRolesProvider(serviceName=kudu).RangerRolesProvider()
2025-06-26 14:07:35.620 [DEBUG - main] (PolicyRefresher.java:102) <== PolicyRefresher(serviceName=kudu).PolicyRefresher()
2025-06-26 14:07:35.620 [INFO - main] (RangerBasePlugin.java:183) Created PolicyRefresher Thread(PolicyRefresher(serviceName=kudu)-14)
2025-06-26 14:07:35.620 [DEBUG - main] (PolicyRefresher.java:489) ==> PolicyRefresher(serviceName=kudu).loadRoles()
2025-06-26 14:07:35.621 [DEBUG - main] (RangerRolesProvider.java:109) ==> RangerRolesProvider(serviceName= kudu serviceType= kudu).loadUserGroupRoles()
2025-06-26 14:07:35.622 [DEBUG - main] (RangerRolesProvider.java:118) In-Use memory: 58471272, Free memory:180800664
2025-06-26 14:07:35.622 [DEBUG - main] (RangerRolesProvider.java:171) ==> RangerRolesProvider(serviceName=kudu).loadUserGroupRolesFromAdmin()
2025-06-26 14:07:35.622 [DEBUG - main] (RangerAdminRESTClient.java:210) ==> RangerAdminRESTClient.getRolesIfUpdated(-1, 0)
2025-06-26 14:07:35.627 [DEBUG - main] (UserGroupInformation.java:245) Hadoop login
2025-06-26 14:07:35.627 [DEBUG - main] (UserGroupInformation.java:191) hadoop login commit
2025-06-26 14:07:35.646 [DEBUG - main] (UserGroupInformation.java:213) Using local user: UnixPrincipal: slave
2025-06-26 14:07:35.648 [DEBUG - main] (UserGroupInformation.java:217) Using user: "UnixPrincipal: slave" with name: slave
2025-06-26 14:07:35.648 [DEBUG - main] (UserGroupInformation.java:229) User entry: "slave"
2025-06-26 14:07:35.649 [DEBUG - main] (UserGroupInformation.java:801) UGI loginUser: slave (auth:SIMPLE)
2025-06-26 14:07:35.649 [DEBUG - main] (RangerAdminRESTClient.java:244) Checking Roles updated as user : slave (auth:SIMPLE)
2025-06-26 14:07:36.200 [DEBUG - main] (RangerAdminRESTClient.java:283) <== RangerAdminRESTClient.getRolesIfUpdated(-1, 0):
2025-06-26 14:07:36.200 [DEBUG - main] (RangerRolesProvider.java:277) ==> RangerRolesProvider(serviceName=kudu).saveToCache()
2025-06-26 14:07:36.208 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerRolesProvider.saveToCache(serviceName=kudu): 8
2025-06-26 14:07:36.208 [DEBUG - main] (RangerRolesProvider.java:330) <== RangerRolesProvider.saveToCache(serviceName=kudu)
2025-06-26 14:07:36.208 [INFO - main] (RangerRolesProvider.java:190) RangerRolesProvider(serviceName=kudu): found updated version. lastKnownRoleVersion=-1; newVersion=1
2025-06-26 14:07:36.208 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerRolesProvider.loadUserGroupRolesFromAdmin(serviceName=kudu): 586
2025-06-26 14:07:36.209 [DEBUG - main] (RangerRolesProvider.java:207) <== RangerRolesProvider(serviceName=kudu serviceType= kudu ).loadUserGroupRolesFromAdmin()
2025-06-26 14:07:36.209 [DEBUG - main] (RangerRolesProvider.java:135) In-Use memory: 14385984, Free memory:224951488
2025-06-26 14:07:36.209 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerRolesProvider.loadUserGroupRoles(serviceName=kudu): 587
2025-06-26 14:07:36.209 [DEBUG - main] (RangerRolesProvider.java:164) <== RangerRolesProvider(serviceName=kudu).loadUserGroupRoles()
2025-06-26 14:07:36.210 [DEBUG - main] (PolicyRefresher.java:496) <== PolicyRefresher(serviceName=kudu).loadRoles()
2025-06-26 14:07:36.210 [DEBUG - main] (PolicyRefresher.java:232) ==> PolicyRefresher(serviceName=kudu).loadPolicy()
2025-06-26 14:07:36.210 [DEBUG - main] (PolicyRefresher.java:241) In-Use memory: 14385984, Free memory:224951488
2025-06-26 14:07:36.210 [DEBUG - main] (PolicyRefresher.java:294) ==> PolicyRefresher(serviceName=kudu).loadPolicyfromPolicyAdmin()
2025-06-26 14:07:36.210 [DEBUG - main] (RangerAdminRESTClient.java:129) ==> RangerAdminRESTClient.getServicePoliciesIfUpdated(-1, 0)
2025-06-26 14:07:36.210 [DEBUG - main] (RangerAdminRESTClient.java:165) Checking Service policy if updated with old api call
2025-06-26 14:07:36.411 [DEBUG - main] (RangerAdminRESTClient.java:201) <== RangerAdminRESTClient.getServicePoliciesIfUpdated(-1, 0): serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null
2025-06-26 14:07:36.412 [INFO - main] (PolicyRefresher.java:319) PolicyRefresher(serviceName=kudu): found updated version. lastKnownVersion=-1; newVersion=2
2025-06-26 14:07:36.412 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] PolicyRefresher.loadPolicyFromPolicyAdmin(serviceName=kudu): 202
2025-06-26 14:07:36.412 [DEBUG - main] (PolicyRefresher.java:337) <== PolicyRefresher(serviceName=kudu).loadPolicyfromPolicyAdmin()
2025-06-26 14:07:36.412 [DEBUG - main] (PolicyRefresher.java:258) In-Use memory: 29708480, Free memory:209628992
2025-06-26 14:07:36.413 [DEBUG - main] (RangerBasePlugin.java:194) ==> setPolicies(serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null)
2025-06-26 14:07:36.414 [DEBUG - main] (RangerPolicyDeltaUtil.java:160) ==> hasPolicyDeltas(servicePolicies:[serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null]
2025-06-26 14:07:36.417 [DEBUG - main] (RangerPolicyDeltaUtil.java:193) <== hasPolicyDeltas(servicePolicies:[serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null], ret:[false]
2025-06-26 14:07:36.418 [DEBUG - main] (RangerBasePlugin.java:243) Creating engine from policies
2025-06-26 14:07:36.422 [DEBUG - main] (PolicyEngine.java:164) ==> PolicyEngine(, serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null, org.apache.ranger.plugin.policyengine.RangerPluginContext@42721fe)
2025-06-26 14:07:36.423 [DEBUG - main] (PolicyEngine.java:175) In-Use memory: 30993872, Free memory:208343600
2025-06-26 14:07:36.432 [DEBUG - main] (RangerPolicyRepository.java:299) RangerPolicyRepository : building policy-repository for service[kudu], and zone:[null] with auditMode[AUDIT_DEFAULT]
2025-06-26 14:07:36.433 [DEBUG - main] (RangerServiceDefHelper.java:139) ==> RangerServiceDefHelper(). The RangerServiceDef: RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }
2025-06-26 14:07:36.435 [DEBUG - main] (RangerServiceDefHelper.java:397) Created graph for resources: _nodes={database=[table], column=[], table=[column]}
2025-06-26 14:07:36.435 [DEBUG - main] (RangerServiceDefHelper.java:605) Returning sources: [database]
2025-06-26 14:07:36.435 [DEBUG - main] (RangerServiceDefHelper.java:625) Returning sinks: [column]
2025-06-26 14:07:36.435 [DEBUG - main] (RangerServiceDefHelper.java:605) Returning sources: [database]
2025-06-26 14:07:36.436 [DEBUG - main] (RangerServiceDefHelper.java:625) Returning sinks: [column]
2025-06-26 14:07:36.436 [DEBUG - main] (RangerServiceDefHelper.java:397) Created graph for resources: null
2025-06-26 14:07:36.436 [DEBUG - main] (RangerServiceDefHelper.java:397) Created graph for resources: null
2025-06-26 14:07:36.437 [DEBUG - main] (RangerServiceDefHelper.java:330) Found [3] resource hierarchies for service [kudu] update-date[Thu Jun 26 14:07:23 UTC 2025]: {0=[[RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }], [RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }], [RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }]], 1=[], 2=[]}
2025-06-26 14:07:36.437 [DEBUG - main] (RangerPolicyRepository.java:1077) ==> RangerPolicyRepository.buildPolicyEvaluator(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }},RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, PolicyEngineOptions: { evaluatorType: auto, evaluateDelegateAdminOnly: false, disableContextEnrichers: false, disableCustomConditions: false, disableTagPolicyEvaluation: false, enableTagEnricherWithLocalRefresher: false, disableTrieLookupPrefilter: false, optimizeTrieForRetrieval: false, cacheAuditResult: false })
2025-06-26 14:07:36.438 [DEBUG - main] (RangerPolicyRepository.java:1101) ==> RangerPolicyRepository.scrubPolicy(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }})
2025-06-26 14:07:36.438 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:36.438 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:36.438 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:36.438 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:36.438 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:36.439 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:36.439 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:36.439 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:36.439 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:36.439 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:36.439 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:36.440 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:36.440 [DEBUG - main] (RangerPolicyRepository.java:1128) <== RangerPolicyRepository.scrubPolicy(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}): false
2025-06-26 14:07:36.444 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:71) ==> RangerOptimizedPolicyEvaluator.init()
2025-06-26 14:07:36.445 [DEBUG - main] (RangerDefaultPolicyEvaluator.java:107) ==> RangerDefaultPolicyEvaluator.init()
2025-06-26 14:07:36.445 [DEBUG - main] (RangerAbstractPolicyEvaluator.java:54) ==> RangerAbstractPolicyEvaluator.init(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}, RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} })
2025-06-26 14:07:36.446 [DEBUG - main] (RangerAbstractPolicyEvaluator.java:62) <== RangerAbstractPolicyEvaluator.init(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}, RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} })
2025-06-26 14:07:36.448 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:118) ==> RangerDefaultPolicyResourceMatcher.init()
2025-06-26 14:07:36.453 [DEBUG - main] (RangerServiceDefHelper.java:204) ==> getResourceHierarchies(policyType=0, keys=database,table)
2025-06-26 14:07:36.453 [DEBUG - main] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:36.454 [DEBUG - main] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): true
2025-06-26 14:07:36.454 [DEBUG - main] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:36.454 [DEBUG - main] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): true
2025-06-26 14:07:36.456 [DEBUG - main] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:36.456 [DEBUG - main] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): false
2025-06-26 14:07:36.456 [DEBUG - main] (RangerServiceDefHelper.java:216) <== getResourceHierarchies(policyType=0, keys=database,table) : [RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }],[RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }]
2025-06-26 14:07:36.457 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:635) ==> isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} })
2025-06-26 14:07:36.457 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:661) <== isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }) : true
2025-06-26 14:07:36.457 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:635) ==> isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} })
2025-06-26 14:07:36.457 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:661) <== isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }) : true
2025-06-26 14:07:36.458 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:759) ==> RangerDefaultPolicyResourceMatcher.createResourceMatcher(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} })
2025-06-26 14:07:36.460 [DEBUG - main] (RangerAbstractResourceMatcher.java:81) ==> RangerAbstractResourceMatcher.init()
2025-06-26 14:07:36.460 [DEBUG - main] (ResourceMatcher.java:69) ==> setDelimiters(value= db, startDelimiter={, endDelimiter=}, escapeChar=\, prefix=
2025-06-26 14:07:36.461 [DEBUG - main] (ResourceMatcher.java:78) <== setDelimiters(value= db, startDelimiter={, endDelimiter=}, escapeChar=\, prefix=
2025-06-26 14:07:36.461 [DEBUG - main] (RangerAbstractResourceMatcher.java:131) <== RangerAbstractResourceMatcher.init()
2025-06-26 14:07:36.461 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:792) <== RangerDefaultPolicyResourceMatcher.createResourceMatcher(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }): RangerDefaultResourceMatcher={RangerAbstractResourceMatcher={resourceDef={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} policyResource={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} optIgnoreCase={true} optWildCard={true} policyValues={db,} policyIsExcludes={false} isMatchAny={false} options={wildCard=true;ignoreCase=true;} }}
2025-06-26 14:07:36.461 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:759) ==> RangerDefaultPolicyResourceMatcher.createResourceMatcher(RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} })
2025-06-26 14:07:36.462 [DEBUG - main] (RangerAbstractResourceMatcher.java:81) ==> RangerAbstractResourceMatcher.init()
2025-06-26 14:07:36.462 [DEBUG - main] (ResourceMatcher.java:69) ==> setDelimiters(value= table, startDelimiter={, endDelimiter=}, escapeChar=\, prefix=
2025-06-26 14:07:36.462 [DEBUG - main] (ResourceMatcher.java:78) <== setDelimiters(value= table, startDelimiter={, endDelimiter=}, escapeChar=\, prefix=
2025-06-26 14:07:36.462 [DEBUG - main] (RangerAbstractResourceMatcher.java:131) <== RangerAbstractResourceMatcher.init()
2025-06-26 14:07:36.462 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:792) <== RangerDefaultPolicyResourceMatcher.createResourceMatcher(RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }): RangerDefaultResourceMatcher={RangerAbstractResourceMatcher={resourceDef={RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} policyResource={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} optIgnoreCase={true} optWildCard={true} policyValues={table,} policyIsExcludes={false} isMatchAny={false} options={wildCard=true;ignoreCase=true;} }}
2025-06-26 14:07:36.462 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:170) RangerDefaultPolicyResourceMatcher.init(): no matcher created for column. Continuing ...
2025-06-26 14:07:36.463 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerDefaultPolicyResourceMatcher.init(): 13
2025-06-26 14:07:36.463 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:227) <== RangerDefaultPolicyResourceMatcher.init(): ret=true
2025-06-26 14:07:36.464 [DEBUG - main] (RangerDefaultPolicyItemEvaluator.java:61) ==> RangerDefaultPolicyItemEvaluator(policyId=1, policyItem=RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }, serviceType=kudu, conditionsDisabled=false)
2025-06-26 14:07:36.465 [DEBUG - main] (RangerDefaultPolicyItemEvaluator.java:73) <== RangerDefaultPolicyItemEvaluator(policyId=1, conditionsCount=0)
2025-06-26 14:07:36.465 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerPolicyEvaluator.init(policyId=1, policyName=db;table;): 20
2025-06-26 14:07:36.466 [DEBUG - main] (RangerDefaultPolicyEvaluator.java:187) <== RangerDefaultPolicyEvaluator.init()
2025-06-26 14:07:36.466 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:335) ==> RangerOptimizedPolicyEvaluator.checkIfHasAllPerms()
2025-06-26 14:07:36.466 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:352) ==> RangerOptimizedPolicyEvaluator.checkIfHasAllPerms(), false
2025-06-26 14:07:36.466 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:147) ==> RangerOptimizedPolicyEvaluator.computeEvalOrder()
2025-06-26 14:07:36.467 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:230) <== RangerOptimizedPolicyEvaluator.computeEvalOrder(), policyName:db;table;, priority:9971
2025-06-26 14:07:36.467 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:111) <== RangerOptimizedPolicyEvaluator.init()
2025-06-26 14:07:36.467 [DEBUG - main] (RangerPolicyRepository.java:1093) <== RangerPolicyRepository.buildPolicyEvaluator(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }},RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }): RangerDefaultPolicyEvaluator={RangerAbstractPolicyEvaluator={policy={RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}} }resourceMatcher={RangerDefaultPolicyResourceMatcher={isInitialized=true, matchers={{RangerDefaultResourceMatcher={RangerAbstractResourceMatcher={resourceDef={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} policyResource={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} optIgnoreCase={true} optWildCard={true} policyValues={db,} policyIsExcludes={false} isMatchAny={false} options={wildCard=true;ignoreCase=true;} }}} {RangerDefaultResourceMatcher={RangerAbstractResourceMatcher={resourceDef={RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} policyResource={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} optIgnoreCase={true} optWildCard={true} policyValues={table,} policyIsExcludes={false} isMatchAny={false} options={wildCard=true;ignoreCase=true;} }}} } }} }
2025-06-26 14:07:36.468 [INFO - main] (RangerPolicyRepository.java:953) This policy engine contains 1 policy evaluators
2025-06-26 14:07:36.468 [DEBUG - main] (RangerPolicyRepository.java:968) policy evaluation order: 1 policies
2025-06-26 14:07:36.468 [DEBUG - main] (RangerPolicyRepository.java:974) policy evaluation order: #1 - policy id=1; name=db;table;; evalOrder=9971
2025-06-26 14:07:36.468 [DEBUG - main] (RangerPolicyRepository.java:977) dataMask policy evaluation order: 0 policies
2025-06-26 14:07:36.468 [DEBUG - main] (RangerPolicyRepository.java:985) rowFilter policy evaluation order: 0 policies
2025-06-26 14:07:36.470 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(database, evaluatorCount=1, isOptimizedForRetrieval=false)
2025-06-26 14:07:36.470 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(database, evaluatorCount=1, isMultiThreaded=false)
2025-06-26 14:07:36.471 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=database): 1
2025-06-26 14:07:36.471 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(database, evaluatorCount=1, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@6b00f608
2025-06-26 14:07:36.471 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=database): 1
2025-06-26 14:07:36.472 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=2; leafNodeCount=1; singleChildNodeCount=1; maxDepth=2; evaluatorListCount=1; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.472 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(database, evaluatorCount=1, isOptimizedForRetrieval=false): resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=2; leafNodeCount=1; singleChildNodeCount=1; maxDepth=2; evaluatorListCount=1; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.472 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(table, evaluatorCount=1, isOptimizedForRetrieval=false)
2025-06-26 14:07:36.472 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(table, evaluatorCount=1, isMultiThreaded=false)
2025-06-26 14:07:36.472 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=table): 0
2025-06-26 14:07:36.473 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(table, evaluatorCount=1, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@1d131e1b
2025-06-26 14:07:36.473 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=table): 1
2025-06-26 14:07:36.473 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=2; leafNodeCount=1; singleChildNodeCount=1; maxDepth=2; evaluatorListCount=1; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.473 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(table, evaluatorCount=1, isOptimizedForRetrieval=false): resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=2; leafNodeCount=1; singleChildNodeCount=1; maxDepth=2; evaluatorListCount=1; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.473 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(column, evaluatorCount=1, isOptimizedForRetrieval=false)
2025-06-26 14:07:36.473 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(column, evaluatorCount=1, isMultiThreaded=false)
2025-06-26 14:07:36.473 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=column): 0
2025-06-26 14:07:36.474 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(column, evaluatorCount=1, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@71cf1b07
2025-06-26 14:07:36.474 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=column): 1
2025-06-26 14:07:36.474 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=1; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.474 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(column, evaluatorCount=1, isOptimizedForRetrieval=false): resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=1; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.474 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(database, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:36.474 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(database, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:36.474 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=database): 0
2025-06-26 14:07:36.475 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(database, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@615091b8
2025-06-26 14:07:36.475 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=database): 1
2025-06-26 14:07:36.475 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.475 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(database, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.475 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(table, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:36.476 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(table, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:36.476 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=table): 0
2025-06-26 14:07:36.476 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(table, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@4fce136b
2025-06-26 14:07:36.476 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=table): 0
2025-06-26 14:07:36.476 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.476 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(table, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.477 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(column, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:36.477 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(column, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:36.477 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=column): 0
2025-06-26 14:07:36.477 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(column, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@4aa83f4f
2025-06-26 14:07:36.477 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=column): 0
2025-06-26 14:07:36.477 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.477 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(column, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.478 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(database, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:36.478 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(database, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:36.478 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=database): 0
2025-06-26 14:07:36.478 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(database, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@43b6123e
2025-06-26 14:07:36.478 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=database): 0
2025-06-26 14:07:36.478 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.478 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(database, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.478 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(table, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:36.478 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(table, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:36.479 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=table): 0
2025-06-26 14:07:36.479 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(table, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@260e86a1
2025-06-26 14:07:36.479 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=table): 1
2025-06-26 14:07:36.479 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.479 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(table, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.479 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(column, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:36.479 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(column, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:36.480 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=column): 0
2025-06-26 14:07:36.480 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(column, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@19648c40
2025-06-26 14:07:36.480 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=column): 1
2025-06-26 14:07:36.480 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.480 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(column, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:36.480 [DEBUG - main] (PolicyEngine.java:204) PolicyEngine : No tag-policy-repository for service kudu
2025-06-26 14:07:36.480 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerPolicyEngine.init(hashCode=40844aab): 58
2025-06-26 14:07:36.480 [DEBUG - main] (PolicyEngine.java:242) In-Use memory: 34825704, Free memory:204511768
2025-06-26 14:07:36.480 [DEBUG - main] (PolicyEngine.java:246) <== PolicyEngine()
2025-06-26 14:07:36.481 [DEBUG - main] (PolicyRefresher.java:403) ==> PolicyRefresher(serviceName=kudu).saveToCache()
2025-06-26 14:07:36.493 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] PolicyRefresher.saveToCache(serviceName=kudu): 11
2025-06-26 14:07:36.493 [DEBUG - main] (PolicyRefresher.java:457) <== PolicyRefresher(serviceName=kudu).saveToCache()
2025-06-26 14:07:36.494 [DEBUG - main] (RangerBasePlugin.java:312) <== setPolicies(serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null)
2025-06-26 14:07:36.494 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] PolicyRefresher.loadPolicy(serviceName=kudu): 284
2025-06-26 14:07:36.494 [DEBUG - main] (PolicyRefresher.java:287) <== PolicyRefresher(serviceName=kudu).loadPolicy()
2025-06-26 14:07:36.495 [DEBUG - PolicyRefresher(serviceName=kudu)-14] (PolicyRefresher.java:200) ==> PolicyRefresher(serviceName=kudu).run()
2025-06-26 14:07:36.496 [DEBUG - main] (PolicyRefresher.java:154) Scheduled policyDownloadRefresher to download policies every 30000 milliseconds
2025-06-26 14:07:36.496 [INFO - main] (RangerKuduAuthorizer.java:91) Finished Ranger Kudu plugin initialization
2025-06-26 14:07:36.521 [DEBUG - pool-3-thread-1] (QueueUtil.java:56) Message: org.apache.kudu.subprocess.InboundRequest@2f18ef78 has been put on the queue
2025-06-26 14:07:36.522 [DEBUG - pool-4-thread-1] (QueueUtil.java:41) Message: org.apache.kudu.subprocess.InboundRequest@2f18ef78 has been taken from the queue
2025-06-26 14:07:36.626 [DEBUG - pool-4-thread-1] (Groups.java:344) GroupCacheLoader - load.
2025-06-26 14:07:36.629 [DEBUG - pool-4-thread-1] (UserGroupInformation.java:1796) Failed to get groups for user user
java.io.IOException: No groups found for user user
at org.apache.hadoop.security.Groups.noGroupsForUser(Groups.java:198) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.security.Groups.access$400(Groups.java:74) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.security.Groups$GroupCacheLoader.load(Groups.java:366) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.security.Groups$GroupCacheLoader.load(Groups.java:302) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache$LoadingValueReference.loadFuture(LocalCache.java:3570) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache$Segment.loadSync(LocalCache.java:2312) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache$Segment.lockedGetOrLoad(LocalCache.java:2189) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache$Segment.get(LocalCache.java:2079) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache.get(LocalCache.java:4011) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache.getOrLoad(LocalCache.java:4034) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache$LocalLoadingCache.get(LocalCache.java:5010) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.security.Groups.getGroupInternal(Groups.java:260) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.security.Groups.getGroups(Groups.java:216) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.security.UserGroupInformation.getGroups(UserGroupInformation.java:1794) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.kudu.subprocess.ranger.authorization.RangerKuduAuthorizer.getUserGroups(RangerKuduAuthorizer.java:246) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.kudu.subprocess.ranger.authorization.RangerKuduAuthorizer.authorizeRequests(RangerKuduAuthorizer.java:178) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.kudu.subprocess.ranger.authorization.RangerKuduAuthorizer.authorize(RangerKuduAuthorizer.java:117) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.kudu.subprocess.ranger.RangerProtocolHandler.executeRequest(RangerProtocolHandler.java:50) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.kudu.subprocess.ranger.RangerProtocolHandler.executeRequest(RangerProtocolHandler.java:36) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.kudu.subprocess.ProtocolHandler.unpackAndExecuteRequest(ProtocolHandler.java:53) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.kudu.subprocess.MessageParser.parseAndExecuteRequest(MessageParser.java:106) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.kudu.subprocess.MessageParser.run(MessageParser.java:65) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
at java.util.concurrent.CompletableFuture$AsyncRun.run(CompletableFuture.java:1640) [?:1.8.0_275]
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) [?:1.8.0_275]
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) [?:1.8.0_275]
at java.lang.Thread.run(Thread.java:748) [?:1.8.0_275]
2025-06-26 14:07:36.638 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:95) ==> RangerPolicyEngineImpl.evaluatePolicies(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={null} clusterType={null} context={} }, policyType=0)
2025-06-26 14:07:36.639 [INFO - pool-4-thread-1] (RangerPolicyEngineImpl.java:105) RangerPolicyEngineImpl.evaluatePolicies(457bc5fa_0, RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={null} clusterType={null} context={} })
2025-06-26 14:07:36.639 [DEBUG - pool-4-thread-1] (RangerAccessRequestImpl.java:275) Old Remote/Client IP Address=null, new IP Address=null
2025-06-26 14:07:36.640 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:435) ==> RangerPolicyEngineImpl.zoneAwareAccessEvaluationWithNoAudit(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0)
2025-06-26 14:07:36.640 [DEBUG - pool-4-thread-1] (PolicyEngine.java:316) ==> PolicyEngine.getMatchedZonesForResourceAndChildren(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } })
2025-06-26 14:07:36.640 [DEBUG - pool-4-thread-1] (PolicyEngine.java:326) <== PolicyEngine.getMatchedZonesForResourceAndChildren(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }) : null
2025-06-26 14:07:36.641 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:444) zoneNames:[null]
2025-06-26 14:07:36.641 [DEBUG - pool-4-thread-1] (PolicyEngine.java:347) zoneName:[null]
2025-06-26 14:07:36.641 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:510) ==> RangerPolicyEngineImpl.evaluatePoliciesNoAudit(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0, zoneName=null)
2025-06-26 14:07:36.642 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:608) ==> RangerPolicyEngineImpl.evaluateTagPolicies(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0, zoneName=null, RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={false} isAudited={false} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={-1} policyVersion={null} evaluatedPoliciesCount={0} reason={null} additionalInfo={}})
2025-06-26 14:07:36.643 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:686) <== RangerPolicyEngineImpl.evaluateTagPolicies(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0, zoneName=null, RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={false} isAudited={false} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={-1} policyVersion={null} evaluatedPoliciesCount={0} reason={null} additionalInfo={}})
2025-06-26 14:07:36.643 [DEBUG - pool-4-thread-1] (RangerPolicyRepository.java:544) ==> RangerPolicyRepository.setAuditEnabledFromCache()
2025-06-26 14:07:36.643 [DEBUG - pool-4-thread-1] (RangerPolicyRepository.java:555) <== RangerPolicyRepository.setAuditEnabledFromCache():false
2025-06-26 14:07:36.643 [DEBUG - pool-4-thread-1] (RangerResourceTrie.java:504) ==> RangerResourceTrie.getEvaluatorsForResource(db)
2025-06-26 14:07:36.643 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.getEvaluatorsForResource(resource=db): 0
2025-06-26 14:07:36.643 [DEBUG - pool-4-thread-1] (RangerResourceTrie.java:549) <== RangerResourceTrie.getEvaluatorsForResource(db): evaluatorCount=1
2025-06-26 14:07:36.644 [DEBUG - pool-4-thread-1] (RangerResourceTrie.java:504) ==> RangerResourceTrie.getEvaluatorsForResource(table)
2025-06-26 14:07:36.644 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.getEvaluatorsForResource(resource=table): 0
2025-06-26 14:07:36.644 [DEBUG - pool-4-thread-1] (RangerResourceTrie.java:549) <== RangerResourceTrie.getEvaluatorsForResource(table): evaluatorCount=1
2025-06-26 14:07:36.644 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:106) [PERF] RangerPolicyRepository.getLikelyMatchEvaluators(resource=db/table): 1
2025-06-26 14:07:36.645 [DEBUG - pool-4-thread-1] (RangerPolicyRepository.java:774) <== RangerPolicyRepository.getLikelyMatchPolicyEvaluators(db/table): evaluatorCount=1
2025-06-26 14:07:36.645 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:194) ==> RangerDefaultPolicyEvaluator.isApplicable(Thu Jun 26 14:07:36 UTC 2025)
2025-06-26 14:07:36.645 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:211) <== RangerDefaultPolicyEvaluator.isApplicable(Thu Jun 26 14:07:36 UTC 2025) : true
2025-06-26 14:07:36.645 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:220) ==> RangerDefaultPolicyEvaluator.evaluate(policyId=1, RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={false} isAudited={false} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={-1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}})
2025-06-26 14:07:36.645 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:550) ==> RangerDefaultPolicyResourceMatcher.getMatchType(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }{token:USER=user})
2025-06-26 14:07:36.646 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:692) ==> RangerDefaultPolicyResourceMatcher.getMatchingHierarchy(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } })
2025-06-26 14:07:36.646 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:204) ==> getResourceHierarchies(policyType=0, keys=database,table)
2025-06-26 14:07:36.646 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:36.646 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): true
2025-06-26 14:07:36.646 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:36.647 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): true
2025-06-26 14:07:36.647 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:36.647 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): false
2025-06-26 14:07:36.647 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:216) <== getResourceHierarchies(policyType=0, keys=database,table) : [RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }],[RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }]
2025-06-26 14:07:36.647 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:635) ==> isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} })
2025-06-26 14:07:36.648 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:661) <== isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }) : true
2025-06-26 14:07:36.648 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:720) <== RangerDefaultPolicyResourceMatcher.getMatchingHierarchy(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }): [RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }]
2025-06-26 14:07:36.648 [DEBUG - pool-4-thread-1] (RangerDefaultResourceMatcher.java:36) ==> RangerDefaultResourceMatcher.isMatch(db, {token:USER=user})
2025-06-26 14:07:36.648 [DEBUG - pool-4-thread-1] (RangerAbstractResourceMatcher.java:286) isAllValuesRequested(db): false
2025-06-26 14:07:36.649 [DEBUG - pool-4-thread-1] (RangerDefaultResourceMatcher.java:85) <== RangerDefaultResourceMatcher.isMatch(db, {token:USER=user}): true
2025-06-26 14:07:36.649 [DEBUG - pool-4-thread-1] (RangerDefaultResourceMatcher.java:36) ==> RangerDefaultResourceMatcher.isMatch(table, {token:USER=user})
2025-06-26 14:07:36.649 [DEBUG - pool-4-thread-1] (RangerAbstractResourceMatcher.java:286) isAllValuesRequested(table): false
2025-06-26 14:07:36.649 [DEBUG - pool-4-thread-1] (RangerDefaultResourceMatcher.java:85) <== RangerDefaultResourceMatcher.isMatch(table, {token:USER=user}): true
2025-06-26 14:07:36.649 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:101) [PERF] RangerDefaultPolicyResourceMatcher.getMatchType(): 3
2025-06-26 14:07:36.649 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:627) <== RangerDefaultPolicyResourceMatcher.getMatchType(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }{token:USER=user}): SELF
2025-06-26 14:07:36.650 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:1264) ==> RangerDefaultPolicyEvaluator.matchPolicyCustomConditions(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } })
2025-06-26 14:07:36.650 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:1304) <== RangerDefaultPolicyEvaluator.matchCustomConditions(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }): true
2025-06-26 14:07:36.650 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:101) [PERF] RangerPolicyEvaluator.evaluate(requestHashCode=457bc5fa,policyId=1, policyName=db;table;): 5
2025-06-26 14:07:36.650 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:276) <== RangerDefaultPolicyEvaluator.evaluate(policyId=1, RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}})
2025-06-26 14:07:36.650 [DEBUG - pool-4-thread-1] (RangerPolicyRepository.java:563) ==> RangerPolicyRepository.storeAuditEnabledInCache()
2025-06-26 14:07:36.650 [DEBUG - pool-4-thread-1] (RangerPolicyRepository.java:571) <== RangerPolicyRepository.storeAuditEnabledInCache()
2025-06-26 14:07:36.650 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:600) <== RangerPolicyEngineImpl.evaluatePoliciesNoAudit(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0, zoneName=null): RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}}
2025-06-26 14:07:36.650 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:502) <== RangerPolicyEngineImpl.zoneAwareAccessEvaluationWithNoAudit(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0): RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}}
2025-06-26 14:07:36.650 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:101) [PERF] RangerPolicyEngine.evaluatePolicies(requestHashCode=457bc5fa_0): 11
2025-06-26 14:07:36.651 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:129) <== RangerPolicyEngineImpl.evaluatePolicies(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType=0): RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}}
2025-06-26 14:07:36.651 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:72) ==> RangerDefaultAuditHandler.processResult(RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}})
2025-06-26 14:07:36.651 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:104) ==> RangerDefaultAuditHandler.getAuthzEvents(RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}})
2025-06-26 14:07:36.652 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:294) generateNextAuditEventId(): 5b736bfa-c481-4959-8468-e8102bc83944-0
2025-06-26 14:07:36.652 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:150) <== RangerDefaultAuditHandler.getAuthzEvents(RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={5b736bfa-c481-4959-8468-e8102bc83944-0} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}}): AuthzAuditEvent{repositoryType=105;repositoryName=kudu;user=user;eventTime=Thu Jun 26 14:07:36 UTC 2025;accessType=all;resourcePath=db/table;resourceType=table;action=all;accessResult=0;agentId=kudu;policyId=-1;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dist-test-slave-5xmx;logType=RangerAudit;eventId=5b736bfa-c481-4959-8468-e8102bc83944-0;seq_num=0;event_count=1;event_dur_ms=0;tags=[];clusterName=Cluster 1;zoneName=null;policyVersion=null;additionalInfo=null}
2025-06-26 14:07:36.652 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:189) ==> RangerDefaultAuditHandler.logAuthzAudit(AuthzAuditEvent{repositoryType=105;repositoryName=kudu;user=user;eventTime=Thu Jun 26 14:07:36 UTC 2025;accessType=all;resourcePath=db/table;resourceType=table;action=all;accessResult=0;agentId=kudu;policyId=-1;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dist-test-slave-5xmx;logType=RangerAudit;eventId=5b736bfa-c481-4959-8468-e8102bc83944-0;seq_num=0;event_count=1;event_dur_ms=0;tags=[];clusterName=Cluster 1;zoneName=null;policyVersion=null;additionalInfo=null})
2025-06-26 14:07:36.652 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:202) <== RangerDefaultAuditHandler.logAuthzAudit(AuthzAuditEvent{repositoryType=105;repositoryName=kudu;user=user;eventTime=Thu Jun 26 14:07:36 UTC 2025;accessType=all;resourcePath=db/table;resourceType=table;action=all;accessResult=0;agentId=kudu;policyId=-1;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dist-test-slave-5xmx;logType=RangerAudit;eventId=5b736bfa-c481-4959-8468-e8102bc83944-0;seq_num=1;event_count=1;event_dur_ms=0;tags=[];clusterName=Cluster 1;zoneName=null;policyVersion=null;additionalInfo=null})
2025-06-26 14:07:36.652 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:80) <== RangerDefaultAuditHandler.processResult(RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={5b736bfa-c481-4959-8468-e8102bc83944-0} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}})
2025-06-26 14:07:36.653 [DEBUG - pool-4-thread-1] (RangerKuduAuthorizer.java:192) RangerAccessRequest [RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }] receives result [RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={5b736bfa-c481-4959-8468-e8102bc83944-0} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}}]
2025-06-26 14:07:36.659 [DEBUG - pool-4-thread-1] (QueueUtil.java:56) Message: org.apache.kudu.subprocess.OutboundResponse@5e85e7a5 has been put on the queue
2025-06-26 14:07:36.659 [DEBUG - pool-5-thread-1] (QueueUtil.java:41) Message: org.apache.kudu.subprocess.OutboundResponse@5e85e7a5 has been taken from the queue
I20250626 14:07:36.669098 25108 server.cc:273] Received an EOF from the subprocess
W20250626 14:07:36.669360 25095 server.cc:408] The subprocess has exited with status 9
I20250626 14:07:36.673282 25109 server.cc:440] outbound queue shut down: Aborted:
I20250626 14:07:36.673301 25105 server.cc:366] get failed, inbound queue shut down: Aborted:
I20250626 14:07:36.673308 25107 server.cc:366] get failed, inbound queue shut down: Aborted:
I20250626 14:07:36.673302 25106 server.cc:366] get failed, inbound queue shut down: Aborted:
W20250626 14:07:36.673638 23932 subprocess_protocol.cc:66] error closing read fd: Bad file descriptor
I20250626 14:07:36.673724 23932 ranger_client.cc:318] Using existing properties file: /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/log_conf/kudu-ranger-subprocess-log4j2.properties
2025-06-26 14:07:37.325 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-audit.xml)
2025-06-26 14:07:37.332 [DEBUG - main] (RangerConfiguration.java:95) Conf file path ranger-kudu-audit.xml does not exists
2025-06-26 14:07:37.332 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-audit.xml): couldn't find resource file location
2025-06-26 14:07:37.333 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-audit.xml), result=false
2025-06-26 14:07:37.333 [DEBUG - main] (RangerPluginConfig.java:248) ==> addAuditResource(Service Type: kudu
2025-06-26 14:07:37.334 [DEBUG - main] (RangerPluginConfig.java:271) <== addAuditResource(Service Type: kudu)
2025-06-26 14:07:37.334 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-security.xml)
2025-06-26 14:07:37.335 [INFO - main] (RangerConfiguration.java:50) addResourceIfReadable(ranger-kudu-security.xml): resource file is file:/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/ranger-kudu-security.xml
2025-06-26 14:07:37.372 [DEBUG - main] (MutableMetricsFactory.java:43) field org.apache.hadoop.metrics2.lib.MutableRate org.apache.hadoop.security.UserGroupInformation$UgiMetrics.getGroups with annotation @org.apache.hadoop.metrics2.annotation.Metric(always=false, sampleName=Ops, valueName=Time, about=, interval=10, type=DEFAULT, value=[GetGroups])
2025-06-26 14:07:37.377 [DEBUG - main] (MutableMetricsFactory.java:43) field org.apache.hadoop.metrics2.lib.MutableRate org.apache.hadoop.security.UserGroupInformation$UgiMetrics.loginFailure with annotation @org.apache.hadoop.metrics2.annotation.Metric(always=false, sampleName=Ops, valueName=Time, about=, interval=10, type=DEFAULT, value=[Rate of failed kerberos logins and latency (milliseconds)])
2025-06-26 14:07:37.378 [DEBUG - main] (MutableMetricsFactory.java:43) field org.apache.hadoop.metrics2.lib.MutableRate org.apache.hadoop.security.UserGroupInformation$UgiMetrics.loginSuccess with annotation @org.apache.hadoop.metrics2.annotation.Metric(always=false, sampleName=Ops, valueName=Time, about=, interval=10, type=DEFAULT, value=[Rate of successful kerberos logins and latency (milliseconds)])
2025-06-26 14:07:37.378 [DEBUG - main] (MutableMetricsFactory.java:43) field private org.apache.hadoop.metrics2.lib.MutableGaugeInt org.apache.hadoop.security.UserGroupInformation$UgiMetrics.renewalFailures with annotation @org.apache.hadoop.metrics2.annotation.Metric(always=false, sampleName=Ops, valueName=Time, about=, interval=10, type=DEFAULT, value=[Renewal failures since last successful login])
2025-06-26 14:07:37.379 [DEBUG - main] (MutableMetricsFactory.java:43) field private org.apache.hadoop.metrics2.lib.MutableGaugeLong org.apache.hadoop.security.UserGroupInformation$UgiMetrics.renewalFailuresTotal with annotation @org.apache.hadoop.metrics2.annotation.Metric(always=false, sampleName=Ops, valueName=Time, about=, interval=10, type=DEFAULT, value=[Renewal failures since startup])
2025-06-26 14:07:37.380 [DEBUG - main] (MetricsSystemImpl.java:231) UgiMetrics, User and group related metrics
2025-06-26 14:07:37.382 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-security.xml), result=true
2025-06-26 14:07:37.382 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-policymgr-ssl.xml)
2025-06-26 14:07:37.383 [DEBUG - main] (RangerConfiguration.java:95) Conf file path ranger-kudu-policymgr-ssl.xml does not exists
2025-06-26 14:07:37.383 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-policymgr-ssl.xml): couldn't find resource file location
2025-06-26 14:07:37.383 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-policymgr-ssl.xml), result=false
2025-06-26 14:07:37.383 [DEBUG - main] (RangerPluginConfig.java:277) ==> addSslConfigResource(Service Type: kudu
2025-06-26 14:07:37.413 [DEBUG - main] (RangerPluginConfig.java:299) <== addSslConfigResource(Service Type: kudu)
2025-06-26 14:07:37.413 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-kudu-audit.xml)
2025-06-26 14:07:37.414 [DEBUG - main] (RangerConfiguration.java:95) Conf file path ranger-kudu-kudu-audit.xml does not exists
2025-06-26 14:07:37.414 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-kudu-audit.xml): couldn't find resource file location
2025-06-26 14:07:37.414 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-kudu-audit.xml), result=false
2025-06-26 14:07:37.414 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-kudu-security.xml)
2025-06-26 14:07:37.415 [DEBUG - main] (RangerConfiguration.java:95) Conf file path ranger-kudu-kudu-security.xml does not exists
2025-06-26 14:07:37.415 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-kudu-security.xml): couldn't find resource file location
2025-06-26 14:07:37.415 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-kudu-security.xml), result=false
2025-06-26 14:07:37.415 [DEBUG - main] (RangerConfiguration.java:44) ==> addResourceIfReadable(ranger-kudu-kudu-policymgr-ssl.xml)
2025-06-26 14:07:37.415 [DEBUG - main] (RangerConfiguration.java:95) Conf file path ranger-kudu-kudu-policymgr-ssl.xml does not exists
2025-06-26 14:07:37.415 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-kudu-policymgr-ssl.xml): couldn't find resource file location
2025-06-26 14:07:37.416 [DEBUG - main] (RangerConfiguration.java:67) <== addResourceIfReadable(ranger-kudu-kudu-policymgr-ssl.xml), result=false
2025-06-26 14:07:37.417 [DEBUG - main] (RangerPluginConfig.java:99) ranger.plugin.kudu.use.x-forwarded-for.ipaddress:false
2025-06-26 14:07:37.417 [DEBUG - main] (RangerPluginConfig.java:100) ranger.plugin.kudu.trusted.proxy.ipaddresses:[null]
2025-06-26 14:07:37.418 [INFO - main] (RangerPluginConfig.java:116) PolicyEngineOptions: { evaluatorType: auto, evaluateDelegateAdminOnly: false, disableContextEnrichers: false, disableCustomConditions: false, disableTagPolicyEvaluation: false, enableTagEnricherWithLocalRefresher: false, disableTrieLookupPrefilter: false, optimizeTrieForRetrieval: false, cacheAuditResult: false }
2025-06-26 14:07:37.420 [DEBUG - main] (RangerPluginConfig.java:170) superUsers=[], superGroups=[]
2025-06-26 14:07:37.421 [DEBUG - main] (RangerPluginConfig.java:161) auditExcludedUsers=[], auditExcludedGroups=[], auditExcludedRoles=[]
2025-06-26 14:07:37.496 [DEBUG - main] (MiscUtil.java:839) ==> MiscUtil.initLocalHost()
2025-06-26 14:07:37.497 [DEBUG - main] (MiscUtil.java:848) <== MiscUtil.initLocalHost()
2025-06-26 14:07:37.542 [DEBUG - main] (Shell.java:874) setsid exited with exit code 0
2025-06-26 14:07:37.542 [DEBUG - main] (SecurityUtil.java:136) Setting hadoop.security.token.service.use_ip to true
2025-06-26 14:07:37.563 [DEBUG - main] (Groups.java:476) Creating new Groups object
2025-06-26 14:07:37.578 [DEBUG - main] (Groups.java:150) Group mapping impl=org.apache.hadoop.security.NullGroupsMapping; cacheTimeout=300000; warningDeltaMs=5000
2025-06-26 14:07:37.579 [INFO - main] (AuditProviderFactory.java:76) AuditProviderFactory: creating..
2025-06-26 14:07:37.579 [INFO - main] (AuditProviderFactory.java:114) AuditProviderFactory: initializing..
2025-06-26 14:07:37.580 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.cache.dir=/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/policy-cache
2025-06-26 14:07:37.580 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.source.impl=org.apache.ranger.admin.client.RangerAdminRESTClient
2025-06-26 14:07:37.580 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.rest.url=http://127.0.0.1:35455
2025-06-26 14:07:37.580 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.pollIntervalMs=30000
2025-06-26 14:07:37.581 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.service.name=kudu
2025-06-26 14:07:37.581 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.access.cluster.name=Cluster 1
2025-06-26 14:07:37.581 [INFO - main] (AuditProviderFactory.java:279) No v3 audit configuration found. Trying v2 audit configurations
2025-06-26 14:07:37.582 [INFO - Ranger async Audit cleanup] (AuditProviderFactory.java:497) RangerAsyncAuditCleanup: Waiting to audit cleanup start signal
2025-06-26 14:07:37.596 [DEBUG - main] (PolicyRefresher.java:67) ==> PolicyRefresher(serviceName=kudu).PolicyRefresher()
2025-06-26 14:07:37.596 [DEBUG - main] (RangerBasePlugin.java:605) ==> RangerBasePlugin.createAdminClient(kudu, kudu, ranger.plugin.kudu)
2025-06-26 14:07:37.597 [DEBUG - main] (RangerBasePlugin.java:618) Value for property[ranger.plugin.kudu.policy.source.impl] was [org.apache.ranger.admin.client.RangerAdminRESTClient].
2025-06-26 14:07:37.601 [DEBUG - main] (RangerAdminRESTClient.java:775) ==> RangerAdminRESTClient.init(http://127.0.0.1:35455, null)
2025-06-26 14:07:37.604 [DEBUG - main] (RangerAdminRESTClient.java:783) <== RangerAdminRESTClient.init(http://127.0.0.1:35455, null)
2025-06-26 14:07:37.605 [DEBUG - main] (RangerBasePlugin.java:638) <== RangerBasePlugin.createAdminClient(kudu, kudu, ranger.plugin.kudu): policySourceImpl=org.apache.ranger.admin.client.RangerAdminRESTClient, client=org.apache.ranger.admin.client.RangerAdminRESTClient@7a35b0f5
2025-06-26 14:07:37.606 [DEBUG - main] (RangerRolesProvider.java:62) ==> RangerRolesProvider(serviceName=kudu).RangerRolesProvider()
2025-06-26 14:07:37.607 [DEBUG - main] (RangerRolesProvider.java:94) <== RangerRolesProvider(serviceName=kudu).RangerRolesProvider()
2025-06-26 14:07:37.607 [DEBUG - main] (PolicyRefresher.java:102) <== PolicyRefresher(serviceName=kudu).PolicyRefresher()
2025-06-26 14:07:37.607 [INFO - main] (RangerBasePlugin.java:183) Created PolicyRefresher Thread(PolicyRefresher(serviceName=kudu)-14)
2025-06-26 14:07:37.607 [DEBUG - main] (PolicyRefresher.java:489) ==> PolicyRefresher(serviceName=kudu).loadRoles()
2025-06-26 14:07:37.608 [DEBUG - main] (RangerRolesProvider.java:109) ==> RangerRolesProvider(serviceName= kudu serviceType= kudu).loadUserGroupRoles()
2025-06-26 14:07:37.609 [DEBUG - main] (RangerRolesProvider.java:118) In-Use memory: 58471424, Free memory:180800512
2025-06-26 14:07:37.609 [DEBUG - main] (RangerRolesProvider.java:171) ==> RangerRolesProvider(serviceName=kudu).loadUserGroupRolesFromAdmin()
2025-06-26 14:07:37.609 [DEBUG - main] (RangerAdminRESTClient.java:210) ==> RangerAdminRESTClient.getRolesIfUpdated(-1, 0)
2025-06-26 14:07:37.613 [DEBUG - main] (UserGroupInformation.java:245) Hadoop login
2025-06-26 14:07:37.614 [DEBUG - main] (UserGroupInformation.java:191) hadoop login commit
2025-06-26 14:07:37.630 [DEBUG - main] (UserGroupInformation.java:213) Using local user: UnixPrincipal: slave
2025-06-26 14:07:37.632 [DEBUG - main] (UserGroupInformation.java:217) Using user: "UnixPrincipal: slave" with name: slave
2025-06-26 14:07:37.633 [DEBUG - main] (UserGroupInformation.java:229) User entry: "slave"
2025-06-26 14:07:37.633 [DEBUG - main] (UserGroupInformation.java:801) UGI loginUser: slave (auth:SIMPLE)
2025-06-26 14:07:37.633 [DEBUG - main] (RangerAdminRESTClient.java:244) Checking Roles updated as user : slave (auth:SIMPLE)
2025-06-26 14:07:37.970 [DEBUG - main] (RangerAdminRESTClient.java:283) <== RangerAdminRESTClient.getRolesIfUpdated(-1, 0):
2025-06-26 14:07:37.970 [DEBUG - main] (RangerRolesProvider.java:277) ==> RangerRolesProvider(serviceName=kudu).saveToCache()
2025-06-26 14:07:37.978 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerRolesProvider.saveToCache(serviceName=kudu): 8
2025-06-26 14:07:37.979 [DEBUG - main] (RangerRolesProvider.java:330) <== RangerRolesProvider.saveToCache(serviceName=kudu)
2025-06-26 14:07:37.979 [INFO - main] (RangerRolesProvider.java:190) RangerRolesProvider(serviceName=kudu): found updated version. lastKnownRoleVersion=-1; newVersion=1
2025-06-26 14:07:37.979 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerRolesProvider.loadUserGroupRolesFromAdmin(serviceName=kudu): 370
2025-06-26 14:07:37.979 [DEBUG - main] (RangerRolesProvider.java:207) <== RangerRolesProvider(serviceName=kudu serviceType= kudu ).loadUserGroupRolesFromAdmin()
2025-06-26 14:07:37.979 [DEBUG - main] (RangerRolesProvider.java:135) In-Use memory: 14383560, Free memory:224953912
2025-06-26 14:07:37.980 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerRolesProvider.loadUserGroupRoles(serviceName=kudu): 371
2025-06-26 14:07:37.980 [DEBUG - main] (RangerRolesProvider.java:164) <== RangerRolesProvider(serviceName=kudu).loadUserGroupRoles()
2025-06-26 14:07:37.980 [DEBUG - main] (PolicyRefresher.java:496) <== PolicyRefresher(serviceName=kudu).loadRoles()
2025-06-26 14:07:37.980 [DEBUG - main] (PolicyRefresher.java:232) ==> PolicyRefresher(serviceName=kudu).loadPolicy()
2025-06-26 14:07:37.981 [DEBUG - main] (PolicyRefresher.java:241) In-Use memory: 14383560, Free memory:224953912
2025-06-26 14:07:37.981 [DEBUG - main] (PolicyRefresher.java:294) ==> PolicyRefresher(serviceName=kudu).loadPolicyfromPolicyAdmin()
2025-06-26 14:07:37.981 [DEBUG - main] (RangerAdminRESTClient.java:129) ==> RangerAdminRESTClient.getServicePoliciesIfUpdated(-1, 0)
2025-06-26 14:07:37.981 [DEBUG - main] (RangerAdminRESTClient.java:165) Checking Service policy if updated with old api call
2025-06-26 14:07:38.099 [DEBUG - main] (RangerAdminRESTClient.java:201) <== RangerAdminRESTClient.getServicePoliciesIfUpdated(-1, 0): serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null
2025-06-26 14:07:38.099 [INFO - main] (PolicyRefresher.java:319) PolicyRefresher(serviceName=kudu): found updated version. lastKnownVersion=-1; newVersion=2
2025-06-26 14:07:38.099 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] PolicyRefresher.loadPolicyFromPolicyAdmin(serviceName=kudu): 118
2025-06-26 14:07:38.100 [DEBUG - main] (PolicyRefresher.java:337) <== PolicyRefresher(serviceName=kudu).loadPolicyfromPolicyAdmin()
2025-06-26 14:07:38.100 [DEBUG - main] (PolicyRefresher.java:258) In-Use memory: 29706144, Free memory:209631328
2025-06-26 14:07:38.100 [DEBUG - main] (RangerBasePlugin.java:194) ==> setPolicies(serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null)
2025-06-26 14:07:38.101 [DEBUG - main] (RangerPolicyDeltaUtil.java:160) ==> hasPolicyDeltas(servicePolicies:[serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null]
2025-06-26 14:07:38.103 [DEBUG - main] (RangerPolicyDeltaUtil.java:193) <== hasPolicyDeltas(servicePolicies:[serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null], ret:[false]
2025-06-26 14:07:38.103 [DEBUG - main] (RangerBasePlugin.java:243) Creating engine from policies
2025-06-26 14:07:38.107 [DEBUG - main] (PolicyEngine.java:164) ==> PolicyEngine(, serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null, org.apache.ranger.plugin.policyengine.RangerPluginContext@42721fe)
2025-06-26 14:07:38.107 [DEBUG - main] (PolicyEngine.java:175) In-Use memory: 30991552, Free memory:208345920
2025-06-26 14:07:38.113 [DEBUG - main] (RangerPolicyRepository.java:299) RangerPolicyRepository : building policy-repository for service[kudu], and zone:[null] with auditMode[AUDIT_DEFAULT]
2025-06-26 14:07:38.114 [DEBUG - main] (RangerServiceDefHelper.java:139) ==> RangerServiceDefHelper(). The RangerServiceDef: RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }
2025-06-26 14:07:38.116 [DEBUG - main] (RangerServiceDefHelper.java:397) Created graph for resources: _nodes={database=[table], column=[], table=[column]}
2025-06-26 14:07:38.116 [DEBUG - main] (RangerServiceDefHelper.java:605) Returning sources: [database]
2025-06-26 14:07:38.116 [DEBUG - main] (RangerServiceDefHelper.java:625) Returning sinks: [column]
2025-06-26 14:07:38.116 [DEBUG - main] (RangerServiceDefHelper.java:605) Returning sources: [database]
2025-06-26 14:07:38.116 [DEBUG - main] (RangerServiceDefHelper.java:625) Returning sinks: [column]
2025-06-26 14:07:38.117 [DEBUG - main] (RangerServiceDefHelper.java:397) Created graph for resources: null
2025-06-26 14:07:38.117 [DEBUG - main] (RangerServiceDefHelper.java:397) Created graph for resources: null
2025-06-26 14:07:38.117 [DEBUG - main] (RangerServiceDefHelper.java:330) Found [3] resource hierarchies for service [kudu] update-date[Thu Jun 26 14:07:23 UTC 2025]: {0=[[RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }], [RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }], [RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }]], 1=[], 2=[]}
2025-06-26 14:07:38.118 [DEBUG - main] (RangerPolicyRepository.java:1077) ==> RangerPolicyRepository.buildPolicyEvaluator(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }},RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, PolicyEngineOptions: { evaluatorType: auto, evaluateDelegateAdminOnly: false, disableContextEnrichers: false, disableCustomConditions: false, disableTagPolicyEvaluation: false, enableTagEnricherWithLocalRefresher: false, disableTrieLookupPrefilter: false, optimizeTrieForRetrieval: false, cacheAuditResult: false })
2025-06-26 14:07:38.118 [DEBUG - main] (RangerPolicyRepository.java:1101) ==> RangerPolicyRepository.scrubPolicy(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }})
2025-06-26 14:07:38.119 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:38.119 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:38.119 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:38.119 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:38.119 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:38.119 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:38.120 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:38.120 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:38.120 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:38.120 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:38.120 [DEBUG - main] (RangerPolicyRepository.java:1135) ==> RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:38.120 [DEBUG - main] (RangerPolicyRepository.java:1144) <== RangerPolicyRepository.scrubPolicyItems(1):
2025-06-26 14:07:38.121 [DEBUG - main] (RangerPolicyRepository.java:1128) <== RangerPolicyRepository.scrubPolicy(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}): false
2025-06-26 14:07:38.124 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:71) ==> RangerOptimizedPolicyEvaluator.init()
2025-06-26 14:07:38.124 [DEBUG - main] (RangerDefaultPolicyEvaluator.java:107) ==> RangerDefaultPolicyEvaluator.init()
2025-06-26 14:07:38.124 [DEBUG - main] (RangerAbstractPolicyEvaluator.java:54) ==> RangerAbstractPolicyEvaluator.init(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}, RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} })
2025-06-26 14:07:38.125 [DEBUG - main] (RangerAbstractPolicyEvaluator.java:62) <== RangerAbstractPolicyEvaluator.init(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}, RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} })
2025-06-26 14:07:38.127 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:118) ==> RangerDefaultPolicyResourceMatcher.init()
2025-06-26 14:07:38.130 [DEBUG - main] (RangerServiceDefHelper.java:204) ==> getResourceHierarchies(policyType=0, keys=database,table)
2025-06-26 14:07:38.131 [DEBUG - main] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:38.131 [DEBUG - main] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): true
2025-06-26 14:07:38.131 [DEBUG - main] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:38.131 [DEBUG - main] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): true
2025-06-26 14:07:38.133 [DEBUG - main] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:38.133 [DEBUG - main] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): false
2025-06-26 14:07:38.133 [DEBUG - main] (RangerServiceDefHelper.java:216) <== getResourceHierarchies(policyType=0, keys=database,table) : [RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }],[RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }]
2025-06-26 14:07:38.133 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:635) ==> isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} })
2025-06-26 14:07:38.133 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:661) <== isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }) : true
2025-06-26 14:07:38.134 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:635) ==> isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} })
2025-06-26 14:07:38.134 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:661) <== isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }) : true
2025-06-26 14:07:38.134 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:759) ==> RangerDefaultPolicyResourceMatcher.createResourceMatcher(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} })
2025-06-26 14:07:38.137 [DEBUG - main] (RangerAbstractResourceMatcher.java:81) ==> RangerAbstractResourceMatcher.init()
2025-06-26 14:07:38.137 [DEBUG - main] (ResourceMatcher.java:69) ==> setDelimiters(value= db, startDelimiter={, endDelimiter=}, escapeChar=\, prefix=
2025-06-26 14:07:38.137 [DEBUG - main] (ResourceMatcher.java:78) <== setDelimiters(value= db, startDelimiter={, endDelimiter=}, escapeChar=\, prefix=
2025-06-26 14:07:38.138 [DEBUG - main] (RangerAbstractResourceMatcher.java:131) <== RangerAbstractResourceMatcher.init()
2025-06-26 14:07:38.138 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:792) <== RangerDefaultPolicyResourceMatcher.createResourceMatcher(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }): RangerDefaultResourceMatcher={RangerAbstractResourceMatcher={resourceDef={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} policyResource={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} optIgnoreCase={true} optWildCard={true} policyValues={db,} policyIsExcludes={false} isMatchAny={false} options={wildCard=true;ignoreCase=true;} }}
2025-06-26 14:07:38.138 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:759) ==> RangerDefaultPolicyResourceMatcher.createResourceMatcher(RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} })
2025-06-26 14:07:38.138 [DEBUG - main] (RangerAbstractResourceMatcher.java:81) ==> RangerAbstractResourceMatcher.init()
2025-06-26 14:07:38.138 [DEBUG - main] (ResourceMatcher.java:69) ==> setDelimiters(value= table, startDelimiter={, endDelimiter=}, escapeChar=\, prefix=
2025-06-26 14:07:38.138 [DEBUG - main] (ResourceMatcher.java:78) <== setDelimiters(value= table, startDelimiter={, endDelimiter=}, escapeChar=\, prefix=
2025-06-26 14:07:38.138 [DEBUG - main] (RangerAbstractResourceMatcher.java:131) <== RangerAbstractResourceMatcher.init()
2025-06-26 14:07:38.138 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:792) <== RangerDefaultPolicyResourceMatcher.createResourceMatcher(RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }): RangerDefaultResourceMatcher={RangerAbstractResourceMatcher={resourceDef={RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} policyResource={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} optIgnoreCase={true} optWildCard={true} policyValues={table,} policyIsExcludes={false} isMatchAny={false} options={wildCard=true;ignoreCase=true;} }}
2025-06-26 14:07:38.139 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:170) RangerDefaultPolicyResourceMatcher.init(): no matcher created for column. Continuing ...
2025-06-26 14:07:38.139 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerDefaultPolicyResourceMatcher.init(): 12
2025-06-26 14:07:38.139 [DEBUG - main] (RangerDefaultPolicyResourceMatcher.java:227) <== RangerDefaultPolicyResourceMatcher.init(): ret=true
2025-06-26 14:07:38.140 [DEBUG - main] (RangerDefaultPolicyItemEvaluator.java:61) ==> RangerDefaultPolicyItemEvaluator(policyId=1, policyItem=RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }, serviceType=kudu, conditionsDisabled=false)
2025-06-26 14:07:38.141 [DEBUG - main] (RangerDefaultPolicyItemEvaluator.java:73) <== RangerDefaultPolicyItemEvaluator(policyId=1, conditionsCount=0)
2025-06-26 14:07:38.142 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerPolicyEvaluator.init(policyId=1, policyName=db;table;): 18
2025-06-26 14:07:38.142 [DEBUG - main] (RangerDefaultPolicyEvaluator.java:187) <== RangerDefaultPolicyEvaluator.init()
2025-06-26 14:07:38.142 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:335) ==> RangerOptimizedPolicyEvaluator.checkIfHasAllPerms()
2025-06-26 14:07:38.142 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:352) ==> RangerOptimizedPolicyEvaluator.checkIfHasAllPerms(), false
2025-06-26 14:07:38.142 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:147) ==> RangerOptimizedPolicyEvaluator.computeEvalOrder()
2025-06-26 14:07:38.143 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:230) <== RangerOptimizedPolicyEvaluator.computeEvalOrder(), policyName:db;table;, priority:9971
2025-06-26 14:07:38.143 [DEBUG - main] (RangerOptimizedPolicyEvaluator.java:111) <== RangerOptimizedPolicyEvaluator.init()
2025-06-26 14:07:38.143 [DEBUG - main] (RangerPolicyRepository.java:1093) <== RangerPolicyRepository.buildPolicyEvaluator(RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }},RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }): RangerDefaultPolicyEvaluator={RangerAbstractPolicyEvaluator={policy={RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}} }resourceMatcher={RangerDefaultPolicyResourceMatcher={isInitialized=true, matchers={{RangerDefaultResourceMatcher={RangerAbstractResourceMatcher={resourceDef={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} policyResource={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} optIgnoreCase={true} optWildCard={true} policyValues={db,} policyIsExcludes={false} isMatchAny={false} options={wildCard=true;ignoreCase=true;} }}} {RangerDefaultResourceMatcher={RangerAbstractResourceMatcher={resourceDef={RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} policyResource={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} optIgnoreCase={true} optWildCard={true} policyValues={table,} policyIsExcludes={false} isMatchAny={false} options={wildCard=true;ignoreCase=true;} }}} } }} }
2025-06-26 14:07:38.143 [INFO - main] (RangerPolicyRepository.java:953) This policy engine contains 1 policy evaluators
2025-06-26 14:07:38.143 [DEBUG - main] (RangerPolicyRepository.java:968) policy evaluation order: 1 policies
2025-06-26 14:07:38.144 [DEBUG - main] (RangerPolicyRepository.java:974) policy evaluation order: #1 - policy id=1; name=db;table;; evalOrder=9971
2025-06-26 14:07:38.144 [DEBUG - main] (RangerPolicyRepository.java:977) dataMask policy evaluation order: 0 policies
2025-06-26 14:07:38.144 [DEBUG - main] (RangerPolicyRepository.java:985) rowFilter policy evaluation order: 0 policies
2025-06-26 14:07:38.145 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(database, evaluatorCount=1, isOptimizedForRetrieval=false)
2025-06-26 14:07:38.146 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(database, evaluatorCount=1, isMultiThreaded=false)
2025-06-26 14:07:38.147 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=database): 0
2025-06-26 14:07:38.147 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(database, evaluatorCount=1, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@6b00f608
2025-06-26 14:07:38.147 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=database): 2
2025-06-26 14:07:38.147 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=2; leafNodeCount=1; singleChildNodeCount=1; maxDepth=2; evaluatorListCount=1; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.147 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(database, evaluatorCount=1, isOptimizedForRetrieval=false): resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=2; leafNodeCount=1; singleChildNodeCount=1; maxDepth=2; evaluatorListCount=1; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.147 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(table, evaluatorCount=1, isOptimizedForRetrieval=false)
2025-06-26 14:07:38.147 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(table, evaluatorCount=1, isMultiThreaded=false)
2025-06-26 14:07:38.148 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=table): 1
2025-06-26 14:07:38.148 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(table, evaluatorCount=1, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@1d131e1b
2025-06-26 14:07:38.148 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=table): 1
2025-06-26 14:07:38.148 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=2; leafNodeCount=1; singleChildNodeCount=1; maxDepth=2; evaluatorListCount=1; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.148 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(table, evaluatorCount=1, isOptimizedForRetrieval=false): resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=2; leafNodeCount=1; singleChildNodeCount=1; maxDepth=2; evaluatorListCount=1; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.148 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(column, evaluatorCount=1, isOptimizedForRetrieval=false)
2025-06-26 14:07:38.148 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(column, evaluatorCount=1, isMultiThreaded=false)
2025-06-26 14:07:38.148 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=column): 0
2025-06-26 14:07:38.148 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(column, evaluatorCount=1, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@71cf1b07
2025-06-26 14:07:38.148 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=column): 0
2025-06-26 14:07:38.149 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=1; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.149 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(column, evaluatorCount=1, isOptimizedForRetrieval=false): resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=1; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.149 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(database, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:38.149 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(database, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:38.149 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=database): 0
2025-06-26 14:07:38.149 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(database, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@615091b8
2025-06-26 14:07:38.149 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=database): 0
2025-06-26 14:07:38.149 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.150 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(database, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.150 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(table, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:38.150 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(table, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:38.150 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=table): 0
2025-06-26 14:07:38.150 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(table, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@4fce136b
2025-06-26 14:07:38.150 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=table): 0
2025-06-26 14:07:38.150 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.150 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(table, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.151 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(column, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:38.151 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(column, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:38.151 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=column): 0
2025-06-26 14:07:38.151 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(column, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@4aa83f4f
2025-06-26 14:07:38.151 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=column): 0
2025-06-26 14:07:38.151 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.151 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(column, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.151 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(database, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:38.152 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(database, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:38.152 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=database): 0
2025-06-26 14:07:38.152 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(database, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@43b6123e
2025-06-26 14:07:38.152 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=database): 0
2025-06-26 14:07:38.152 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.152 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(database, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=database; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.152 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(table, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:38.152 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(table, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:38.153 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=table): 0
2025-06-26 14:07:38.153 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(table, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@260e86a1
2025-06-26 14:07:38.153 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=table): 1
2025-06-26 14:07:38.153 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.153 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(table, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=table; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.153 [DEBUG - main] (RangerResourceTrie.java:93) ==> RangerResourceTrie(column, evaluatorCount=0, isOptimizedForRetrieval=false)
2025-06-26 14:07:38.153 [DEBUG - main] (RangerResourceTrie.java:306) ==> buildTrie(column, evaluatorCount=0, isMultiThreaded=false)
2025-06-26 14:07:38.154 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(resourceDef=column): 0
2025-06-26 14:07:38.154 [DEBUG - main] (RangerResourceTrie.java:406) <== buildTrie(column, evaluatorCount=0, isMultiThreaded=false) :org.apache.ranger.plugin.policyengine.RangerResourceTrie$TrieNode@19648c40
2025-06-26 14:07:38.154 [DEBUG - main] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.init(name=column): 1
2025-06-26 14:07:38.154 [DEBUG - main] (RangerResourceTrie.java:148) resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.154 [DEBUG - main] (RangerResourceTrie.java:158) <== RangerResourceTrie(column, evaluatorCount=0, isOptimizedForRetrieval=false): resourceName=column; optIgnoreCase=true; optWildcard=true; wildcardChars=*?{}\; nodeCount=1; leafNodeCount=1; singleChildNodeCount=0; maxDepth=1; evaluatorListCount=0; wildcardEvaluatorListCount=0; evaluatorListRefCount=0; wildcardEvaluatorListRefCount=0
2025-06-26 14:07:38.154 [DEBUG - main] (PolicyEngine.java:204) PolicyEngine : No tag-policy-repository for service kudu
2025-06-26 14:07:38.154 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] RangerPolicyEngine.init(hashCode=40844aab): 47
2025-06-26 14:07:38.154 [DEBUG - main] (PolicyEngine.java:242) In-Use memory: 34823504, Free memory:204513968
2025-06-26 14:07:38.154 [DEBUG - main] (PolicyEngine.java:246) <== PolicyEngine()
2025-06-26 14:07:38.155 [DEBUG - main] (PolicyRefresher.java:403) ==> PolicyRefresher(serviceName=kudu).saveToCache()
2025-06-26 14:07:38.167 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] PolicyRefresher.saveToCache(serviceName=kudu): 11
2025-06-26 14:07:38.167 [DEBUG - main] (PolicyRefresher.java:457) <== PolicyRefresher(serviceName=kudu).saveToCache()
2025-06-26 14:07:38.168 [DEBUG - main] (RangerBasePlugin.java:312) <== setPolicies(serviceName=kudu, serviceId=1, policyVersion=2, policyUpdateTime=Thu Jun 26 14:07:34 UTC 2025, policies=[RangerPolicy={id={1} guid={41968f15-4b87-4f61-9abc-259512691136} isEnabled={true} createdBy={null} updatedBy={null} createTime={null} updateTime={null} version={1} service={kudu} name={db;table;} policyType={0} policyPriority={0} description={null} resourceSignature={null} isAuditEnabled={true} serviceType={kudu} resources={database={RangerPolicyResource={values={db } isExcludes={false} isRecursive={false} }} table={RangerPolicyResource={values={table } isExcludes={false} isRecursive={false} }} } policyLabels={} policyConditions={} policyItems={RangerPolicyItem={accessTypes={RangerPolicyItemAccess={type={metadata} isAllowed={true} }} users={user } groups={} roles={} conditions={} delegateAdmin={false} }} denyPolicyItems={} allowExceptions={} denyExceptions={} dataMaskPolicyItems={} rowFilterPolicyItems={} options={} validitySchedules={, zoneName=, isDenyAllElse={false} }}], tagPolicies=null, policyDeltas=null, serviceDef=RangerServiceDef={id={105} guid={05a093c7-022f-4655-bd2a-a7595bb15e81} isEnabled={true} createdBy={null} updatedBy={null} createTime={Thu Jun 26 14:07:23 UTC 2025} updateTime={Thu Jun 26 14:07:23 UTC 2025} version={1} name={kudu} displayName={kudu} implClass={org.apache.ranger.services.kudu.RangerServiceKudu} label={Kudu} description={Kudu} rbKeyLabel={null} rbKeyDescription={null} options={enableDenyAndExceptionsInPolicies=true } configs={} resources={RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }} accessTypes={RangerAccessTypeDef={itemId={1} name={select} label={SELECT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={2} name={insert} label={INSERT} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={3} name={update} label={UPDATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={4} name={delete} label={DELETE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={5} name={alter} label={ALTER} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={6} name={create} label={CREATE} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={7} name={drop} label={DROP} rbKeyLabel={null} impliedGrants={metadata } }RangerAccessTypeDef={itemId={8} name={metadata} label={METADATA} rbKeyLabel={null} impliedGrants={} }RangerAccessTypeDef={itemId={9} name={all} label={ALL} rbKeyLabel={null} impliedGrants={select insert update delete alter create drop metadata } }} policyConditions={} contextEnrichers={} enums={} dataMaskDef={RangerDataMaskDef={maskTypes={} accessTypes={} resources={} }} rowFilterDef={RangerRowFilterDef={accessTypes={} resources={} }} }, auditMode=audit-default, securityZones=null)
2025-06-26 14:07:38.168 [DEBUG - main] (RangerPerfTracer.java:101) [PERF] PolicyRefresher.loadPolicy(serviceName=kudu): 188
2025-06-26 14:07:38.168 [DEBUG - main] (PolicyRefresher.java:287) <== PolicyRefresher(serviceName=kudu).loadPolicy()
2025-06-26 14:07:38.169 [DEBUG - PolicyRefresher(serviceName=kudu)-14] (PolicyRefresher.java:200) ==> PolicyRefresher(serviceName=kudu).run()
2025-06-26 14:07:38.169 [DEBUG - main] (PolicyRefresher.java:154) Scheduled policyDownloadRefresher to download policies every 30000 milliseconds
2025-06-26 14:07:38.170 [INFO - main] (RangerKuduAuthorizer.java:91) Finished Ranger Kudu plugin initialization
2025-06-26 14:07:38.195 [DEBUG - pool-3-thread-1] (QueueUtil.java:56) Message: org.apache.kudu.subprocess.InboundRequest@498a9bda has been put on the queue
2025-06-26 14:07:38.195 [DEBUG - pool-4-thread-1] (QueueUtil.java:41) Message: org.apache.kudu.subprocess.InboundRequest@498a9bda has been taken from the queue
2025-06-26 14:07:38.286 [DEBUG - pool-4-thread-1] (Groups.java:344) GroupCacheLoader - load.
2025-06-26 14:07:38.289 [DEBUG - pool-4-thread-1] (UserGroupInformation.java:1796) Failed to get groups for user user
java.io.IOException: No groups found for user user
at org.apache.hadoop.security.Groups.noGroupsForUser(Groups.java:198) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.security.Groups.access$400(Groups.java:74) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.security.Groups$GroupCacheLoader.load(Groups.java:366) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.security.Groups$GroupCacheLoader.load(Groups.java:302) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache$LoadingValueReference.loadFuture(LocalCache.java:3570) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache$Segment.loadSync(LocalCache.java:2312) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache$Segment.lockedGetOrLoad(LocalCache.java:2189) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache$Segment.get(LocalCache.java:2079) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache.get(LocalCache.java:4011) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache.getOrLoad(LocalCache.java:4034) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.thirdparty.com.google.common.cache.LocalCache$LocalLoadingCache.get(LocalCache.java:5010) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.security.Groups.getGroupInternal(Groups.java:260) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.security.Groups.getGroups(Groups.java:216) ~[kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.hadoop.security.UserGroupInformation.getGroups(UserGroupInformation.java:1794) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.kudu.subprocess.ranger.authorization.RangerKuduAuthorizer.getUserGroups(RangerKuduAuthorizer.java:246) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.kudu.subprocess.ranger.authorization.RangerKuduAuthorizer.authorizeRequests(RangerKuduAuthorizer.java:178) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.kudu.subprocess.ranger.authorization.RangerKuduAuthorizer.authorize(RangerKuduAuthorizer.java:117) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.kudu.subprocess.ranger.RangerProtocolHandler.executeRequest(RangerProtocolHandler.java:50) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.kudu.subprocess.ranger.RangerProtocolHandler.executeRequest(RangerProtocolHandler.java:36) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.kudu.subprocess.ProtocolHandler.unpackAndExecuteRequest(ProtocolHandler.java:53) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.kudu.subprocess.MessageParser.parseAndExecuteRequest(MessageParser.java:106) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
at org.apache.kudu.subprocess.MessageParser.run(MessageParser.java:65) [kudu-subprocess.jar:1.18.0-SNAPSHOT]
at java.util.concurrent.CompletableFuture$AsyncRun.run(CompletableFuture.java:1640) [?:1.8.0_275]
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) [?:1.8.0_275]
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) [?:1.8.0_275]
at java.lang.Thread.run(Thread.java:748) [?:1.8.0_275]
2025-06-26 14:07:38.296 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:95) ==> RangerPolicyEngineImpl.evaluatePolicies(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={null} clusterType={null} context={} }, policyType=0)
2025-06-26 14:07:38.297 [INFO - pool-4-thread-1] (RangerPolicyEngineImpl.java:105) RangerPolicyEngineImpl.evaluatePolicies(bf39e75_0, RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={null} clusterType={null} context={} })
2025-06-26 14:07:38.297 [DEBUG - pool-4-thread-1] (RangerAccessRequestImpl.java:275) Old Remote/Client IP Address=null, new IP Address=null
2025-06-26 14:07:38.298 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:435) ==> RangerPolicyEngineImpl.zoneAwareAccessEvaluationWithNoAudit(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0)
2025-06-26 14:07:38.298 [DEBUG - pool-4-thread-1] (PolicyEngine.java:316) ==> PolicyEngine.getMatchedZonesForResourceAndChildren(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } })
2025-06-26 14:07:38.298 [DEBUG - pool-4-thread-1] (PolicyEngine.java:326) <== PolicyEngine.getMatchedZonesForResourceAndChildren(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }) : null
2025-06-26 14:07:38.298 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:444) zoneNames:[null]
2025-06-26 14:07:38.298 [DEBUG - pool-4-thread-1] (PolicyEngine.java:347) zoneName:[null]
2025-06-26 14:07:38.298 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:510) ==> RangerPolicyEngineImpl.evaluatePoliciesNoAudit(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0, zoneName=null)
2025-06-26 14:07:38.299 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:608) ==> RangerPolicyEngineImpl.evaluateTagPolicies(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0, zoneName=null, RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={false} isAudited={false} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={-1} policyVersion={null} evaluatedPoliciesCount={0} reason={null} additionalInfo={}})
2025-06-26 14:07:38.300 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:686) <== RangerPolicyEngineImpl.evaluateTagPolicies(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0, zoneName=null, RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={false} isAudited={false} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={-1} policyVersion={null} evaluatedPoliciesCount={0} reason={null} additionalInfo={}})
2025-06-26 14:07:38.300 [DEBUG - pool-4-thread-1] (RangerPolicyRepository.java:544) ==> RangerPolicyRepository.setAuditEnabledFromCache()
2025-06-26 14:07:38.300 [DEBUG - pool-4-thread-1] (RangerPolicyRepository.java:555) <== RangerPolicyRepository.setAuditEnabledFromCache():false
2025-06-26 14:07:38.300 [DEBUG - pool-4-thread-1] (RangerResourceTrie.java:504) ==> RangerResourceTrie.getEvaluatorsForResource(db)
2025-06-26 14:07:38.300 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.getEvaluatorsForResource(resource=db): 0
2025-06-26 14:07:38.301 [DEBUG - pool-4-thread-1] (RangerResourceTrie.java:549) <== RangerResourceTrie.getEvaluatorsForResource(db): evaluatorCount=1
2025-06-26 14:07:38.301 [DEBUG - pool-4-thread-1] (RangerResourceTrie.java:504) ==> RangerResourceTrie.getEvaluatorsForResource(table)
2025-06-26 14:07:38.301 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:106) [PERF] RangerResourceTrie.getEvaluatorsForResource(resource=table): 0
2025-06-26 14:07:38.301 [DEBUG - pool-4-thread-1] (RangerResourceTrie.java:549) <== RangerResourceTrie.getEvaluatorsForResource(table): evaluatorCount=1
2025-06-26 14:07:38.301 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:106) [PERF] RangerPolicyRepository.getLikelyMatchEvaluators(resource=db/table): 1
2025-06-26 14:07:38.301 [DEBUG - pool-4-thread-1] (RangerPolicyRepository.java:774) <== RangerPolicyRepository.getLikelyMatchPolicyEvaluators(db/table): evaluatorCount=1
2025-06-26 14:07:38.302 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:194) ==> RangerDefaultPolicyEvaluator.isApplicable(Thu Jun 26 14:07:38 UTC 2025)
2025-06-26 14:07:38.302 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:211) <== RangerDefaultPolicyEvaluator.isApplicable(Thu Jun 26 14:07:38 UTC 2025) : true
2025-06-26 14:07:38.302 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:220) ==> RangerDefaultPolicyEvaluator.evaluate(policyId=1, RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={false} isAudited={false} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={-1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}})
2025-06-26 14:07:38.302 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:550) ==> RangerDefaultPolicyResourceMatcher.getMatchType(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }{token:USER=user})
2025-06-26 14:07:38.303 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:692) ==> RangerDefaultPolicyResourceMatcher.getMatchingHierarchy(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } })
2025-06-26 14:07:38.303 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:204) ==> getResourceHierarchies(policyType=0, keys=database,table)
2025-06-26 14:07:38.303 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:38.303 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): true
2025-06-26 14:07:38.304 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:38.304 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): true
2025-06-26 14:07:38.304 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:223) ==> hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table)
2025-06-26 14:07:38.304 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:243) <== hierarchyHasAllResources(hierarchy=RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, resourceNames=database,table): false
2025-06-26 14:07:38.304 [DEBUG - pool-4-thread-1] (RangerServiceDefHelper.java:216) <== getResourceHierarchies(policyType=0, keys=database,table) : [RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }],[RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={3} name={column} type={string} level={30} parent={table} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Column} description={Column} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }]
2025-06-26 14:07:38.305 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:635) ==> isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} })
2025-06-26 14:07:38.305 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:661) <== isHierarchyValidForResources(RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} },RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }) : true
2025-06-26 14:07:38.305 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:720) <== RangerDefaultPolicyResourceMatcher.getMatchingHierarchy(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }): [RangerResourceDef={itemId={1} name={database} type={string} level={10} parent={null} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Database} description={Database} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }, RangerResourceDef={itemId={2} name={table} type={string} level={20} parent={database} mandatory={true} lookupSupported={true} recursiveSupported={false} excludesSupported={true} matcher={org.apache.ranger.plugin.resourcematcher.RangerDefaultResourceMatcher} matcherOptions={{wildCard=true, ignoreCase=true}} validationRegEx={} validationMessage={} uiHint={} label={Table} description={Table} rbKeyLabel={null} rbKeyDescription={null} rbKeyValidationMessage={null} accessTypeRestrictions={[]} isValidLeaf={true} }]
2025-06-26 14:07:38.305 [DEBUG - pool-4-thread-1] (RangerDefaultResourceMatcher.java:36) ==> RangerDefaultResourceMatcher.isMatch(db, {token:USER=user})
2025-06-26 14:07:38.305 [DEBUG - pool-4-thread-1] (RangerAbstractResourceMatcher.java:286) isAllValuesRequested(db): false
2025-06-26 14:07:38.306 [DEBUG - pool-4-thread-1] (RangerDefaultResourceMatcher.java:85) <== RangerDefaultResourceMatcher.isMatch(db, {token:USER=user}): true
2025-06-26 14:07:38.306 [DEBUG - pool-4-thread-1] (RangerDefaultResourceMatcher.java:36) ==> RangerDefaultResourceMatcher.isMatch(table, {token:USER=user})
2025-06-26 14:07:38.306 [DEBUG - pool-4-thread-1] (RangerAbstractResourceMatcher.java:286) isAllValuesRequested(table): false
2025-06-26 14:07:38.306 [DEBUG - pool-4-thread-1] (RangerDefaultResourceMatcher.java:85) <== RangerDefaultResourceMatcher.isMatch(table, {token:USER=user}): true
2025-06-26 14:07:38.306 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:101) [PERF] RangerDefaultPolicyResourceMatcher.getMatchType(): 3
2025-06-26 14:07:38.306 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyResourceMatcher.java:627) <== RangerDefaultPolicyResourceMatcher.getMatchType(RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }{token:USER=user}): SELF
2025-06-26 14:07:38.306 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:1264) ==> RangerDefaultPolicyEvaluator.matchPolicyCustomConditions(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } })
2025-06-26 14:07:38.307 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:1304) <== RangerDefaultPolicyEvaluator.matchCustomConditions(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }): true
2025-06-26 14:07:38.307 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:101) [PERF] RangerPolicyEvaluator.evaluate(requestHashCode=bf39e75,policyId=1, policyName=db;table;): 5
2025-06-26 14:07:38.307 [DEBUG - pool-4-thread-1] (RangerDefaultPolicyEvaluator.java:276) <== RangerDefaultPolicyEvaluator.evaluate(policyId=1, RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}})
2025-06-26 14:07:38.307 [DEBUG - pool-4-thread-1] (RangerPolicyRepository.java:563) ==> RangerPolicyRepository.storeAuditEnabledInCache()
2025-06-26 14:07:38.307 [DEBUG - pool-4-thread-1] (RangerPolicyRepository.java:571) <== RangerPolicyRepository.storeAuditEnabledInCache()
2025-06-26 14:07:38.307 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:600) <== RangerPolicyEngineImpl.evaluatePoliciesNoAudit(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0, zoneName=null): RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}}
2025-06-26 14:07:38.308 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:502) <== RangerPolicyEngineImpl.zoneAwareAccessEvaluationWithNoAudit(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType =0): RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}}
2025-06-26 14:07:38.308 [DEBUG - pool-4-thread-1] (RangerPerfTracer.java:101) [PERF] RangerPolicyEngine.evaluatePolicies(requestHashCode=bf39e75_0): 12
2025-06-26 14:07:38.308 [DEBUG - pool-4-thread-1] (RangerPolicyEngineImpl.java:129) <== RangerPolicyEngineImpl.evaluatePolicies(RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }, policyType=0): RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}}
2025-06-26 14:07:38.308 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:72) ==> RangerDefaultAuditHandler.processResult(RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}})
2025-06-26 14:07:38.308 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:104) ==> RangerDefaultAuditHandler.getAuthzEvents(RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={null} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}})
2025-06-26 14:07:38.309 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:294) generateNextAuditEventId(): 68e7f035-3a2b-4c82-ad70-34608f829b58-0
2025-06-26 14:07:38.309 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:150) <== RangerDefaultAuditHandler.getAuthzEvents(RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={68e7f035-3a2b-4c82-ad70-34608f829b58-0} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}}): AuthzAuditEvent{repositoryType=105;repositoryName=kudu;user=user;eventTime=Thu Jun 26 14:07:38 UTC 2025;accessType=all;resourcePath=db/table;resourceType=table;action=all;accessResult=0;agentId=kudu;policyId=-1;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dist-test-slave-5xmx;logType=RangerAudit;eventId=68e7f035-3a2b-4c82-ad70-34608f829b58-0;seq_num=0;event_count=1;event_dur_ms=0;tags=[];clusterName=Cluster 1;zoneName=null;policyVersion=null;additionalInfo=null}
2025-06-26 14:07:38.309 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:189) ==> RangerDefaultAuditHandler.logAuthzAudit(AuthzAuditEvent{repositoryType=105;repositoryName=kudu;user=user;eventTime=Thu Jun 26 14:07:38 UTC 2025;accessType=all;resourcePath=db/table;resourceType=table;action=all;accessResult=0;agentId=kudu;policyId=-1;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dist-test-slave-5xmx;logType=RangerAudit;eventId=68e7f035-3a2b-4c82-ad70-34608f829b58-0;seq_num=0;event_count=1;event_dur_ms=0;tags=[];clusterName=Cluster 1;zoneName=null;policyVersion=null;additionalInfo=null})
2025-06-26 14:07:38.310 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:202) <== RangerDefaultAuditHandler.logAuthzAudit(AuthzAuditEvent{repositoryType=105;repositoryName=kudu;user=user;eventTime=Thu Jun 26 14:07:38 UTC 2025;accessType=all;resourcePath=db/table;resourceType=table;action=all;accessResult=0;agentId=kudu;policyId=-1;resultReason=null;aclEnforcer=ranger-acl;sessionId=null;clientType=null;clientIP=null;requestData=null;agentHostname=dist-test-slave-5xmx;logType=RangerAudit;eventId=68e7f035-3a2b-4c82-ad70-34608f829b58-0;seq_num=1;event_count=1;event_dur_ms=0;tags=[];clusterName=Cluster 1;zoneName=null;policyVersion=null;additionalInfo=null})
2025-06-26 14:07:38.310 [DEBUG - pool-4-thread-1] (RangerDefaultAuditHandler.java:80) <== RangerDefaultAuditHandler.processResult(RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={68e7f035-3a2b-4c82-ad70-34608f829b58-0} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}})
2025-06-26 14:07:38.310 [DEBUG - pool-4-thread-1] (RangerKuduAuthorizer.java:192) RangerAccessRequest [RangerAccessRequestImpl={resource={RangerResourceImpl={ownerUser={null} elements={database=db; table=table; } }} accessType={all} user={user} userGroups={} userRoles={} accessTime={null} clientIPAddress={null} forwardedAddresses={} remoteIPAddress={null} clientType={null} action={all} requestData={null} sessionId={null} resourceMatchingScope={SELF} clusterName={Cluster 1} clusterType={} context={token:USER={user} } }] receives result [RangerAccessResult={isAccessDetermined={false} isAllowed={false} isAuditedDetermined={true} isAudited={true} auditLogId={68e7f035-3a2b-4c82-ad70-34608f829b58-0} policyType={0} policyId={-1} zoneName={null} auditPolicyId={1} policyVersion={null} evaluatedPoliciesCount={1} reason={null} additionalInfo={}}]
2025-06-26 14:07:38.316 [DEBUG - pool-4-thread-1] (QueueUtil.java:56) Message: org.apache.kudu.subprocess.OutboundResponse@29402c9c has been put on the queue
2025-06-26 14:07:38.316 [DEBUG - pool-5-thread-1] (QueueUtil.java:41) Message: org.apache.kudu.subprocess.OutboundResponse@29402c9c has been taken from the queue
I20250626 14:07:38.326120 25141 server.cc:273] Received an EOF from the subprocess
W20250626 14:07:38.326328 25128 server.cc:408] The subprocess has exited with status 9
I20250626 14:07:38.330200 25142 server.cc:440] outbound queue shut down: Aborted:
I20250626 14:07:38.330209 25140 server.cc:366] get failed, inbound queue shut down: Aborted:
I20250626 14:07:38.330233 25138 server.cc:366] get failed, inbound queue shut down: Aborted:
I20250626 14:07:38.330225 25139 server.cc:366] get failed, inbound queue shut down: Aborted:
W20250626 14:07:38.330585 23932 subprocess_protocol.cc:66] error closing read fd: Bad file descriptor
I20250626 14:07:38.330914 23932 ranger_client.cc:318] Using overwritten properties file: /tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/log_conf/kudu-ranger-subprocess-log4j2.properties
2025-06-26 14:07:38.922 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-audit.xml): couldn't find resource file location
2025-06-26 14:07:38.927 [INFO - main] (RangerConfiguration.java:50) addResourceIfReadable(ranger-kudu-security.xml): resource file is file:/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/ranger-kudu-security.xml
2025-06-26 14:07:38.967 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-policymgr-ssl.xml): couldn't find resource file location
2025-06-26 14:07:38.999 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-kudu-audit.xml): couldn't find resource file location
2025-06-26 14:07:39.000 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-kudu-security.xml): couldn't find resource file location
2025-06-26 14:07:39.000 [ERROR - main] (RangerConfiguration.java:63) addResourceIfReadable(ranger-kudu-kudu-policymgr-ssl.xml): couldn't find resource file location
2025-06-26 14:07:39.002 [INFO - main] (RangerPluginConfig.java:116) PolicyEngineOptions: { evaluatorType: auto, evaluateDelegateAdminOnly: false, disableContextEnrichers: false, disableCustomConditions: false, disableTagPolicyEvaluation: false, enableTagEnricherWithLocalRefresher: false, disableTrieLookupPrefilter: false, optimizeTrieForRetrieval: false, cacheAuditResult: false }
2025-06-26 14:07:39.169 [INFO - main] (AuditProviderFactory.java:76) AuditProviderFactory: creating..
2025-06-26 14:07:39.171 [INFO - main] (AuditProviderFactory.java:114) AuditProviderFactory: initializing..
2025-06-26 14:07:39.171 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.cache.dir=/tmp/dist-test-taskuJePZZ/test-tmp/ranger_client-test.0.RangerClientTestBase.TestLogging.1750946659125028-23932-0/policy-cache
2025-06-26 14:07:39.171 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.source.impl=org.apache.ranger.admin.client.RangerAdminRESTClient
2025-06-26 14:07:39.171 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.rest.url=http://127.0.0.1:35455
2025-06-26 14:07:39.172 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.policy.pollIntervalMs=30000
2025-06-26 14:07:39.172 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.service.name=kudu
2025-06-26 14:07:39.172 [INFO - main] (AuditProviderFactory.java:148) AUDIT PROPERTY: ranger.plugin.kudu.access.cluster.name=Cluster 1
2025-06-26 14:07:39.172 [INFO - main] (AuditProviderFactory.java:279) No v3 audit configuration found. Trying v2 audit configurations
2025-06-26 14:07:39.173 [INFO - Ranger async Audit cleanup] (AuditProviderFactory.java:497) RangerAsyncAuditCleanup: Waiting to audit cleanup start signal
2025-06-26 14:07:39.201 [INFO - main] (RangerBasePlugin.java:183) Created PolicyRefresher Thread(PolicyRefresher(serviceName=kudu)-14)
2025-06-26 14:07:39.532 [INFO - main] (RangerRolesProvider.java:190) RangerRolesProvider(serviceName=kudu): found updated version. lastKnownRoleVersion=-1; newVersion=1
2025-06-26 14:07:39.702 [INFO - main] (PolicyRefresher.java:319) PolicyRefresher(serviceName=kudu): found updated version. lastKnownVersion=-1; newVersion=2
2025-06-26 14:07:39.727 [INFO - main] (RangerPolicyRepository.java:953) This policy engine contains 1 policy evaluators
2025-06-26 14:07:39.745 [INFO - main] (RangerKuduAuthorizer.java:91) Finished Ranger Kudu plugin initialization
I20250626 14:07:39.887693 25172 server.cc:273] Received an EOF from the subprocess
W20250626 14:07:39.887918 25159 server.cc:408] The subprocess has exited with status 9
I20250626 14:07:39.892128 25170 server.cc:366] get failed, inbound queue shut down: Aborted:
I20250626 14:07:39.892141 25173 server.cc:440] outbound queue shut down: Aborted:
I20250626 14:07:39.892149 25169 server.cc:366] get failed, inbound queue shut down: Aborted:
I20250626 14:07:39.892149 25171 server.cc:366] get failed, inbound queue shut down: Aborted:
W20250626 14:07:39.892570 23932 subprocess_protocol.cc:66] error closing read fd: Bad file descriptor
I20250626 14:07:39.892629 23932 mini_ranger.cc:66] Stopping Ranger...
I20250626 14:07:40.225692 23932 mini_ranger.cc:68] Stopped Ranger
2025-06-26 14:07:40.225 UTC [24757] LOG: received smart shutdown request
2025-06-26 14:07:40.228 UTC [24757] LOG: background worker "logical replication launcher" (PID 24765) exited with exit code 1
2025-06-26 14:07:40.229 UTC [24760] LOG: shutting down
2025-06-26 14:07:40.230 UTC [24760] LOG: checkpoint starting: shutdown immediate
2025-06-26 14:07:40.911 UTC [24760] LOG: checkpoint complete: wrote 1501 buffers (9.2%); 0 WAL file(s) added, 0 removed, 0 recycled; write=0.020 s, sync=0.658 s, total=0.682 s; sync files=799, longest=0.007 s, average=0.001 s; distance=7940 kB, estimate=7940 kB; lsn=0/1C3BA90, redo lsn=0/1C3BA90
2025-06-26 14:07:40.916 UTC [24757] LOG: database system is shut down
[ OK ] RangerClientTestBase.TestLogging (37967 ms)
[----------] 1 test from RangerClientTestBase (37967 ms total)
[----------] Global test environment tear-down
[==========] 22 tests from 3 test suites ran. (201847 ms total)
[ PASSED ] 21 tests.
[ FAILED ] 1 test, listed below:
[ FAILED ] RangerClientTestExtraJVMArgs.SmokeTest
1 FAILED TEST