You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@ranger.apache.org by Yao Zhou <zh...@gmail.com> on 2020/08/25 01:25:43 UTC
Review Request 72800: [RANGER-2967] Add support for Amazon CloudWatch
Logs as an Audit Store
-----------------------------------------------------------
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/72800/
-----------------------------------------------------------
Review request for ranger.
Bugs: RANGER-2967
https://issues.apache.org/jira/browse/RANGER-2967
Repository: ranger
Description
-------
This change is to add CloudWatch Logs to the list of Ranger supported audit stores. With this change, Ranger users will be allowed to configure their plugins to send audit events to Amazon CloudWatch Logs. Further, customers can query the events using Amazon CloudWatch Insights.
This functionality is built with a newly introduced audit destination 'AmazonCloudWatchAuditDestination'. Ranger users can enable it in the way similar to other types of audit destinations like Solr.
Diffs
-----
agents-audit/pom.xml 461081c3a
agents-audit/src/main/java/org/apache/ranger/audit/destination/AmazonCloudWatchAuditDestination.java PRE-CREATION
agents-audit/src/main/java/org/apache/ranger/audit/provider/AuditProviderFactory.java 1be9c2f86
hbase-agent/conf/ranger-hbase-audit-changes.cfg 799e55200
hbase-agent/scripts/install.properties 2ce88224a
hdfs-agent/conf/ranger-hdfs-audit-changes.cfg 4c9f66262
hdfs-agent/scripts/install.properties 4c5e0fb50
hive-agent/conf/ranger-hive-audit-changes.cfg cb023f8cf
hive-agent/scripts/install.properties b88d64245
kms/scripts/install.properties e33192bfe
knox-agent/conf/ranger-knox-audit-changes.cfg da23ebc1b
knox-agent/scripts/install.properties 939fd881b
plugin-atlas/conf/ranger-atlas-audit-changes.cfg 39d1d109a
plugin-atlas/scripts/install.properties 94a802343
plugin-elasticsearch/conf/ranger-elasticsearch-audit-changes.cfg c3219d785
plugin-elasticsearch/scripts/install.properties 7e752c336
plugin-kafka/conf/ranger-kafka-audit-changes.cfg 35ec308b9
plugin-kafka/scripts/install.properties facbc790f
plugin-kms/conf/ranger-kms-audit-changes.cfg 939e8393c
plugin-kylin/conf/ranger-kylin-audit-changes.cfg c3219d785
plugin-kylin/scripts/install.properties b08f0edec
plugin-ozone/conf/ranger-ozone-audit-changes.cfg 94445932a
plugin-ozone/scripts/install.properties a160ec155
plugin-presto/conf/ranger-presto-audit-changes.cfg 35ec308b9
plugin-presto/scripts/install.properties 956533571
plugin-solr/conf/ranger-solr-audit-changes.cfg 1e316671c
plugin-solr/scripts/install.properties 88e805653
plugin-sqoop/conf/ranger-sqoop-audit-changes.cfg c3219d785
plugin-sqoop/scripts/install.properties b7b1187ff
plugin-yarn/conf/ranger-yarn-audit-changes.cfg c3219d785
plugin-yarn/scripts/install.properties 71bab4996
security-admin/src/test/java/org/apache/ranger/audit/destination/AmazonCloudWatchAuditDestinationTest.java PRE-CREATION
storm-agent/conf/ranger-storm-audit-changes.cfg c3219d785
storm-agent/scripts/install.properties 109300f33
Diff: https://reviews.apache.org/r/72800/diff/1/
Testing
-------
mvn -pl agents-audit clean install compile package
Testing with Hive
Audit events were sent to Amazon CloudWatch Logs successfully
Thanks,
Yao Zhou
Re: Review Request 72800: [RANGER-2967] Add support for Amazon CloudWatch Logs as an Audit Store
Posted by Pradeep Agrawal <pr...@gmail.com>.
-----------------------------------------------------------
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/72800/#review223815
-----------------------------------------------------------
Ship it!
Ship It!
- Pradeep Agrawal
On Dec. 8, 2021, 12:58 a.m., Yao Zhou wrote:
>
> -----------------------------------------------------------
> This is an automatically generated e-mail. To reply, visit:
> https://reviews.apache.org/r/72800/
> -----------------------------------------------------------
>
> (Updated Dec. 8, 2021, 12:58 a.m.)
>
>
> Review request for ranger.
>
>
> Bugs: RANGER-2967
> https://issues.apache.org/jira/browse/RANGER-2967
>
>
> Repository: ranger
>
>
> Description
> -------
>
> This change is to add CloudWatch Logs to the list of Ranger supported audit stores. With this change, Ranger users will be allowed to configure their plugins to send audit events to Amazon CloudWatch Logs. Further, customers can query the events using Amazon CloudWatch Insights.
>
> This functionality is built with a newly introduced audit destination 'AmazonCloudWatchAuditDestination'. Ranger users can enable it in the way similar to other types of audit destinations like Solr.
>
>
> Diffs
> -----
>
> agents-audit/pom.xml 5607242af
> agents-audit/src/main/java/org/apache/ranger/audit/destination/AmazonCloudWatchAuditDestination.java PRE-CREATION
> agents-audit/src/main/java/org/apache/ranger/audit/provider/AuditProviderFactory.java 7a3c7f61d
> hbase-agent/conf/ranger-hbase-audit-changes.cfg 26bd2fab9
> hbase-agent/scripts/install.properties 2ce88224a
> hdfs-agent/conf/ranger-hdfs-audit-changes.cfg 9e099e6d0
> hdfs-agent/scripts/install.properties 4c5e0fb50
> hive-agent/conf/ranger-hive-audit-changes.cfg c396d5d55
> hive-agent/scripts/install.properties b88d64245
> kms/scripts/install.properties 493553653
> knox-agent/conf/ranger-knox-audit-changes.cfg c396d5d55
> knox-agent/scripts/install.properties 939fd881b
> plugin-atlas/conf/ranger-atlas-audit-changes.cfg 39d1d109a
> plugin-atlas/scripts/install.properties 94a802343
> plugin-elasticsearch/conf/ranger-elasticsearch-audit-changes.cfg c396d5d55
> plugin-elasticsearch/scripts/install.properties 7e752c336
> plugin-kafka/conf/ranger-kafka-audit-changes.cfg dfd27f37c
> plugin-kafka/scripts/install.properties facbc790f
> plugin-kms/conf/ranger-kms-audit-changes.cfg 8d5ca3433
> plugin-kylin/conf/ranger-kylin-audit-changes.cfg c396d5d55
> plugin-kylin/scripts/install.properties b08f0edec
> plugin-ozone/conf/ranger-ozone-audit-changes.cfg 8cd5e39c8
> plugin-ozone/scripts/install.properties a160ec155
> plugin-presto/conf/ranger-presto-audit-changes.cfg dfd27f37c
> plugin-presto/scripts/install.properties 956533571
> plugin-solr/conf/ranger-solr-audit-changes.cfg d4588ffc1
> plugin-solr/scripts/install.properties 88e805653
> plugin-sqoop/conf/ranger-sqoop-audit-changes.cfg c396d5d55
> plugin-sqoop/scripts/install.properties b7b1187ff
> plugin-yarn/conf/ranger-yarn-audit-changes.cfg c396d5d55
> plugin-yarn/scripts/install.properties 71bab4996
> security-admin/src/test/java/org/apache/ranger/audit/destination/AmazonCloudWatchAuditDestinationTest.java PRE-CREATION
> storm-agent/conf/ranger-storm-audit-changes.cfg c396d5d55
> storm-agent/scripts/install.properties 109300f33
>
>
> Diff: https://reviews.apache.org/r/72800/diff/2/
>
>
> Testing
> -------
>
> mvn -pl agents-audit clean install compile package
>
> Testing with Hive
>
> Audit events were sent to Amazon CloudWatch Logs successfully
>
>
> Thanks,
>
> Yao Zhou
>
>
Re: Review Request 72800: [RANGER-2967] Add support for Amazon CloudWatch Logs as an Audit Store
Posted by Yao Zhou <zh...@gmail.com>.
-----------------------------------------------------------
This is an automatically generated e-mail. To reply, visit:
https://reviews.apache.org/r/72800/
-----------------------------------------------------------
(Updated Dec. 8, 2021, 12:58 a.m.)
Review request for ranger.
Changes
-------
resolved merge conflict
Bugs: RANGER-2967
https://issues.apache.org/jira/browse/RANGER-2967
Repository: ranger
Description
-------
This change is to add CloudWatch Logs to the list of Ranger supported audit stores. With this change, Ranger users will be allowed to configure their plugins to send audit events to Amazon CloudWatch Logs. Further, customers can query the events using Amazon CloudWatch Insights.
This functionality is built with a newly introduced audit destination 'AmazonCloudWatchAuditDestination'. Ranger users can enable it in the way similar to other types of audit destinations like Solr.
Diffs (updated)
-----
agents-audit/pom.xml 5607242af
agents-audit/src/main/java/org/apache/ranger/audit/destination/AmazonCloudWatchAuditDestination.java PRE-CREATION
agents-audit/src/main/java/org/apache/ranger/audit/provider/AuditProviderFactory.java 7a3c7f61d
hbase-agent/conf/ranger-hbase-audit-changes.cfg 26bd2fab9
hbase-agent/scripts/install.properties 2ce88224a
hdfs-agent/conf/ranger-hdfs-audit-changes.cfg 9e099e6d0
hdfs-agent/scripts/install.properties 4c5e0fb50
hive-agent/conf/ranger-hive-audit-changes.cfg c396d5d55
hive-agent/scripts/install.properties b88d64245
kms/scripts/install.properties 493553653
knox-agent/conf/ranger-knox-audit-changes.cfg c396d5d55
knox-agent/scripts/install.properties 939fd881b
plugin-atlas/conf/ranger-atlas-audit-changes.cfg 39d1d109a
plugin-atlas/scripts/install.properties 94a802343
plugin-elasticsearch/conf/ranger-elasticsearch-audit-changes.cfg c396d5d55
plugin-elasticsearch/scripts/install.properties 7e752c336
plugin-kafka/conf/ranger-kafka-audit-changes.cfg dfd27f37c
plugin-kafka/scripts/install.properties facbc790f
plugin-kms/conf/ranger-kms-audit-changes.cfg 8d5ca3433
plugin-kylin/conf/ranger-kylin-audit-changes.cfg c396d5d55
plugin-kylin/scripts/install.properties b08f0edec
plugin-ozone/conf/ranger-ozone-audit-changes.cfg 8cd5e39c8
plugin-ozone/scripts/install.properties a160ec155
plugin-presto/conf/ranger-presto-audit-changes.cfg dfd27f37c
plugin-presto/scripts/install.properties 956533571
plugin-solr/conf/ranger-solr-audit-changes.cfg d4588ffc1
plugin-solr/scripts/install.properties 88e805653
plugin-sqoop/conf/ranger-sqoop-audit-changes.cfg c396d5d55
plugin-sqoop/scripts/install.properties b7b1187ff
plugin-yarn/conf/ranger-yarn-audit-changes.cfg c396d5d55
plugin-yarn/scripts/install.properties 71bab4996
security-admin/src/test/java/org/apache/ranger/audit/destination/AmazonCloudWatchAuditDestinationTest.java PRE-CREATION
storm-agent/conf/ranger-storm-audit-changes.cfg c396d5d55
storm-agent/scripts/install.properties 109300f33
Diff: https://reviews.apache.org/r/72800/diff/2/
Changes: https://reviews.apache.org/r/72800/diff/1-2/
Testing
-------
mvn -pl agents-audit clean install compile package
Testing with Hive
Audit events were sent to Amazon CloudWatch Logs successfully
Thanks,
Yao Zhou