You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@druid.apache.org by GitBox <gi...@apache.org> on 2020/03/03 18:28:47 UTC

[GitHub] [druid] ceastman-ibm opened a new issue #9453: Enabling basic security with an external metadata database causes usermap error

ceastman-ibm opened a new issue #9453: Enabling basic security with an external metadata database causes usermap error
URL: https://github.com/apache/druid/issues/9453
 
 
   Please provide a detailed title (e.g. "Broker crashes when using TopN query with Bound filter" instead of just "Broker crashes").
   
   ### Affected Version
   
   0.17.0
   
   ### Description
   
   Using postgresql as an external metadata database.
   configuration added to common.runtime.properties:
   druid.auth.authenticatorChain=["MyBasicPostgreSQLAuthenticator"]
   druid.auth.authenticator.MyBasicPostgreSQLAuthenticator.type=basic
   druid.auth.authenticator.MyBasicPostgreSQLAuthenticator.credentialsValidator.type=metadata
   druid.auth.authenticator.MyBasicPostgreSQLAuthenticator.skipOnFailure=false
   druid.auth.authenticator.MyBasicPostgreSQLAuthenticator.authorizerName=MyBasicPostgreSQLAuthorizer
   druid.escalator.type=basic
   druid.escalator.authorizerName=MyBasicPostgreSQLAuthorizer
   druid.auth.authorizers=["MyBasicPostgreSQLAuthorizer"]
   druid.auth.authorizer.MyBasicPostgreSQLAuthorizer.type=basic
   druid.metadata.postgres.ssl.sslMode=require
   druid.escalator.internalClientUsername=<<redacted>>
   druid.escalator.internalClientPassword=<<redacted>>
   druid.auth.authenticator.MyBasicPostgreSQLAuthenticator.initialAdminPassword=<<redacted>>
   druid.auth.authenticator.MyBasicPostgreSQLAuthenticator.initialInternalClientPassword=<<redacted>>
    
   druid.metadata.storage.connector.user=redacted
   druid.metadata.storage.connector.password=redacted
   druid.metadata.storage.type=postgresql
   druid.metadata.storage.connector.connectURI=jdbc:postgresql://redacted.databases.appdomain.cloud:31039/druid?sslmode=verify-full
   druid.metadata.storage.connector.user=redacted
   druid.metadata.storage.connector.password=redacted
   druid.metadata.postgres.ssl.sslMode=require
   Please include as much detailed information about the problem as possible.
   - Cluster size
   - Configurations in use
   - Steps to reproduce the problem
   - The error message or stack traces encountered. Providing more context, such as nearby log messages or even entire logs, can be helpful.
   - Any debugging that you have already done
   
   logs from the historical/middle manager kubernetes pod:
   2020-03-03T18:25:07,145 WARN [main] org.apache.druid.java.util.common.RetryUtils - Retrying (6 of 9) in 43,455ms.
   com.fasterxml.jackson.core.JsonParseException: Input does not start with Smile format header (first byte = 0x3c) and parser has REQUIRE_HEADER enabled: can not parse
    at [Source: (byte[])"<html>
   <head>
   <meta http-equiv="Content-Type" content="text/html;charset=utf-8"/>
   <title>Error 401 Unauthorized</title>
   </head>
   <body><h2>HTTP ERROR 401</h2>
   <p>Problem accessing /druid-ext/basic-security/authentication/db/MyBasicPostgreSQLAuthenticator/cachedSerializedUserMap. Reason:
   <pre>    Unauthorized</pre></p><hr><a href="http://eclipse.org/jetty">Powered by Jetty:// 9.4.12.v20180830</a><hr/>
   
   </body>
   </html>
   "; line: -1, column: 0]
   	at com.fasterxml.jackson.dataformat.smile.SmileParserBootstrapper.constructParser(SmileParserBootstrapper.java:133) ~[jackson-dataformat-smile-2.10.1.jar:2.10.1]
   	at com.fasterxml.jackson.dataformat.smile.SmileFactory._createParser(SmileFactory.java:460) ~[jackson-dataformat-smile-2.10.1.jar:2.10.1]
   	at com.fasterxml.jackson.dataformat.smile.SmileFactory.createParser(SmileFactory.java:366) ~[jackson-dataformat-smile-2.10.1.jar:2.10.1]
   	at com.fasterxml.jackson.dataformat.smile.SmileFactory.createParser(SmileFactory.java:353) ~[jackson-dataformat-smile-2.10.1.jar:2.10.1]
   	at com.fasterxml.jackson.dataformat.smile.SmileFactory.createParser(SmileFactory.java:29) ~[jackson-dataformat-smile-2.10.1.jar:2.10.1]
   	at com.fasterxml.jackson.databind.ObjectMapper.readValue(ObjectMapper.java:3283) ~[jackson-databind-2.10.1.jar:2.10.1]
   	at org.apache.druid.security.basic.authentication.db.cache.CoordinatorPollingBasicAuthenticatorCacheManager.tryFetchUserMapFromCoordinator(CoordinatorPollingBasicAuthenticatorCacheManager.java:262) ~[?:?]
   	at org.apache.druid.security.basic.authentication.db.cache.CoordinatorPollingBasicAuthenticatorCacheManager.lambda$fetchUserMapFromCoordinator$1(CoordinatorPollingBasicAuthenticatorCacheManager.java:192) ~[?:?]
   	at org.apache.druid.java.util.common.RetryUtils.retry(RetryUtils.java:87) [druid-core-0.17.0.jar:0.17.0]
   	at org.apache.druid.java.util.common.RetryUtils.retry(RetryUtils.java:115) [druid-core-0.17.0.jar:0.17.0]
   	at org.apache.druid.java.util.common.RetryUtils.retry(RetryUtils.java:105) [druid-core-0.17.0.jar:0.17.0]
   	at org.apache.druid.security.basic.authentication.db.cache.CoordinatorPollingBasicAuthenticatorCacheManager.fetchUserMapFromCoordinator(CoordinatorPollingBasicAuthenticatorCacheManager.java:190) [druid-basic-security-0.17.0.jar:0.17.0]
   	at org.apache.druid.security.basic.authentication.db.cache.CoordinatorPollingBasicAuthenticatorCacheManager.initUserMaps(CoordinatorPollingBasicAuthenticatorCacheManager.java:289) [druid-basic-security-0.17.0.jar:0.17.0]
   	at org.apache.druid.security.basic.authentication.db.cache.CoordinatorPollingBasicAuthenticatorCacheManager.start(CoordinatorPollingBasicAuthenticatorCacheManager.java:108) [druid-basic-security-0.17.0.jar:0.17.0]
   	at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) ~[?:1.8.0_242]
   	at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) ~[?:1.8.0_242]
   	at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:1.8.0_242]
   	at java.lang.reflect.Method.invoke(Method.java:498) ~[?:1.8.0_242]
   	at org.apache.druid.java.util.common.lifecycle.Lifecycle$AnnotationBasedHandler.start(Lifecycle.java:446) [druid-core-0.17.0.jar:0.17.0]
   	at org.apache.druid.java.util.common.lifecycle.Lifecycle.start(Lifecycle.java:341) [druid-core-0.17.0.jar:0.17.0]
   	at org.apache.druid.guice.LifecycleModule$2.start(LifecycleModule.java:143) [druid-core-0.17.0.jar:0.17.0]
   	at org.apache.druid.cli.GuiceRunnable.initLifecycle(GuiceRunnable.java:115) [druid-services-0.17.0.jar:0.17.0]
   	at org.apache.druid.cli.ServerRunnable.run(ServerRunnable.java:59) [druid-services-0.17.0.jar:0.17.0]
   	at org.apache.druid.cli.Main.main(Main.java:113) [druid-services-0.17.0.jar:0.17.0]

----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
users@infra.apache.org


With regards,
Apache Git Services

---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscribe@druid.apache.org
For additional commands, e-mail: commits-help@druid.apache.org


[GitHub] [druid] ceastman-ibm commented on issue #9453: Enabling basic security with an external metadata database causes usermap error

Posted by GitBox <gi...@apache.org>.
ceastman-ibm commented on issue #9453: Enabling basic security with an external metadata database causes usermap error
URL: https://github.com/apache/druid/issues/9453#issuecomment-595814639
 
 
   this was due to a bad configuration on my part.

----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
users@infra.apache.org


With regards,
Apache Git Services

---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscribe@druid.apache.org
For additional commands, e-mail: commits-help@druid.apache.org


[GitHub] [druid] ceastman-ibm commented on issue #9453: Enabling basic security with an external metadata database causes usermap error

Posted by GitBox <gi...@apache.org>.
ceastman-ibm commented on issue #9453: Enabling basic security with an external metadata database causes usermap error
URL: https://github.com/apache/druid/issues/9453#issuecomment-594098786
 
 
   <img width="1680" alt="Screen Shot 2020-03-03 at 12 29 11 PM" src="https://user-images.githubusercontent.com/25593207/75807222-9d862a00-5d4a-11ea-9dc1-f77ef7ac74c6.png">
   

----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
users@infra.apache.org


With regards,
Apache Git Services

---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscribe@druid.apache.org
For additional commands, e-mail: commits-help@druid.apache.org


[GitHub] [druid] PeterCahn commented on issue #9453: Enabling basic security with an external metadata database causes usermap error

Posted by GitBox <gi...@apache.org>.
PeterCahn commented on issue #9453: Enabling basic security with an external metadata database causes usermap error
URL: https://github.com/apache/druid/issues/9453#issuecomment-601145843
 
 
   > 
   > 
   > this was due to a bad configuration on my part.
   
   Which configuration was the problem?

----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
users@infra.apache.org


With regards,
Apache Git Services

---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscribe@druid.apache.org
For additional commands, e-mail: commits-help@druid.apache.org


[GitHub] [druid] ceastman-ibm closed issue #9453: Enabling basic security with an external metadata database causes usermap error

Posted by GitBox <gi...@apache.org>.
ceastman-ibm closed issue #9453: Enabling basic security with an external metadata database causes usermap error
URL: https://github.com/apache/druid/issues/9453
 
 
   

----------------------------------------------------------------
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
users@infra.apache.org


With regards,
Apache Git Services

---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscribe@druid.apache.org
For additional commands, e-mail: commits-help@druid.apache.org