Don Bosco Durai |
Review Request 34878: RANGER-397 Port log4j audit provider to V3 implementation |
Mon, 01 Jun, 06:50 |
Don Bosco Durai |
Re: Review Request 34878: RANGER-397 Port log4j audit provider to V3 implementation |
Mon, 01 Jun, 07:06 |
Madhan Neethiraj |
Re: Review Request 34878: RANGER-397 Port log4j audit provider to V3 implementation |
Mon, 01 Jun, 07:07 |
Don Bosco Durai |
Re: Review Request 34878: RANGER-397 Port log4j audit provider to V3 implementation |
Mon, 01 Jun, 07:13 |
Madhan Neethiraj |
Re: Review Request 34878: RANGER-397 Port log4j audit provider to V3 implementation |
Mon, 01 Jun, 19:37 |
|
[jira] [Created] (RANGER-518) [rolling downgrade] - disable SHA256 hashing of password to provide a way to test rolling downgrade of ranger admin downgrade |
|
Gautam Borad (JIRA) |
[jira] [Created] (RANGER-518) [rolling downgrade] - disable SHA256 hashing of password to provide a way to test rolling downgrade of ranger admin downgrade |
Mon, 01 Jun, 07:31 |
Gautam Borad (JIRA) |
[jira] [Updated] (RANGER-518) [rolling downgrade] - disable SHA256 hashing of password to provide a way to test rolling downgrade of ranger admin downgrade |
Mon, 01 Jun, 08:37 |
Gautam Borad (JIRA) |
[jira] [Updated] (RANGER-518) [rolling downgrade] - disable SHA256 hashing of password to provide a way to test rolling downgrade of ranger admin downgrade |
Mon, 01 Jun, 09:04 |
Gautam Borad (JIRA) |
[jira] [Updated] (RANGER-518) [rolling downgrade] - disable SHA256 hashing of password to provide a way to test rolling downgrade of ranger admin downgrade |
Mon, 01 Jun, 09:04 |
Selvamohan Neethiraj (JIRA) |
[jira] [Commented] (RANGER-518) [rolling downgrade] - disable SHA256 hashing of password to provide a way to test rolling downgrade of ranger admin downgrade |
Mon, 01 Jun, 16:47 |
|
[jira] [Created] (RANGER-519) Access Audit filtering does not work for servicename |
|
Gautam Borad (JIRA) |
[jira] [Created] (RANGER-519) Access Audit filtering does not work for servicename |
Mon, 01 Jun, 14:38 |
Selvamohan Neethiraj (JIRA) |
[jira] [Updated] (RANGER-519) Access Audit filtering does not work for servicename |
Mon, 01 Jun, 15:12 |
Selvamohan Neethiraj (JIRA) |
[jira] [Commented] (RANGER-519) Access Audit filtering does not work for servicename |
Mon, 01 Jun, 15:13 |
Selvamohan Neethiraj |
[MENTORS] - Quarterly Incubator report for Apache Ranger - Need sign-off |
Mon, 01 Jun, 16:33 |
Selvamohan Neethiraj |
[MENTORS] - Quarterly Incubator report for Apache Ranger - Need sign-off |
Mon, 01 Jun, 16:36 |
Alan Gates |
Re: [MENTORS] - Quarterly Incubator report for Apache Ranger - Need sign-off |
Mon, 01 Jun, 17:52 |
Selvamohan Neethiraj |
[MENTORS] [VOTE] Release Apache Ranger 0.5.0 (incubating) - release candidate 2 (dev group vote) |
Mon, 01 Jun, 16:39 |
Alan Gates |
Re: [MENTORS] [VOTE] Release Apache Ranger 0.5.0 (incubating) - release candidate 2 (dev group vote) |
Mon, 01 Jun, 17:49 |
Jakob Homan |
Re: [MENTORS] [VOTE] Release Apache Ranger 0.5.0 (incubating) - release candidate 2 (dev group vote) |
Tue, 02 Jun, 00:42 |
|
[jira] [Created] (RANGER-520) When getting Keys from a clustered kms servers, stale key list is returned |
|
Selvamohan Neethiraj (JIRA) |
[jira] [Created] (RANGER-520) When getting Keys from a clustered kms servers, stale key list is returned |
Mon, 01 Jun, 20:24 |
Selvamohan Neethiraj (JIRA) |
[jira] [Updated] (RANGER-520) When getting Keys from a clustered kms servers, stale key list is returned |
Mon, 01 Jun, 20:28 |
Velmurugan Periasamy (JIRA) |
[jira] [Commented] (RANGER-520) When getting Keys from a clustered kms servers, stale key list is returned |
Mon, 01 Jun, 21:52 |
|
[jira] [Commented] (RANGER-492) New LDAP/AD properties should be available during install in windows |
|
Velmurugan Periasamy (JIRA) |
[jira] [Commented] (RANGER-492) New LDAP/AD properties should be available during install in windows |
Mon, 01 Jun, 21:56 |
Selvamohan Neethiraj (JIRA) |
[jira] [Updated] (RANGER-492) New LDAP/AD properties should be available during install in windows |
Sat, 06 Jun, 20:39 |
Don Bosco Durai |
Review Request 34916: RANGER-397 Incorporate review comments |
Tue, 02 Jun, 01:08 |
Madhan Neethiraj |
Re: Review Request 34916: RANGER-397 Incorporate review comments |
Tue, 02 Jun, 03:19 |
|
[jira] [Commented] (RANGER-219) Autocomplete behavior of hive tables/columns |
|
Hanish Bansal (JIRA) |
[jira] [Commented] (RANGER-219) Autocomplete behavior of hive tables/columns |
Tue, 02 Jun, 11:34 |
Ramesh Mani (JIRA) |
[jira] [Commented] (RANGER-219) Autocomplete behavior of hive tables/columns |
Tue, 02 Jun, 17:08 |
Hanish Bansal (JIRA) |
[jira] [Commented] (RANGER-219) Autocomplete behavior of hive tables/columns |
Wed, 03 Jun, 09:59 |
Ramesh Mani (JIRA) |
[jira] [Resolved] (RANGER-219) Autocomplete behavior of hive tables/columns |
Mon, 08 Jun, 23:09 |
Don Bosco Durai |
Review Request 34948: RANGER-246 - Adding kafka-ranger-env.sh to install/conf folder |
Tue, 02 Jun, 16:15 |
Velmurugan Periasamy |
Re: Review Request 34948: RANGER-246 - Adding kafka-ranger-env.sh to install/conf folder |
Tue, 02 Jun, 16:20 |
|
[jira] [Created] (RANGER-521) RangerAccessReqest.getAsString() and isLeafName() to be updated to not require serviceDef argument |
|
Madhan Neethiraj (JIRA) |
[jira] [Created] (RANGER-521) RangerAccessReqest.getAsString() and isLeafName() to be updated to not require serviceDef argument |
Tue, 02 Jun, 16:56 |
|
[jira] [Resolved] (RANGER-399) Testing connection at a Kerberized cluster |
|
Ramesh Mani (JIRA) |
[jira] [Resolved] (RANGER-399) Testing connection at a Kerberized cluster |
Tue, 02 Jun, 17:10 |
robinlin (JIRA) |
[jira] [Commented] (RANGER-399) Testing connection at a Kerberized cluster |
Thu, 04 Jun, 02:30 |
Selvamohan Neethiraj (JIRA) |
[jira] [Commented] (RANGER-399) Testing connection at a Kerberized cluster |
Thu, 04 Jun, 02:34 |
robinlin (JIRA) |
[jira] [Commented] (RANGER-399) Testing connection at a Kerberized cluster |
Thu, 04 Jun, 03:17 |
Ramesh Mani |
Re: [jira] [Commented] (RANGER-399) Testing connection at a Kerberized cluster |
Mon, 08 Jun, 21:53 |
Selvamohan Neethiraj (JIRA) |
[jira] [Updated] (RANGER-399) Testing connection at a Kerberized cluster |
Sat, 06 Jun, 20:39 |
Ramesh Mani (JIRA) |
[jira] [Commented] (RANGER-399) Testing connection at a Kerberized cluster |
Mon, 08 Jun, 21:58 |
robinlin (JIRA) |
[jira] [Commented] (RANGER-399) Testing connection at a Kerberized cluster |
Wed, 10 Jun, 01:36 |
Madhan Neethiraj |
Review Request 34949: RANGER-521: updated RangerAccessReqest.getAsString() and isLeafName() to not require serviceDef argument |
Tue, 02 Jun, 17:10 |
Don Bosco Durai |
Re: Review Request 34949: RANGER-521: updated RangerAccessReqest.getAsString() and isLeafName() to not require serviceDef argument |
Tue, 02 Jun, 17:26 |
Madhan Neethiraj |
Re: Review Request 34949: RANGER-521: updated RangerAccessReqest.getAsString() and isLeafName() to not require serviceDef argument |
Thu, 04 Jun, 16:07 |
Don Bosco Durai |
Re: Review Request 34949: RANGER-521: updated RangerAccessReqest.getAsString() and isLeafName() to not require serviceDef argument |
Thu, 04 Jun, 16:14 |
|
[jira] [Created] (RANGER-522) Update YARN service-def to remove ip-custom-condition |
|
Madhan Neethiraj (JIRA) |
[jira] [Created] (RANGER-522) Update YARN service-def to remove ip-custom-condition |
Tue, 02 Jun, 20:24 |
Madhan Neethiraj |
Review Request 34950: RANGER-522: YARN service-def updated to remove custom condition for IP address check |
Tue, 02 Jun, 20:37 |
Don Bosco Durai |
Re: Review Request 34950: RANGER-522: YARN service-def updated to remove custom condition for IP address check |
Tue, 02 Jun, 22:12 |
|
[jira] [Created] (RANGER-523) Update embedded service-def creation sequence and other misc fixes |
|
Madhan Neethiraj (JIRA) |
[jira] [Created] (RANGER-523) Update embedded service-def creation sequence and other misc fixes |
Tue, 02 Jun, 23:50 |
Madhan Neethiraj |
Review Request 34975: RANGER-523: updated sequence of embedded service-def creation |
Wed, 03 Jun, 02:24 |
Don Bosco Durai |
Re: Review Request 34975: RANGER-523: updated sequence of embedded service-def creation |
Wed, 03 Jun, 02:28 |
|
[jira] [Created] (RANGER-524) Hbase plugin: list command should prune the tables returned on user permissions |
|
Alok Lal (JIRA) |
[jira] [Created] (RANGER-524) Hbase plugin: list command should prune the tables returned on user permissions |
Wed, 03 Jun, 06:08 |
Alok Lal |
Review Request 34985: RANGER-524 hbase shell list command should prune the list of tables returned based on user's access |
Wed, 03 Jun, 06:17 |
Madhan Neethiraj |
Re: Review Request 34985: RANGER-524 hbase shell list command should prune the list of tables returned based on user's access |
Wed, 03 Jun, 06:40 |
|
[jira] [Commented] (RANGER-368) No update operation (like updating User/Group, updating repository, updating Resource/Policy) works on chrome browser. |
|
Hanish Bansal (JIRA) |
[jira] [Commented] (RANGER-368) No update operation (like updating User/Group, updating repository, updating Resource/Policy) works on chrome browser. |
Wed, 03 Jun, 09:58 |
|
[jira] [Created] (RANGER-525) Use JDK class for Key Protection instead of having own classes |
|
Gautam Borad (JIRA) |
[jira] [Created] (RANGER-525) Use JDK class for Key Protection instead of having own classes |
Wed, 03 Jun, 09:59 |
Gautam Borad (JIRA) |
[jira] [Updated] (RANGER-525) Use JDK class for Key Protection instead of having own classes |
Wed, 03 Jun, 10:02 |
Selvamohan Neethiraj (JIRA) |
[jira] [Commented] (RANGER-525) Use JDK class for Key Protection instead of having own classes |
Wed, 03 Jun, 10:27 |
Selvamohan Neethiraj (JIRA) |
[jira] [Updated] (RANGER-525) Use JDK class for Key Protection instead of having own classes |
Wed, 03 Jun, 10:40 |
Selvamohan Neethiraj |
[VOTE] Release Apache Ranger 0.5.0 (incubating) - release candidate 3 (dev group vote) |
Wed, 03 Jun, 10:46 |
Alan Gates |
Re: [VOTE] Release Apache Ranger 0.5.0 (incubating) - release candidate 3 (dev group vote) |
Thu, 04 Jun, 16:21 |
Madhan Neethiraj |
Re: [VOTE] Release Apache Ranger 0.5.0 (incubating) - release candidate 3 (dev group vote) |
Sat, 06 Jun, 05:22 |
Alok Lal |
Re: [VOTE] Release Apache Ranger 0.5.0 (incubating) - release candidate 3 (dev group vote) |
Sat, 06 Jun, 05:23 |
Ramesh Mani |
Re: [VOTE] Release Apache Ranger 0.5.0 (incubating) - release candidate 3 (dev group vote) |
Sat, 06 Jun, 05:28 |
Dilli Arumugam |
Re: [VOTE] Release Apache Ranger 0.5.0 (incubating) - release candidate 3 (dev group vote) |
Sat, 06 Jun, 05:38 |
Selvamohan Neethiraj |
Re: [VOTE] Release Apache Ranger 0.5.0 (incubating) - release candidate 3 (dev group vote) |
Sat, 06 Jun, 05:43 |
Dilli Arumugam |
Re: [VOTE] Release Apache Ranger 0.5.0 (incubating) - release candidate 3 (dev group vote) |
Sat, 06 Jun, 05:47 |
Gautam Borad |
Re: [VOTE] Release Apache Ranger 0.5.0 (incubating) - release candidate 3 (dev group vote) |
Sat, 06 Jun, 06:34 |
Dilli Arumugam |
Re: [VOTE] Release Apache Ranger 0.5.0 (incubating) - release candidate 3 (dev group vote) |
Sat, 06 Jun, 12:58 |
Velmurugan Periasamy |
Re: [VOTE] Release Apache Ranger 0.5.0 (incubating) - release candidate 3 (dev group vote) |
Sat, 06 Jun, 13:26 |
Don Bosco Durai |
Re: [VOTE] Release Apache Ranger 0.5.0 (incubating) - release candidate 3 (dev group vote) |
Sat, 06 Jun, 19:16 |
|
[jira] [Created] (RANGER-526) Provide REST API to change user role |
|
Gautam Borad (JIRA) |
[jira] [Created] (RANGER-526) Provide REST API to change user role |
Wed, 03 Jun, 13:40 |
Gautam Borad (JIRA) |
[jira] [Updated] (RANGER-526) Provide REST API to change user role |
Wed, 03 Jun, 14:05 |
|
[jira] [Created] (RANGER-527) System should preserve Service-def ID if it's given at the time of creating |
|
Gautam Borad (JIRA) |
[jira] [Created] (RANGER-527) System should preserve Service-def ID if it's given at the time of creating |
Wed, 03 Jun, 16:58 |
Gautam Borad (JIRA) |
[jira] [Updated] (RANGER-527) System should preserve Service-def ID if it's given at the time of creating |
Wed, 03 Jun, 17:18 |
|
[jira] [Created] (RANGER-528) System should preserve Service-def ID if it's given at the time of creating |
|
Gautam Borad (JIRA) |
[jira] [Created] (RANGER-528) System should preserve Service-def ID if it's given at the time of creating |
Wed, 03 Jun, 17:00 |
Gautam Borad (JIRA) |
[jira] [Resolved] (RANGER-528) System should preserve Service-def ID if it's given at the time of creating |
Wed, 03 Jun, 17:15 |
|
[jira] [Created] (RANGER-529) Policy Validation: resources of a policy must match one of the resource hierarchies of the service def. |
|
Alok Lal (JIRA) |
[jira] [Created] (RANGER-529) Policy Validation: resources of a policy must match one of the resource hierarchies of the service def. |
Wed, 03 Jun, 20:58 |
Alok Lal |
Review Request 35025: RANGER-529 Policy Validation: resources of a policy must match one of the resource hierarchies of the service def |
Wed, 03 Jun, 22:52 |
|
[jira] [Issue Comment Deleted] (RANGER-290) Policy validation: validate policy information about conditions against condition definition |
|
Alok Lal (JIRA) |
[jira] [Issue Comment Deleted] (RANGER-290) Policy validation: validate policy information about conditions against condition definition |
Wed, 03 Jun, 23:33 |
|
[jira] [Assigned] (RANGER-202) Ranger hbase authorization at namespace level |
|
Madhan Neethiraj (JIRA) |
[jira] [Assigned] (RANGER-202) Ranger hbase authorization at namespace level |
Thu, 04 Jun, 17:48 |
Madhan Neethiraj |
Review Request 35081: RANGER-202: support authorization at namespace level |
Thu, 04 Jun, 17:53 |
Don Bosco Durai |
Re: Review Request 35081: RANGER-202: support authorization at namespace level |
Thu, 04 Jun, 22:54 |
Don Bosco Durai |
Review Request 35105: RANGER-261 Fix audit to HDFS in Kerberos environment |
Thu, 04 Jun, 23:33 |
Don Bosco Durai |
Re: Review Request 35105: RANGER-261 Fix audit to HDFS in Kerberos environment |
Thu, 04 Jun, 23:55 |
Madhan Neethiraj |
Re: Review Request 35105: RANGER-261 Fix audit to HDFS in Kerberos environment |
Fri, 05 Jun, 01:08 |
|
[jira] [Created] (RANGER-530) Access-type "all" should imply rest of the permissions in Hive |
|
Madhan Neethiraj (JIRA) |
[jira] [Created] (RANGER-530) Access-type "all" should imply rest of the permissions in Hive |
Thu, 04 Jun, 23:54 |
Madhan Neethiraj |
Review Request 35106: RANGER-530: Access-type 'all' should imply rest of the permissions in Hive |
Fri, 05 Jun, 00:40 |
Selvamohan Neethiraj |
Re: Review Request 35106: RANGER-530: Access-type 'all' should imply rest of the permissions in Hive |
Fri, 05 Jun, 01:57 |
Don Bosco Durai |
Review Request 35111: RANGER-261 Fix audit to HDFS in Kerberos environment |
Fri, 05 Jun, 05:00 |
Madhan Neethiraj |
Re: Review Request 35111: RANGER-261 Fix audit to HDFS in Kerberos environment |
Fri, 05 Jun, 08:14 |
|
[jira] [Created] (RANGER-531) Legacy plugins unable to download policies |
|
Madhan Neethiraj (JIRA) |
[jira] [Created] (RANGER-531) Legacy plugins unable to download policies |
Fri, 05 Jun, 16:43 |
|
Re: Review Request 35141: RANGER-531: fix for error in legacy plugins downloading policies |
|
Velmurugan Periasamy |
Re: Review Request 35141: RANGER-531: fix for error in legacy plugins downloading policies |
Fri, 05 Jun, 17:03 |
Don Bosco Durai |
Review Request 35142: RANGER-178 Enable building of Solr Authorization plugin |
Fri, 05 Jun, 17:25 |
Madhan Neethiraj |
Re: Review Request 35142: RANGER-178 Enable building of Solr Authorization plugin |
Fri, 05 Jun, 18:03 |
|
[jira] [Created] (RANGER-532) Storm Plugin Installation failed with error NoClassDefFoundError |
|
Selvamohan Neethiraj (JIRA) |
[jira] [Created] (RANGER-532) Storm Plugin Installation failed with error NoClassDefFoundError |
Fri, 05 Jun, 19:03 |
Selvamohan Neethiraj (JIRA) |
[jira] [Updated] (RANGER-532) Storm Plugin Installation failed with error NoClassDefFoundError |
Fri, 05 Jun, 19:16 |
Selvamohan Neethiraj (JIRA) |
[jira] [Commented] (RANGER-532) Storm Plugin Installation failed with error NoClassDefFoundError |
Fri, 05 Jun, 19:45 |
|
[jira] [Created] (RANGER-533) Hbase plugin: if user does not have family-level access to any family in a table then user may be incorrectly denied access done at table/family level during get or scan |
|
Alok Lal (JIRA) |
[jira] [Created] (RANGER-533) Hbase plugin: if user does not have family-level access to any family in a table then user may be incorrectly denied access done at table/family level during get or scan |
Fri, 05 Jun, 22:37 |
Alok Lal (JIRA) |
[jira] [Updated] (RANGER-533) Hbase plugin: if user does not have family-level access to any family in a table then user may be incorrectly denied access done at table/family level during get or scan |
Fri, 05 Jun, 22:38 |
Alok Lal (JIRA) |
[jira] [Updated] (RANGER-533) Hbase plugin: if user does not have family-level access to any family in a table then user may be incorrectly denied access done at table/family level during get or scan |
Fri, 05 Jun, 22:45 |
Alok Lal |
Review Request 35162: RANGER-533: Hbase plugin: if user does not have family-level access to any family in a table then user may be incorrectly denied access done at table/family level during get or scan. Scan/get done at column level is working correctly, so are other operations like put and delete. |
Fri, 05 Jun, 23:28 |
Madhan Neethiraj |
Re: Review Request 35162: RANGER-533: Hbase plugin: if user does not have family-level access to any family in a table then user may be incorrectly denied access done at table/family level during get or scan. Scan/get done at column level is working correctly, so are other operations like put and delete. |
Sat, 06 Jun, 01:06 |
Alok Lal |
Re: Review Request 35162: RANGER-533: Hbase plugin: if user does not have family-level access to any family in a table then user may be incorrectly denied access done at table/family level during get or scan. Scan/get done at column level is working correctly, so are other operations like put and delete. |
Sat, 06 Jun, 03:36 |
Madhan Neethiraj |
Re: Review Request 35162: RANGER-533: Hbase plugin: if user does not have family-level access to any family in a table then user may be incorrectly denied access done at table/family level during get or scan. Scan/get done at column level is working correctly, so are other operations like put and delete. |
Sat, 06 Jun, 05:07 |
Alok Lal |
Re: Review Request 35162: RANGER-533: Hbase plugin: if user does not have family-level access to any family in a table then user may be incorrectly denied access done at table/family level during get or scan. Scan/get done at column level is working correctly, so are other operations like put and delete. |
Sat, 06 Jun, 07:37 |
Alok Lal |
Re: Review Request 35162: RANGER-533: Hbase plugin: if user does not have family-level access to any family in a table then user may be incorrectly denied access done at table/family level during get or scan. Scan/get done at column level is working correctly, so are other operations like put and delete. |
Sat, 06 Jun, 07:37 |
Madhan Neethiraj |
Re: Review Request 35162: RANGER-533: Hbase plugin: if user does not have family-level access to any family in a table then user may be incorrectly denied access done at table/family level during get or scan. Scan/get done at column level is working correctly, so are other operations like put and delete. |
Sat, 06 Jun, 07:57 |