日志:
。。。
2022-05-26 12:29:16,041 INFO [Curator-LeaderSelector-0] coordinate.StreamingCoordinator:626 : Current node become the lead coordinator.
2022-05-26 12:29:16,075 INFO [Curator-LeaderSelector-0] coordinate.BuildJobSubmitter:85 : Restore job submitter
2022-05-26 12:29:16,112 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN') or hasPermission(#project, 'ADMINISTRATION')) found on specific method: public void org.apache.kylin.rest.service.DashboardService.checkAuthorization(org.apache.kylin.metadata.project.ProjectInstance) throws org.springframework.security.access.AccessDeniedException
2022-05-26 12:29:16,112 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN') or hasPermission(#project, 'ADMINISTRATION')) found on specific method: public void org.apache.kylin.rest.service.DashboardService.checkAuthorization(org.apache.kylin.metadata.project.ProjectInstance) throws org.springframework.security.access.AccessDeniedException
2022-05-26 12:29:16,113 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.DashboardService; public void org.apache.kylin.rest.service.DashboardService.checkAuthorization(org.apache.kylin.metadata.project.ProjectInstance) throws org.springframework.security.access.AccessDeniedException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN') or hasPermission(#project, 'ADMINISTRATION')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,113 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.DashboardService; public void org.apache.kylin.rest.service.DashboardService.checkAuthorization(org.apache.kylin.metadata.project.ProjectInstance) throws org.springframework.security.access.AccessDeniedException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN') or hasPermission(#project, 'ADMINISTRATION')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,113 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.DashboardService.checkAuthorization() throws org.springframework.security.access.AccessDeniedException
2022-05-26 12:29:16,113 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.DashboardService.checkAuthorization() throws org.springframework.security.access.AccessDeniedException
2022-05-26 12:29:16,114 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.DashboardService; public void org.apache.kylin.rest.service.DashboardService.checkAuthorization() throws org.springframework.security.access.AccessDeniedException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,114 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.DashboardService; public void org.apache.kylin.rest.service.DashboardService.checkAuthorization() throws org.springframework.security.access.AccessDeniedException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,148 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public java.lang.String org.apache.kylin.rest.service.AdminService.getEnv() throws org.apache.commons.configuration.ConfigurationException,java.io.UnsupportedEncodingException
2022-05-26 12:29:16,148 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public java.lang.String org.apache.kylin.rest.service.AdminService.getEnv() throws org.apache.commons.configuration.ConfigurationException,java.io.UnsupportedEncodingException
2022-05-26 12:29:16,149 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public java.lang.String org.apache.kylin.rest.service.AdminService.getEnv() throws org.apache.commons.configuration.ConfigurationException,java.io.UnsupportedEncodingException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,149 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public java.lang.String org.apache.kylin.rest.service.AdminService.getEnv() throws org.apache.commons.configuration.ConfigurationException,java.io.UnsupportedEncodingException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,149 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.AdminService.cleanupStorage()
2022-05-26 12:29:16,149 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.AdminService.cleanupStorage()
2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public void org.apache.kylin.rest.service.AdminService.cleanupStorage()]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public void org.apache.kylin.rest.service.AdminService.cleanupStorage()]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.AdminService.updateConfig(java.lang.String,java.lang.String)
2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.AdminService.updateConfig(java.lang.String,java.lang.String)
2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public void org.apache.kylin.rest.service.AdminService.updateConfig(java.lang.String,java.lang.String)]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public void org.apache.kylin.rest.service.AdminService.updateConfig(java.lang.String,java.lang.String)]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,193 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.saveExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException
2022-05-26 12:29:16,193 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.saveExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException
2022-05-26 12:29:16,193 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.saveExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,193 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.saveExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.updateExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException
2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.updateExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException
2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.updateExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.updateExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.removeExternalFilter(java.lang.String) throws java.io.IOException
2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.removeExternalFilter(java.lang.String) throws java.io.IOException
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.removeExternalFilter(java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.removeExternalFilter(java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.syncExtFilterToProject(java.lang.String[],java.lang.String) throws java.io.IOException
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.syncExtFilterToProject(java.lang.String[],java.lang.String) throws java.io.IOException
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.syncExtFilterToProject(java.lang.String[],java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.syncExtFilterToProject(java.lang.String[],java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.removeExtFilterFromProject(java.lang.String,java.lang.String) throws java.io.IOException
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.removeExtFilterFromProject(java.lang.String,java.lang.String) throws java.io.IOException
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.removeExtFilterFromProject(java.lang.String,java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.removeExtFilterFromProject(java.lang.String,java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,196 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public java.util.List org.apache.kylin.rest.service.ExtFilterService.listAllExternalFilters()
2022-05-26 12:29:16,196 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public java.util.List org.apache.kylin.rest.service.ExtFilterService.listAllExternalFilters()
2022-05-26 12:29:16,196 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public java.util.List org.apache.kylin.rest.service.ExtFilterService.listAllExternalFilters()]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,196 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public java.util.List org.apache.kylin.rest.service.ExtFilterService.listAllExternalFilters()]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,525 INFO [localhost-startStop-1] common.KylinConfig:473 : Creating new manager instance of class org.apache.kylin.rest.security.KylinUserManager
2022-05-26 12:29:16,526 INFO [localhost-startStop-1] security.KylinUserManager:60 : Initializing KylinUserManager with config kylin_metadata@hbase
2022-05-26 12:29:16,526 DEBUG [localhost-startStop-1] cachesync.CachedCrudAssist:122 : Reloading ManagedUser from kylin_metadata(key='/user')@kylin_metadata@hbase
2022-05-26 12:29:16,550 DEBUG [localhost-startStop-1] cachesync.CachedCrudAssist:155 : Loaded 3 ManagedUser(s) out of 3 resource with 0 errors
2022-05-26 12:29:17,166 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/user/authentication*/']
2022-05-26 12:29:17,166 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/user/authentication*/*']
2022-05-26 12:29:17,166 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/query/runningQueries']
2022-05-26 12:29:17,166 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/query/runningQueries']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/query//stop']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/query//stop']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/query/']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/query*/']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/metadata*/*']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/metadata/']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api//metrics']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api//metrics']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/cache*/']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/cache*/']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/streaming_coordinator/']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/streaming_coordinator/*']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/service_discovery/state/is_active_job_node']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/service_discovery/state/is_active_job_node']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasAnyRole('ROLE_ANALYST')', for Ant [pattern='/api/cubes/src/tables']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasAnyRole('ROLE_ANALYST')', for Ant [pattern='/api/cubes/src/tables']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/cubes/']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/cubes*/']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/models*/*']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/models/']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/streaming*/']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/streaming*/*']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/job/']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/job*/']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/admin/public_config']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/admin/public_config']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/admin/version']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/admin/version']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/projects']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/projects']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/admin*/*']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/admin/']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/tables//snapshotLocalCache/']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/tables//snapshotLocalCache/']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/']
2022-05-26 12:29:17,186 DEBUG [localhost-startStop-1] intercept.FilterSecurityInterceptor:180 : Validated configuration attributes
2022-05-26 12:29:17,186 DEBUG [localhost-startStop-1] intercept.FilterSecurityInterceptor:180 : Validated configuration attributes
2022-05-26 12:29:17,187 INFO [localhost-startStop-1] web.DefaultSecurityFilterChain:43 : Creating filter chain: org.springframework.security.web.util.matcher.AnyRequestMatcher@1, [org.springframework.security.web.context.SecurityContextPersistenceFilter@62a791f, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@760ebec3, org.springframework.security.web.header.HeaderWriterFilter@6c9ef969, org.springframework.security.web.authentication.logout.LogoutFilter@637220b2, org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter@36c55f42, org.springframework.security.web.authentication.www.BasicAuthenticationFilter@353e17ff, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@2e70e580, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@5c75374c, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@40d65ccf, org.springframework.security.web.session.SessionManagementFilter@5123ac5, org.springframework.security.web.access.ExceptionTranslationFilter@2c678302, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@59dd1e95]
2022-05-26 12:29:17,187 INFO [localhost-startStop-1] web.DefaultSecurityFilterChain:43 : Creating filter chain: org.springframework.security.web.util.matcher.AnyRequestMatcher@1, [org.springframework.security.web.context.SecurityContextPersistenceFilter@62a791f, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@760ebec3, org.springframework.security.web.header.HeaderWriterFilter@6c9ef969, org.springframework.security.web.authentication.logout.LogoutFilter@637220b2, org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter@36c55f42, org.springframework.security.web.authentication.www.BasicAuthenticationFilter@353e17ff, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@2e70e580, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@5c75374c, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@40d65ccf, org.springframework.security.web.session.SessionManagementFilter@5123ac5, org.springframework.security.web.access.ExceptionTranslationFilter@2c678302, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@59dd1e95]
2022-05-26 12:29:17,242 INFO [localhost-startStop-1] http.DefaultFilterChainValidator:154 : Checking whether login URL '/login' is accessible with your configuration
2022-05-26 12:29:17,242 INFO [localhost-startStop-1] http.DefaultFilterChainValidator:154 : Checking whether login URL '/login' is accessible with your configuration
2022-05-26 12:29:17,248 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/user/authentication*/'
2022-05-26 12:29:17,248 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/user/authentication*/*'
2022-05-26 12:29:17,248 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query/runningQueries'
2022-05-26 12:29:17,248 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query/runningQueries'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query//stop'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query//stop'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query/'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query*/'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/metadata*/*'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/metadata/'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api//metrics'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api//metrics'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cache*/'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cache*/'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/streaming_coordinator/'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/streaming_coordinator/*'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/service_discovery/state/is_active_job_node'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/service_discovery/state/is_active_job_node'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cubes/src/tables'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cubes/src/tables'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cubes/'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cubes*/'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/models*/*'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/models/'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/streaming*/'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/streaming*/*'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/job/'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/job*/'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin/public_config'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin/public_config'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin/version'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin/version'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/projects'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/projects'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin*/*'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin/'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/tables//snapshotLocalCache/'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/tables//snapshotLocalCache/'
2022-05-26 12:29:17,253 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/'
2022-05-26 12:29:17,253 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/'
2022-05-26 12:29:17,253 DEBUG [localhost-startStop-1] http.DefaultFilterChainValidator:186 : No access attributes defined for login page URL
2022-05-26 12:29:17,253 DEBUG [localhost-startStop-1] http.DefaultFilterChainValidator:186 : No access attributes defined for login page URL
无法启动
使用的版本:kylin-3.0.2 hbase2.0.5 hadoop3.1.3 zookeeper3.4.10
日志: 。。。 2022-05-26 12:29:16,041 INFO [Curator-LeaderSelector-0] coordinate.StreamingCoordinator:626 : Current node become the lead coordinator. 2022-05-26 12:29:16,075 INFO [Curator-LeaderSelector-0] coordinate.BuildJobSubmitter:85 : Restore job submitter 2022-05-26 12:29:16,112 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN') or hasPermission(#project, 'ADMINISTRATION')) found on specific method: public void org.apache.kylin.rest.service.DashboardService.checkAuthorization(org.apache.kylin.metadata.project.ProjectInstance) throws org.springframework.security.access.AccessDeniedException 2022-05-26 12:29:16,112 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN') or hasPermission(#project, 'ADMINISTRATION')) found on specific method: public void org.apache.kylin.rest.service.DashboardService.checkAuthorization(org.apache.kylin.metadata.project.ProjectInstance) throws org.springframework.security.access.AccessDeniedException 2022-05-26 12:29:16,113 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.DashboardService; public void org.apache.kylin.rest.service.DashboardService.checkAuthorization(org.apache.kylin.metadata.project.ProjectInstance) throws org.springframework.security.access.AccessDeniedException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN') or hasPermission(#project, 'ADMINISTRATION')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,113 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.DashboardService; public void org.apache.kylin.rest.service.DashboardService.checkAuthorization(org.apache.kylin.metadata.project.ProjectInstance) throws org.springframework.security.access.AccessDeniedException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN') or hasPermission(#project, 'ADMINISTRATION')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,113 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.DashboardService.checkAuthorization() throws org.springframework.security.access.AccessDeniedException 2022-05-26 12:29:16,113 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.DashboardService.checkAuthorization() throws org.springframework.security.access.AccessDeniedException 2022-05-26 12:29:16,114 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.DashboardService; public void org.apache.kylin.rest.service.DashboardService.checkAuthorization() throws org.springframework.security.access.AccessDeniedException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,114 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.DashboardService; public void org.apache.kylin.rest.service.DashboardService.checkAuthorization() throws org.springframework.security.access.AccessDeniedException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,148 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public java.lang.String org.apache.kylin.rest.service.AdminService.getEnv() throws org.apache.commons.configuration.ConfigurationException,java.io.UnsupportedEncodingException 2022-05-26 12:29:16,148 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public java.lang.String org.apache.kylin.rest.service.AdminService.getEnv() throws org.apache.commons.configuration.ConfigurationException,java.io.UnsupportedEncodingException 2022-05-26 12:29:16,149 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public java.lang.String org.apache.kylin.rest.service.AdminService.getEnv() throws org.apache.commons.configuration.ConfigurationException,java.io.UnsupportedEncodingException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,149 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public java.lang.String org.apache.kylin.rest.service.AdminService.getEnv() throws org.apache.commons.configuration.ConfigurationException,java.io.UnsupportedEncodingException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,149 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.AdminService.cleanupStorage() 2022-05-26 12:29:16,149 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.AdminService.cleanupStorage() 2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public void org.apache.kylin.rest.service.AdminService.cleanupStorage()]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public void org.apache.kylin.rest.service.AdminService.cleanupStorage()]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.AdminService.updateConfig(java.lang.String,java.lang.String) 2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.AdminService.updateConfig(java.lang.String,java.lang.String) 2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public void org.apache.kylin.rest.service.AdminService.updateConfig(java.lang.String,java.lang.String)]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public void org.apache.kylin.rest.service.AdminService.updateConfig(java.lang.String,java.lang.String)]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,193 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.saveExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException 2022-05-26 12:29:16,193 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.saveExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException 2022-05-26 12:29:16,193 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.saveExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,193 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.saveExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.updateExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException 2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.updateExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException 2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.updateExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.updateExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.removeExternalFilter(java.lang.String) throws java.io.IOException 2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.removeExternalFilter(java.lang.String) throws java.io.IOException 2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.removeExternalFilter(java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.removeExternalFilter(java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.syncExtFilterToProject(java.lang.String[],java.lang.String) throws java.io.IOException 2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.syncExtFilterToProject(java.lang.String[],java.lang.String) throws java.io.IOException 2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.syncExtFilterToProject(java.lang.String[],java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.syncExtFilterToProject(java.lang.String[],java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.removeExtFilterFromProject(java.lang.String,java.lang.String) throws java.io.IOException 2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.removeExtFilterFromProject(java.lang.String,java.lang.String) throws java.io.IOException 2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.removeExtFilterFromProject(java.lang.String,java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.removeExtFilterFromProject(java.lang.String,java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,196 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public java.util.List org.apache.kylin.rest.service.ExtFilterService.listAllExternalFilters() 2022-05-26 12:29:16,196 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public java.util.List org.apache.kylin.rest.service.ExtFilterService.listAllExternalFilters() 2022-05-26 12:29:16,196 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public java.util.List org.apache.kylin.rest.service.ExtFilterService.listAllExternalFilters()]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,196 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public java.util.List org.apache.kylin.rest.service.ExtFilterService.listAllExternalFilters()]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']] 2022-05-26 12:29:16,525 INFO [localhost-startStop-1] common.KylinConfig:473 : Creating new manager instance of class org.apache.kylin.rest.security.KylinUserManager 2022-05-26 12:29:16,526 INFO [localhost-startStop-1] security.KylinUserManager:60 : Initializing KylinUserManager with config kylin_metadata@hbase 2022-05-26 12:29:16,526 DEBUG [localhost-startStop-1] cachesync.CachedCrudAssist:122 : Reloading ManagedUser from kylin_metadata(key='/user')@kylin_metadata@hbase 2022-05-26 12:29:16,550 DEBUG [localhost-startStop-1] cachesync.CachedCrudAssist:155 : Loaded 3 ManagedUser(s) out of 3 resource with 0 errors 2022-05-26 12:29:17,166 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/user/authentication*/'] 2022-05-26 12:29:17,166 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/user/authentication*/*'] 2022-05-26 12:29:17,166 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/query/runningQueries'] 2022-05-26 12:29:17,166 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/query/runningQueries'] 2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/query//stop'] 2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/query//stop'] 2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/query/'] 2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/query*/'] 2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/metadata*/*'] 2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/metadata/'] 2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api//metrics'] 2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api//metrics'] 2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/cache*/'] 2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/cache*/'] 2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/streaming_coordinator/'] 2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/streaming_coordinator/*'] 2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/service_discovery/state/is_active_job_node'] 2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/service_discovery/state/is_active_job_node'] 2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasAnyRole('ROLE_ANALYST')', for Ant [pattern='/api/cubes/src/tables'] 2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasAnyRole('ROLE_ANALYST')', for Ant [pattern='/api/cubes/src/tables'] 2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/cubes/'] 2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/cubes*/'] 2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/models*/*'] 2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/models/'] 2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/streaming*/'] 2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/streaming*/*'] 2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/job/'] 2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/job*/'] 2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/admin/public_config'] 2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/admin/public_config'] 2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/admin/version'] 2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/admin/version'] 2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/projects'] 2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/projects'] 2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/admin*/*'] 2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/admin/'] 2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/tables//snapshotLocalCache/'] 2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/tables//snapshotLocalCache/'] 2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/'] 2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/'] 2022-05-26 12:29:17,186 DEBUG [localhost-startStop-1] intercept.FilterSecurityInterceptor:180 : Validated configuration attributes 2022-05-26 12:29:17,186 DEBUG [localhost-startStop-1] intercept.FilterSecurityInterceptor:180 : Validated configuration attributes 2022-05-26 12:29:17,187 INFO [localhost-startStop-1] web.DefaultSecurityFilterChain:43 : Creating filter chain: org.springframework.security.web.util.matcher.AnyRequestMatcher@1, [org.springframework.security.web.context.SecurityContextPersistenceFilter@62a791f, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@760ebec3, org.springframework.security.web.header.HeaderWriterFilter@6c9ef969, org.springframework.security.web.authentication.logout.LogoutFilter@637220b2, org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter@36c55f42, org.springframework.security.web.authentication.www.BasicAuthenticationFilter@353e17ff, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@2e70e580, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@5c75374c, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@40d65ccf, org.springframework.security.web.session.SessionManagementFilter@5123ac5, org.springframework.security.web.access.ExceptionTranslationFilter@2c678302, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@59dd1e95] 2022-05-26 12:29:17,187 INFO [localhost-startStop-1] web.DefaultSecurityFilterChain:43 : Creating filter chain: org.springframework.security.web.util.matcher.AnyRequestMatcher@1, [org.springframework.security.web.context.SecurityContextPersistenceFilter@62a791f, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@760ebec3, org.springframework.security.web.header.HeaderWriterFilter@6c9ef969, org.springframework.security.web.authentication.logout.LogoutFilter@637220b2, org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter@36c55f42, org.springframework.security.web.authentication.www.BasicAuthenticationFilter@353e17ff, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@2e70e580, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@5c75374c, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@40d65ccf, org.springframework.security.web.session.SessionManagementFilter@5123ac5, org.springframework.security.web.access.ExceptionTranslationFilter@2c678302, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@59dd1e95] 2022-05-26 12:29:17,242 INFO [localhost-startStop-1] http.DefaultFilterChainValidator:154 : Checking whether login URL '/login' is accessible with your configuration 2022-05-26 12:29:17,242 INFO [localhost-startStop-1] http.DefaultFilterChainValidator:154 : Checking whether login URL '/login' is accessible with your configuration 2022-05-26 12:29:17,248 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/user/authentication*/' 2022-05-26 12:29:17,248 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/user/authentication*/*' 2022-05-26 12:29:17,248 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query/runningQueries' 2022-05-26 12:29:17,248 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query/runningQueries' 2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query//stop' 2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query//stop' 2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query/' 2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query*/' 2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/metadata*/*' 2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/metadata/' 2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api//metrics' 2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api//metrics' 2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cache*/' 2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cache*/' 2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/streaming_coordinator/' 2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/streaming_coordinator/*' 2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/service_discovery/state/is_active_job_node' 2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/service_discovery/state/is_active_job_node' 2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cubes/src/tables' 2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cubes/src/tables' 2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cubes/' 2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cubes*/' 2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/models*/*' 2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/models/' 2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/streaming*/' 2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/streaming*/*' 2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/job/' 2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/job*/' 2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin/public_config' 2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin/public_config' 2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin/version' 2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin/version' 2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/projects' 2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/projects' 2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin*/*' 2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin/' 2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/tables//snapshotLocalCache/' 2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/tables//snapshotLocalCache/' 2022-05-26 12:29:17,253 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/' 2022-05-26 12:29:17,253 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/' 2022-05-26 12:29:17,253 DEBUG [localhost-startStop-1] http.DefaultFilterChainValidator:186 : No access attributes defined for login page URL 2022-05-26 12:29:17,253 DEBUG [localhost-startStop-1] http.DefaultFilterChainValidator:186 : No access attributes defined for login page URL