KylinOLAP/Kylin

No access attributes defined for login page URL

resuscitateocean opened this issue · 0 comments

无法启动

使用的版本:kylin-3.0.2
hbase2.0.5
hadoop3.1.3
zookeeper3.4.10

日志:
。。。
2022-05-26 12:29:16,041 INFO [Curator-LeaderSelector-0] coordinate.StreamingCoordinator:626 : Current node become the lead coordinator.
2022-05-26 12:29:16,075 INFO [Curator-LeaderSelector-0] coordinate.BuildJobSubmitter:85 : Restore job submitter
2022-05-26 12:29:16,112 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN') or hasPermission(#project, 'ADMINISTRATION')) found on specific method: public void org.apache.kylin.rest.service.DashboardService.checkAuthorization(org.apache.kylin.metadata.project.ProjectInstance) throws org.springframework.security.access.AccessDeniedException
2022-05-26 12:29:16,112 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN') or hasPermission(#project, 'ADMINISTRATION')) found on specific method: public void org.apache.kylin.rest.service.DashboardService.checkAuthorization(org.apache.kylin.metadata.project.ProjectInstance) throws org.springframework.security.access.AccessDeniedException
2022-05-26 12:29:16,113 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.DashboardService; public void org.apache.kylin.rest.service.DashboardService.checkAuthorization(org.apache.kylin.metadata.project.ProjectInstance) throws org.springframework.security.access.AccessDeniedException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN') or hasPermission(#project, 'ADMINISTRATION')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,113 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.DashboardService; public void org.apache.kylin.rest.service.DashboardService.checkAuthorization(org.apache.kylin.metadata.project.ProjectInstance) throws org.springframework.security.access.AccessDeniedException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN') or hasPermission(#project, 'ADMINISTRATION')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,113 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.DashboardService.checkAuthorization() throws org.springframework.security.access.AccessDeniedException
2022-05-26 12:29:16,113 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.DashboardService.checkAuthorization() throws org.springframework.security.access.AccessDeniedException
2022-05-26 12:29:16,114 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.DashboardService; public void org.apache.kylin.rest.service.DashboardService.checkAuthorization() throws org.springframework.security.access.AccessDeniedException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,114 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.DashboardService; public void org.apache.kylin.rest.service.DashboardService.checkAuthorization() throws org.springframework.security.access.AccessDeniedException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,148 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public java.lang.String org.apache.kylin.rest.service.AdminService.getEnv() throws org.apache.commons.configuration.ConfigurationException,java.io.UnsupportedEncodingException
2022-05-26 12:29:16,148 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public java.lang.String org.apache.kylin.rest.service.AdminService.getEnv() throws org.apache.commons.configuration.ConfigurationException,java.io.UnsupportedEncodingException
2022-05-26 12:29:16,149 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public java.lang.String org.apache.kylin.rest.service.AdminService.getEnv() throws org.apache.commons.configuration.ConfigurationException,java.io.UnsupportedEncodingException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,149 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public java.lang.String org.apache.kylin.rest.service.AdminService.getEnv() throws org.apache.commons.configuration.ConfigurationException,java.io.UnsupportedEncodingException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,149 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.AdminService.cleanupStorage()
2022-05-26 12:29:16,149 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.AdminService.cleanupStorage()
2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public void org.apache.kylin.rest.service.AdminService.cleanupStorage()]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public void org.apache.kylin.rest.service.AdminService.cleanupStorage()]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.AdminService.updateConfig(java.lang.String,java.lang.String)
2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.AdminService.updateConfig(java.lang.String,java.lang.String)
2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public void org.apache.kylin.rest.service.AdminService.updateConfig(java.lang.String,java.lang.String)]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,150 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.AdminService; public void org.apache.kylin.rest.service.AdminService.updateConfig(java.lang.String,java.lang.String)]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,193 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.saveExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException
2022-05-26 12:29:16,193 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.saveExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException
2022-05-26 12:29:16,193 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.saveExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,193 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.saveExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.updateExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException
2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.updateExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException
2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.updateExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.updateExternalFilter(org.apache.kylin.metadata.model.ExternalFilterDesc) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.removeExternalFilter(java.lang.String) throws java.io.IOException
2022-05-26 12:29:16,194 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.removeExternalFilter(java.lang.String) throws java.io.IOException
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.removeExternalFilter(java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.removeExternalFilter(java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.syncExtFilterToProject(java.lang.String[],java.lang.String) throws java.io.IOException
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.syncExtFilterToProject(java.lang.String[],java.lang.String) throws java.io.IOException
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.syncExtFilterToProject(java.lang.String[],java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.syncExtFilterToProject(java.lang.String[],java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.removeExtFilterFromProject(java.lang.String,java.lang.String) throws java.io.IOException
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public void org.apache.kylin.rest.service.ExtFilterService.removeExtFilterFromProject(java.lang.String,java.lang.String) throws java.io.IOException
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.removeExtFilterFromProject(java.lang.String,java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,195 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public void org.apache.kylin.rest.service.ExtFilterService.removeExtFilterFromProject(java.lang.String,java.lang.String) throws java.io.IOException]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,196 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public java.util.List org.apache.kylin.rest.service.ExtFilterService.listAllExternalFilters()
2022-05-26 12:29:16,196 DEBUG [localhost-startStop-1] prepost.PrePostAnnotationSecurityMetadataSource:127 : @org.springframework.security.access.prepost.PreAuthorize(value=hasRole('ROLE_ADMIN')) found on specific method: public java.util.List org.apache.kylin.rest.service.ExtFilterService.listAllExternalFilters()
2022-05-26 12:29:16,196 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public java.util.List org.apache.kylin.rest.service.ExtFilterService.listAllExternalFilters()]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,196 DEBUG [localhost-startStop-1] method.DelegatingMethodSecurityMetadataSource:86 : Caching method [CacheKey[org.apache.kylin.rest.service.ExtFilterService; public java.util.List org.apache.kylin.rest.service.ExtFilterService.listAllExternalFilters()]] with attributes [[authorize: 'hasRole('ROLE_ADMIN')', filter: 'null', filterTarget: 'null']]
2022-05-26 12:29:16,525 INFO [localhost-startStop-1] common.KylinConfig:473 : Creating new manager instance of class org.apache.kylin.rest.security.KylinUserManager
2022-05-26 12:29:16,526 INFO [localhost-startStop-1] security.KylinUserManager:60 : Initializing KylinUserManager with config kylin_metadata@hbase
2022-05-26 12:29:16,526 DEBUG [localhost-startStop-1] cachesync.CachedCrudAssist:122 : Reloading ManagedUser from kylin_metadata(key='/user')@kylin_metadata@hbase
2022-05-26 12:29:16,550 DEBUG [localhost-startStop-1] cachesync.CachedCrudAssist:155 : Loaded 3 ManagedUser(s) out of 3 resource with 0 errors
2022-05-26 12:29:17,166 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/user/authentication*/']
2022-05-26 12:29:17,166 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/user/authentication*/
']
2022-05-26 12:29:17,166 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/query/runningQueries']
2022-05-26 12:29:17,166 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/query/runningQueries']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/query//stop']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/query/
/stop']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/query*/']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/query*/
']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/metadata*/']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/metadata*/
']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api//metrics']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/
/metrics']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/cache*/']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/cache*/
']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/streaming_coordinator/']
2022-05-26 12:29:17,167 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/streaming_coordinator/
']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/service_discovery/state/is_active_job_node']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/service_discovery/state/is_active_job_node']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasAnyRole('ROLE_ANALYST')', for Ant [pattern='/api/cubes/src/tables']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasAnyRole('ROLE_ANALYST')', for Ant [pattern='/api/cubes/src/tables']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/cubes*/']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/cubes*/
']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/models*/']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/models*/
']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/streaming*/']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/streaming*/
']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/job*/']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/job*/
']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/admin/public_config']
2022-05-26 12:29:17,168 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/admin/public_config']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/admin/version']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/admin/version']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/projects']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/projects']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/admin*/']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'hasRole('ROLE_ADMIN')', for Ant [pattern='/api/admin*/
']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/tables//snapshotLocalCache/']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'permitAll', for Ant [pattern='/api/tables//snapshotLocalCache/']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/']
2022-05-26 12:29:17,169 DEBUG [localhost-startStop-1] expression.ExpressionBasedFilterInvocationSecurityMetadataSource:74 : Adding web access control expression 'isAuthenticated()', for Ant [pattern='/api/
']
2022-05-26 12:29:17,186 DEBUG [localhost-startStop-1] intercept.FilterSecurityInterceptor:180 : Validated configuration attributes
2022-05-26 12:29:17,186 DEBUG [localhost-startStop-1] intercept.FilterSecurityInterceptor:180 : Validated configuration attributes
2022-05-26 12:29:17,187 INFO [localhost-startStop-1] web.DefaultSecurityFilterChain:43 : Creating filter chain: org.springframework.security.web.util.matcher.AnyRequestMatcher@1, [org.springframework.security.web.context.SecurityContextPersistenceFilter@62a791f, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@760ebec3, org.springframework.security.web.header.HeaderWriterFilter@6c9ef969, org.springframework.security.web.authentication.logout.LogoutFilter@637220b2, org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter@36c55f42, org.springframework.security.web.authentication.www.BasicAuthenticationFilter@353e17ff, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@2e70e580, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@5c75374c, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@40d65ccf, org.springframework.security.web.session.SessionManagementFilter@5123ac5, org.springframework.security.web.access.ExceptionTranslationFilter@2c678302, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@59dd1e95]
2022-05-26 12:29:17,187 INFO [localhost-startStop-1] web.DefaultSecurityFilterChain:43 : Creating filter chain: org.springframework.security.web.util.matcher.AnyRequestMatcher@1, [org.springframework.security.web.context.SecurityContextPersistenceFilter@62a791f, org.springframework.security.web.context.request.async.WebAsyncManagerIntegrationFilter@760ebec3, org.springframework.security.web.header.HeaderWriterFilter@6c9ef969, org.springframework.security.web.authentication.logout.LogoutFilter@637220b2, org.springframework.security.web.authentication.UsernamePasswordAuthenticationFilter@36c55f42, org.springframework.security.web.authentication.www.BasicAuthenticationFilter@353e17ff, org.springframework.security.web.savedrequest.RequestCacheAwareFilter@2e70e580, org.springframework.security.web.servletapi.SecurityContextHolderAwareRequestFilter@5c75374c, org.springframework.security.web.authentication.AnonymousAuthenticationFilter@40d65ccf, org.springframework.security.web.session.SessionManagementFilter@5123ac5, org.springframework.security.web.access.ExceptionTranslationFilter@2c678302, org.springframework.security.web.access.intercept.FilterSecurityInterceptor@59dd1e95]
2022-05-26 12:29:17,242 INFO [localhost-startStop-1] http.DefaultFilterChainValidator:154 : Checking whether login URL '/login' is accessible with your configuration
2022-05-26 12:29:17,242 INFO [localhost-startStop-1] http.DefaultFilterChainValidator:154 : Checking whether login URL '/login' is accessible with your configuration
2022-05-26 12:29:17,248 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/user/authentication*/'
2022-05-26 12:29:17,248 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/user/authentication*/
'
2022-05-26 12:29:17,248 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query/runningQueries'
2022-05-26 12:29:17,248 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query/runningQueries'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query//stop'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query/
/stop'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query*/'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/query*/
'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/metadata*/'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/metadata*/
'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api//metrics'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/
/metrics'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cache*/'
2022-05-26 12:29:17,249 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cache*/
'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/streaming_coordinator/'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/streaming_coordinator/
'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/service_discovery/state/is_active_job_node'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/service_discovery/state/is_active_job_node'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cubes/src/tables'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cubes/src/tables'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cubes*/'
2022-05-26 12:29:17,251 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/cubes*/
'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/models*/'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/models*/
'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/streaming*/'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/streaming*/
'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/job*/'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/job*/
'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin/public_config'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin/public_config'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin/version'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin/version'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/projects'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/projects'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin*/'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/admin*/
'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/tables//snapshotLocalCache/'
2022-05-26 12:29:17,252 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/tables//snapshotLocalCache/'
2022-05-26 12:29:17,253 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/'
2022-05-26 12:29:17,253 DEBUG [localhost-startStop-1] matcher.AntPathRequestMatcher:157 : Checking match of request : '/login'; against '/api/
'
2022-05-26 12:29:17,253 DEBUG [localhost-startStop-1] http.DefaultFilterChainValidator:186 : No access attributes defined for login page URL
2022-05-26 12:29:17,253 DEBUG [localhost-startStop-1] http.DefaultFilterChainValidator:186 : No access attributes defined for login page URL