[jira] [Work logged] (HIVE-26705) Fix Typo in hive-kudu-handler

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26705?focusedWorklogId=823264=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823264
 ]

ASF GitHub Bot logged work on HIVE-26705:
-

Author: ASF GitHub Bot
Created on: 04/Nov/22 05:25
Start Date: 04/Nov/22 05:25
Worklog Time Spent: 10m 
  Work Description: slfan1989 commented on PR #3729:
URL: https://github.com/apache/hive/pull/3729#issuecomment-1302994124

   > LGTM
   
   @ayushtkn Thank you very much for your help reviewing the code and merging 
the pr!




Issue Time Tracking
---

Worklog Id: (was: 823264)
Time Spent: 1h  (was: 50m)

> Fix Typo in hive-kudu-handler
> -
>
> Key: HIVE-26705
> URL: https://issues.apache.org/jira/browse/HIVE-26705
> Project: Hive
>  Issue Type: Improvement
>Reporter: fanshilun
>Assignee: fanshilun
>Priority: Major
>  Labels: pull-request-available
> Fix For: 4.0.0
>
>  Time Spent: 1h
>  Remaining Estimate: 0h
>
> When reading the code, I found typo and repaired the typo of the moudle.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26705) Fix Typo in hive-kudu-handler

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26705?focusedWorklogId=823262=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823262
 ]

ASF GitHub Bot logged work on HIVE-26705:
-

Author: ASF GitHub Bot
Created on: 04/Nov/22 05:24
Start Date: 04/Nov/22 05:24
Worklog Time Spent: 10m 
  Work Description: slfan1989 commented on PR #3729:
URL: https://github.com/apache/hive/pull/3729#issuecomment-1302993587

   > +1 (non-binding)
   > 
   > Thank you, @slfan1989 !
   
   @cnauroth Thank you very much for your help reviewing the code!




Issue Time Tracking
---

Worklog Id: (was: 823262)
Time Spent: 50m  (was: 40m)

> Fix Typo in hive-kudu-handler
> -
>
> Key: HIVE-26705
> URL: https://issues.apache.org/jira/browse/HIVE-26705
> Project: Hive
>  Issue Type: Improvement
>Reporter: fanshilun
>Assignee: fanshilun
>Priority: Major
>  Labels: pull-request-available
> Fix For: 4.0.0
>
>  Time Spent: 50m
>  Remaining Estimate: 0h
>
> When reading the code, I found typo and repaired the typo of the moudle.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Assigned] (HIVE-25483) TxnHandler::acquireLock should close the DB conn to avoid connection leaks

2022-11-03 Thread KIRTI RUGE (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-25483?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

KIRTI RUGE reassigned HIVE-25483:
-

Assignee: KIRTI RUGE

> TxnHandler::acquireLock should close the DB conn to avoid connection leaks
> --
>
> Key: HIVE-25483
> URL: https://issues.apache.org/jira/browse/HIVE-25483
> Project: Hive
>  Issue Type: Improvement
>Reporter: Rajesh Balamohan
>Assignee: KIRTI RUGE
>Priority: Major
>
> TxnHandler::acquireLock should close DB connection on exiting the function. 
> [https://github.com/apache/hive/blob/master/standalone-metastore/metastore-server/src/main/java/org/apache/hadoop/hive/metastore/txn/TxnHandler.java#L5688]
> [https://github.com/apache/hive/blob/master/standalone-metastore/metastore-server/src/main/java/org/apache/hadoop/hive/metastore/txn/TxnHandler.java#L5726]
> [https://github.com/apache/hive/blob/master/standalone-metastore/metastore-server/src/main/java/org/apache/hadoop/hive/metastore/txn/TxnHandler.java#L5737-L5740]
>  If there are any exceptions downstream, this connection isn't closed 
> cleanly. In a corner case, hikari connection leak detector reported the 
> following
> {noformat}
> 2021-08-26 09:19:18,102 WARN  com.zaxxer.hikari.pool.ProxyLeakTask: 
> [HikariPool-4 housekeeper]: Connection leak detection triggered for 
> org.postgresql.jdbc.PgConnection@77f76747, stack trace follows
> java.lang.Exception: Apparent connection leak detected
> at 
> org.apache.hadoop.hive.metastore.txn.TxnHandler.getDbConn(TxnHandler.java:3843)
> at 
> org.apache.hadoop.hive.metastore.txn.TxnHandler.acquireLock(TxnHandler.java:5135)
>  
> at 
> org.apache.hadoop.hive.ql.txn.compactor.Initiator.run(Initiator.java:107) 
> {noformat}



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Assigned] (HIVE-26085) "getTableObjectByName method should ignore it" exception doesn't include cause

2022-11-03 Thread KIRTI RUGE (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26085?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

KIRTI RUGE reassigned HIVE-26085:
-

Assignee: KIRTI RUGE

> "getTableObjectByName method should ignore it" exception doesn't include cause
> --
>
> Key: HIVE-26085
> URL: https://issues.apache.org/jira/browse/HIVE-26085
> Project: Hive
>  Issue Type: Improvement
>  Components: Parser
> Environment: HDP 3.1.5
>Reporter: Wataru Yukawa
>Assignee: KIRTI RUGE
>Priority: Major
>
> current logic doesn't contain cause
> https://github.com/apache/hive/blob/a6e93633dc15aba179fb6ad422be4cbc88adf071/ql/src/java/org/apache/hadoop/hive/ql/parse/SemanticAnalyzer.java#L12208
> but
> {code}
> throw new SemanticException("Got exception though getTableObjectByName method 
> should ignore it", e)
> {code}
> seems better for troubleshooting.
> We encounter this issue when user access hive view where user doesn't hive 
> permission in original hive table.
> {code}
> create view aaa_view
> as
> select ... from aaa
> {code}
> "getTableObjectByName" exception happens when user try to access "aaa_view" 
> but doesn't have permission "aaa" table with apache ranger.
> {code}
> Caused by: java.lang.RuntimeException: 
> org.apache.hadoop.hive.ql.parse.SemanticException:Got exception though 
> getTableObjectByName method should ignore it
> at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.walkASTMarkTABREF(SemanticAnalyzer.java:12020)
> at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.rewriteASTWithMaskAndFilter(SemanticAnalyzer.java:12139)
> at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.replaceViewReferenceWithDefinition(SemanticAnalyzer.java:2608)
> at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.getMetaData(SemanticAnalyzer.java:2192)
> at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.getMetaData(SemanticAnalyzer.java:2103)
> at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.getMetaData(SemanticAnalyzer.java:2257)
> at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.getMetaData(SemanticAnalyzer.java:2088)
> at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.genResolvedParseTree(SemanticAnalyzer.java:12234)
> at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.analyzeInternal(SemanticAnalyzer.java:12328)
> at 
> org.apache.hadoop.hive.ql.parse.CalcitePlanner.analyzeInternal(CalcitePlanner.java:367)
> at 
> org.apache.hadoop.hive.ql.parse.BaseSemanticAnalyzer.analyze(BaseSemanticAnalyzer.java:290)
> at org.apache.hadoop.hive.ql.Driver.compile(Driver.java:664)
> at org.apache.hadoop.hive.ql.Driver.compileInternal(Driver.java:1870)
> at 
> org.apache.hadoop.hive.ql.Driver.compileAndRespond(Driver.java:1817)
> at 
> org.apache.hadoop.hive.ql.Driver.compileAndRespond(Driver.java:1812)
> at 
> org.apache.hadoop.hive.ql.reexec.ReExecDriver.compileAndRespond(ReExecDriver.java:126)
> at 
> org.apache.hive.service.cli.operation.SQLOperation.prepare(SQLOperation.java:197)
> ... 26 common frames omitted
> {code}
> In this case, we can't see error log like "permission denied" when user try 
> to access "aaa_view".
> So, it would be nice to add cause



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (HIVE-26705) Fix Typo in hive-kudu-handler

2022-11-03 Thread Ayush Saxena (Jira)


[ 
https://issues.apache.org/jira/browse/HIVE-26705?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17628671#comment-17628671
 ] 

Ayush Saxena commented on HIVE-26705:
-

Committed to master.
Thanx [~slfan1989] for the contribution and [~cnauroth] for the review!!!

> Fix Typo in hive-kudu-handler
> -
>
> Key: HIVE-26705
> URL: https://issues.apache.org/jira/browse/HIVE-26705
> Project: Hive
>  Issue Type: Improvement
>Reporter: fanshilun
>Assignee: fanshilun
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 40m
>  Remaining Estimate: 0h
>
> When reading the code, I found typo and repaired the typo of the moudle.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (HIVE-26705) Fix Typo in hive-kudu-handler

2022-11-03 Thread Ayush Saxena (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26705?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ayush Saxena updated HIVE-26705:

Fix Version/s: 4.0.0

> Fix Typo in hive-kudu-handler
> -
>
> Key: HIVE-26705
> URL: https://issues.apache.org/jira/browse/HIVE-26705
> Project: Hive
>  Issue Type: Improvement
>Reporter: fanshilun
>Assignee: fanshilun
>Priority: Major
>  Labels: pull-request-available
> Fix For: 4.0.0
>
>  Time Spent: 40m
>  Remaining Estimate: 0h
>
> When reading the code, I found typo and repaired the typo of the moudle.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Resolved] (HIVE-26705) Fix Typo in hive-kudu-handler

2022-11-03 Thread Ayush Saxena (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26705?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ayush Saxena resolved HIVE-26705.
-
Resolution: Fixed

> Fix Typo in hive-kudu-handler
> -
>
> Key: HIVE-26705
> URL: https://issues.apache.org/jira/browse/HIVE-26705
> Project: Hive
>  Issue Type: Improvement
>Reporter: fanshilun
>Assignee: fanshilun
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 40m
>  Remaining Estimate: 0h
>
> When reading the code, I found typo and repaired the typo of the moudle.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26705) Fix Typo in hive-kudu-handler

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26705?focusedWorklogId=823258=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823258
 ]

ASF GitHub Bot logged work on HIVE-26705:
-

Author: ASF GitHub Bot
Created on: 04/Nov/22 04:47
Start Date: 04/Nov/22 04:47
Worklog Time Spent: 10m 
  Work Description: ayushtkn merged PR #3729:
URL: https://github.com/apache/hive/pull/3729




Issue Time Tracking
---

Worklog Id: (was: 823258)
Time Spent: 40m  (was: 0.5h)

> Fix Typo in hive-kudu-handler
> -
>
> Key: HIVE-26705
> URL: https://issues.apache.org/jira/browse/HIVE-26705
> Project: Hive
>  Issue Type: Improvement
>Reporter: fanshilun
>Assignee: fanshilun
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 40m
>  Remaining Estimate: 0h
>
> When reading the code, I found typo and repaired the typo of the moudle.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26705) Fix Typo in hive-kudu-handler

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26705?focusedWorklogId=823236=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823236
 ]

ASF GitHub Bot logged work on HIVE-26705:
-

Author: ASF GitHub Bot
Created on: 04/Nov/22 02:42
Start Date: 04/Nov/22 02:42
Worklog Time Spent: 10m 
  Work Description: slfan1989 commented on PR #3729:
URL: https://github.com/apache/hive/pull/3729#issuecomment-1302884961

   @ayushtkn Can you help review this pr? Thank you very much!




Issue Time Tracking
---

Worklog Id: (was: 823236)
Time Spent: 0.5h  (was: 20m)

> Fix Typo in hive-kudu-handler
> -
>
> Key: HIVE-26705
> URL: https://issues.apache.org/jira/browse/HIVE-26705
> Project: Hive
>  Issue Type: Improvement
>Reporter: fanshilun
>Assignee: fanshilun
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 0.5h
>  Remaining Estimate: 0h
>
> When reading the code, I found typo and repaired the typo of the moudle.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26705) Fix Typo in hive-kudu-handler

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26705?focusedWorklogId=823222=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823222
 ]

ASF GitHub Bot logged work on HIVE-26705:
-

Author: ASF GitHub Bot
Created on: 04/Nov/22 00:32
Start Date: 04/Nov/22 00:32
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #3729:
URL: https://github.com/apache/hive/pull/3729#issuecomment-1302822301

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=3729)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3729=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3729=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3729=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3729=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3729=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3729=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3729=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3729=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3729=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3729=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3729=false=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=3729=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3729=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3729=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 823222)
Time Spent: 20m  (was: 10m)

> Fix Typo in hive-kudu-handler
> -
>
> Key: HIVE-26705
> URL: https://issues.apache.org/jira/browse/HIVE-26705
> Project: Hive
>  Issue Type: Improvement
>Reporter: fanshilun
>Assignee: fanshilun
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> When reading the code, I found typo and repaired the typo of the moudle.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26513) Hive Metastore fail to start in Hadoop3.3.x when Kerberos enabled

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26513?focusedWorklogId=823220=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823220
 ]

ASF GitHub Bot logged work on HIVE-26513:
-

Author: ASF GitHub Bot
Created on: 04/Nov/22 00:25
Start Date: 04/Nov/22 00:25
Worklog Time Spent: 10m 
  Work Description: github-actions[bot] commented on PR #3573:
URL: https://github.com/apache/hive/pull/3573#issuecomment-1302819013

   This pull request has been automatically marked as stale because it has not 
had recent activity. It will be closed if no further activity occurs.
   Feel free to reach out on the d...@hive.apache.org list if the patch is in 
need of reviews.




Issue Time Tracking
---

Worklog Id: (was: 823220)
Time Spent: 20m  (was: 10m)

> Hive Metastore fail to start in Hadoop3.3.x when Kerberos enabled
> -
>
> Key: HIVE-26513
> URL: https://issues.apache.org/jira/browse/HIVE-26513
> Project: Hive
>  Issue Type: Bug
> Environment: Hive-3.1.3
> Hadoop-3.3.4
> Zookeeper-3.5.9
>Reporter: Yu Hou
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 20m
>  Remaining Estimate: 0h
>
> Fail to start Hive metastore when enable Kerberos in Hadoop 3.3.x
> {code:java}
> 2022-09-02T06:20:04,458 INFO  [main]: zookeeper.ZooKeeper 
> (ZooKeeper.java:(868)) - Initiating client connection, 
> connectString=ambari-agent-01:2181,ambari-agent-02:2181,ambari-server:2181 
> sessionTimeout=6 watcher=org.apache.curator.ConnectionState@433348bc
> 2022-09-02T06:20:04,470 INFO  [main]: common.X509Util 
> (X509Util.java:(79)) - Setting -D 
> jdk.tls.rejectClientInitiatedRenegotiation=true to disable client-initiated 
> TLS renegotiation
> 2022-09-02T06:20:04,499 INFO  [main]: zookeeper.ClientCnxnSocket 
> (ClientCnxnSocket.java:initProperties(237)) - jute.maxbuffer value is 4194304 
> Bytes
> 2022-09-02T06:20:04,540 INFO  [main]: zookeeper.ClientCnxn 
> (ClientCnxn.java:initRequestTimeout(1653)) - zookeeper.request.timeout value 
> is 0. feature enabled=
> 2022-09-02T06:20:04,587 ERROR [main]: metastore.HiveMetaStore 
> (HiveMetaStore.java:startMetaStore(9056)) - java.lang.NoSuchMethodError: 
> org.apache.curator.framework.api.CreateBuilder.creatingParentsIfNeeded()Lorg/apache/curator/framework/api/ProtectACLCreateModeStatPathAndBytesable;
>   at 
> org.apache.hadoop.hive.metastore.security.ZooKeeperTokenStore.ensurePath(ZooKeeperTokenStore.java:158)
>   at 
> org.apache.hadoop.hive.metastore.security.ZooKeeperTokenStore.initClientAndPaths(ZooKeeperTokenStore.java:234)
>   at 
> org.apache.hadoop.hive.metastore.security.ZooKeeperTokenStore.init(ZooKeeperTokenStore.java:471)
>   at 
> org.apache.hadoop.hive.metastore.security.MetastoreDelegationTokenManager.startDelegationTokenSecretManager(MetastoreDelegationTokenManager.java:76)
>   at 
> org.apache.hadoop.hive.metastore.HiveMetaStore.startMetaStore(HiveMetaStore.java:8952)
>   at 
> org.apache.hadoop.hive.metastore.HiveMetaStore.main(HiveMetaStore.java:8854)
>   at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
>   at 
> sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
>   at 
> sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
>   at java.lang.reflect.Method.invoke(Method.java:498)
>   at org.apache.hadoop.util.RunJar.run(RunJar.java:323)
>   at org.apache.hadoop.util.RunJar.main(RunJar.java:236)
> 2022-09-02T06:20:04,613 INFO  [main-SendThread(ambari-agent-01:2181)]: 
> zookeeper.Login (Login.java:login(302)) - HiveZooKeeperClient successfully 
> logged in.
> 2022-09-02T06:20:04,615 INFO  [Thread-6]: zookeeper.Login 
> (Login.java:run(135)) - TGT refresh thread started.
> 2022-09-02T06:20:04,640 INFO  [main-SendThread(ambari-agent-01:2181)]: 
> client.ZooKeeperSaslClient (SecurityUtils.java:run(128)) - Client will use 
> GSSAPI as SASL mechanism.
> 2022-09-02T06:20:04,588 ERROR [main]: metastore.HiveMetaStore 
> (HiveMetaStore.java:main(8859)) - Metastore Thrift Server threw an 
> exception...
> java.lang.NoSuchMethodError: 
> org.apache.curator.framework.api.CreateBuilder.creatingParentsIfNeeded()Lorg/apache/curator/framework/api/ProtectACLCreateModeStatPathAndBytesable;
>   at 
> org.apache.hadoop.hive.metastore.security.ZooKeeperTokenStore.ensurePath(ZooKeeperTokenStore.java:158)
>  ~[hive-exec-3.1.3.jar:3.1.3]
>   at 
> org.apache.hadoop.hive.metastore.security.ZooKeeperTokenStore.initClientAndPaths(ZooKeeperTokenStore.java:234)
>  ~[hive-exec-3.1.3.jar:3.1.3]
>   at 
> org.apache.hadoop.hive.metastore.security.ZooKeeperTokenStore.init(ZooKeeperTokenStore.java:471)
>  ~[hive-exec-3.1.3.jar:3.1.3]
>   at 
> 

[jira] [Work logged] (HIVE-26012) HMS APIs to be enhanced for metadata replication

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26012?focusedWorklogId=823221=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823221
 ]

ASF GitHub Bot logged work on HIVE-26012:
-

Author: ASF GitHub Bot
Created on: 04/Nov/22 00:25
Start Date: 04/Nov/22 00:25
Worklog Time Spent: 10m 
  Work Description: github-actions[bot] closed pull request #3477: 
HIVE-26012: HMS APIs to be enhanced for metadata replication
URL: https://github.com/apache/hive/pull/3477




Issue Time Tracking
---

Worklog Id: (was: 823221)
Time Spent: 6h  (was: 5h 50m)

> HMS APIs to be enhanced for metadata replication
> 
>
> Key: HIVE-26012
> URL: https://issues.apache.org/jira/browse/HIVE-26012
> Project: Hive
>  Issue Type: Improvement
>  Components: Metastore
>Affects Versions: 3.1.0
>Reporter: Naveen Gangam
>Assignee: Hongdan Zhu
>Priority: Major
>  Labels: pull-request-available
> Attachments: HMS APIs to be enhanced for metadata replication.docx
>
>  Time Spent: 6h
>  Remaining Estimate: 0h
>
> HMS currently has APIs like these that automatically create/delete the 
> directories on the associated DFS. 
> [create/drop]_database
> [create/drop]_table*
> [add/append/drop]_partition*
> This is expected and should be this way when query processors use this APIs. 
> However, when tools that replicate hive metadata use this APIs on the target 
> cluster, creating these dirs on target side which cause the replication of 
> DFS-snapshots to fail.
> So we if provide an option to bypass this creation of dirs, dfs replications 
> will be smoother. In the future we will need to restrict users that can use 
> these APIs. So we will have some sort of an authorization policy.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26705) Fix Typo in hive-kudu-handler

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26705?focusedWorklogId=823218=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823218
 ]

ASF GitHub Bot logged work on HIVE-26705:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 23:40
Start Date: 03/Nov/22 23:40
Worklog Time Spent: 10m 
  Work Description: slfan1989 opened a new pull request, #3729:
URL: https://github.com/apache/hive/pull/3729

   JIRA: HIVE-26705. Fix Typo in hive-kudu-handler.
   
   When reading the code, I found typo and repaired the typo of the moudle.




Issue Time Tracking
---

Worklog Id: (was: 823218)
Remaining Estimate: 0h
Time Spent: 10m

> Fix Typo in hive-kudu-handler
> -
>
> Key: HIVE-26705
> URL: https://issues.apache.org/jira/browse/HIVE-26705
> Project: Hive
>  Issue Type: Improvement
>Reporter: fanshilun
>Assignee: fanshilun
>Priority: Major
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> When reading the code, I found typo and repaired the typo of the moudle.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (HIVE-26705) Fix Typo in hive-kudu-handler

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26705?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

ASF GitHub Bot updated HIVE-26705:
--
Labels: pull-request-available  (was: )

> Fix Typo in hive-kudu-handler
> -
>
> Key: HIVE-26705
> URL: https://issues.apache.org/jira/browse/HIVE-26705
> Project: Hive
>  Issue Type: Improvement
>Reporter: fanshilun
>Assignee: fanshilun
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 10m
>  Remaining Estimate: 0h
>
> When reading the code, I found typo and repaired the typo of the moudle.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Assigned] (HIVE-26705) Fix Typo in hive-kudu-handler

2022-11-03 Thread fanshilun (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26705?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

fanshilun reassigned HIVE-26705:



> Fix Typo in hive-kudu-handler
> -
>
> Key: HIVE-26705
> URL: https://issues.apache.org/jira/browse/HIVE-26705
> Project: Hive
>  Issue Type: Improvement
>Reporter: fanshilun
>Assignee: fanshilun
>Priority: Major
>
> When reading the code, I found typo and repaired the typo of the moudle.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work started] (HIVE-26705) Fix Typo in hive-kudu-handler

2022-11-03 Thread fanshilun (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26705?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Work on HIVE-26705 started by fanshilun.

> Fix Typo in hive-kudu-handler
> -
>
> Key: HIVE-26705
> URL: https://issues.apache.org/jira/browse/HIVE-26705
> Project: Hive
>  Issue Type: Improvement
>Reporter: fanshilun
>Assignee: fanshilun
>Priority: Major
>
> When reading the code, I found typo and repaired the typo of the moudle.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26648) Upgrade Bouncy Castle to 1.70 due to high CVEs

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26648?focusedWorklogId=823200=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823200
 ]

ASF GitHub Bot logged work on HIVE-26648:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 21:13
Start Date: 03/Nov/22 21:13
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #3727:
URL: https://github.com/apache/hive/pull/3727#issuecomment-1302668666

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=3727)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3727=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3727=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3727=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3727=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3727=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 823200)
Time Spent: 1h 20m  (was: 1h 10m)

>  Upgrade Bouncy Castle to 1.70 due to high CVEs
> ---
>
> Key: HIVE-26648
> URL: https://issues.apache.org/jira/browse/HIVE-26648
> Project: Hive
>  Issue Type: Task
>Reporter: Devaspati Krishnatri
>Assignee: Devaspati Krishnatri
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 1h 20m
>  Remaining Estimate: 0h
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (HIVE-26704) Cleaner shouldn't be blocked by global min open txnId

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26704?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

ASF GitHub Bot updated HIVE-26704:
--
Labels: pull-request-available  (was: )

> Cleaner shouldn't be blocked by global min open txnId
> -
>
> Key: HIVE-26704
> URL: https://issues.apache.org/jira/browse/HIVE-26704
> Project: Hive
>  Issue Type: Task
>Reporter: Denys Kuzmenko
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 10m
>  Remaining Estimate: 0h
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26704) Cleaner shouldn't be blocked by global min open txnId

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26704?focusedWorklogId=823192=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823192
 ]

ASF GitHub Bot logged work on HIVE-26704:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 20:39
Start Date: 03/Nov/22 20:39
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #3576:
URL: https://github.com/apache/hive/pull/3576#issuecomment-1302638546

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=3576)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3576=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3576=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3576=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3576=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3576=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3576=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3576=false=SECURITY_HOTSPOT)
 
[![E](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/E-16px.png
 
'E')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3576=false=SECURITY_HOTSPOT)
 [2 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3576=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3576=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3576=false=CODE_SMELL)
 [18 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=3576=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3576=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3576=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 823192)
Remaining Estimate: 0h
Time Spent: 10m

> Cleaner shouldn't be blocked by global min open txnId
> -
>
> Key: HIVE-26704
> URL: https://issues.apache.org/jira/browse/HIVE-26704
> Project: Hive
>  Issue Type: Task
>Reporter: Denys Kuzmenko
>Priority: Major
>  Time Spent: 10m
>  Remaining Estimate: 0h
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26648) Upgrade Bouncy Castle to 1.70 due to high CVEs

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26648?focusedWorklogId=823160=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823160
 ]

ASF GitHub Bot logged work on HIVE-26648:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 18:05
Start Date: 03/Nov/22 18:05
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #3727:
URL: https://github.com/apache/hive/pull/3727#issuecomment-1302487087

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=3727)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3727=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3727=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3727=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3727=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3727=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 823160)
Time Spent: 1h 10m  (was: 1h)

>  Upgrade Bouncy Castle to 1.70 due to high CVEs
> ---
>
> Key: HIVE-26648
> URL: https://issues.apache.org/jira/browse/HIVE-26648
> Project: Hive
>  Issue Type: Task
>Reporter: Devaspati Krishnatri
>Assignee: Devaspati Krishnatri
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 1h 10m
>  Remaining Estimate: 0h
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (HIVE-26702) Backport HIVE-17315 (more flexible metastore database connection pooling) to 3.2.0.

2022-11-03 Thread Chris Nauroth (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26702?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Chris Nauroth updated HIVE-26702:
-
Description: HIVE-17315 added support for more flexible metastore 
connection pooling configuration, integration with DBCP and an important 
capability to the HikariCP integration: passthrough configuration of any 
additional HikariCP configurations, such as {{{}minimumIdle{}}}. This issue 
proposes to backport all 5 sub-tasks of HIVE-17315 for inclusion in the 
upcoming 3.2.0 release.  (was: HIVE-17317 added support for using DBCP as the 
metastore's database connection pooling implementation. It also added an 
important capability to the HikariCP integration: passthrough configuration of 
any additional HikariCP configurations, such as {{{}minimumIdle{}}}. This issue 
proposes to backport this for the upcoming 3.2.0 release.)
Summary: Backport HIVE-17315 (more flexible metastore database 
connection pooling) to 3.2.0.  (was: Backport HIVE-17317 (metastore DBCP and 
HikariCP configuration support) to 3.x.)

> Backport HIVE-17315 (more flexible metastore database connection pooling) to 
> 3.2.0.
> ---
>
> Key: HIVE-26702
> URL: https://issues.apache.org/jira/browse/HIVE-26702
> Project: Hive
>  Issue Type: Improvement
>  Components: Metastore
>Reporter: Chris Nauroth
>Assignee: Chris Nauroth
>Priority: Major
>
> HIVE-17315 added support for more flexible metastore connection pooling 
> configuration, integration with DBCP and an important capability to the 
> HikariCP integration: passthrough configuration of any additional HikariCP 
> configurations, such as {{{}minimumIdle{}}}. This issue proposes to backport 
> all 5 sub-tasks of HIVE-17315 for inclusion in the upcoming 3.2.0 release.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Assigned] (HIVE-26702) Backport HIVE-17317 (metastore DBCP and HikariCP configuration support) to 3.x.

2022-11-03 Thread Chris Nauroth (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26702?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Chris Nauroth reassigned HIVE-26702:



> Backport HIVE-17317 (metastore DBCP and HikariCP configuration support) to 
> 3.x.
> ---
>
> Key: HIVE-26702
> URL: https://issues.apache.org/jira/browse/HIVE-26702
> Project: Hive
>  Issue Type: Improvement
>  Components: Metastore
>Reporter: Chris Nauroth
>Assignee: Chris Nauroth
>Priority: Major
>
> HIVE-17317 added support for using DBCP as the metastore's database 
> connection pooling implementation. It also added an important capability to 
> the HikariCP integration: passthrough configuration of any additional 
> HikariCP configurations, such as {{{}minimumIdle{}}}. This issue proposes to 
> backport this for the upcoming 3.2.0 release.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26648) Upgrade Bouncy Castle to 1.70 due to high CVEs

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26648?focusedWorklogId=823149=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823149
 ]

ASF GitHub Bot logged work on HIVE-26648:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 17:21
Start Date: 03/Nov/22 17:21
Worklog Time Spent: 10m 
  Work Description: cnauroth commented on PR #3727:
URL: https://github.com/apache/hive/pull/3727#issuecomment-1302435776

   Something odd happened in that last pre-commit, and it looks unrelated to 
this change. I triggered a re-run:
   
   
http://ci.hive.apache.org/blue/organizations/jenkins/hive-precommit/detail/PR-3727/2/pipeline/




Issue Time Tracking
---

Worklog Id: (was: 823149)
Time Spent: 1h  (was: 50m)

>  Upgrade Bouncy Castle to 1.70 due to high CVEs
> ---
>
> Key: HIVE-26648
> URL: https://issues.apache.org/jira/browse/HIVE-26648
> Project: Hive
>  Issue Type: Task
>Reporter: Devaspati Krishnatri
>Assignee: Devaspati Krishnatri
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 1h
>  Remaining Estimate: 0h
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (HIVE-26684) Upgrade maven-shade-plugin from 3.4.1 for bug fixes.

2022-11-03 Thread Chris Nauroth (Jira)


[ 
https://issues.apache.org/jira/browse/HIVE-26684?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17628426#comment-17628426
 ] 

Chris Nauroth commented on HIVE-26684:
--

Thank you, [~ngangam] and [~ayushtkn] !

> Upgrade maven-shade-plugin from 3.4.1 for bug fixes.
> 
>
> Key: HIVE-26684
> URL: https://issues.apache.org/jira/browse/HIVE-26684
> Project: Hive
>  Issue Type: Bug
>  Components: Build Infrastructure
>Reporter: Chris Nauroth
>Assignee: Chris Nauroth
>Priority: Major
>  Labels: pull-request-available
> Fix For: 4.0.0
>
>  Time Spent: 1.5h
>  Remaining Estimate: 0h
>
> The Hive build currently runs with maven-shade-plugin version 3.1.1, released 
> in April 2018. This issue proposes to upgrade to the latest version, 3.4.1, 
> released in October 2022. See HIVE-26648 for an example of another patch that 
> is blocked due to a bug in version 3.1.1.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (HIVE-13288) Confusing exception message in DagUtils.localizeResource

2022-11-03 Thread Chris Nauroth (Jira)


[ 
https://issues.apache.org/jira/browse/HIVE-13288?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17628425#comment-17628425
 ] 

Chris Nauroth commented on HIVE-13288:
--

Thank you, [~rbalamohan] and [~abstractdog] !

> Confusing exception message in DagUtils.localizeResource
> 
>
> Key: HIVE-13288
> URL: https://issues.apache.org/jira/browse/HIVE-13288
> Project: Hive
>  Issue Type: Improvement
>  Components: HiveServer2
>Affects Versions: 1.2.1
>Reporter: Jeff Zhang
>Assignee: Chris Nauroth
>Priority: Major
>  Labels: pull-request-available
> Fix For: 4.0.0-alpha-2
>
>  Time Spent: 40m
>  Remaining Estimate: 0h
>
> I got the following exception when query through hive server2. And check the 
> source code, it it due to some error when copying data from local to hdfs. 
> But the IOException is ignored and assume that it is due to another thread is 
> also writing. I don't think it make sense to assume that, at least should log 
> the IOException. 
> {code}
> LOG.info("Localizing resource because it does not exist: " + src + " to dest: 
> " + dest);
>   try {
> destFS.copyFromLocalFile(false, false, src, dest);
>   } catch (IOException e) {
> LOG.info("Looks like another thread is writing the same file will 
> wait.");
> int waitAttempts =
> 
> conf.getInt(HiveConf.ConfVars.HIVE_LOCALIZE_RESOURCE_NUM_WAIT_ATTEMPTS.varname,
> 
> HiveConf.ConfVars.HIVE_LOCALIZE_RESOURCE_NUM_WAIT_ATTEMPTS.defaultIntVal);
> long sleepInterval = HiveConf.getTimeVar(
> conf, HiveConf.ConfVars.HIVE_LOCALIZE_RESOURCE_WAIT_INTERVAL,
> TimeUnit.MILLISECONDS);
> LOG.info("Number of wait attempts: " + waitAttempts + ". Wait 
> interval: "
> + sleepInterval);
> boolean found = false;
> {code}
> {noformat}
> 2016-03-15 11:25:39,921 INFO  [HiveServer2-Background-Pool: Thread-249]: 
> tez.DagUtils (DagUtils.java:getHiveJarDirectory(876)) - Jar dir is 
> null/directory doesn't exist. Choosing HIVE_INSTALL_DIR - /user/jeff/.hiveJars
> 2016-03-15 11:25:40,058 INFO  [HiveServer2-Background-Pool: Thread-249]: 
> tez.DagUtils (DagUtils.java:localizeResource(952)) - Localizing resource 
> because it does not exist: 
> file:/usr/hdp/2.3.2.0-2950/hive/lib/hive-exec-1.2.1.2.3.2.0-2950.jar to dest: 
> hdfs://sandbox.hortonworks.com:8020/user/jeff/.hiveJars/hive-exec-1.2.1.2.3.2.0-2950-a97c953db414a4f792d868e2b0417578a61ccfa368048016926117b641b07f34.jar
> 2016-03-15 11:25:40,063 INFO  [HiveServer2-Background-Pool: Thread-249]: 
> tez.DagUtils (DagUtils.java:localizeResource(956)) - Looks like another 
> thread is writing the same file will wait.
> 2016-03-15 11:25:40,064 INFO  [HiveServer2-Background-Pool: Thread-249]: 
> tez.DagUtils (DagUtils.java:localizeResource(963)) - Number of wait attempts: 
> 5. Wait interval: 5000
> 2016-03-15 11:25:53,548 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> thrift.ThriftCLIService (ThriftCLIService.java:OpenSession(294)) - Client 
> protocol version: HIVE_CLI_SERVICE_PROTOCOL_V8
> 2016-03-15 11:25:53,548 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> metastore.HiveMetaStore (HiveMetaStore.java:logInfo(747)) - 1: Shutting down 
> the object store...
> 2016-03-15 11:25:53,549 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> HiveMetaStore.audit (HiveMetaStore.java:logAuditEvent(372)) - 
> ugi=hive/sandbox.hortonworks@example.com   ip=unknown-ip-addr  
> cmd=Shutting down the object store...
> 2016-03-15 11:25:53,549 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> metastore.HiveMetaStore (HiveMetaStore.java:logInfo(747)) - 1: Metastore 
> shutdown complete.
> 2016-03-15 11:25:53,549 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> HiveMetaStore.audit (HiveMetaStore.java:logAuditEvent(372)) - 
> ugi=hive/sandbox.hortonworks@example.com   ip=unknown-ip-addr  
> cmd=Metastore shutdown complete.
> 2016-03-15 11:25:53,573 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> session.SessionState (SessionState.java:createPath(641)) - Created local 
> directory: /tmp/e43fbaab-a659-4331-90cb-0ea0b2098e25_resources
> 2016-03-15 11:25:53,577 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> session.SessionState (SessionState.java:createPath(641)) - Created HDFS 
> directory: /tmp/hive/ambari-qa/e43fbaab-a659-4331-90cb-0ea0b2098e25
> 2016-03-15 11:25:53,582 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> session.SessionState (SessionState.java:createPath(641)) - Created local 
> directory: /tmp/hive/e43fbaab-a659-4331-90cb-0ea0b2098e25
> 2016-03-15 11:25:53,587 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> session.SessionState (SessionState.java:createPath(641)) - Created HDFS 
> directory: 
> 

[jira] [Work logged] (HIVE-26693) HS2 can not read/write hive_catalog iceberg table created by other engines

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26693?focusedWorklogId=823121=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823121
 ]

ASF GitHub Bot logged work on HIVE-26693:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 15:50
Start Date: 03/Nov/22 15:50
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #3726:
URL: https://github.com/apache/hive/pull/3726#issuecomment-1302314882

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=3726)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3726=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3726=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3726=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3726=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3726=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3726=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3726=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3726=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3726=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3726=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3726=false=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=3726=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3726=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3726=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 823121)
Time Spent: 40m  (was: 0.5h)

> HS2 can not read/write hive_catalog iceberg table created by other engines
> --
>
> Key: HIVE-26693
> URL: https://issues.apache.org/jira/browse/HIVE-26693
> Project: Hive
>  Issue Type: Improvement
>  Components: HiveServer2, StorageHandler
>Affects Versions: 4.0.0-alpha-2
>Reporter: zhangbutao
>Assignee: zhangbutao
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 40m
>  Remaining Estimate: 0h
>
> Step to reproduce:
>  # Create hive_catalog iceberg table by Trino/Presto/Flink (Spark with 
> _iceberg.engine.hive.enabled_ disabled)
>  # show table info with hive beeline:
> {code:java}
> ++
> |                   createtab_stmt                   |
> ++
> | CREATE EXTERNAL TABLE `iceberg_hive`.`testtrinoice`( |
> |   `id` int)                                        |
> | ROW FORMAT SERDE                                   |
> |   'org.apache.hadoop.hive.serde2.lazy.LazySimpleSerDe'  |
> | STORED AS INPUTFORMAT                              |
> |   'org.apache.hadoop.mapred.FileInputFormat'       |
> | OUTPUTFORMAT                                       |
> |   'org.apache.hadoop.mapred.FileOutputFormat'      |
> | LOCATION                                           

[jira] [Work logged] (HIVE-26628) Iceberg table is created when running explain ctas command

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26628?focusedWorklogId=823101=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823101
 ]

ASF GitHub Bot logged work on HIVE-26628:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 14:18
Start Date: 03/Nov/22 14:18
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #3724:
URL: https://github.com/apache/hive/pull/3724#issuecomment-1302183767

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=3724)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3724=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3724=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3724=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3724=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3724=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3724=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3724=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3724=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3724=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3724=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3724=false=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=3724=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3724=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3724=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 823101)
Time Spent: 2h  (was: 1h 50m)

> Iceberg table is created when running explain ctas command
> --
>
> Key: HIVE-26628
> URL: https://issues.apache.org/jira/browse/HIVE-26628
> Project: Hive
>  Issue Type: Bug
>  Components: StorageHandler
>Reporter: Krisztian Kasa
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 2h
>  Remaining Estimate: 0h
>
> {code}
> create table source(a int, b string, c int);
> explain
> create table tbl_ice stored by iceberg stored as orc tblproperties 
> ('format-version'='2') as
> select a, b, c from source;
> create table tbl_ice stored by iceberg stored as orc tblproperties 
> ('format-version'='2') as
> select a, b, c from source;
> {code}
> {code}
>  org.apache.hadoop.hive.ql.parse.SemanticException: 
> org.apache.hadoop.hive.ql.parse.SemanticException: Table already exists: 
> default.tbl_ice
>   at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.analyzeCreateTable(SemanticAnalyzer.java:13963)
>   at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.genResolvedParseTree(SemanticAnalyzer.java:12528)
>   at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.analyzeInternal(SemanticAnalyzer.java:12693)
>   at 
> org.apache.hadoop.hive.ql.parse.CalcitePlanner.analyzeInternal(CalcitePlanner.java:460)
>   at 
> 

[jira] [Work logged] (HIVE-26648) Upgrade Bouncy Castle to 1.70 due to high CVEs

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26648?focusedWorklogId=823099=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823099
 ]

ASF GitHub Bot logged work on HIVE-26648:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 14:06
Start Date: 03/Nov/22 14:06
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #3727:
URL: https://github.com/apache/hive/pull/3727#issuecomment-1302167306

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=3727)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3727=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3727=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3727=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=3727=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3727=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3727=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 823099)
Time Spent: 50m  (was: 40m)

>  Upgrade Bouncy Castle to 1.70 due to high CVEs
> ---
>
> Key: HIVE-26648
> URL: https://issues.apache.org/jira/browse/HIVE-26648
> Project: Hive
>  Issue Type: Task
>Reporter: Devaspati Krishnatri
>Assignee: Devaspati Krishnatri
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 50m
>  Remaining Estimate: 0h
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26243) Add vectorized implementation of the 'ds_kll_sketch' UDAF

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26243?focusedWorklogId=823078=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823078
 ]

ASF GitHub Bot logged work on HIVE-26243:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 13:00
Start Date: 03/Nov/22 13:00
Worklog Time Spent: 10m 
  Work Description: deniskuzZ commented on code in PR #3317:
URL: https://github.com/apache/hive/pull/3317#discussion_r1012869267


##
standalone-metastore/pom.xml:
##
@@ -181,6 +182,17 @@
 commons-lang3
 ${commons-lang3.version}
   
+  
+org.apache.datasketches

Review Comment:
   why do you need this, it's already defined in root pom DM?





Issue Time Tracking
---

Worklog Id: (was: 823078)
Time Spent: 3h 10m  (was: 3h)

> Add vectorized implementation of the 'ds_kll_sketch' UDAF
> -
>
> Key: HIVE-26243
> URL: https://issues.apache.org/jira/browse/HIVE-26243
> Project: Hive
>  Issue Type: Improvement
>  Components: UDF, Vectorization
>Affects Versions: 4.0.0-alpha-2
>Reporter: Alessandro Solimando
>Assignee: Alessandro Solimando
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 3h 10m
>  Remaining Estimate: 0h
>
> _ds_kll_sketch_ UDAF does not have a vectorized implementation at the moment, 
> the present ticket aims at bridging this gap.
> This is particularly important because vectorization has an "all or nothing" 
> approach, so if this function is used at the side of vectorized functions, 
> they won't be able to benefit from vectorized execution.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26243) Add vectorized implementation of the 'ds_kll_sketch' UDAF

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26243?focusedWorklogId=823077=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823077
 ]

ASF GitHub Bot logged work on HIVE-26243:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 12:59
Start Date: 03/Nov/22 12:59
Worklog Time Spent: 10m 
  Work Description: deniskuzZ commented on code in PR #3317:
URL: https://github.com/apache/hive/pull/3317#discussion_r1012845371


##
ql/src/java/org/apache/hadoop/hive/ql/optimizer/physical/Vectorizer.java:
##
@@ -304,7 +327,7 @@ public enum EnabledOverride {
 nameMap.put(
 vectorizationEnabledOverride.name().toLowerCase(), 
vectorizationEnabledOverride);

Review Comment:
   could you please create toString() method that returns name().toLowerCase() 
and use that



##
standalone-metastore/metastore-server/src/main/java/org/apache/hadoop/hive/common/histogram/KllHistogramEstimator.java:
##
@@ -0,0 +1,83 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.hadoop.hive.common.histogram;
+
+import org.apache.datasketches.kll.KllFloatsSketch;
+import org.apache.hadoop.hive.common.histogram.kll.KllUtils;
+import org.apache.hadoop.hive.common.type.HiveDecimal;
+import org.apache.hadoop.hive.ql.util.JavaDataModel;
+
+import java.io.ByteArrayOutputStream;
+import java.io.IOException;
+
+public class KllHistogramEstimator {

Review Comment:
   should we keep those classes in hive-exec module?



##
standalone-metastore/metastore-server/src/main/java/org/apache/hadoop/hive/common/histogram/KllHistogramEstimatorFactory.java:
##
@@ -0,0 +1,75 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied.  See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+package org.apache.hadoop.hive.common.histogram;
+
+import org.apache.hadoop.hive.common.histogram.kll.KllUtils;
+
+public class KllHistogramEstimatorFactory {
+
+  private KllHistogramEstimatorFactory() {
+throw new AssertionError("Suppress default constructor for non 
instantiation");
+  }
+
+  /**
+   * This function deserializes the serialized KLL histogram estimator from a 
byte array.
+   * @param buf to deserialize
+   * @return KLL histogram estimator
+   */
+  public static KllHistogramEstimator getKllHistogramEstimator(byte[] buf) {

Review Comment:
   is it used? 



##
standalone-metastore/metastore-server/src/main/java/org/apache/hadoop/hive/common/histogram/KllHistogramEstimatorFactory.java:
##
@@ -0,0 +1,75 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing,
+ * software distributed under the License is distributed on an
+ * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+ * KIND, either express or implied.  See the License for the
+ * specific language governing permissions and limitations
+ * under the License.
+ */
+
+package org.apache.hadoop.hive.common.histogram;
+
+import 

[jira] [Work logged] (HIVE-26648) Upgrade Bouncy Castle to 1.70 due to high CVEs

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26648?focusedWorklogId=823076=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823076
 ]

ASF GitHub Bot logged work on HIVE-26648:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 12:57
Start Date: 03/Nov/22 12:57
Worklog Time Spent: 10m 
  Work Description: devaspatikrishnatri commented on PR #3727:
URL: https://github.com/apache/hive/pull/3727#issuecomment-1302057676

   @ayushtkn @nrg4878 @cnauroth please see this




Issue Time Tracking
---

Worklog Id: (was: 823076)
Time Spent: 40m  (was: 0.5h)

>  Upgrade Bouncy Castle to 1.70 due to high CVEs
> ---
>
> Key: HIVE-26648
> URL: https://issues.apache.org/jira/browse/HIVE-26648
> Project: Hive
>  Issue Type: Task
>Reporter: Devaspati Krishnatri
>Assignee: Devaspati Krishnatri
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 40m
>  Remaining Estimate: 0h
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26648) Upgrade Bouncy Castle to 1.70 due to high CVEs

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26648?focusedWorklogId=823075=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823075
 ]

ASF GitHub Bot logged work on HIVE-26648:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 12:56
Start Date: 03/Nov/22 12:56
Worklog Time Spent: 10m 
  Work Description: devaspatikrishnatri opened a new pull request, #3727:
URL: https://github.com/apache/hive/pull/3727

   
> Key: HIVE-26648
> URL: https://issues.apache.org/jira/browse/HIVE-26648
> Project: Hive
>  Issue Type: Task
>Reporter: Devaspati Krishnatri
>Assignee: Devaspati Krishnatri
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 0.5h
>  Remaining Estimate: 0h
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26648) Upgrade Bouncy Castle to 1.70 due to high CVEs

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26648?focusedWorklogId=823073=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823073
 ]

ASF GitHub Bot logged work on HIVE-26648:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 12:48
Start Date: 03/Nov/22 12:48
Worklog Time Spent: 10m 
  Work Description: devaspatikrishnatri closed pull request #3688: 
HIVE-26648:Upgrade Bouncy Castle to 1.70 due to high CVEs
URL: https://github.com/apache/hive/pull/3688




Issue Time Tracking
---

Worklog Id: (was: 823073)
Time Spent: 20m  (was: 10m)

>  Upgrade Bouncy Castle to 1.70 due to high CVEs
> ---
>
> Key: HIVE-26648
> URL: https://issues.apache.org/jira/browse/HIVE-26648
> Project: Hive
>  Issue Type: Task
>Reporter: Devaspati Krishnatri
>Assignee: Devaspati Krishnatri
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 20m
>  Remaining Estimate: 0h
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26693) HS2 can not read/write hive_catalog iceberg table created by other engines

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26693?focusedWorklogId=823051=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823051
 ]

ASF GitHub Bot logged work on HIVE-26693:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 11:52
Start Date: 03/Nov/22 11:52
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #3726:
URL: https://github.com/apache/hive/pull/3726#issuecomment-1301988672

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=3726)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3726=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3726=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3726=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3726=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3726=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3726=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3726=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3726=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3726=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3726=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3726=false=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=3726=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3726=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3726=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 823051)
Time Spent: 0.5h  (was: 20m)

> HS2 can not read/write hive_catalog iceberg table created by other engines
> --
>
> Key: HIVE-26693
> URL: https://issues.apache.org/jira/browse/HIVE-26693
> Project: Hive
>  Issue Type: Improvement
>  Components: HiveServer2, StorageHandler
>Affects Versions: 4.0.0-alpha-2
>Reporter: zhangbutao
>Assignee: zhangbutao
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 0.5h
>  Remaining Estimate: 0h
>
> Step to reproduce:
>  # Create hive_catalog iceberg table by Trino/Presto/Flink (Spark with 
> _iceberg.engine.hive.enabled_ disabled)
>  # show table info with hive beeline:
> {code:java}
> ++
> |                   createtab_stmt                   |
> ++
> | CREATE EXTERNAL TABLE `iceberg_hive`.`testtrinoice`( |
> |   `id` int)                                        |
> | ROW FORMAT SERDE                                   |
> |   'org.apache.hadoop.hive.serde2.lazy.LazySimpleSerDe'  |
> | STORED AS INPUTFORMAT                              |
> |   'org.apache.hadoop.mapred.FileInputFormat'       |
> | OUTPUTFORMAT                                       |
> |   'org.apache.hadoop.mapred.FileOutputFormat'      |
> | LOCATION                                          

[jira] [Work logged] (HIVE-25790) Make managed table copies handle updates (FileUtils)

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-25790?focusedWorklogId=823024=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823024
 ]

ASF GitHub Bot logged work on HIVE-25790:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 10:36
Start Date: 03/Nov/22 10:36
Worklog Time Spent: 10m 
  Work Description: deniskuzZ commented on code in PR #3582:
URL: https://github.com/apache/hive/pull/3582#discussion_r1012655098


##
ql/src/java/org/apache/hadoop/hive/ql/parse/repl/CopyUtils.java:
##
@@ -492,20 +495,94 @@ private void doRegularCopyOnce(FileSystem sourceFs, 
List srcList,
 throw new IOException(e);
   }
 } else {
-  //Destination should be empty
+  // Destination should have identical files only
   if (overWrite) {
-deleteSubDirs(destinationFs, destination);
+leaveIdenticalFilesOnly(sourceFs, paths, destinationFs, destination);
   }
   copyFilesBetweenFS(sourceFs, paths, destinationFs, destination, false, 
true);
 }
   }
 
-  private void deleteSubDirs(FileSystem fs, Path path) throws IOException {
-//Delete the root path instead of doing a listing
-//This is more optimised
-delete(fs, path, true);
-//Recreate just the Root folder
-mkdirs(fs, path);
+  /**
+   * Leave identical files only between source and destination. It gets source 
paths.
+   */
+  void leaveIdenticalFilesOnly(FileSystem sourceFs, Path[] srcPaths,
+  FileSystem destinationFs, Path destinationPath) throws IOException {
+for (Path srcPath : srcPaths) {
+  leaveIdenticalFilesOnlyFileByFile(sourceFs, srcPath,
+  destinationFs, new Path(destinationPath, srcPath.getName()));
+}
+  }
+
+  /**
+   * Leave identical files only between source and destination. It gets a 
source path.
+   */
+  private void leaveIdenticalFilesOnlyFileByFile(FileSystem sourceFs, Path 
srcPath,
+  FileSystem destinationFs, Path dstPath) throws IOException {
+boolean toDelete = false;
+Type dstType = getType(destinationFs, dstPath);
+Type srcType = getType(sourceFs, srcPath);
+LOG.debug("Source path: {}, type: {}", srcPath, srcType);
+LOG.debug("Destination path: {}, type: {}", dstPath, dstType);
+switch (dstType) {
+case NONE:
+  // If destination is none, then no need to delete anything.
+  break;
+case FILE:
+  // If destination is a file,
+  if (srcType == Type.FILE) {
+// If source is a file, then delete the destination file if it is not 
same as source.
+toDelete = !FileUtils.isSameFile(sourceFs, srcPath, destinationFs, 
dstPath);
+LOG.debug("Same file?: {}", !toDelete);
+  } else {
+// Otherwise, delete the destination file.
+toDelete = true;
+  }
+  break;
+case DIRECTORY:
+  // If destination is a directory,
+  if (srcType == Type.DIRECTORY) {
+// If both are directories, visit for children of both.
+Set bothChildNames = Stream.concat(
+Arrays.stream(sourceFs.listStatus(srcPath))

Review Comment:
   you are listing plenty of times: here and when calling getType, could this 
be optimized?





Issue Time Tracking
---

Worklog Id: (was: 823024)
Time Spent: 1h 20m  (was: 1h 10m)

> Make managed table copies handle updates (FileUtils)
> 
>
> Key: HIVE-25790
> URL: https://issues.apache.org/jira/browse/HIVE-25790
> Project: Hive
>  Issue Type: Sub-task
>Reporter: Haymant Mangla
>Assignee: Teddy Choi
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 1h 20m
>  Remaining Estimate: 0h
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-25790) Make managed table copies handle updates (FileUtils)

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-25790?focusedWorklogId=823022=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823022
 ]

ASF GitHub Bot logged work on HIVE-25790:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 10:35
Start Date: 03/Nov/22 10:35
Worklog Time Spent: 10m 
  Work Description: deniskuzZ commented on code in PR #3582:
URL: https://github.com/apache/hive/pull/3582#discussion_r1012643637


##
ql/src/java/org/apache/hadoop/hive/ql/parse/repl/CopyUtils.java:
##
@@ -492,20 +495,94 @@ private void doRegularCopyOnce(FileSystem sourceFs, 
List srcList,
 throw new IOException(e);
   }
 } else {
-  //Destination should be empty
+  // Destination should have identical files only
   if (overWrite) {
-deleteSubDirs(destinationFs, destination);
+leaveIdenticalFilesOnly(sourceFs, paths, destinationFs, destination);
   }
   copyFilesBetweenFS(sourceFs, paths, destinationFs, destination, false, 
true);
 }
   }
 
-  private void deleteSubDirs(FileSystem fs, Path path) throws IOException {
-//Delete the root path instead of doing a listing
-//This is more optimised
-delete(fs, path, true);
-//Recreate just the Root folder
-mkdirs(fs, path);
+  /**
+   * Leave identical files only between source and destination. It gets source 
paths.
+   */
+  void leaveIdenticalFilesOnly(FileSystem sourceFs, Path[] srcPaths,
+  FileSystem destinationFs, Path destinationPath) throws IOException {
+for (Path srcPath : srcPaths) {
+  leaveIdenticalFilesOnlyFileByFile(sourceFs, srcPath,
+  destinationFs, new Path(destinationPath, srcPath.getName()));
+}
+  }
+
+  /**
+   * Leave identical files only between source and destination. It gets a 
source path.
+   */
+  private void leaveIdenticalFilesOnlyFileByFile(FileSystem sourceFs, Path 
srcPath,
+  FileSystem destinationFs, Path dstPath) throws IOException {
+boolean toDelete = false;
+Type dstType = getType(destinationFs, dstPath);
+Type srcType = getType(sourceFs, srcPath);
+LOG.debug("Source path: {}, type: {}", srcPath, srcType);
+LOG.debug("Destination path: {}, type: {}", dstPath, dstType);
+switch (dstType) {
+case NONE:
+  // If destination is none, then no need to delete anything.
+  break;
+case FILE:
+  // If destination is a file,
+  if (srcType == Type.FILE) {
+// If source is a file, then delete the destination file if it is not 
same as source.
+toDelete = !FileUtils.isSameFile(sourceFs, srcPath, destinationFs, 
dstPath);
+LOG.debug("Same file?: {}", !toDelete);
+  } else {
+// Otherwise, delete the destination file.
+toDelete = true;

Review Comment:
   is it possible that srcType and dstType would be different?



##
ql/src/java/org/apache/hadoop/hive/ql/parse/repl/CopyUtils.java:
##
@@ -492,20 +495,94 @@ private void doRegularCopyOnce(FileSystem sourceFs, 
List srcList,
 throw new IOException(e);
   }
 } else {
-  //Destination should be empty
+  // Destination should have identical files only
   if (overWrite) {
-deleteSubDirs(destinationFs, destination);
+leaveIdenticalFilesOnly(sourceFs, paths, destinationFs, destination);
   }
   copyFilesBetweenFS(sourceFs, paths, destinationFs, destination, false, 
true);
 }
   }
 
-  private void deleteSubDirs(FileSystem fs, Path path) throws IOException {
-//Delete the root path instead of doing a listing
-//This is more optimised
-delete(fs, path, true);
-//Recreate just the Root folder
-mkdirs(fs, path);
+  /**
+   * Leave identical files only between source and destination. It gets source 
paths.
+   */
+  void leaveIdenticalFilesOnly(FileSystem sourceFs, Path[] srcPaths,
+  FileSystem destinationFs, Path destinationPath) throws IOException {
+for (Path srcPath : srcPaths) {
+  leaveIdenticalFilesOnlyFileByFile(sourceFs, srcPath,
+  destinationFs, new Path(destinationPath, srcPath.getName()));
+}
+  }
+
+  /**
+   * Leave identical files only between source and destination. It gets a 
source path.
+   */
+  private void leaveIdenticalFilesOnlyFileByFile(FileSystem sourceFs, Path 
srcPath,
+  FileSystem destinationFs, Path dstPath) throws IOException {
+boolean toDelete = false;
+Type dstType = getType(destinationFs, dstPath);
+Type srcType = getType(sourceFs, srcPath);
+LOG.debug("Source path: {}, type: {}", srcPath, srcType);
+LOG.debug("Destination path: {}, type: {}", dstPath, dstType);
+switch (dstType) {
+case NONE:
+  // If destination is none, then no need to delete anything.
+  break;
+case FILE:
+  // If destination is a file,
+  if (srcType == Type.FILE) {
+// If source is a file, then delete the 

[jira] [Work logged] (HIVE-25790) Make managed table copies handle updates (FileUtils)

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-25790?focusedWorklogId=823023=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823023
 ]

ASF GitHub Bot logged work on HIVE-25790:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 10:35
Start Date: 03/Nov/22 10:35
Worklog Time Spent: 10m 
  Work Description: deniskuzZ commented on code in PR #3582:
URL: https://github.com/apache/hive/pull/3582#discussion_r1012649913


##
ql/src/java/org/apache/hadoop/hive/ql/parse/repl/CopyUtils.java:
##
@@ -492,20 +495,94 @@ private void doRegularCopyOnce(FileSystem sourceFs, 
List srcList,
 throw new IOException(e);
   }
 } else {
-  //Destination should be empty
+  // Destination should have identical files only
   if (overWrite) {
-deleteSubDirs(destinationFs, destination);
+leaveIdenticalFilesOnly(sourceFs, paths, destinationFs, destination);
   }
   copyFilesBetweenFS(sourceFs, paths, destinationFs, destination, false, 
true);
 }
   }
 
-  private void deleteSubDirs(FileSystem fs, Path path) throws IOException {
-//Delete the root path instead of doing a listing
-//This is more optimised
-delete(fs, path, true);
-//Recreate just the Root folder
-mkdirs(fs, path);
+  /**
+   * Leave identical files only between source and destination. It gets source 
paths.
+   */
+  void leaveIdenticalFilesOnly(FileSystem sourceFs, Path[] srcPaths,
+  FileSystem destinationFs, Path destinationPath) throws IOException {
+for (Path srcPath : srcPaths) {
+  leaveIdenticalFilesOnlyFileByFile(sourceFs, srcPath,
+  destinationFs, new Path(destinationPath, srcPath.getName()));
+}
+  }
+
+  /**
+   * Leave identical files only between source and destination. It gets a 
source path.
+   */
+  private void leaveIdenticalFilesOnlyFileByFile(FileSystem sourceFs, Path 
srcPath,
+  FileSystem destinationFs, Path dstPath) throws IOException {
+boolean toDelete = false;
+Type dstType = getType(destinationFs, dstPath);
+Type srcType = getType(sourceFs, srcPath);
+LOG.debug("Source path: {}, type: {}", srcPath, srcType);
+LOG.debug("Destination path: {}, type: {}", dstPath, dstType);
+switch (dstType) {
+case NONE:
+  // If destination is none, then no need to delete anything.
+  break;
+case FILE:
+  // If destination is a file,
+  if (srcType == Type.FILE) {
+// If source is a file, then delete the destination file if it is not 
same as source.
+toDelete = !FileUtils.isSameFile(sourceFs, srcPath, destinationFs, 
dstPath);
+LOG.debug("Same file?: {}", !toDelete);
+  } else {
+// Otherwise, delete the destination file.
+toDelete = true;
+  }
+  break;
+case DIRECTORY:
+  // If destination is a directory,
+  if (srcType == Type.DIRECTORY) {
+// If both are directories, visit for children of both.
+Set bothChildNames = Stream.concat(

Review Comment:
   why do you need concat? I think idea was to remove target-only files that 
are not identical to the source. You should only compare the common set, isn't 
it?





Issue Time Tracking
---

Worklog Id: (was: 823023)
Time Spent: 1h 10m  (was: 1h)

> Make managed table copies handle updates (FileUtils)
> 
>
> Key: HIVE-25790
> URL: https://issues.apache.org/jira/browse/HIVE-25790
> Project: Hive
>  Issue Type: Sub-task
>Reporter: Haymant Mangla
>Assignee: Teddy Choi
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 1h 10m
>  Remaining Estimate: 0h
>




--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Resolved] (HIVE-26684) Upgrade maven-shade-plugin from 3.4.1 for bug fixes.

2022-11-03 Thread Ayush Saxena (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26684?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ayush Saxena resolved HIVE-26684.
-
Fix Version/s: 4.0.0
   Resolution: Fixed

> Upgrade maven-shade-plugin from 3.4.1 for bug fixes.
> 
>
> Key: HIVE-26684
> URL: https://issues.apache.org/jira/browse/HIVE-26684
> Project: Hive
>  Issue Type: Bug
>  Components: Build Infrastructure
>Reporter: Chris Nauroth
>Assignee: Chris Nauroth
>Priority: Major
>  Labels: pull-request-available
> Fix For: 4.0.0
>
>  Time Spent: 1.5h
>  Remaining Estimate: 0h
>
> The Hive build currently runs with maven-shade-plugin version 3.1.1, released 
> in April 2018. This issue proposes to upgrade to the latest version, 3.4.1, 
> released in October 2022. See HIVE-26648 for an example of another patch that 
> is blocked due to a bug in version 3.1.1.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (HIVE-26684) Upgrade maven-shade-plugin from 3.4.1 for bug fixes.

2022-11-03 Thread Ayush Saxena (Jira)


[ 
https://issues.apache.org/jira/browse/HIVE-26684?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17628238#comment-17628238
 ] 

Ayush Saxena commented on HIVE-26684:
-

Committed to master.

Thanx [~cnauroth] for the contribution and [~ngangam] for the review!!!

> Upgrade maven-shade-plugin from 3.4.1 for bug fixes.
> 
>
> Key: HIVE-26684
> URL: https://issues.apache.org/jira/browse/HIVE-26684
> Project: Hive
>  Issue Type: Bug
>  Components: Build Infrastructure
>Reporter: Chris Nauroth
>Assignee: Chris Nauroth
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 1.5h
>  Remaining Estimate: 0h
>
> The Hive build currently runs with maven-shade-plugin version 3.1.1, released 
> in April 2018. This issue proposes to upgrade to the latest version, 3.4.1, 
> released in October 2022. See HIVE-26648 for an example of another patch that 
> is blocked due to a bug in version 3.1.1.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26684) Upgrade maven-shade-plugin from 3.4.1 for bug fixes.

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26684?focusedWorklogId=823018=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823018
 ]

ASF GitHub Bot logged work on HIVE-26684:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 10:24
Start Date: 03/Nov/22 10:24
Worklog Time Spent: 10m 
  Work Description: ayushtkn merged PR #3717:
URL: https://github.com/apache/hive/pull/3717




Issue Time Tracking
---

Worklog Id: (was: 823018)
Time Spent: 1.5h  (was: 1h 20m)

> Upgrade maven-shade-plugin from 3.4.1 for bug fixes.
> 
>
> Key: HIVE-26684
> URL: https://issues.apache.org/jira/browse/HIVE-26684
> Project: Hive
>  Issue Type: Bug
>  Components: Build Infrastructure
>Reporter: Chris Nauroth
>Assignee: Chris Nauroth
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 1.5h
>  Remaining Estimate: 0h
>
> The Hive build currently runs with maven-shade-plugin version 3.1.1, released 
> in April 2018. This issue proposes to upgrade to the latest version, 3.4.1, 
> released in October 2022. See HIVE-26648 for an example of another patch that 
> is blocked due to a bug in version 3.1.1.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26400) Provide docker images for Hive

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26400?focusedWorklogId=823005=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-823005
 ]

ASF GitHub Bot logged work on HIVE-26400:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 09:42
Start Date: 03/Nov/22 09:42
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #3448:
URL: https://github.com/apache/hive/pull/3448#issuecomment-1301850083

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=3448)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3448=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3448=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3448=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3448=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3448=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3448=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3448=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3448=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3448=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3448=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3448=false=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=3448=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3448=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3448=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 823005)
Time Spent: 3h 20m  (was: 3h 10m)

> Provide docker images for Hive
> --
>
> Key: HIVE-26400
> URL: https://issues.apache.org/jira/browse/HIVE-26400
> Project: Hive
>  Issue Type: Improvement
>  Components: Build Infrastructure
>Reporter: Zhihua Deng
>Assignee: Zhihua Deng
>Priority: Blocker
>  Labels: hive-4.0.0-must, pull-request-available
>  Time Spent: 3h 20m
>  Remaining Estimate: 0h
>
> Make Apache Hive be able to run inside docker container in pseudo-distributed 
> mode, with MySQL/Derby as its back database, provide the following:
>  * Quick-start/Debugging/Prepare a test env for Hive;
>  * Tools to build target image with specified version of Hive and its 
> dependencies;
>  * Images can be used as the basis for the Kubernetes operator.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Assigned] (HIVE-26697) Create vectorized Hive DeleteFilter for Iceberg tables

2022-11-03 Thread Jira


 [ 
https://issues.apache.org/jira/browse/HIVE-26697?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ádám Szita reassigned HIVE-26697:
-


> Create vectorized Hive DeleteFilter for Iceberg tables
> --
>
> Key: HIVE-26697
> URL: https://issues.apache.org/jira/browse/HIVE-26697
> Project: Hive
>  Issue Type: Sub-task
>  Components: Iceberg integration
>Reporter: Ádám Szita
>Assignee: Ádám Szita
>Priority: Major
>
> Implement a DeleteFilter that changes an Iterable of VectorizedRowBatches in 
> a way that whenever a new batch is seen in the {{next()}} method, we iterate 
> its rows and apply the original Iceberg DeleteFilter on it. In VRBs we can 
> utilize the {{selected}} array to mark rows as selected (not deleted), so 
> essentially we're going to implement the {{markRowDeleted}} method.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Assigned] (HIVE-26696) Implement row iterator for VectorizedRowBatch

2022-11-03 Thread Jira


 [ 
https://issues.apache.org/jira/browse/HIVE-26696?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ádám Szita reassigned HIVE-26696:
-


> Implement row iterator for VectorizedRowBatch
> -
>
> Key: HIVE-26696
> URL: https://issues.apache.org/jira/browse/HIVE-26696
> Project: Hive
>  Issue Type: Sub-task
>  Components: Iceberg integration
>Reporter: Ádám Szita
>Assignee: Ádám Szita
>Priority: Major
>
> In order to utilize the existing DeleteFilter implementation of Iceberg we'll 
> need to provide a row iterator that iterates through the rows of a 
> VectorizedRowBatch instance.
> This can be used during a read with positional deletes, but it will be 
> especially required for implementing equality deletes.
> A HiveRow concept needs to be created along with a converter class that 
> provides row data information that's usable as an Iceberg Record.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Assigned] (HIVE-26695) Vectorized reading of Iceberg V2 tables

2022-11-03 Thread Jira


 [ 
https://issues.apache.org/jira/browse/HIVE-26695?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ádám Szita reassigned HIVE-26695:
-


> Vectorized reading of Iceberg V2 tables
> ---
>
> Key: HIVE-26695
> URL: https://issues.apache.org/jira/browse/HIVE-26695
> Project: Hive
>  Issue Type: Improvement
>Reporter: Ádám Szita
>Assignee: Ádám Szita
>Priority: Major
>
> Currently HiveIcebergStorageHandler prevents proceeding to vectorized reading 
> code path for V2 Iceberg tables, as the feature for reading in delete 
> information and merging this to VectorizedRowBatches is missing.
> This should serve as an umbrella jira to implement the feature.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (HIVE-26694) Populate file row position information during vectorized Iceberg reads

2022-11-03 Thread Jira


 [ 
https://issues.apache.org/jira/browse/HIVE-26694?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ádám Szita updated HIVE-26694:
--
Parent: HIVE-26695
Issue Type: Sub-task  (was: Improvement)

> Populate file row position information during vectorized Iceberg reads
> --
>
> Key: HIVE-26694
> URL: https://issues.apache.org/jira/browse/HIVE-26694
> Project: Hive
>  Issue Type: Sub-task
>  Components: Iceberg integration
>Reporter: Ádám Szita
>Assignee: Ádám Szita
>Priority: Major
>
> Currently we leverage VectorizedOrcRecordReader and 
> VectorizedParquetRecordReader during vectorized Iceberg reads. In order to 
> read V2 tables where delete files with positional deletes are present, we 
> need to make these record reader implementations provide the row number 
> information too.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Updated] (HIVE-26695) Vectorized reading of Iceberg V2 tables

2022-11-03 Thread Jira


 [ 
https://issues.apache.org/jira/browse/HIVE-26695?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ádám Szita updated HIVE-26695:
--
Component/s: Iceberg integration

> Vectorized reading of Iceberg V2 tables
> ---
>
> Key: HIVE-26695
> URL: https://issues.apache.org/jira/browse/HIVE-26695
> Project: Hive
>  Issue Type: Improvement
>  Components: Iceberg integration
>Reporter: Ádám Szita
>Assignee: Ádám Szita
>Priority: Major
>
> Currently HiveIcebergStorageHandler prevents proceeding to vectorized reading 
> code path for V2 Iceberg tables, as the feature for reading in delete 
> information and merging this to VectorizedRowBatches is missing.
> This should serve as an umbrella jira to implement the feature.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Assigned] (HIVE-26694) Populate file row position information during vectorized Iceberg reads

2022-11-03 Thread Jira


 [ 
https://issues.apache.org/jira/browse/HIVE-26694?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ádám Szita reassigned HIVE-26694:
-


> Populate file row position information during vectorized Iceberg reads
> --
>
> Key: HIVE-26694
> URL: https://issues.apache.org/jira/browse/HIVE-26694
> Project: Hive
>  Issue Type: Improvement
>  Components: Iceberg integration
>Reporter: Ádám Szita
>Assignee: Ádám Szita
>Priority: Major
>
> Currently we leverage VectorizedOrcRecordReader and 
> VectorizedParquetRecordReader during vectorized Iceberg reads. In order to 
> read V2 tables where delete files with positional deletes are present, we 
> need to make these record reader implementations provide the row number 
> information too.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Work logged] (HIVE-26628) Iceberg table is created when running explain ctas command

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26628?focusedWorklogId=822992=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-822992
 ]

ASF GitHub Bot logged work on HIVE-26628:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 09:09
Start Date: 03/Nov/22 09:09
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #3724:
URL: https://github.com/apache/hive/pull/3724#issuecomment-1301816827

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=3724)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3724=false=BUG)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3724=false=BUG)
 [0 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3724=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3724=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3724=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3724=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3724=false=SECURITY_HOTSPOT)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3724=false=SECURITY_HOTSPOT)
 [0 Security 
Hotspots](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3724=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3724=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3724=false=CODE_SMELL)
 [0 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=3724=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3724=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3724=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 822992)
Time Spent: 1h 50m  (was: 1h 40m)

> Iceberg table is created when running explain ctas command
> --
>
> Key: HIVE-26628
> URL: https://issues.apache.org/jira/browse/HIVE-26628
> Project: Hive
>  Issue Type: Bug
>  Components: StorageHandler
>Reporter: Krisztian Kasa
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 1h 50m
>  Remaining Estimate: 0h
>
> {code}
> create table source(a int, b string, c int);
> explain
> create table tbl_ice stored by iceberg stored as orc tblproperties 
> ('format-version'='2') as
> select a, b, c from source;
> create table tbl_ice stored by iceberg stored as orc tblproperties 
> ('format-version'='2') as
> select a, b, c from source;
> {code}
> {code}
>  org.apache.hadoop.hive.ql.parse.SemanticException: 
> org.apache.hadoop.hive.ql.parse.SemanticException: Table already exists: 
> default.tbl_ice
>   at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.analyzeCreateTable(SemanticAnalyzer.java:13963)
>   at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.genResolvedParseTree(SemanticAnalyzer.java:12528)
>   at 
> org.apache.hadoop.hive.ql.parse.SemanticAnalyzer.analyzeInternal(SemanticAnalyzer.java:12693)
>   at 
> org.apache.hadoop.hive.ql.parse.CalcitePlanner.analyzeInternal(CalcitePlanner.java:460)
>   at 
> 

[jira] [Work logged] (HIVE-26509) Introduce dynamic leader election in HMS

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-26509?focusedWorklogId=822987=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-822987
 ]

ASF GitHub Bot logged work on HIVE-26509:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 08:50
Start Date: 03/Nov/22 08:50
Worklog Time Spent: 10m 
  Work Description: sonarcloud[bot] commented on PR #3567:
URL: https://github.com/apache/hive/pull/3567#issuecomment-1301797258

   Kudos, SonarCloud Quality Gate passed!  [![Quality Gate 
passed](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/QualityGateBadge/passed-16px.png
 'Quality Gate 
passed')](https://sonarcloud.io/dashboard?id=apache_hive=3567)
   
   
[![Bug](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/bug-16px.png
 
'Bug')](https://sonarcloud.io/project/issues?id=apache_hive=3567=false=BUG)
 
[![C](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/C-16px.png
 
'C')](https://sonarcloud.io/project/issues?id=apache_hive=3567=false=BUG)
 [10 
Bugs](https://sonarcloud.io/project/issues?id=apache_hive=3567=false=BUG)
  
   
[![Vulnerability](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/vulnerability-16px.png
 
'Vulnerability')](https://sonarcloud.io/project/issues?id=apache_hive=3567=false=VULNERABILITY)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3567=false=VULNERABILITY)
 [0 
Vulnerabilities](https://sonarcloud.io/project/issues?id=apache_hive=3567=false=VULNERABILITY)
  
   [![Security 
Hotspot](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/security_hotspot-16px.png
 'Security 
Hotspot')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3567=false=SECURITY_HOTSPOT)
 
[![E](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/E-16px.png
 
'E')](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3567=false=SECURITY_HOTSPOT)
 [1 Security 
Hotspot](https://sonarcloud.io/project/security_hotspots?id=apache_hive=3567=false=SECURITY_HOTSPOT)
  
   [![Code 
Smell](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/common/code_smell-16px.png
 'Code 
Smell')](https://sonarcloud.io/project/issues?id=apache_hive=3567=false=CODE_SMELL)
 
[![A](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/RatingBadge/A-16px.png
 
'A')](https://sonarcloud.io/project/issues?id=apache_hive=3567=false=CODE_SMELL)
 [65 Code 
Smells](https://sonarcloud.io/project/issues?id=apache_hive=3567=false=CODE_SMELL)
   
   [![No Coverage 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/CoverageChart/NoCoverageInfo-16px.png
 'No Coverage 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3567=coverage=list)
 No Coverage information  
   [![No Duplication 
information](https://sonarsource.github.io/sonarcloud-github-static-resources/v2/checks/Duplications/NoDuplicationInfo-16px.png
 'No Duplication 
information')](https://sonarcloud.io/component_measures?id=apache_hive=3567=duplicated_lines_density=list)
 No Duplication information
   
   




Issue Time Tracking
---

Worklog Id: (was: 822987)
Time Spent: 6h  (was: 5h 50m)

> Introduce dynamic leader election in HMS
> 
>
> Key: HIVE-26509
> URL: https://issues.apache.org/jira/browse/HIVE-26509
> Project: Hive
>  Issue Type: New Feature
>  Components: Standalone Metastore
>Reporter: Zhihua Deng
>Assignee: Zhihua Deng
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 6h
>  Remaining Estimate: 0h
>
> From HIVE-21841 we have a leader HMS selected by configuring 
> metastore.housekeeping.leader.hostname on startup. This approach saves us 
> from running duplicated HMS's housekeeping tasks cluster-wide. 
> In this jira, we introduce another dynamic leader election: adopt hive lock 
> to implement the leader election. Once a HMS owns the lock, then it becomes 
> the leader, carries out the housekeeping tasks, and sends heartbeats to renew 
> the lock before timeout. If the leader fails to reclaim the lock, then stops 
> the already started tasks if it has, the electing event is audited. We can 
> achieve a more dynamic leader when the original goes down or in the public 
> cloud without well configured property, and reduce the leader’s burdens by 
> running these tasks among different leaders.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)


[jira] [Commented] (HIVE-13288) Confusing exception message in DagUtils.localizeResource

2022-11-03 Thread Jira


[ 
https://issues.apache.org/jira/browse/HIVE-13288?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=17628145#comment-17628145
 ] 

László Bodor commented on HIVE-13288:
-

merged to master, thanks for fixing this [~cnauroth] and [~rbalamohan] for the 
review!


> Confusing exception message in DagUtils.localizeResource
> 
>
> Key: HIVE-13288
> URL: https://issues.apache.org/jira/browse/HIVE-13288
> Project: Hive
>  Issue Type: Improvement
>  Components: HiveServer2
>Affects Versions: 1.2.1
>Reporter: Jeff Zhang
>Assignee: Chris Nauroth
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 40m
>  Remaining Estimate: 0h
>
> I got the following exception when query through hive server2. And check the 
> source code, it it due to some error when copying data from local to hdfs. 
> But the IOException is ignored and assume that it is due to another thread is 
> also writing. I don't think it make sense to assume that, at least should log 
> the IOException. 
> {code}
> LOG.info("Localizing resource because it does not exist: " + src + " to dest: 
> " + dest);
>   try {
> destFS.copyFromLocalFile(false, false, src, dest);
>   } catch (IOException e) {
> LOG.info("Looks like another thread is writing the same file will 
> wait.");
> int waitAttempts =
> 
> conf.getInt(HiveConf.ConfVars.HIVE_LOCALIZE_RESOURCE_NUM_WAIT_ATTEMPTS.varname,
> 
> HiveConf.ConfVars.HIVE_LOCALIZE_RESOURCE_NUM_WAIT_ATTEMPTS.defaultIntVal);
> long sleepInterval = HiveConf.getTimeVar(
> conf, HiveConf.ConfVars.HIVE_LOCALIZE_RESOURCE_WAIT_INTERVAL,
> TimeUnit.MILLISECONDS);
> LOG.info("Number of wait attempts: " + waitAttempts + ". Wait 
> interval: "
> + sleepInterval);
> boolean found = false;
> {code}
> {noformat}
> 2016-03-15 11:25:39,921 INFO  [HiveServer2-Background-Pool: Thread-249]: 
> tez.DagUtils (DagUtils.java:getHiveJarDirectory(876)) - Jar dir is 
> null/directory doesn't exist. Choosing HIVE_INSTALL_DIR - /user/jeff/.hiveJars
> 2016-03-15 11:25:40,058 INFO  [HiveServer2-Background-Pool: Thread-249]: 
> tez.DagUtils (DagUtils.java:localizeResource(952)) - Localizing resource 
> because it does not exist: 
> file:/usr/hdp/2.3.2.0-2950/hive/lib/hive-exec-1.2.1.2.3.2.0-2950.jar to dest: 
> hdfs://sandbox.hortonworks.com:8020/user/jeff/.hiveJars/hive-exec-1.2.1.2.3.2.0-2950-a97c953db414a4f792d868e2b0417578a61ccfa368048016926117b641b07f34.jar
> 2016-03-15 11:25:40,063 INFO  [HiveServer2-Background-Pool: Thread-249]: 
> tez.DagUtils (DagUtils.java:localizeResource(956)) - Looks like another 
> thread is writing the same file will wait.
> 2016-03-15 11:25:40,064 INFO  [HiveServer2-Background-Pool: Thread-249]: 
> tez.DagUtils (DagUtils.java:localizeResource(963)) - Number of wait attempts: 
> 5. Wait interval: 5000
> 2016-03-15 11:25:53,548 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> thrift.ThriftCLIService (ThriftCLIService.java:OpenSession(294)) - Client 
> protocol version: HIVE_CLI_SERVICE_PROTOCOL_V8
> 2016-03-15 11:25:53,548 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> metastore.HiveMetaStore (HiveMetaStore.java:logInfo(747)) - 1: Shutting down 
> the object store...
> 2016-03-15 11:25:53,549 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> HiveMetaStore.audit (HiveMetaStore.java:logAuditEvent(372)) - 
> ugi=hive/sandbox.hortonworks@example.com   ip=unknown-ip-addr  
> cmd=Shutting down the object store...
> 2016-03-15 11:25:53,549 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> metastore.HiveMetaStore (HiveMetaStore.java:logInfo(747)) - 1: Metastore 
> shutdown complete.
> 2016-03-15 11:25:53,549 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> HiveMetaStore.audit (HiveMetaStore.java:logAuditEvent(372)) - 
> ugi=hive/sandbox.hortonworks@example.com   ip=unknown-ip-addr  
> cmd=Metastore shutdown complete.
> 2016-03-15 11:25:53,573 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> session.SessionState (SessionState.java:createPath(641)) - Created local 
> directory: /tmp/e43fbaab-a659-4331-90cb-0ea0b2098e25_resources
> 2016-03-15 11:25:53,577 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> session.SessionState (SessionState.java:createPath(641)) - Created HDFS 
> directory: /tmp/hive/ambari-qa/e43fbaab-a659-4331-90cb-0ea0b2098e25
> 2016-03-15 11:25:53,582 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> session.SessionState (SessionState.java:createPath(641)) - Created local 
> directory: /tmp/hive/e43fbaab-a659-4331-90cb-0ea0b2098e25
> 2016-03-15 11:25:53,587 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> session.SessionState (SessionState.java:createPath(641)) - Created HDFS 
> directory: 
> 

[jira] [Updated] (HIVE-13288) Confusing exception message in DagUtils.localizeResource

2022-11-03 Thread Jira


 [ 
https://issues.apache.org/jira/browse/HIVE-13288?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

László Bodor updated HIVE-13288:

Fix Version/s: 4.0.0-alpha-2

> Confusing exception message in DagUtils.localizeResource
> 
>
> Key: HIVE-13288
> URL: https://issues.apache.org/jira/browse/HIVE-13288
> Project: Hive
>  Issue Type: Improvement
>  Components: HiveServer2
>Affects Versions: 1.2.1
>Reporter: Jeff Zhang
>Assignee: Chris Nauroth
>Priority: Major
>  Labels: pull-request-available
> Fix For: 4.0.0-alpha-2
>
>  Time Spent: 40m
>  Remaining Estimate: 0h
>
> I got the following exception when query through hive server2. And check the 
> source code, it it due to some error when copying data from local to hdfs. 
> But the IOException is ignored and assume that it is due to another thread is 
> also writing. I don't think it make sense to assume that, at least should log 
> the IOException. 
> {code}
> LOG.info("Localizing resource because it does not exist: " + src + " to dest: 
> " + dest);
>   try {
> destFS.copyFromLocalFile(false, false, src, dest);
>   } catch (IOException e) {
> LOG.info("Looks like another thread is writing the same file will 
> wait.");
> int waitAttempts =
> 
> conf.getInt(HiveConf.ConfVars.HIVE_LOCALIZE_RESOURCE_NUM_WAIT_ATTEMPTS.varname,
> 
> HiveConf.ConfVars.HIVE_LOCALIZE_RESOURCE_NUM_WAIT_ATTEMPTS.defaultIntVal);
> long sleepInterval = HiveConf.getTimeVar(
> conf, HiveConf.ConfVars.HIVE_LOCALIZE_RESOURCE_WAIT_INTERVAL,
> TimeUnit.MILLISECONDS);
> LOG.info("Number of wait attempts: " + waitAttempts + ". Wait 
> interval: "
> + sleepInterval);
> boolean found = false;
> {code}
> {noformat}
> 2016-03-15 11:25:39,921 INFO  [HiveServer2-Background-Pool: Thread-249]: 
> tez.DagUtils (DagUtils.java:getHiveJarDirectory(876)) - Jar dir is 
> null/directory doesn't exist. Choosing HIVE_INSTALL_DIR - /user/jeff/.hiveJars
> 2016-03-15 11:25:40,058 INFO  [HiveServer2-Background-Pool: Thread-249]: 
> tez.DagUtils (DagUtils.java:localizeResource(952)) - Localizing resource 
> because it does not exist: 
> file:/usr/hdp/2.3.2.0-2950/hive/lib/hive-exec-1.2.1.2.3.2.0-2950.jar to dest: 
> hdfs://sandbox.hortonworks.com:8020/user/jeff/.hiveJars/hive-exec-1.2.1.2.3.2.0-2950-a97c953db414a4f792d868e2b0417578a61ccfa368048016926117b641b07f34.jar
> 2016-03-15 11:25:40,063 INFO  [HiveServer2-Background-Pool: Thread-249]: 
> tez.DagUtils (DagUtils.java:localizeResource(956)) - Looks like another 
> thread is writing the same file will wait.
> 2016-03-15 11:25:40,064 INFO  [HiveServer2-Background-Pool: Thread-249]: 
> tez.DagUtils (DagUtils.java:localizeResource(963)) - Number of wait attempts: 
> 5. Wait interval: 5000
> 2016-03-15 11:25:53,548 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> thrift.ThriftCLIService (ThriftCLIService.java:OpenSession(294)) - Client 
> protocol version: HIVE_CLI_SERVICE_PROTOCOL_V8
> 2016-03-15 11:25:53,548 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> metastore.HiveMetaStore (HiveMetaStore.java:logInfo(747)) - 1: Shutting down 
> the object store...
> 2016-03-15 11:25:53,549 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> HiveMetaStore.audit (HiveMetaStore.java:logAuditEvent(372)) - 
> ugi=hive/sandbox.hortonworks@example.com   ip=unknown-ip-addr  
> cmd=Shutting down the object store...
> 2016-03-15 11:25:53,549 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> metastore.HiveMetaStore (HiveMetaStore.java:logInfo(747)) - 1: Metastore 
> shutdown complete.
> 2016-03-15 11:25:53,549 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> HiveMetaStore.audit (HiveMetaStore.java:logAuditEvent(372)) - 
> ugi=hive/sandbox.hortonworks@example.com   ip=unknown-ip-addr  
> cmd=Metastore shutdown complete.
> 2016-03-15 11:25:53,573 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> session.SessionState (SessionState.java:createPath(641)) - Created local 
> directory: /tmp/e43fbaab-a659-4331-90cb-0ea0b2098e25_resources
> 2016-03-15 11:25:53,577 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> session.SessionState (SessionState.java:createPath(641)) - Created HDFS 
> directory: /tmp/hive/ambari-qa/e43fbaab-a659-4331-90cb-0ea0b2098e25
> 2016-03-15 11:25:53,582 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> session.SessionState (SessionState.java:createPath(641)) - Created local 
> directory: /tmp/hive/e43fbaab-a659-4331-90cb-0ea0b2098e25
> 2016-03-15 11:25:53,587 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> session.SessionState (SessionState.java:createPath(641)) - Created HDFS 
> directory: 
> /tmp/hive/ambari-qa/e43fbaab-a659-4331-90cb-0ea0b2098e25/_tmp_space.db
> 2016-03-15 11:25:53,592 INFO  

[jira] [Resolved] (HIVE-13288) Confusing exception message in DagUtils.localizeResource

2022-11-03 Thread Jira


 [ 
https://issues.apache.org/jira/browse/HIVE-13288?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

László Bodor resolved HIVE-13288.
-
Resolution: Fixed

> Confusing exception message in DagUtils.localizeResource
> 
>
> Key: HIVE-13288
> URL: https://issues.apache.org/jira/browse/HIVE-13288
> Project: Hive
>  Issue Type: Improvement
>  Components: HiveServer2
>Affects Versions: 1.2.1
>Reporter: Jeff Zhang
>Assignee: Chris Nauroth
>Priority: Major
>  Labels: pull-request-available
> Fix For: 4.0.0-alpha-2
>
>  Time Spent: 40m
>  Remaining Estimate: 0h
>
> I got the following exception when query through hive server2. And check the 
> source code, it it due to some error when copying data from local to hdfs. 
> But the IOException is ignored and assume that it is due to another thread is 
> also writing. I don't think it make sense to assume that, at least should log 
> the IOException. 
> {code}
> LOG.info("Localizing resource because it does not exist: " + src + " to dest: 
> " + dest);
>   try {
> destFS.copyFromLocalFile(false, false, src, dest);
>   } catch (IOException e) {
> LOG.info("Looks like another thread is writing the same file will 
> wait.");
> int waitAttempts =
> 
> conf.getInt(HiveConf.ConfVars.HIVE_LOCALIZE_RESOURCE_NUM_WAIT_ATTEMPTS.varname,
> 
> HiveConf.ConfVars.HIVE_LOCALIZE_RESOURCE_NUM_WAIT_ATTEMPTS.defaultIntVal);
> long sleepInterval = HiveConf.getTimeVar(
> conf, HiveConf.ConfVars.HIVE_LOCALIZE_RESOURCE_WAIT_INTERVAL,
> TimeUnit.MILLISECONDS);
> LOG.info("Number of wait attempts: " + waitAttempts + ". Wait 
> interval: "
> + sleepInterval);
> boolean found = false;
> {code}
> {noformat}
> 2016-03-15 11:25:39,921 INFO  [HiveServer2-Background-Pool: Thread-249]: 
> tez.DagUtils (DagUtils.java:getHiveJarDirectory(876)) - Jar dir is 
> null/directory doesn't exist. Choosing HIVE_INSTALL_DIR - /user/jeff/.hiveJars
> 2016-03-15 11:25:40,058 INFO  [HiveServer2-Background-Pool: Thread-249]: 
> tez.DagUtils (DagUtils.java:localizeResource(952)) - Localizing resource 
> because it does not exist: 
> file:/usr/hdp/2.3.2.0-2950/hive/lib/hive-exec-1.2.1.2.3.2.0-2950.jar to dest: 
> hdfs://sandbox.hortonworks.com:8020/user/jeff/.hiveJars/hive-exec-1.2.1.2.3.2.0-2950-a97c953db414a4f792d868e2b0417578a61ccfa368048016926117b641b07f34.jar
> 2016-03-15 11:25:40,063 INFO  [HiveServer2-Background-Pool: Thread-249]: 
> tez.DagUtils (DagUtils.java:localizeResource(956)) - Looks like another 
> thread is writing the same file will wait.
> 2016-03-15 11:25:40,064 INFO  [HiveServer2-Background-Pool: Thread-249]: 
> tez.DagUtils (DagUtils.java:localizeResource(963)) - Number of wait attempts: 
> 5. Wait interval: 5000
> 2016-03-15 11:25:53,548 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> thrift.ThriftCLIService (ThriftCLIService.java:OpenSession(294)) - Client 
> protocol version: HIVE_CLI_SERVICE_PROTOCOL_V8
> 2016-03-15 11:25:53,548 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> metastore.HiveMetaStore (HiveMetaStore.java:logInfo(747)) - 1: Shutting down 
> the object store...
> 2016-03-15 11:25:53,549 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> HiveMetaStore.audit (HiveMetaStore.java:logAuditEvent(372)) - 
> ugi=hive/sandbox.hortonworks@example.com   ip=unknown-ip-addr  
> cmd=Shutting down the object store...
> 2016-03-15 11:25:53,549 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> metastore.HiveMetaStore (HiveMetaStore.java:logInfo(747)) - 1: Metastore 
> shutdown complete.
> 2016-03-15 11:25:53,549 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> HiveMetaStore.audit (HiveMetaStore.java:logAuditEvent(372)) - 
> ugi=hive/sandbox.hortonworks@example.com   ip=unknown-ip-addr  
> cmd=Metastore shutdown complete.
> 2016-03-15 11:25:53,573 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> session.SessionState (SessionState.java:createPath(641)) - Created local 
> directory: /tmp/e43fbaab-a659-4331-90cb-0ea0b2098e25_resources
> 2016-03-15 11:25:53,577 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> session.SessionState (SessionState.java:createPath(641)) - Created HDFS 
> directory: /tmp/hive/ambari-qa/e43fbaab-a659-4331-90cb-0ea0b2098e25
> 2016-03-15 11:25:53,582 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> session.SessionState (SessionState.java:createPath(641)) - Created local 
> directory: /tmp/hive/e43fbaab-a659-4331-90cb-0ea0b2098e25
> 2016-03-15 11:25:53,587 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> session.SessionState (SessionState.java:createPath(641)) - Created HDFS 
> directory: 
> /tmp/hive/ambari-qa/e43fbaab-a659-4331-90cb-0ea0b2098e25/_tmp_space.db
> 2016-03-15 11:25:53,592 INFO  

[jira] [Work logged] (HIVE-13288) Confusing exception message in DagUtils.localizeResource

2022-11-03 Thread ASF GitHub Bot (Jira)


 [ 
https://issues.apache.org/jira/browse/HIVE-13288?focusedWorklogId=822954=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-822954
 ]

ASF GitHub Bot logged work on HIVE-13288:
-

Author: ASF GitHub Bot
Created on: 03/Nov/22 06:58
Start Date: 03/Nov/22 06:58
Worklog Time Spent: 10m 
  Work Description: abstractdog merged PR #3722:
URL: https://github.com/apache/hive/pull/3722




Issue Time Tracking
---

Worklog Id: (was: 822954)
Time Spent: 40m  (was: 0.5h)

> Confusing exception message in DagUtils.localizeResource
> 
>
> Key: HIVE-13288
> URL: https://issues.apache.org/jira/browse/HIVE-13288
> Project: Hive
>  Issue Type: Improvement
>  Components: HiveServer2
>Affects Versions: 1.2.1
>Reporter: Jeff Zhang
>Assignee: Chris Nauroth
>Priority: Major
>  Labels: pull-request-available
>  Time Spent: 40m
>  Remaining Estimate: 0h
>
> I got the following exception when query through hive server2. And check the 
> source code, it it due to some error when copying data from local to hdfs. 
> But the IOException is ignored and assume that it is due to another thread is 
> also writing. I don't think it make sense to assume that, at least should log 
> the IOException. 
> {code}
> LOG.info("Localizing resource because it does not exist: " + src + " to dest: 
> " + dest);
>   try {
> destFS.copyFromLocalFile(false, false, src, dest);
>   } catch (IOException e) {
> LOG.info("Looks like another thread is writing the same file will 
> wait.");
> int waitAttempts =
> 
> conf.getInt(HiveConf.ConfVars.HIVE_LOCALIZE_RESOURCE_NUM_WAIT_ATTEMPTS.varname,
> 
> HiveConf.ConfVars.HIVE_LOCALIZE_RESOURCE_NUM_WAIT_ATTEMPTS.defaultIntVal);
> long sleepInterval = HiveConf.getTimeVar(
> conf, HiveConf.ConfVars.HIVE_LOCALIZE_RESOURCE_WAIT_INTERVAL,
> TimeUnit.MILLISECONDS);
> LOG.info("Number of wait attempts: " + waitAttempts + ". Wait 
> interval: "
> + sleepInterval);
> boolean found = false;
> {code}
> {noformat}
> 2016-03-15 11:25:39,921 INFO  [HiveServer2-Background-Pool: Thread-249]: 
> tez.DagUtils (DagUtils.java:getHiveJarDirectory(876)) - Jar dir is 
> null/directory doesn't exist. Choosing HIVE_INSTALL_DIR - /user/jeff/.hiveJars
> 2016-03-15 11:25:40,058 INFO  [HiveServer2-Background-Pool: Thread-249]: 
> tez.DagUtils (DagUtils.java:localizeResource(952)) - Localizing resource 
> because it does not exist: 
> file:/usr/hdp/2.3.2.0-2950/hive/lib/hive-exec-1.2.1.2.3.2.0-2950.jar to dest: 
> hdfs://sandbox.hortonworks.com:8020/user/jeff/.hiveJars/hive-exec-1.2.1.2.3.2.0-2950-a97c953db414a4f792d868e2b0417578a61ccfa368048016926117b641b07f34.jar
> 2016-03-15 11:25:40,063 INFO  [HiveServer2-Background-Pool: Thread-249]: 
> tez.DagUtils (DagUtils.java:localizeResource(956)) - Looks like another 
> thread is writing the same file will wait.
> 2016-03-15 11:25:40,064 INFO  [HiveServer2-Background-Pool: Thread-249]: 
> tez.DagUtils (DagUtils.java:localizeResource(963)) - Number of wait attempts: 
> 5. Wait interval: 5000
> 2016-03-15 11:25:53,548 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> thrift.ThriftCLIService (ThriftCLIService.java:OpenSession(294)) - Client 
> protocol version: HIVE_CLI_SERVICE_PROTOCOL_V8
> 2016-03-15 11:25:53,548 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> metastore.HiveMetaStore (HiveMetaStore.java:logInfo(747)) - 1: Shutting down 
> the object store...
> 2016-03-15 11:25:53,549 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> HiveMetaStore.audit (HiveMetaStore.java:logAuditEvent(372)) - 
> ugi=hive/sandbox.hortonworks@example.com   ip=unknown-ip-addr  
> cmd=Shutting down the object store...
> 2016-03-15 11:25:53,549 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> metastore.HiveMetaStore (HiveMetaStore.java:logInfo(747)) - 1: Metastore 
> shutdown complete.
> 2016-03-15 11:25:53,549 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> HiveMetaStore.audit (HiveMetaStore.java:logAuditEvent(372)) - 
> ugi=hive/sandbox.hortonworks@example.com   ip=unknown-ip-addr  
> cmd=Metastore shutdown complete.
> 2016-03-15 11:25:53,573 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> session.SessionState (SessionState.java:createPath(641)) - Created local 
> directory: /tmp/e43fbaab-a659-4331-90cb-0ea0b2098e25_resources
> 2016-03-15 11:25:53,577 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> session.SessionState (SessionState.java:createPath(641)) - Created HDFS 
> directory: /tmp/hive/ambari-qa/e43fbaab-a659-4331-90cb-0ea0b2098e25
> 2016-03-15 11:25:53,582 INFO  [HiveServer2-Handler-Pool: Thread-48]: 
> session.SessionState (SessionState.java:createPath(641))