检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Security Shared Responsibilities Asset Identification and Management Identity Authentication and Access Control Data Protection Technologies Audit and Logging Service Resilience Security Risk Monitoring Update Management Security Hardening
Doris O&M Management Doris Log Overview Accessing the Doris Web UI for Component Status Backing Up Doris Data Restoring Doris Data Table of Audit Logs Parent topic: Using Doris
On MRS Manager, click Audit to view audit logs and check whether related operations are recorded. Run the ping command to check whether the IP address can be pinged. Solution If ResourceManager is abnormal, see the Yarn-related sections to rectify the fault.
/clickhouse/clickhouse_web_audit.log Clickhouse data migration audit log ClickHouse audit log /var/log/Bigdata/audit/clickhouse/clickhouse-server-audit.log Path of ClickHouse audit log files Logs of MRS 3.2.0 and Earlier Versions Log path: The default storage path of ClickHouse log
Using Ranger Enabling Ranger Authentication for MRS Cluster Services Logging In to the Ranger Web UI Adding a Ranger Permission Policy Configuration Examples for Ranger Permission Policy Viewing Ranger Audit Information Configuring Ranger Security Zone Viewing Ranger User Permission
Using Ranger (MRS 3.x) Logging In to the Ranger Web UI Enabling Ranger Authentication for MRS Cluster Services Adding a Ranger Permission Policy Configuration Examples for Ranger Permission Policy Viewing Ranger Audit Information Configuring Ranger Security Zone Changing the Ranger
Events Viewing Alarms of an MRS Cluster Configuring Alarm Thresholds for an MRS Cluster Configuring Alarm Masking for an MRS Cluster Connecting an MRS Cluster to SNMP to Report Alarms Connecting an MRS Cluster to the Syslog Server to Report Alarms Periodically Backing Up Alarm and Audit
Unified auditing Ranger plug-ins can record audit logs. Currently, audit logs can be stored in local files. High reliability Ranger supports two RangerAdmins working in active/active mode. Two RangerAdmins provide services at the same time.
Audit Allows authorized users to query and export audit logs, helping you to view all user activities and operations. Tenant Provides a unified tenant management platform. System Provides monitoring, alarm configuration management, and backup management.
Audit Logging Whether to audit the policy. Allow Conditions Policy allowed condition. You can configure permissions allowed by the policy. In the Select Group column, select the created user group to which you want to grant permissions.
Parameters Table 1 Hue common parameters Parameter Description Default Value Value Range HANDLER_ACCESSLOG_LEVEL Hue access log level DEBUG ERROR WARN INFO DEBUG HANDLER_AUDITSLOG_LEVEL Hue audit log level DEBUG ERROR WARN INFO DEBUG HANDLER_ERRORLOG_LEVEL Hue error log level ERROR
The error details are as follows: Cause Analysis Check the start time and end time of the task based on the HiveServer audit logs. Check whether data is inserted into the same table or partition in the time segment.
Audit Log jdbcserver-audit.log ranger-audit.log JDBCServer2x audit log Log levels Table 2 describes the log levels supported by Spark2x. The priorities of log levels are ERROR, WARN, INFO, and DEBUG in descending order.
Audit Log jdbcserver-audit.log ranger-audit.log JDBCServer2x audit log Log levels Table 2 describes the log levels supported by Spark2x. The priorities of log levels are ERROR, WARN, INFO, and DEBUG in descending order.
Data Encryption During Transmission Encrypting Data Transmission Between the Controller and Agent Configuring a Trusted IP Address to Access LDAP HFile and WAL Encryption Configuring the IP Address Whitelist for Modifying Data in an HBase Read-Only Cluster Configuring LDAP Output Audit
If the CPU usage is high, check the Time field in FE audit log /var/log/Bigdata/audit/doris/fe/fe.audit.log to collect statistics on the average task duration. If the value is also high, the alarm is caused by large concurrent tasks.
Procedure Check the task termination operator in the Yarn logs and audit logs, and determine the cause of the task termination. Reference None Parent topic: MRS Cluster Alarm Handling Reference
If the CPU usage is high, check the Time field in FE audit log /var/log/Bigdata/audit/doris/fe/fe.audit.log to collect statistics on the average task duration. If the value is also high, the alarm is caused by large concurrent tasks.
If the CPU usage is high, check the Time field in FE audit log /var/log/Bigdata/audit/doris/fe/fe.audit.log to collect statistics on the average task duration. If the value is also high, the alarm is caused by large concurrent tasks.
Historical data that is seldomly accessed needs to be backed up over a long period for audit and backtracking. Query demands on such data decrease sharply as time goes by. If all data is stored locally, a large number of resources will be wasted.