Skip to content

Commit f696782

Browse files
gertjanalmosabua
authored andcommitted
Document security configuration for kill_query use on the Resource groups and Ranger access control pages
1 parent c833da9 commit f696782

File tree

2 files changed

+9
-1
lines changed

2 files changed

+9
-1
lines changed

docs/src/main/sphinx/admin/resource-groups.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -199,7 +199,11 @@ documentation](https://docs.oracle.com/en/java/javase/24/docs/api/java.base/java
199199
- `DATA_DEFINITION`: Queries that affect the data definition. These include
200200
`CREATE`, `ALTER`, and `DROP` statements for schemas, tables, views, and
201201
materialized views, as well as statements that manage prepared statements,
202-
privileges, sessions, and transactions.
202+
privileges, sessions, and transactions. When external clients need
203+
access to the `system.runtime.kill_query()` procedure to stop running or
204+
queued queries, this `queryType` must be used to make sure the
205+
`kill_query()` is executed directly and isn't queued to wait for the
206+
initial query to finish.
203207
- `ALTER_TABLE_EXECUTE`: Queries that execute table procedures with [ALTER
204208
TABLE EXECUTE](alter-table-execute).
205209

docs/src/main/sphinx/security/ranger-access-control.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -193,3 +193,7 @@ The following table lists the configuration properties for the Ranger access con
193193
execute any query.
194194
* To allow this, create a policy in Apache Ranger for a `trinouser` resource
195195
with value `{USER}` and with the `impersonate` permission for user `{USER}`.
196+
* External clients can use the `system.runtime.kill_query()` procedure to
197+
kill running queries. Add a policy with Schema `system`, Database
198+
`runtime` and Procedure `kill_query` with `execute` permission for user
199+
`{USER}`.

0 commit comments

Comments
 (0)