Skip to content

Release 9.0.17.1

This is the Rolling Release Notes for the Release 9.0.17.1. This release notes are applicable only to Privacera's Self Managed version.

Breaking Changes

Apache Ranger : Policy Delta option disabled by default

The Policy Delta option is now disabled by default. When incremental policy cache updates are disabled, each policy update or creation prompts Ranger Admin to reload all policies from the database. This process may impact performance, especially in environments with a large number of policies, as it can be time-consuming and resource-intensive.

For instructions on enabling this feature, refer to : Configuring Ranger Policy Delta for Ranger Admin.

Instruction to Check Pod Status After Installation

Added a set of instructions to verify the pod status after successfully running an install or upgrade.

Privacera Monitoring

Otel Receiver

Otel Receiver

  • The default Ingress URL for the Otel receiver has been updated from otel-collector.<MONITOIRNG_NAMESPACE>.<DNS> to otel-receiver.<MONITOIRNG_NAMESPACE>.<DNS>
Grafana Alerts and Contact Points

Grafana Alerts and Contact Points

  • Privacera now provides a default set of alerts pre-configured in Grafana. For more details on these alerts and steps to configure custom alerts, refer Alerting.
  • You can now create custom contact points for Privacera-provisioned alerts in Grafana. To learn how to configure custom contact points, refer to the Configuring Custom Alert Contact Points.
Streamlined Prometheus Metrics Scraping for Ranger Pods

Streamlined Prometheus Metrics Scraping for Ranger Pods

Privacera has introduced an automated Kubernetes cron job that runs every 15 minutes. This cron job annotates a single Ranger pod (from multiple replicas) to enable Prometheus to scrape Ranger DB-related metrics. This enhancement ensures reliable and precise monitoring by preventing manual effort and eliminating the risk of duplicated metrics.

Discovery

Automated Azure Resource Creation for Discovery

Automated Azure Resource Creation for Discovery

Privacera Manager now simplifies the setup process for Discovery by automatically creating required Azure resources, such as CosmosDB and Storage Accounts. This eliminates the need for users to configure these resources manually.

PolicySync Connector

Support for Masking Options in Tag-Based Masking for BigQuery Connector

Support for Masking Options in Tag-Based Masking for BigQuery Connector

Privacera's BigQuery connector now includes support for a defined set of native masking options, along with enhanced security controls. The following masking options are now available for column-level security:

  • Custom UDF (User-Defined Function)
  • EMAIL Mask
  • Date-Year Mask
  • Default Masking
Support for Service Account and Google Workspace Domain Service Principals in BigQuery Connector

Support for Service Account and Google Workspace Domain Service Principals in BigQuery Connector

This release introduces support for Service Account and Google Workspace Domain service principals in the BigQuery connector.

  • Service Account: Supports resource-based access control, as well as native tag-based access control and masking.
  • Google Workspace Domain: Supports native tag-based access control and masking.

These enhancements offer increased flexibility in managing access and enforcing masking policies within BigQuery.

Enhanced Exception Logging in ResourceLoader, AuditLoader, and PermissionLoader Components

Enhanced Exception Logging in ResourceLoader, AuditLoader, and PermissionLoader Components

This release enhances exception logging in the ResourceLoader, AuditLoader, and PermissionLoader components of the Unity Catalog and DBX SQL connector. These improvements facilitate more effective error tracking and debugging.

Enhanced Functionality for Google BigQuery Connector

Enhanced Functionality for Google BigQuery Connector

The Google BigQuery connector now supports dynamic onboarding of resources such as projects, datasets, and tables. Previously, updating managed resources required manual modifications in the Privacera Manager (PM) environment, a process that was both tedious and time-consuming.

With this update, users can now update the connector configuration directly through the Privacera Portal UI, enabling the connector to automatically detect and onboard resources. This enhancement streamlines the process and significantly reduces manual effort.

Improved On-Demand Task Processing Time for Databricks SQL Connector

Improved On-Demand Task Processing Time for Databricks SQL Connector

This update enhances the Databricks SQL connector, significantly improving the processing speed of on-demand tasks. The connector now executes these tasks more efficiently, resulting in reduced overall processing time.

Optimized PolicySync Permission Loader for Non-Existent Resources

Optimized PolicySync Permission Loader for Non-Existent Resources

The PolicySync Permission Loader has been optimized by minimizing unnecessary processing cycles, ensuring more efficient operation when handling non-existent resources.

Fixed ops-server.out Log File Growth and Redundant Log Entry

Fixed ops-server.out Log File Growth and Redundant Log Entry

This release addresses an issue where the ops-server.out log file was growing excessively due to redundant log entries.

  • Improved log clarity and reduced unnecessary log growth.
Fixed Ops Server JWT Token Population Issue in policysync.properties

Fixed Ops Server JWT Token Population Issue in policysync.properties

This release resolves an issue where the Ops Server JWT token was not populated in policysync.properties after running post-install. The fix ensures seamless authentication for on-demand task synchronization in PolicySync connector, enhancing both reliability and security for customers.

Fixed Ops Connector Issue Due to Recent Changes in the Release Process

Fixed Ops Connector Issue Due to Recent Changes in the Release Process

This release addresses an issue in the Ops connector caused by recent changes in the release process. The fix ensures that the connector functions as expected and operates smoothly.

Privacera Diagnostics

Fix applied for the issue related to error log filtering.

Fix for Privacera Diagnostics Error Log Filtering

A fix has been implemented to enable filtering of pod-level error logs based on error levels such as Critical and Warning.

Spark Plugin

Support for EMR & EMR-SERVERLESS Versions 7.6.0 and 7.7.0

Support for EMR & EMR-SERVERLESS Versions 7.6.0 and 7.7.0

This release introduces support for EMR and EMR-Serverless with versions 7.6.0 and 7.7.0.

Default Access Check for External Locations in EMR OLAC with EHM

Default Access Check for External Locations in EMR OLAC with EHM

Access checks are now enabled by default in EMR OLAC with EHM for CREATE TABLE, CREATE DATABASE, and ALTER TABLE operations involving an external location.

Fixed EMR OLAC Issue - Query Failures Due to 'AssumeRole' sessionName Limit

Fixed EMR OLAC Issue - Query Failures Due to 'AssumeRole' sessionName Limit

This release resolves an issue in EMR OLAC where queries failed due to the AssumeRole session name exceeding AWS’s 64-character limit. With this fix, queries involving long bucket names can now execute successfully.

Fixed EMR OLAC Issue - Query Failure Due to 'AssumeRole' Exception in CTAS Operations

Fixed EMR OLAC Issue - Query Failure Due to 'AssumeRole' Exception in CTAS Operations

This release resolves an issue in EMR OLAC where queries failed due to an AssumeRole exception in spark-submit. Previously, when both INSERT and CTAS operations were performed in the same session, the STS token generated for the INSERT operation’s PUT requests was reused. Since CTAS requires a different request type, this caused an exception. The fix ensures that CTAS PUT requests are mapped to WRITE_COPY operations, triggering the generation of a new STS token.

Comments