Release 9.0.21.1¶
This is the Rolling Release Notes for the Release 9.0.21.1. These release notes are applicable only to Privacera's Self Managed version.
Breaking Changes
Privacera Portal: Access Log Location Updated in Portal¶
The access log location for the Portal service has been updated to improve log organization and simplify management.
-
Previous Path::
/opt/privacera/portal/tomcat/logs
-
New Path::
/opt/privacera/portal/logs/access-logs/
The new structure centralizes logs under a consistent directory structure for better accessibility and maintenance.
Known Issue: OAuth SSO Login May Fail for Portal Users¶
Some users may experience issues when attempting to log in via OAuth SSO. This is a known issue, and our team is actively working on a fix.
In the meantime, affected users can use alternative login methods, such as Username/Password or SSO via SAML or LDAP.
We appreciate your patience and will provide updates as soon as the issue is resolved.
Apache Ranger¶
New API Endpoint for Entitlement Policies
New API Endpoint for Entitlement Policies¶
A new API has been introduced for retrieving Ranger entitlement policies. This API enables fetching Ranger policies applicable to a specified principal (user, group, or role). This API is currently accessible via Python and curl REST clients.
Limitation
Integration with the Ranger Intg Java Client is not yet supported.
Privacera Portal¶
New Credit Card Validator Utility
New Credit Card Validator Utility¶
Privacera Portal now includes a Credit Card Validator tool. This utility validates credit card numbers using the Luhn Algorithm and default BIN/IIN ranges. It is designed with security and privacy in mind, ensuring that no credit card data is stored and that all validations are performed securely using industry-standard algorithms.
Privacera Monitoring¶
Improved Post Install Job Failure Handling
Improved Post Install Job Failure Handling¶
During the post install job execution, if the system encounters an issue accessing the Git repository, it automatically fall back to the local repository. This ensures that dashboards and alerts are successfully uploaded to your Grafana instance, even in the event of remote repository access issues.
Privacera Diagnostics¶
Support for Privacera-Managed Secrets in Portal and Discovery
Support for Privacera-Managed Secrets in Portal and Discovery¶
Resolved an issue in the Portal and Discovery components to support seamless integration with Privacera-managed secrets.
Spark Plugin¶
JWT Token Retrieval in EMR Serverless Bootstrap Now Successful
JWT Token Retrieval in EMR Serverless Bootstrap Now Successful¶
EMR Serverless jobs can now successfully retrieve the JWT token when using the bootstrap command.
Fixed CTAS Query Issue with Specific RLF Policy Condition on DBR 15.4 LTS
Fixed CTAS Query Issue with Specific RLF Policy Condition on DBR 15.4 LTS¶
On Databricks Runtime 15.4 LTS, a fix has been implemented to resolve failures in CTAS queries. These failures occurred when a Row Level Filtering (RLF) policy with a expression containing a SELECT
query on a table was applied. Previously, this scenario unexpectedly required access to the underlying table.
Limitation
A known issue exists for SELECT
queries that utilize Row Level Filtering (RLF) policy containing logical operators in query.
- Prev topic: Releases