Release 9.2.21.1¶
These are the Rolling Release Notes for Release 9.2.21.1. These release notes are applicable to both Privacera's Self-Managed version and PrivaceraCloud.
Apache Ranger¶
Added Support for Privacera TagSync in D2P Environment
Added Support for Privacera TagSync in D2P Environment¶
- Introduced support for Privacera TagSync in the D2P environment.
- Enables successful synchronization of tags from Privacera to Ranger in D2P setups.
- TagSync can now authenticate with Ranger via Privacera Manager configuration.
Fixed Missing Capture of Previous User Attribute Values in Ranger Admin Audit Logs
Fixed Missing Capture of Previous User Attribute Values in Ranger Admin Audit Logs¶
Fixed an issue where Ranger admin audits did not capture the previous values of user additional attributes during updates.
Grafana¶
Updated Grafana Image
Updated Grafana Image¶
Upgraded Grafana dependencies to address known security vulnerabilities identified in CVE(Critical Vulnerabilities and Exposures) report.
Portal¶
Security Updates
Security Updates¶
Resolved newly identified CVEs and addressed additional vulnerabilities in third-party dependencies.
Privacera Discovery¶
Fixed Cross-Project Resource Exclusion Issue
Fixed Cross-Project Resource Exclusion Issue¶
Resolved cross-project scoping issue to ensure resource exclusion rules are remain isolated within their respective projects.
Updated Application Dependencies
Updated Application Dependencies¶
Upgraded application dependencies to address known security vulnerabilities identified in CVE (Common Vulnerabilities and Exposures) report.
Spark Plugin¶
Added Support for Apache Spark Connect Spark 4.0.2 and 4.1.1
Added Support for Apache Spark Connect Spark 4.0.2 and 4.1.1¶
- Introduced support for Apache Spark Connect for Spark 4.0.2 and 4.1.1, enabling secure client-server connectivity to a remote Spark cluster.
- For prerequisites and configuration details, refer to Apache Spark OLAC – Spark Connect.
Added OLAC Support for EMR 7.10 and 7.12
Added OLAC Support for EMR 7.10 and 7.12¶
- Introduced OLAC support for EMR 7.10 and 7.12 for both Self-Managed and PrivaceraCloud, enabling compatibility with newer EMR environments.
- Trino is not supported on EMR 7.12. For more information, refer to AWS EMR access – Limitations.
Handled the Case Where the Date Header in Spark Plugin Was not Updated Even After a Skew Was Detected
Handled the Case Where the Date Header in Spark Plugin Was not Updated Even After a Skew Was Detected¶
- Fixed the issue which caused the request to fail with 403 RequestTimeTooSkewed error, by handling the case where the Date Header was not updated even after a skew was detected.
Fix for Multipart Upload Path Handling in Session Policy
Fix for Multipart Upload Path Handling in Session Policy¶
- Fixed an issue in multipart upload handling where x-amz-copy-source paths without a leading slash were not processed correctly.
- Updated the logic to support both path formats and ensure required permissions are properly added to the session policy, preventing access failures.
Fix NoSuchMethodException When Invoking resignForRetry Method in Spark Plugin
Fix NoSuchMethodException When Invoking resignForRetry Method in Spark Plugin¶
Fixed a NoSuchMethodException that occurred when invoking the resignForRetry method in the Spark Plugin.
EMR Plugin¶
[PrivaceraCloud only] Added support for EMR Trino JDK compatibility (JDK < 21)
[PrivaceraCloud only] Added support for EMR Trino JDK compatibility (JDK < 21)¶
EMR Trino clusters were failing for EMR version below 7.2.0 due to JDK upgrade to version 21 in Privacera Trino Plugin. Now a fix has been added to ensure Trino working with EMR version below 7.2.0.
Privacera Kafka¶
Updated Application Dependencies
Updated Application Dependencies¶
Upgraded application dependencies to address known security vulnerabilities identified in CVE (Common Vulnerabilities and Exposures) report.
Privacera PKafka¶
Updated Application Dependencies
Updated Application Dependencies¶
Upgraded application dependencies to address known security vulnerabilities identified in CVE (Common Vulnerabilities and Exposures) report.
PrivaceraCloud¶
Runtime Environments
Runtime Environments¶
Managing connectors is now easier. You can deploy and manage connectors entirely through the PrivaceraCloud Portal UI—no manual configuration required.
How it works: The Kubernetes namespace in your cluster where Privacera services run is called the Runtime Plane. Deployment and lifecycle management are handled directly from the portal, streamlining your operational workflow.
Current support:
- Deployment mode: PrivaceraCloud Data-Plane
- Supported connectors: Microsoft SQL Server (MSSQL), Databricks Unity Catalog (DBX UC), and Snowflake
Support for additional connectors and deployment modes is planned for upcoming releases.
Note
This feature works only for fresh deployments. Migration of existing deployments is not currently supported.
Getting started: Contact Privacera Support to enable this feature for your account. Then navigate to Settings → Runtime Environments to begin.
Security Zone Isolation - Restrict Cross-Zone Visibility in Data Catalog and Policy Management
Security Zone Isolation - Restrict Cross-Zone Visibility in Data Catalog and Policy Management¶
Introduced zone-aware visibility in Privacera so users only see catalog resources and policies from their assigned Security Zone(s).
Zone Admins now have read-only, zone-scoped Data Catalog access without requiring global admin or Ranger admin elevation.
The UI now hides other zones and unrelated resources to prevent cross-zone metadata exposure and reduce clutter.
Introduced New API for Resource Type to Get Resource Mapping
Introduced New API for Resource Type to Get Resource Mapping¶
The Omni Metadata Service API retrieves tag-to-resource mappings at a specific resource type level (for example, TABLE). Results are limited to the requested resource type.
The API supports both full (snapshot) and incremental (delta) retrieval, along with cursor-based pagination to handle large datasets efficiently.
If there are no updates since the last request, the API returns 304 Not Modified, avoiding response payload, reducing data transfer, and improving performance.
This enhancement simplifies client integration and improves efficiency for use cases requiring tag data scoped to a specific resource type.
Privacera UserSync¶
SCIM Server Cache Rebuild
SCIM Server Cache Rebuild¶
Correct cache rebuild in SCIM Server when server context is enabled.
Base Image Upgraded
Base Image Upgraded¶
Updated the base image to a newer Debian version to address known security vulnerabilities identified in CVE report.
Update Application Dependencies
Update Application Dependencies¶
Upgraded application dependencies to address known security vulnerabilities identified in CVE (Common Vulnerabilities and Exposures) report.
Audit Fluentd¶
Audit Fluentd Base Image Upgraded
Audit Fluentd Base Image Upgraded¶
Updated the Audit Fluentd base image to a newer Debian version to address known security vulnerabilities identified in CVE report.
PolicySync Connector¶
Azure AD OAuth Support for Databricks Unity Catalog Connector Using AzureTenantId
Azure AD OAuth Support for Databricks Unity Catalog Connector Using AzureTenantId¶
- Introduced an Azure OAuth mechanism for Azure Databricks that authenticates with Azure AD service principal credentials, with configuration support including
AzureTenantId. - Existing Databricks OAuth (OIDC) and personal access token (PAT) authentication flows remain supported and unchanged.
- Upgraded the Databricks JDBC driver to version 3.3.1.
- For more information, refer to Azure AD (Entra ID) OAuth authentication for Databricks Unity Catalog.
Base Image Upgraded
Base Image Upgraded¶
Updated the base image to a newer Debian version to address known security vulnerabilities identified in the CVE report for Snowflake and Databricks Unity Catalog.
MSSQL – Disable Access Management
MSSQL – Disable Access Management¶
- Added a configuration flag to disable access management. When enabled, access policy ACLs are not loaded (only masking ACLs are applied), and access policies created in Privacera will not grant permissions.
- This allows external systems to handle access control, while Privacera is used solely for data masking.
- For configuration details, see Load only masking ACLs.
Databricks Unity Catalog – Disable Access Management
Databricks Unity Catalog – Disable Access Management¶
- Added a configuration flag to disable access management. When enabled, access policy ACLs are not loaded (only masking ACLs are applied), and access policies created in Privacera will not grant permissions.
- This allows external systems to handle access control, while Privacera is used solely for data masking.
- For configuration details, see Load only masking ACLs.
Privacera Diagnostics¶
Diagnostics Server and Client Enhancements
Diagnostics Server and Client Enhancements¶
Both Diagnostics Server and Client are migrated Diagnostics Base image to a new ChainGuard image.
- Prev topic: Releases