Release 403-e STS (23 Dec 2022)#
Starburst Enterprise platform (SEP) 403-e is the follow up release to the 402-e version. It includes all improvements from the Trino 403 project release.
This release is a short term support (STS) release.
Breaking changes#
SEP configuration validation now checks for catalog security misconfigurations that may cause security issues. If built-in access control is in use but a catalog is configured with the
hive.security
ordelta.security
configuration properties set to a value other thanstarburst
, the cluster fails to start. The same failure occurs if theiceberg.security
catalog configuration property is set to a value other thansystem
. It is strongly recommended to fix this misconfiguration by setting allhive.security
anddelta.security
properties tostarburst
andiceberg.security
properties tosystem
, but you may also disable configuration validation by settingstarburst.config-validation.enabled=false
in yourconfig.properties
file.Built-in access control audit log now uses an improved backend schema for log storage. Existing log entries stored in the old schema are not automatically migrated to the new storage, so those older entries do not appear in the audit logs upon upgrading to this version of SEP.
403-e.1 changes#
General#
Added Run and troubleshoot to the query run options in the query editor.
Added a dark mode toggle option to the SEP UI. This is a cosmetic change that does not affect any site functionality.
Added SQL syntax error checking to the query editor.
Added SEP configuration validation that checks cluster configuration files for severe misconfigurations that can cause unwanted behavior.
Added Kerberos authentication support for query logger to connect to Oracle.
Added IAM token-based authentication support for query logger to connect to a MySQL database.
Improved presentation of single-row query results in the query editor.
Updated JDK version in Docker images to 17.0.5.
Fixed browser crashes when a query execution returns a huge amount of data.
Fixed an issue where users attempting to access the Trino web UI were being redirected to an invalid URL after logging in.
Data products#
Added option to reply to an existing comment in the discussion pane.
Changed date and timestamp formatting to be consistent with the rest of SEP.
Security#
Added an option to filter the audit logs by query ID. Also added the Query ID column to the access log and change log record tables.
Added support for table functions in Hive Ranger access control.
Improved clarity of the error message that appears when attempting to create a built-in access control privilege that conflicts with an existing privilege.
Updated audit logs to use the Insights data retention policy.
Hive connector#
Fixed bug in parquet reader for arrays spanning multiple parquet pages.
Fixed
ArrayIndexOutOfBoundsException
error in the parquet reader when reading string columns.
Delta Lake connector#
Fixed bug in parquet reader for arrays spanning multiple parquet pages.
Fixed
ArrayIndexOutOfBoundsException
error in the parquet reader when reading string columns.
Iceberg connector#
Fixed bug in parquet reader for arrays spanning multiple parquet pages.
Fixed
ArrayIndexOutOfBoundsException
error in the parquet reader when reading string columns.
Kafka connector#
Fixed an issue where the Cloudera Schema Registry Client would not renew the ticket granting ticket (TGT) before it expired.
Salesforce connector#
Added support for rounding decimal data types.