Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
New end of support date
The end of support date for 2024.1 has been updated to July 31, 2024.
Immuta v2024.1.13 was released June 25, 2024.
Comply with column length and precision in a Snowflake masking policy: Snowflake is soon requiring the outputs of masked columns to comply with the length, scale, and precision of what the Snowflake columns require. To comply with this Snowflake behavior change, Immuta truncates the output values in masked columns to match the Snowflake column requirements so that users' queries continue to complete successfully.
Data sources were sometimes locked down and inaccessible to users after being registered in Immuta, even if no policies applied to them.
Immuta v2024.1.12 was released June 6, 2024.
Deleting and re-enabling a Redshift integration caused issues for data sources with custom schema/table names and formats.
Immuta v2024.1.11 was released May 31, 2024.
Users were unable to access Redshift data sources they had recently registered.
Immuta was not escaping or encoding special backslash characters (/
, \
) in usernames, which resulted in bad API requests.
Immuta v2024.1.10 was released May 22, 2024.
IAM integrations that had SCIM enabled did not support backslashes \
in usernames.
UI performance improvements when subscription policies contain special variables (@host, @database, @schema, @table).
Immuta v2024.1.9 was released May 13, 2024.
If a subscription policy was built against user attributes it caused UI errors and performance issues.
Performance improvements of subscription policies.
Immuta v2024.1.8 was released May 7, 2024.
The Unity Catalog integration configuration could not be saved if OAuth token passthrough was used as the authentication method.
External user IDs failed to save if the username contained a psql slash command (\e
, , \q
, etc.).
Immuta v2024.1.7 was released April 26, 2024.
Immuta failed to connect to users' external metadata database.
Immuta v2024.1.6 was released April 10, 2024.
Long subscription policies caused out of memory errors.
Users could not create or update integration configurations if they used Snowflake External OAuth.
Users encountered out of memory errors when navigating to the project equalization page if their Immuta tenant had over 200,000 data sources, 400 subscription policies, 200 users, and 4 million tags.
Performance improvements of native project workspaces.
Write policies for Starburst (Trino) (available in Immuta v2024.1 and newer as of March 25, 2024): In addition to read operations, Immuta's Starburst (Trino) integration now supports fine-grained access permissions for write operations. In its default setting, write operations control the authorization of SQL operations that perform data modification. Administrators can include more operations (such as ALTER and DROP tables) to be authorized as write operations through advanced configuration. Contact your customer success representative to learn more.
Immuta v2024.1.5 was released March 8, 2024.
Users who had access to many data sources encountered a 500 error when trying to view data sources on the data source or project pages.
Immuta v2024.1.4 was released February 28, 2024.
Vulnerabilities addressed:
CVE-2023-5869
CVE-2024-0985
Immuta v2024.1.3 was released February 22, 2024.
Faster query performance with Snowflake memoizable functions: When a policy is applied to a column, Immuta now uses Snowflake memoizable functions to cache the result of common lookups in the policy encapsulated in the called function.
Subsequently, when users query a column with the applied policy, Immuta leverages the cached result, resulting in significant enhancements to query performance.
To enable support for memoizable functions, please contact your Immuta customer success representative.
Additional fixes to address the following issue: Any attempt to stage or remove automatic subscription policies resulted in revokes not going through to Databricks if there was a casing mismatch between the principal user from Databricks and the external username mapped to Immuta.
Immuta v2024.1.2 was released February 9, 2024.
Additional fixes to address an issue that prevented revokes from going through to Databricks if
an automatic subscription policy was staged or deleted and
there was a casing mismatch between the principal user from Databricks and the external username mapped to Immuta.
Immuta v2024.1.1 was released February 2, 2024.
Fix to address issues with performance of background jobs.
Any attempt to stage or remove automatic subscription policies resulted in revokes not going through to Databricks if there was a casing mismatch between the principal user from Databricks and the external username mapped to Immuta.
Immuta v2024.1.0 was released January 25, 2024.
Amazon S3 integration: Immuta’s Amazon S3 integration enhances the management of permissions in complex data lakes on object storage. Eliminate scalability concerns as you enforce S3 access effortlessly. You can grant users time-bound access to files and folders, creating a security posture with zero-standing permissions, a gold-standard for compliance.
Additionally, you can grant access to human identities seamlessly through Identity Providers (IdPs) like Okta, Microsoft Entra ID, and more, thanks to integration with AWS IAM Identity Center. With the implementation of attribute-based access controls (ABAC) for S3, Immuta provides a simplified and efficient approach to managing data lake permissions. The privileges you set using the Amazon S3 integration can apply anywhere, from the CLI, to your applications using AWS SDKs, and on Amazon EMR Spark and Amazon SageMaker. Elevate your data governance with these advanced capabilities and experience a seamless and secure data access environment. Contact your customer success manager for more details.
Integrations API: The integrations API allows you to integrate your remote data platform with Immuta so that Immuta can manage and enforce access controls on your data.
Write policies: Write policies is a new capability to manage user write access authorizations via policy (enabling users to modify data in data source objects). This release supports the new functionality for Snowflake and Databricks Unity catalog integrations. Contact your customer success manager for more details.
Deprecated items remain in the product with minimal support until their end of life date.
All users must be on Immuta version 2022.5 or newer to migrate directly to 2024.1.
Feature | Deprecation notice | End of life (EOL) |
---|---|---|
Databricks Spark with Unity Catalog support integration
2024.1
2024.2 LTS
dbt integration
2024.1
2024.2 LTS
MySQL
2024.1
2024.2 LTS
Legacy sensitive data discovery (SDD)
2023.3
2024.4
Immuta supports the following databases.
Amazon Redshift
Amazon Redshift Serverless
Amazon Redshift Spectrum
Amazon S3
Azure Synapse Analytics (Immuta only supports Dedicated SQL pools, not Serverless SQL pools.)
Google BigQuery
Databricks Unity Catalog:
Databricks clusters (See the Databricks Installation guide for supported Databricks runtimes.)
Databricks SQL
Snowflake
Starburst (Trino)
The following legacy databases are currently supported for existing customers.
Apache Impala
Amazon Athena
Amazon EMR Hive - Deprecated in 2023.2
Amazon EMR Spark - Deprecated in 2023.2
Amazon S3 proxy - Deprecated in 2023.3
Azure Data Lake Storage - Deprecated in 2023.3
Azure SQL - Deprecated in 2023.3
CDH Spark
Elasticsearch
Greenplum
MySQL - Deprecated in 2024.1
Netezza
Oracle
PostgreSQL
SQL Server
Immuta supports the following Kubernetes distributions. Click a link below for details.
Immuta supports these external catalogs. Click a link below for configuration instructions.
For details about the IAM protocols and providers in this section, see the support matrix in the Identity Managers Overview.
Immuta fully supports these IAM protocols:
AD/LDAP
SAML 2.0
OpenID Connect 1.0
These are common providers that support the protocols listed above. However, this list may not be all-inclusive, and if a provider stops supporting one of those protocols, Immuta may not fully support that provider.
Active Directory
ADFS
Amazon Cognito
Centrify
JumpCloud
Keycloak
Microsoft Entra ID
Okta
OneLogin
OpenLDAP and other LDAP servers
Oracle Access Manager
Ping Identity
Immuta supports the following web browsers.
Firefox
Google Chrome
Microsoft Edge
Immuta CLI v1.3.0 was released April 4, 2024. It allows you to export universal audit model (UAM) events to ADLS Gen2.
Linux x86_64 (amd64):
Linux ARMv8 (arm64):
Darwin x86_64 (amd64):
Darwin ARMv8 (arm64):
Download and add the binary to a directory in your system's $PATH as immuta.exe
:
The SHA 256 checksum is available to verify the file at https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.3.0/immuta_cli_SHA256SUMS.
Immuta CLI v1.2.1 was released November 20, 2023. It fixes a bug with the integrations API.
Linux x86_64 (amd64):
Linux ARMv8 (arm64):
Darwin x86_64 (amd64):
Darwin ARMv8 (arm64):
Download and add the binary to a directory in your system's $PATH as immuta.exe
:
The SHA 256 checksum is available to verify the file at https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.2.1/immuta_cli_SHA256SUMS.
Immuta CLI v1.2.0 was released October 2, 2023. It fixes a bug with the audit export.
Linux x86_64 (amd64):
Linux ARMv8 (arm64):
Darwin x86_64 (amd64):
Darwin ARMv8 (arm64):
Download and add the binary to a directory in your system's $PATH as immuta.exe
:
The SHA 256 checksum is available to verify the file at https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.2.0/immuta_cli_SHA256SUMS.
Immuta CLI v1.2.0-1 was released August 19, 2022. It allows you to export universal audit model (UAM) events to S3.
Linux x86_64 (amd64):
Linux ARMv8 (arm64):
Darwin x86_64 (amd64):
Darwin ARMv8 (arm64):
Download and add the binary to a directory in your system's $PATH as immuta.exe
:
The SHA 256 checksum is available to verify the file at https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.2.0-1/immuta_cli_SHA256SUMS.
Immuta CLI v1.1.0 was released August 19, 2022. It allows you to overwrite existing files in output directory targets when you specify the --force
flag to clone your Immuta tenant or policies. If this --force
flag is omitted, you will receive an error when the output directory exists and is not empty.
Linux x86_64 (amd64):
Linux ARMv8 (arm64):
Darwin x86_64 (amd64):
Darwin ARMv8 (arm64):
Download and add the binary to a directory in your system's $PATH as immuta.exe
:
The SHA 256 checksum is available to verify the file at https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.1.0/immuta_cli_SHA256SUMS.
The Immuta CLI v1.0.0 was released April, 26, 2022. It includes new commands that allow users to manage sensitive data discovery.
Linux x86_64 (amd64):
Linux ARMv8 (arm64):
Darwin x86_64 (amd64):
Darwin ARMv8 (arm64):
Download and add the binary to a directory in your system's $PATH as immuta.exe
:
The SHA 256 checksum is available to verify the file at https://immuta-platform-artifacts.s3.amazonaws.com/cli/v1.0.0/immuta_cli_SHA256SUMS.
Run sensitive data discovery (SDD): The immuta sdd run
command allows you to run SDD using the CLI instead of the API or UI. You can specify data sources on which to run SDD, or you can run SDD on all data sources.
Manage patterns: The immuta sdd classifier
command and its sub commands allow you to create, search for, update, and delete sensitive data discovery rules.
Manage identification frameworks: The immuta sdd template
command and its sub commands allow you to create, search for, update, and delete sensitive data discovery frameworks. Global frameworks must be managed through the Immuta UI.
--output
or -o
flag allows you to specify yaml or json for the output.
--template
option for the immuta api
command has been changed to --outputTemplate
. Additionally, this option is now available for all commands so that users can customize the output.
version
is now a flag instead of a command.
Running immuta policy clone
when there were no policies available to clone did not indicate that a target directory was not created or updated. The CLI now prints the message No global policies available to clone
.
The verbose
option is deprecated (in favor of the --output
option).
The version
command is deprecated.
Changes:
Update to immuta-deploy-tools
v2.4.6
Optimized memory usage when restoring database backups
Optimized disk usage when creating database backups
Added extraEnv
and extraVolumeMounts
to web service init containers
Added support for custom annotations for ConfigMaps and Secrets
Changes:
Web Service port is now configurable
Update to immuta-deploy-tools
v2.4.4
Only allow privileged users to drop and create database during restore
Only connect to Postgres database during restore when running as a superuser
Fix:
Fixed bug where Google Cloud credentials were not properly mounted during restore process
Changes:
Added support for <component>.image.digest
to allow image digests to be used instead of image tags.
Added endpointslices
to built-in Ingress Controller Role.
Fix:
No longer deploy database-initialize resources when restore is disabled.
Google Cloud Secret Key is no longer referenced when restore is disabled.
Changes:
Update to immuta-deploy-tools
v2.4.3
Fix:
Fix malformed YAML error during generation of database-initialize hook manifest when backup.restore.enabled
is true
Fix:
Update to immuta-deploy-tools
v2.4.2
Adds support for Azure managed identities.
Support non-superuser restore from backup taken by a superuser.
Changes:
Support for Query Engine rehydration.
Use queryEngine.rehydration.enabled
Deprecate openSSLConfig
in favor of openSSLConfigMapName
.
Where openSSLConfigMapName
is an existing Configmap that's managed outside of Helm, but located in the same namespace.
Do not manage external database backup/restore process when a superuser is not set.
Deprecate externalDatabase.backup.enabled
and externalDatabase.restore.enabled
Use backup.enabled
and backup.restore.enabled
.
Fix:
Update immuta-deploy-tools
to v2.3.1
Vulnerability fixes
Fix:
Update to immuta-deploy-tools
v2.3.0
Fixed bug where backup files would be cleaned up based on Last Modified Date instead of the timestamp in the filename.
Vulnerability fixes
Changes:
All replica counts default to 1
Database Migrations execute as init-container for internal and external metadata
Enabled Patroni Failsafe mode by default
Persistence is enabled by default
Deprecate HA Redis Cache feature
Deprecate hooks.databaseMigration
and hooks.databaseInitialize.initVars
Deprecate ingressClass
Use web.ingress.ingressClassName
or web.ingress.annotation
instead
Immuta Helm 4.11.1 includes bug fixes and stability improvements.
Fix:
Update to immuta-deploy-tools
v2.2.0.
Fixed bug where database migrations failed to execute on databases not named bometadata
.
Only set automountServiceAccountToken
on Pods when rbac.create
is enabled.
Immuta Helm 4.11.0 includes bug-fixes for database backups.
Update:
Update immuta-deploy-tools image to v2.1.9.
Immuta Helm Chart 4.10.0 contains bug fixes and stability improvements.
Fix:
Update immuta-deploy-tools
to v2.1.8.
Default to Immuta 2022.4.1.
Backups failed when tls.enabled
was set to false.
extraEnv
processing returned null if valueFrom
was used instead of value.
Use tls-secret.type
of kubernetes.io/tls
when nginxIngress.enabled
is set to false.
Base Web Ingress annotations couldn't be removed or overridden.
Couldn't disable external TLS while leaving internal TLS enabled.
Couldn't restore from a specific backup file in Helm Chart.
Immuta Helm backup failed when storageClass
did not support ReadWriteMany
.
Couldn't enable database restores by default on new Helm deployments.
Fix regression when using max-backup-count
for database backups.
Update:
Kubernetes 1.24 support.
Increase default Patroni log level to INFO
instead of WARNING
.
Immuta Helm 4.9.7 includes bug-fixes for external metadata database migrations.
Update:
Update immuta-deploy-tools image to v2.1.7.
Default to Immuta 2022.3.1.
Immuta Helm 4.9.6 includes bug-fixes for external metadata database migrations.
Update:
Update immuta-deploy-tools image to v2.1.6.
Support Immuta 2022.3.0.
Immuta Helm 4.9.5 includes bug-fixes for external metadata db and backups.
Update:
Update immuta-deploy-tools image to v2.1.5.
Default to Immuta 2022.1.1.
Fix:
Fix TLS behavior when external is disabled.
Fix restore when specifying backup file.
Fix backup.maxBackupCount
behavior. A previous version introduced a regression that ignored the value.
Immuta Helm 4.9.3 includes bug-fixes and small database initialization configuration updates.
Update:
Support passing database initialization variables to immuta-deploy-tools
.
Fix:
Fix backup.restore.allowMissingArchive
value reference typo.
Fix validation logic for external database passwords when existingSecret
is specified.
Helm 4.9.2 adds functionality to improve security context granularity.
Update:
Default to Immuta 2022.1.0.
Remove service token auto mounting.
Deprecate <component>.securityContext
in favor of <component>.podSecurityContext
.
Granular security context support.
Immuta Helm 4.9.0 includes bug-fixes and updates to various components.
Update:
Update immuta-deploy-tools image to v2.1.4
Fix:
Do not create or mount volume to /var/lib/immuta
for older versions of Immuta (<2022.1.0)
Immuta Helm 4.8.1 includes bug-fixes and enables some use-cases that were previously blocked.
Update:
Add volume to support uploading Immuta plugins for restricted OpenShift security contexts.
Add support for custom Azure blob domain for backups.
Fix:
Use credentials from existing secret when creating backups.
Remove validation requirement for external database passwords when an existing secret is provided.
Set Patroni config environment variable for interactive shell sessions.
Don't create an ODBC volume (/var/lib/immuta/odbc
) for older versions of Immuta (< 2021.4.0).
This release includes changes to support deploying Immuta on OpenShift and updates the built-in Ingress-Nginx controller to support Kubernetes 1.22+.
It is now possible to deploy the Immuta Helm Chart on OpenShift Kubernetes clusters. For more details see Deploy Immuta on OpenShift.
The Ingress-Nginx controller has been updated from v0.x to v1.x in order to support Kubernetes 1.22+. Due to breaking changes, the v1 release of Ingress-Nginx does not support Kubernetes versions older than 1.19. Users who have existing deployments on older Kubernetes clusters can set nginxIngress.controller.image.tag=v0.49.3
in the Immuta Helm values.
Update:
Upgrade Ingress-Nginx controller to v1.1.0.
Creation of Ingress resources can now be disabled.
Support configuring Patroni to use ConfigMaps for leader election (required for deployment on OpenShift).
Added pod anti-affinity rules for Redis cache Pods.
Allow annotations to be set on the Query Engine client Service.
Add Helm value cache.updateStrategy
to allow update strategy to be set for cache workloads.
Fix:
Fix for database restores from blob storage into an external database.
Fix for backup SecurityContext overrides not taking effect.
This release includes new features and other changes intended to improve the usability of the Immuta Helm Chart.
New features include the ability to use an external PostgreSQL database for Immuta metadata and the option to use Redis as a cache. Other notable improvements are the ability to set a global image registry override, support for the PodSecurityPolicy RunAsUser
rule MustRunAsNonRoot
, configurable SecurityContext runAsUser
settings for most components, and support for Kubernetes API resources that have moved out of beta.
It is now possible to use an external PostgreSQL instance as the Immuta Metadata Database when running Immuta in Kubernetes. When enabled, this functionality replaces the built-in PostgreSQL metadata database that runs in Kubernetes. This functionality is enabled by setting database.enabled=false
and passing the connection information for the PostgreSQL instance under the key externalDatabase
.
For existing deployments it is possible to migrate from the built-in database to an external database. In order to migrate, backups must be configured, and a backup should be taken immediately prior to migrating. The process of migrating can be done by running helm upgrade
with the external database Helm values and backup.restore.enabled=true
.
This functionality is compatible with Immuta 2021.3+.
There is now the option to use Redis as the cache implementation for Immuta. The primary motivation for offering this option is to enable the use of TLS for network traffic between the Immuta web service and cache pods.
In order to select Redis as the cache implementation for Immuta, set the Helm value cache.type=redis
when installing the Immuta Helm Chart.
TLS is enabled for internal network traffic by default when Redis is used, so unless tls.enabledInternal=false
is set, TLS will be used for network traffic between Immuta and Redis.
When Redis is selected as the cache for Immuta, the Immuta Web Service pods will contain an additional container that runs envoy as an ambassador sidecar; the envoy container is named "cache-proxy-sidecar." In this configuration, kubectl logs
commands must include the flag --container=service
in order to access logs for the Immuta Web Service.
It is now possible to configure the container image registry globally for all images referenced by the Immuta Helm Chart.
The default value for global.imageRegistry
is registry.immuta.com
.
Immuta images are referenced relative to the configured image registry by adding the repository prefix immuta/
, for example registry.mycorp.com/immuta/immuta-service
.
Third-party images are referenced without the immuta/
prefix. The images that this applies to are
ingress-ngnix-controller
memcached
redis
envoyproxy-envoy-alpine
If these images are not available in the custom registry under the root prefix, it is possible to configure the image repository. This may be the case if you have pulled these images and pushed them to your registry under the immuta/
prefix.
MustRunAsNonRoot
PoliciesInit containers for initializing database and Query Engine persistent volumes no longer run as root. In addition to increasing overall security by running init containers as an unprivileged user, this also means that Immuta is now compatible with the PodSecurityPolicy RunAsUser
rule MustRunAsNonRoot
or other similar policies.
runAsUser
for Most ComponentsThe Pod SecurityContext is now configurable for all components except for Nginx Ingress. This means that the user ID that the Pods run as can now be customized by setting securityContext.runAsUser
for the components that support it. The following table shows which components are configurable for various Immuta versions.
The resources created by the Immuta Helm Chart will now use stable versions of the following resources when they are available on the Kubernetes cluster.
networking.k8s.io/v1
for Ingress resources.
batch/v1
for CronJob resources.
policy/v1
for PodDisruptionBudget resources.
Upgrading to 4.7.0 from 4.6 should be possible with minimal or no changes to the Helm values. The following section identifies any caveats or recommendations that should be taken into account when upgrading.
helm upgrade --reuse-values
not supported for upgrade from 4.6 to 4.7Due to changes in the Chart's default values.yaml
file, helm upgrade --reuse-values
does not work. If you have a saved values file, use that when calling helm upgrade
. If you don't have a saved values file, you can use helm get values
to save the Helm values locally before calling helm upgrade
.
Some values have been deprecated in this release. The following table indicates the deprecated values and the migration path for each one. Update any custom Helm values referencing the deprecated values at the earliest convenience to avoid any issues when the deprecated values are removed.
Update Kubernetes Batch API versions.
Update Kubernetes Networking API versions.
Update Kubernetes Policy API versions.
Startup init container checks now have a time out.
Support for disabling built-in database and using an external database.
Database and Query Engine initContainers
no longer run as root.
Runtime user ID is now configurable for all Pods except Nginx Ingress.
Added shared memory volume for Database and Query Engine by default.
It is now possible to set a Docker image registry globally in Helm values.
The environment variable noproxy
will now be configured such that internal network connections do not use the proxy if extraEnv
values are used to set HTTP_PROXY
or HTTPS_PROXY
.
Added option to deploy Redis with TLS instead of Memcached for the cache.
Fix:
Database and Query Engine Pods now crash and restart when the backup restore process fails.
The TLS generation hook will now regenerate TLS certs if the externalHostname
value changes.
This release makes it possible to increase the size of /dev/shm
in the Database and Query Engine Pods. This functionality makes use of memory-backed emptyDir Volumes.
Update:
Add support for memory-backed volumes to increase the size of /dev/shm
.
Update Helm Chart appVersion
to 2021.3.5.
This release includes an update to the default image tag for the bundled Nginx Ingress Controller.
The ingress-nginx project has released a few updates since v0.47.0
. This release updates the default version to v0.49.3
, which includes an update to Alpine Linux v3.14.2
. This update addresses CVE-2021-3711, which v0.47.0
was vulnerable to.
To upgrade the Nginx Ingress Controller without upgrading the Immuta Helm Chart, you can set the following Helm values.
Update:
Update Helm Chart appVersion
to 2021.3.4.
Update ingress-nginx controller to v0.49.3
.
This release updates the Immuta Helm Chart appVersion
to 2021.2.2 and adds support for using an S3-compatible server for backup and restore. It also contains a fix for the metrics export CronJob in Immuta 2021.2+.
In order to use a custom S3 endpoint for backup and restore, new Helm values have been added. The example below shows how to configure an S3 compatible endpoint.
Update:
Update Helm Chart appVersion
to 2021.2.2.
Add blob storage endpoint support for backup storage.
Fix:
Fix Metrics CronJob errors for Immuta 2021.2+
This release includes usability and stability improvements and an update to the bundled Nginx Ingress Controller. Usability improvements include the option to use an existing Kubernetes Secret for Immuta database passwords. Stability improvements include a change in configuration for the Immuta database and Query Engine StatefulSets.
This release adds the option to use an existing Kubernetes Secret for Immuta database passwords used in the Helm installation. Using an existing Secret can be useful when you want more control over the creation of the Secret or do not want to include the sensitive values in the Immuta Helm values file.
To use an existing Kubernetes Secret, you must first create a Secret containing the required data keys.
Note: This is an example showing the required data keys and some sample values. For more details on creating Secrets in Kubernetes, see the Kubernetes Documentation.
Reference the Secret by name in the Immuta Helm values.
If you have an existing release, you can migrate to an existing Kubernetes Secret by creating the Secret with the values previously defined in your Helm values by using the following mappings.
Set the existingSecret
value and removing the password values from your Immuta Helm values file. Apply the change by running helm upgrade
for your release, referencing the values file.
This release includes a change in the default settings for Patroni, which is used in the database and Query Engine StatefulSets. This setting has been shown to improve the stability of the StatefulSets when the pods are restarted frequently due to cluster operations, such as node upgrades.
For new installations, no action is necessary to make use of this configuration change. For existing installations, the change must be applied manually to the StatefulSet pods.
Note: Replace "RELEASE_NAME" with the name of your Immuta Helm release.
The ingress-nginx project released an update to mitigate a vulnerability in Nginx. We've updated the bundled ingress controller to this new release. More details are available in this GitHub issue.
Update:
Add support for using an existing Kubernetes Secret for passwords.
Enable use_pg_rewind
for Patroni by default.
Update ingress-nginx controller to v0.47.0 to mitigate CVE-2021-23017.
This release updates versions for various components.
Update:
Update Helm Chart app version to 2021.2.0.
Update immuta-deploy-tools image to 1.1.2.
Update default ingress-nginx controller image to v0.46.0.
This release adds support for Immuta 2021.2 and to allow scaling Immuta web service pods to zero.
Update:
Update container uid and gid in securityContext
for 2021.2.
Remove dependency on pgrep
and getopt
from scripts.
Allow web pod replicas to be set to zero.
This release updates the default Immuta version to 2021.1.3 and the default memcached image tag to 1.6-alpine.
Update:
Update memcached image to 1.6-alpine.
This release contains a fix for an issue where setting resource requests and limits was not possible for some containers created by the Immuta Helm Chart.
Fix:
Set configurable resource limits for all containers and init containers
This release contains updates that enable the configuration of options that were previously not exposed in the Helm Chart.
The Immuta Fingerprint service configuration can now be set in Helm values. For example, to set the worker_timeout
option to a value of 300, set the following values.
The log level for the Immuta Fingerprint service can also be configured. Valid values include DEBUG
, INFO
, WARNING
, ERROR
, and CRITICAL
.
Feature:
Add ability to pass in configuration for Immuta Fingerprint service
Fix:
Add port 8008 to Database and Query Engine Endpoints
When upgrading to 4.6.2 with nginxIngress.enabled
set to true
, a new ConfigMap was introduced to be used by the NGINX Ingress Controller for leader election. This will cause the old ConfigMap, named ingress-controller-leader-immuta-<RELEASE>-ingress
, to be orphaned. This will not affect the operation of Immuta and may be removed by running
Fix:
When using --reuse-values
coming from 4.5.x charts, extraEnv
value throws a templating error.
Use Immuta config item publicPostgres.useSSL
instead of publicPostgres.ssl
starting with Immuta Version 2020.3.
Adopt nginx-ingress leader election ConfigMap into the chart when using Optional Ingress Controller component.
Feature:
Set log_error_verbosity = TERSE
in Postgres configuration.
Update default version to 2020.4.0.
Add port 8008 to primary database and query-engine services.
Add ability to set annotations on all service accounts.
Set .spec.terminationGracePeriodSeconds
for all Immuta pods.
Update Query Engine readiness and liveness probes to use Patroni REST API endpoints.
Update Database readiness and liveness probes to use Patroni REST API endpoints.
Fix:
Database password is no longer used in Query Engine init-container.
Feature:
Add support for LDAPS-backed Query Engine Authentication.
Fix:
Web Service pods now wait for database migrations to execute before startup.
This release contains a fix for a race condition introduced in 4.5.3 when performing a new install.
Fix:
Removed Endpoint resource for Database and Query Engine components to prevent race condition with Service. Endpoints are now created by Database and Query Engine Service resource.
This release contains a few fixes and updates the default Immuta application version to 2020.2.8.
Feature:
Update appVersion
to 2020.2.8.
Fix:
Support EndpointSlices for Database and Immuta Query Engine in Kubernetes 1.17+.
This release contains a few fixes and updates the default Immuta application version to 2020.2.7.
Feature:
Update appVersion
to 2020.2.7.
Update default values for Immuta Query Engine to support Elastic.
Fix:
Helm hooks fail to run with helm older than 3.2.0.
TLS Ciphers used in NGINX Ingress Controller incompatibility with default TLS cipher suites set in Databricks.
This release contains a fix for a bug introduced with the last release that caused helm install
to timeout and fail when used with the --wait
flag.
If you are using Argo CD to deploy the Immuta Helm Chart, then you may notice that the TLS secret will be marked OutOfSync (requires pruning). The TLS secret (which is used for the encryption of inter-pod network traffic) should not be pruned. Update the Helm values with the following so that the TLS secret can be monitored as a resource without the risk of unwanted pruning.
Fixes:
Fix issue with TLS generation and the helm install --wait
flag.
The Immuta Helm Chart now supports deployment using Argo CD. Prior to this, the TLS generation hook would create a Secret that was not tracked by Helm. In Argo CD this resource would appear to need pruning. There was also an issue with the database and Query Engine endpoints, in which they would appear to be out of sync, but syncing them would remove the runtime changes that were being applied by Patroni. These issues have been resolved, and Argo CD is now supported.
For Argo CD versions older than 1.7.0 you must use the following Helm values in order for the TLS generation hook to run successfully.
Starting with Argo CD version 1.7.0 the default Immuta Helm Chart values can be used.
The bundled version of ingress-nginx has been upgraded to 0.34.1. In addition to upgrading the default version, the cluster scoped resources that used to be created (ClusterRole and ClusterRoleBinding) are no longer required and have been removed.
Setting the Helm value nginxIngress.controller.service.isInternal
will now cause an internal Azure load balancer to be created for nginx ingress.
externalTrafficPolicy
A new value was added to set the externalTrafficPolicy
on the nginx ingress Service. Setting this value to "Local" can be useful for preserving client IP addresses. See the Kubernetes Documentation for more information on preserving the client source IP.
When upgrading an existing Helm release from chart version <=4.4
that was using the default values tls.enabled=true
and tls.create=true
, you must first annotate and label the Immuta TLS Secret so that it can be adopted by Helm.
You will need to complete these steps if you encounter either of the following errors when running the helm upgrade
command.
To resolve these upgrade errors, run the following commands, being sure to substitute the proper Helm release name and namespace.
After this, you can proceed to run helm upgrade
.
Feature:
Refactored Helm Chart hooks to work with Argo CD.
Updated Helm Chart description.
Update web pod annotations so that password changes cause a rolling restart.
Upgrade ingress-nginx to 0.34.1.
Support setting externalTrafficPolicy
on the nginx ingress Service.
Update nginx ingress Service to include Azure annotations.
Bug:
Fix issue with release names that contain periods.
Bug:
Fix fingerprint configuration when TLS is disabled.
It is now possible to set pod annotations and labels at a global level. When set, these labels and annotations will be used for all pods that the Immuta Helm Chart creates. Pod labels and annotations can be set using the Helm values global.podAnnotations
and global.podLabels
to a map of string to string.
Labels and annotations can also be set individually for each component in the Immuta Helm Chart. To set labels and annotations for an individual component, set the Helm values <componentName>.podAnnotations
and <componentName>.podLabels
to a map of string to string.
Feature:
Support labels/annotations on all pods.
Bug:
Fix for Query Engine pod referencing image repository from database values.
Cleanup:
Remove the option to configure Data Source CA certificates using a ConfigMap.
nodeSelector
and tolerations
It is now possible to set custom nodeSelector
and tolerations
for each component in the Immuta Helm Chart.
To set a custom nodeSelector
, set the Helm value for <componentName>.nodeSelector
to a valid nodeSelector
. See the Kubernetes documentation for more details.
To set a custom tolerations
, set the Helm value for <componentName>.tolerations
to a valid tolerations
. See the Kubernetes documentation for more details.
Feature:
Support setting nodeSelector
and tolerations
on all pods.
Version | General availability date | End of support date | End of extended support date |
---|---|---|---|
General availability date: The date the software version is available to all customers.
Support period: The period of time between the general availability date and the end of support date. During this period, Immuta will keep the version up-to-date with important bug fixes and security updates.
End of support date: The date when Immuta will stop backporting critical bug fixes to the release. For LTS releases, this is one year after the general availability date. For all other major releases, this is typically one month after the next release (four months after the general availability date).
Extended support period: The period of time between the end of support date and the extended support date. During this period, Immuta will no longer provide bug fix updates to the version, but will investigate and troubleshoot issues. Immuta recommends to upgrade before this period.
End of extended support date: The date when Immuta is no longer obligated to investigate issues raised against the release. The end of extended support date will occur three months after the next major release.
Immuta releases one long-term support (LTS) version each year that is kept up-to-date with important bug fixes and security updates for one year. Our customers who prefer to remain on an Immuta version for an extended period of time can install the LTS versions and be confident that their implementation is stable and supported.
Major releases that are not designated “LTS” will be updated with important bug fixes until one month after the next major release.
Why should I choose the LTS version?
Immuta recognizes that frequent upgrades are not feasible for many of our customers and wants to ensure that customers can remain on versions of the product that are well-supported. The LTS model ensures that customers who choose to stay on an Immuta version for a longer time will benefit from stability and security updates without being exposed to the risk of functionality changes.
I am on an older version today. Do I have to upgrade to an LTS version?
Immuta recommends that customers on older versions start planning an upgrade to the LTS or a more recent quarterly version.
Can I still use older versions?
The Customer Success team will continue to answer questions and help you troubleshoot older versions as much as possible. However, Immuta will not provide code updates to versions that have reached their end of support date.
What if I want the latest version of Immuta?
Great! Staying up-to-date with the latest Immuta release is the best way to get the latest features and improvements. The LTS model does not impact you. You will always be supported with critical bug fixes and security updates when you are using one of the two most recent major releases of Immuta. Immuta recommends to plan for quarterly upgrades to stay on a supported version when not on the LTS.
How are the non-LTS versions supported?
Major releases that are not designated LTS are supported with critical bug fixes through the next two major release dates, which is typically a four-month period, giving time for an upgrade each quarter.
What are considered critical bug fixes?
Cybersecurity vulnerabilities (CVEs) that are categorized as critical or high and have a possible impact within the Immuta solution.
Bugs that cause a severe and ongoing disruption to our customers' ability to conduct business in production, including critical performance impacts.
Preview level | Access | Support | Documentation | Contact |
---|---|---|---|---|
The design partner level is for SaaS customers only.
In this preview level, Immuta launches an initial limited-functionality feature with a select group of customers to solve a specific challenge. The goal of this preview level is to validate that the solution solves the challenge in a way that is valuable, usable, and feasible.
Throughout the feature development and launch processes, Product Management and Engineering meet regularly with the customer to gather feedback and help implement the feature. When the process starts, entire portions of the feature may be missing from the product, but the customer receives regular (potentially weekly) updates of the feature from the Engineering team.
Design partner level features do not have support SLAs or Immuta customer support engagement; the customer solely works with the Immuta Product team. Design partner feature functionality is subject to change, discontinuation, and discontinuation of support at Immuta’s sole discretion. Immuta makes no delivery date commitments.
Private preview features approximately match the product offered to the general public. Immuta only makes changes to the feature after gathering feedback or discovering unexpected implications of the feature.
Immuta invites customers to the private preview, and they are required to engage with Immuta Product Management to provide feedback about the feature.
Immuta makes commercially reasonable efforts to support private preview functionality; however, such support is not subject to SLA targets or processes. Immuta immediately closes support tickets that are filed and redirects customers to the Product Manager in charge of the feature. Private preview functionality is subject to change, discontinuation, and discontinuation of support at Immuta’s sole discretion.
Public preview features match the product offered to the general public. Immuta only changes the feature to address bugs.
Public preview features are fully documented on the Immuta website, but customers are expected (not required) to engage with Product Management and Customer Success to enable the feature.
Immuta makes commercially reasonable efforts to support public preview functionality; however, such support is not subject to the normal SLA targets and will not be considered priority level 1 or 2. If public preview functionality impacts or is believed to reasonably impact other fully supported functionality, the customer must disable the public preview functionality; SLA targets and processes only apply once the public preview functionality is disabled. Issues discovered (even at priority levels 3 and 4) with public preview functionality will be resolved at Immuta’s sole discretion.
GA features are complete and available to all customers. Full SLA targets and processes apply.
Use the image digests below to verify the integrity of Immuta images that you pull.
Image digests may be different than the digests shown below if you are using a registry proxy, such as JFrog Artifactory or Sonatype Nexus, to proxy requests to the Immuta container registry. Registry proxies modify the image manifest resulting in a new image digest.
Image | Digest |
---|---|
The table below outlines the available features currently in preview for this release and when they were introduced.
Feature | Availability | Introduced |
---|
New Setting | Description |
---|---|
New Setting | Description |
---|---|
Immuta Version | Components |
---|---|
Deprecated Value | Replacement Value |
---|---|
Helm Value | Secret Data Key |
---|---|
2024.3
September 2024
February 2025
April 2025
2024.2 LTS
April 2024
April 2025
June 2025
2024.1
January 2024
July 2024
October 2024
Invitation only
None
None
Product Management (required)
Invitation only
Best effort
Yes
Product Management (required)
Customer request
Limited SLAs
Yes
Customer Success and Sales Engineering
No action required
Full SLAs
Yes
Customer Success and Sales Engineering
registry.immuta.com/immuta/immuta-service:2024.1.0
sha256:6321a76485addd5cbac92b771da6e6fc451e78aa03ab24e85385f93801aea135
registry.immuta.com/immuta/immuta-service:2024.1.1
sha256:0841ca08d90d61623c648ec1d27c5588a1b4405c9e8c3accc4c24d0946ae1e61
registry.immuta.com/immuta/immuta-service:2024.1.2
sha256:bf992fe630a2f65155ae2378d7af91fe424b5922c026977b880d4427760b3831
registry.immuta.com/immuta/immuta-service:2024.1.3
sha256:65b5f954d94beb0f2e90e340bb7c935025bac363560d7b07731ba4a1fe904c10
registry.immuta.com/immuta/immuta-service:2024.1.4
sha256:04edba068f5b1165c359c4d210335f821572b0f98253a79d6c3683436edc152d
registry.immuta.com/immuta/immuta-service:2024.1.5
sha256:43ea2713e72f969a31ea68f1bbd940b9c7a7fe060120bb723f55a1ed95469c9a
registry.immuta.com/immuta/immuta-service:2024.1.6
sha256:48291f00267067a1f015ef43a20ea791c04e3c347fc7e8683480b951ca8c4658
registry.immuta.com/immuta/immuta-service:2024.1.7
sha256:1fedd1d851d2ccf2257a585529f89fd99cb46da34e1b85a079f078e2f07382c1
registry.immuta.com/immuta/immuta-service:2024.1.8
sha256:11000e75b98e40ecfbc4fdc8dbdc293b0fa377aa778884135a2525b3741ca2ab
registry.immuta.com/immuta/immuta-service:2024.1.9
sha256:28055b6abfdd67c841cd6a8c18f6d8052394e60e16849b2ae58647126323cb9f
registry.immuta.com/immuta/immuta-service:2024.1.10
sha256:e7242235e14f7ccb4d2adc6c2de6f3edf9b9b7a12bc9c73d016d649ca0658a5b
registry.immuta.com/immuta/immuta-service:2024.1.11
sha256:6e2630d8a7514dc6161e0d98c709d315dd9d11e38ea10b29bb0b1eaf3d64e360
registry.immuta.com/immuta/immuta-service:2024.1.12
sha256:021272c780d49158e02b732712068191d0f35ce8abaafd33a2e80a31d6a4b9b6
registry.immuta.com/immuta/immuta-db:2024.1.0
sha256:6f08d5f36e3e09a040b45dc1ead9ef0f733875783308c3ccf9775301ba414f02
registry.immuta.com/immuta/immuta-db:2024.1.1
sha256:bf7df50caaae9416cb7a0293b68a19688a21df32e5ffb452ed4e478cd7b152cf
registry.immuta.com/immuta/immuta-db:2024.1.2
sha256:70e8e04d0e13fd78503dccf2906b56cf676fb5e4cfcf2431337b6a356d1bdae5
registry.immuta.com/immuta/immuta-db:2024.1.3
sha256:ba14d2868e733089332e906e749e739b17b5402069df139c63817f0435c6d9ed
registry.immuta.com/immuta/immuta-db:2024.1.4
sha256:d1ded87901a7aaef349407cbc8a595373a719924486defc21e02d68a13ce5af4
registry.immuta.com/immuta/immuta-db:2024.1.5
sha256:af17a56f8bc5b9e9462465e6f2e48c62cead62064b541879ae57f3a359748087
registry.immuta.com/immuta/immuta-db:2024.1.6
sha256:22dbca7dc2c485a71df3060181cd84ff54bd3df30f03cb853238330e7fc68718
registry.immuta.com/immuta/immuta-db:2024.1.7
sha256:cfcae5d981a4f0322c5ccb98b50cbc423e78a8b91d675bc172223acea8d4ef79
registry.immuta.com/immuta/immuta-db:2024.1.8
sha256:a7839c9b5b65ee319b11f20fa87d176b14be4c9569fdc255305622a105dbba5e
registry.immuta.com/immuta/immuta-db:2024.1.9
sha256:00e6dfb6699e979b0b7e59f8752f347d6f390696b2e002e22a6e5dc82768846d
registry.immuta.com/immuta/immuta-db:2024.1.10
sha256:ad0189ab77224c9410729d5962d5fa45f8fc7d93567837cc7bb1de66e9262b16
registry.immuta.com/immuta/immuta-db:2024.1.11
sha256:ad07fce2ac73358c21f51b48aa8164ba61a188123d0229ca6c19aae3a68cade0
registry.immuta.com/immuta/immuta-db:2024.1.12
sha256:6dbcfde6e5ade9a4ccf8d66de08d804ad9ab616c3502ac3dc777c0a671a28587
registry.immuta.com/immuta/immuta-fingerprint:2024.1.0
sha256:f3fd3af0035e88ff47e7c16955ae08277c7cd3958f7506218f6275a17048843f
registry.immuta.com/immuta/immuta-fingerprint:2024.1.1
sha256:62a004ee76a755eaa1a10637de1945e2912169416c3dc20da0d2736fd95c60a9
registry.immuta.com/immuta/immuta-fingerprint:2024.1.2
sha256:092a43b9d09b47e8a223aa2c3f71c5ac062333d426666553fa843ff230120603
registry.immuta.com/immuta/immuta-fingerprint:2024.1.3
sha256:2c2c3c7f5678aa81fc56b4b8c76069dc7f05668924cf2e0201919a0fa355d41e
registry.immuta.com/immuta/immuta-fingerprint:2024.1.4
sha256:ec173aa89c39d58f60bf5658f31bbaa7b07ee312a817b0f8eaeb1b4bfe6292bb
registry.immuta.com/immuta/immuta-fingerprint:2024.1.5
sha256:3d590e56e0a8afb781a90559639d1e0cbf8bc1f93db5a1cd84209ed22a569c7c
registry.immuta.com/immuta/immuta-fingerprint:2024.1.6
sha256:a1b806acf8b3488a71be6d6d9360d0a5537e6fb4b4a8dadd7780b63a7783f8f3
registry.immuta.com/immuta/immuta-fingerprint:2024.1.7
sha256:6d0867a180d63dbbdb2fd07576d36c9ba5f7019c71f15e9a040eb1ac6a09ac7f
registry.immuta.com/immuta/immuta-fingerprint:2024.1.8
sha256:fc171ab0e9ff3928f59e521ce2b36fc1084a417271fbfefe7085820be4d7f5e2
registry.immuta.com/immuta/immuta-fingerprint:2024.1.9
sha256:888d50176061a584b577b6327950bdd8036e3d62c248eb37830c3b3b6df39e33
registry.immuta.com/immuta/immuta-fingerprint:2024.1.10
sha256:e65c03d68af0148e653a8c03ccb0dc59398e7b676283b1308d3bb3189313c1a1
registry.immuta.com/immuta/immuta-fingerprint:2024.1.11
sha256:26cb0674ab52b71b043343959295d451045611b6790a1bf83ff75b8cab9135db
registry.immuta.com/immuta/immuta-deploy-tools:2.3.1
sha256:0930dd1ff1e6036b1f6aca520864fad440ba0ccc3dcd08ea4015b02216f27b52
registry.immuta.com/immuta/immuta-deploy-tools:2.4.0
sha256:7832025b1dbc8f057865707002ceecef30165ff8fb54b094e3f94c778ccd28fc
registry.immuta.com/immuta/immuta-deploy-tools:2.4.2
sha256:193e4d3f65238b0de51dde7c3331c441a9e148a1b66695fb9ef905c3eb61b230
registry.immuta.com/immuta/immuta-deploy-tools:2.4.3
sha256:9530a1f4697aa8104b46ac526234e5451733253715f6f57ead2a8157189d43c6
registry.immuta.com/immuta/immuta-deploy-tools:2.4.4
sha256:b55d1834aeb12848c7fe48013e574243d6ec76c81336c20a35992efd40b63265
registry.immuta.com/immuta/immuta-deploy-tools:2.4.5
sha256:7e02af923b6eb36e633f5e10c9d2156efbc8e048af1ebbe217e7aa2cb4a3cae4
registry.immuta.com/immuta/immuta-deploy-tools:2.4.6
sha256:2ca0e4b24ba510916a28e5c917ed3d050a791e9581b713ec5763dbd2cb773f06
hooks.databaseInitialize.initVars
Key/value dictionary of variables passed to database initialization process.
podSecurityContext
Pod level security features on all pods.
containerSecurityContext
Container level security features on all containers.
<component>.podSecurityContext
Pod level security features for individual component.
<component>.containerSecurityContext
Container level security features for individual component.
Any
backup
, cache
2021.2+
backup
, cache
, fingerprint
2021.4+
backup
, cache
, database
, fingerprint
, queryEngine
, web
configHook.imageRepository
deployTools.image.registry
and deployTools.image.repository
configHook.imageTag
deployTools.image.tag
configHook.imagePullPolicy
deployTools.imagePullPolicy
database.imageRepository
database.image.registry
and database.image.repository
database.imageTag
database.image.tag
fingerprint.imageRepository
fingerprint.image.registry
and fingerprint.image.repository
fingerprint.imageTag
fingerprint.image.tag
memcached.imagePullPolicy
cache.memcached.imagePullPolicy
memcached.imageRepository
cache.memcached.image.registry
and cache.memcached.image.repository
memcached.imageTag
cache.memcached.image.tag
memcached.nodeSelector
cache.nodeSelector
memcached.podAnnotations
cache.podAnnotations
memcached.podLabels
cache.podLabels
memcached.replicas
cache.replicas
memcached.resources
cache.resources
memcached.tolerations
cache.tolerations
memcached.maxItemMemory
cache.memcached.maxItemMemory
queryEngine.imageRepository
queryEngine.image.registry
and queryEngine.image.repository
queryEngine.imageTag
queryEngine.image.tag
web.imageRepository
web.image.registry
and web.image.repository
web.imageTag
web.image.tag
database.password
databasePassword
database.patroniApiPassword
databasePatroniApiPassword
database.replicationPassword
databaseReplicationPassword
database.superuserPassword
databaseSuperuserPassword
queryEngine.password
queryEnginePassword
queryEngine.patroniApiPassword
queryEnginePatroniApiPassword
queryEngine.replicationPassword
queryEngineReplicationPassword
queryEngine.superuserPassword
queryEngineSuperuserPassword
Allow in the Snowflake and Databricks Unity Catalog integrations | Public preview | September 2023 (v2023.3) |
Private preview | January 2024 (v2024.1) |
Private preview | September 2022 (v2022.3) |
Public preview | July 2022 (v2022.2) |
Private preview | October 2022 (v2022.3) |
Public preview | 2021 |
Public preview | November 2021 (v2021.4) |
Private preview | October 2022 (v2022.4) |
Public preview | 2021 |
Private preview | December 2022 (v2022.5) |
Private preview | September 2023 (v2024.1) |