This is an automated email from the ASF dual-hosted git repository. git-site-role pushed a commit to branch asf-staging in repository https://gitbox.apache.org/repos/asf/zeppelin-site.git
The following commit(s) were added to refs/heads/asf-staging by this push: new 3717da511 Automatic Site Publish by Buildbot 3717da511 is described below commit 3717da511890f9bc5a071bd0c104cc335314ed7d Author: buildbot <us...@infra.apache.org> AuthorDate: Tue Jul 8 06:31:15 2025 +0000 Automatic Site Publish by Buildbot --- output/atom.xml | 2 +- output/rss.xml | 4 ++-- output/security.html | 2 ++ 3 files changed, 5 insertions(+), 3 deletions(-) diff --git a/output/atom.xml b/output/atom.xml index 6ff89d599..db98fc0ec 100644 --- a/output/atom.xml +++ b/output/atom.xml @@ -4,7 +4,7 @@ <title>Apache Zeppelin</title> <link href="http://zeppelin.apache.org/" rel="self"/> <link href="http://zeppelin.apache.org"/> - <updated>2025-07-08T06:19:40+00:00</updated> + <updated>2025-07-08T06:31:04+00:00</updated> <id>http://zeppelin.apache.org</id> <author> <name>The Apache Software Foundation</name> diff --git a/output/rss.xml b/output/rss.xml index 9167ecab8..c9701dc32 100644 --- a/output/rss.xml +++ b/output/rss.xml @@ -5,8 +5,8 @@ <description>Apache Zeppelin - The Apache Software Foundation</description> <link>http://zeppelin.apache.org</link> <link>http://zeppelin.apache.org</link> - <lastBuildDate>2025-07-08T06:19:40+00:00</lastBuildDate> - <pubDate>2025-07-08T06:19:40+00:00</pubDate> + <lastBuildDate>2025-07-08T06:31:04+00:00</lastBuildDate> + <pubDate>2025-07-08T06:31:04+00:00</pubDate> <ttl>1800</ttl> diff --git a/output/security.html b/output/security.html index 957d6a0e9..0351d4982 100644 --- a/output/security.html +++ b/output/security.html @@ -184,6 +184,8 @@ Zeppelin deployments. Always use the latest available jars and ensure that you set up Zeppelin on a secure network to stop malicious users gaining access to your deployment (see below).</p> +<p><strong>Note:</strong> The JDBC connection string (URL) can accept a variety of parameters, some of which may have significant security implications. In untrusted or shared environments, you must carefully review and monitor all parameters included in the JDBC URL. Certain parameters can enable features such as external network access, file access, or privilege escalation, which may introduce security risks. Always ensure that only safe and intended parameters are used, and regularly [...] + <h3>Zeppelin on Docker</h3> <p>An exception to the above is when the Zeppelin interpreter