This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/zeppelin-site.git


The following commit(s) were added to refs/heads/asf-staging by this push:
     new 844eeed31 Automatic Site Publish by Buildbot
844eeed31 is described below

commit 844eeed31debc9a0079ec826a94b695bd287fdd7
Author: buildbot <[email protected]>
AuthorDate: Wed Aug 13 05:17:08 2025 +0000

    Automatic Site Publish by Buildbot
---
 output/atom.xml      |  2 +-
 output/rss.xml       |  4 ++--
 output/security.html | 19 ++++++++++---------
 3 files changed, 13 insertions(+), 12 deletions(-)

diff --git a/output/atom.xml b/output/atom.xml
index 13c1221d4..f6cb4a977 100644
--- a/output/atom.xml
+++ b/output/atom.xml
@@ -4,7 +4,7 @@
  <title>Apache Zeppelin</title>
  <link href="http://zeppelin.apache.org/"; rel="self"/>
  <link href="http://zeppelin.apache.org"/>
- <updated>2025-08-03T13:25:38+00:00</updated>
+ <updated>2025-08-13T05:16:57+00:00</updated>
  <id>http://zeppelin.apache.org</id>
  <author>
    <name>The Apache Software Foundation</name>
diff --git a/output/rss.xml b/output/rss.xml
index 1c93583bb..0963a49cb 100644
--- a/output/rss.xml
+++ b/output/rss.xml
@@ -5,8 +5,8 @@
         <description>Apache Zeppelin - The Apache Software 
Foundation</description>
         <link>http://zeppelin.apache.org</link>
         <link>http://zeppelin.apache.org</link>
-        <lastBuildDate>2025-08-03T13:25:38+00:00</lastBuildDate>
-        <pubDate>2025-08-03T13:25:38+00:00</pubDate>
+        <lastBuildDate>2025-08-13T05:16:57+00:00</lastBuildDate>
+        <pubDate>2025-08-13T05:16:57+00:00</pubDate>
         <ttl>1800</ttl>
 
 
diff --git a/output/security.html b/output/security.html
index aca783dfa..02d0896bb 100644
--- a/output/security.html
+++ b/output/security.html
@@ -188,17 +188,18 @@ your deployment (see below).</p>
 
 <h3>Zeppelin on Docker</h3>
 
-<p>An exception to the above is when the Zeppelin interpreter
-is <a 
href="https://zeppelin.apache.org/docs/latest/quickstart/docker.html";>run in a 
Docker container</a>.
-This isolates the operating environment of the interpreter through the docker 
container.</p>
+<p>When the Zeppelin interpreter is <a 
href="https://zeppelin.apache.org/docs/latest/quickstart/docker.html";>run in a 
Docker container</a>,
+this isolates the operating environment of the interpreter through the Docker 
container.
+This isolation can provide an operational benefit on large deployments, but is 
not intended as a security boundary:
+access to your Zeppelin instances should be restricted regardless of how they 
are deployed.</p>
 
 <h3>Zeppelin on Kubernetes</h3>
 
-<p>A similar exception exists when Zeppelin is
-<a 
href="https://zeppelin.apache.org/docs/latest/quickstart/kubernetes.html";>deployed
 on Kubernetes</a>.
-In this case Zeppelin creates pods for individual interpreters,
-and also the Spark interpreter is auto configured to use Spark
-on Kubernetes in client mode.</p>
+<p>When Zeppelin is <a 
href="https://zeppelin.apache.org/docs/latest/quickstart/kubernetes.html";>deployed
 on Kubernetes</a>,
+Zeppelin creates pods for individual interpreters.
+Also, the Spark interpreter is auto configured to use Spark on Kubernetes in 
client mode.
+This isolation can provide an operational benefit on large deployments, but is 
not intended as a security boundary:
+access to your Zeppelin instances should be restricted regardless of how they 
are deployed.</p>
 
 <h2>JavaScript code execution in the browser</h2>
 
@@ -237,7 +238,7 @@ locations for these executables, such as PYTHON and 
SPARK_HOME.</p>
 <h1>Known Security Issues</h1>
 
 <p>It is always best to use the latest Apache Zeppelin <a 
href="https://zeppelin.apache.org/download.html";>release</a>.
-A good place to check for CVE announcments is the <a 
href="https://lists.apache.org/[email protected]";>Zeppelin users 
mailing list</a>.
+A good place to check for CVE announcements is the <a 
href="https://lists.apache.org/[email protected]";>Zeppelin users 
mailing list</a>.
 Many third party sites maintain lists of CVEs by product. One example is <a 
href="https://app.opencve.io/cve/?vendor=apache&product=zeppelin";>OpenCVE</a>.</p>
 
 <h1>Reporting Security Issues</h1>

Reply via email to