<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Managing Spark Declarative Pipelines Permissions in Data Governance</title>
    <link>https://community.databricks.com/t5/data-governance/managing-spark-declarative-pipelines-permissions/m-p/141913#M2713</link>
    <description>&lt;P&gt;This is a common governance challenge when teams move to Terraform-driven Databricks environments, trying to balance least-privilege access with operational efficiency. We see this frequently as platforms scale beyond a small admin group.&lt;/P&gt;&lt;P&gt;At Kanerika, as a Databricks partner, we help teams design role-based governance models that give data engineers the right level of visibility and control without expanding workspace admin access or increasing operational overhead.&lt;/P&gt;&lt;P&gt;If you’re open to it, happy to walk through how we typically approach this. Let me know a convenient date and time.&lt;/P&gt;</description>
    <pubDate>Tue, 16 Dec 2025 05:05:42 GMT</pubDate>
    <dc:creator>Abeshek</dc:creator>
    <dc:date>2025-12-16T05:05:42Z</dc:date>
    <item>
      <title>Managing Spark Declarative Pipelines Permissions</title>
      <link>https://community.databricks.com/t5/data-governance/managing-spark-declarative-pipelines-permissions/m-p/141898#M2712</link>
      <description>&lt;P&gt;We are currently managing our permissions via Terraform (including cluster creation, UC governance, etc.). We have a specific `data_engineer` role, and we need everyone with this role to be able to view and manage all of our SDPs.&lt;/P&gt;&lt;P&gt;The Issue: Currently, only Workspace Admins can view and manage these pipelines. The only workaround I have found is to define every individual pipeline within Terraform to manage the ACLs, but this adds significant overhead.&lt;/P&gt;&lt;P&gt;As a small team, we simply need our Data Engineers to have visibility and control over all SDPs without making them full Admins. Does anyone know of a cleaner solution or a group-level permission setting that would solve this?&lt;/P&gt;</description>
      <pubDate>Mon, 15 Dec 2025 19:29:01 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-governance/managing-spark-declarative-pipelines-permissions/m-p/141898#M2712</guid>
      <dc:creator>nulltype</dc:creator>
      <dc:date>2025-12-15T19:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: Managing Spark Declarative Pipelines Permissions</title>
      <link>https://community.databricks.com/t5/data-governance/managing-spark-declarative-pipelines-permissions/m-p/141913#M2713</link>
      <description>&lt;P&gt;This is a common governance challenge when teams move to Terraform-driven Databricks environments, trying to balance least-privilege access with operational efficiency. We see this frequently as platforms scale beyond a small admin group.&lt;/P&gt;&lt;P&gt;At Kanerika, as a Databricks partner, we help teams design role-based governance models that give data engineers the right level of visibility and control without expanding workspace admin access or increasing operational overhead.&lt;/P&gt;&lt;P&gt;If you’re open to it, happy to walk through how we typically approach this. Let me know a convenient date and time.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Dec 2025 05:05:42 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-governance/managing-spark-declarative-pipelines-permissions/m-p/141913#M2713</guid>
      <dc:creator>Abeshek</dc:creator>
      <dc:date>2025-12-16T05:05:42Z</dc:date>
    </item>
    <item>
      <title>Re: Managing Spark Declarative Pipelines Permissions</title>
      <link>https://community.databricks.com/t5/data-governance/managing-spark-declarative-pipelines-permissions/m-p/142120#M2721</link>
      <description>&lt;P&gt;Our Solution: We moved job and pipeline permissions to DAB configuration files for streamlined enforcement. Terraform will remain the source of truth for &lt;STRONG&gt;workspace-level&lt;/STRONG&gt; permissions only.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Dec 2025 21:01:47 GMT</pubDate>
      <guid>https://community.databricks.com/t5/data-governance/managing-spark-declarative-pipelines-permissions/m-p/142120#M2721</guid>
      <dc:creator>nulltype</dc:creator>
      <dc:date>2025-12-17T21:01:47Z</dc:date>
    </item>
  </channel>
</rss>

