cancel
Showing results forย 
Search instead forย 
Did you mean:ย 
Data Governance
Join discussions on data governance practices, compliance, and security within the Databricks Community. Exchange strategies and insights to ensure data integrity and regulatory compliance.
cancel
Showing results forย 
Search instead forย 
Did you mean:ย 

RLS Impact on Lake house monitoring quality metrics

karunakaran_r
New Contributor III

We have RLS applied on a table and we would like to enable lake house monitoring for a quality profile metrics ,

My Questions:
Which identity is used by Lakehouse Monitoring and how can I find it, so that I can exclude it for unrestricted access to table in our RLS policy. 

karunakaran_r_0-1754592769557.png

 

1 ACCEPTED SOLUTION

Accepted Solutions

lingareddy_Alva
Honored Contributor III

Hi @karunakaran_r 

In Databricks Lakehouse Monitoring, the profiling and drift metric collection runs as a service principal thatโ€™s tied to the Databricks system itself, not as your own user account.
That means when the monitor queries your table, it wonโ€™t be using your personal identity โ€” it uses the Lakehouse Monitoring service identity
(sometimes referred to as the system service principal for lakehouse monitoring).

How to find it for RLS exclusions:
- Go to Admin Console โ†’ Service Principals in your Databricks workspace (you need admin permissions).
- Look for a principal with a name like:
databricks-lakehouse-monitoring
- Note its Service Principal ID (or application ID in Azure AD).
- Update your Row-Level Security policy to include a clause that grants unrestricted access when current_user() or the principal ID equals that service principal.

 

LR

View solution in original post

2 REPLIES 2

lingareddy_Alva
Honored Contributor III

Hi @karunakaran_r 

In Databricks Lakehouse Monitoring, the profiling and drift metric collection runs as a service principal thatโ€™s tied to the Databricks system itself, not as your own user account.
That means when the monitor queries your table, it wonโ€™t be using your personal identity โ€” it uses the Lakehouse Monitoring service identity
(sometimes referred to as the system service principal for lakehouse monitoring).

How to find it for RLS exclusions:
- Go to Admin Console โ†’ Service Principals in your Databricks workspace (you need admin permissions).
- Look for a principal with a name like:
databricks-lakehouse-monitoring
- Note its Service Principal ID (or application ID in Azure AD).
- Update your Row-Level Security policy to include a clause that grants unrestricted access when current_user() or the principal ID equals that service principal.

 

LR

Thank you @lingareddy_Alva