- 5782 Views
- 6 replies
- 7 kudos
Forum Posts
- 4037 Views
- 4 replies
- 1 kudos
Incorrect secret value when loaded as environment variable
I recently faced an issue that took good hours to identify. I'm loading an environment variable with a secretENVVAR: {{secrets/scope/key}}The secret is loaded in my application, I could verify it's there, but its value is not correct. I realised tha...
- 4037 Views
- 4 replies
- 1 kudos
- 1 kudos
Hi team, is there an update or fix for this?
- 1 kudos
- 2327 Views
- 1 replies
- 0 kudos
Is it possible to turn off the redaction of secrets? Is there a better way to solve this?
As part of our Azure Data Factory pipeline, we utilize Databricks to run some scripts that identify which files we need to load from a certain source. This list of files is then passed back into Azure Data Factory utilizing the Exit status from the n...
- 2327 Views
- 1 replies
- 0 kudos
- 0 kudos
No, it is not possible to turn off redaction. No, there is not another way to return values from a notebook.1) Using a native Databricks feature such as Autoloader is suggested.2) They could write the list of files to be processed to a delta table an...
- 0 kudos
- 1436 Views
- 1 replies
- 0 kudos
- 1436 Views
- 1 replies
- 0 kudos
- 0 kudos
You could leverage SHOW GRANT which displays the privilegesSHOW GRANT [<user>] ON [CATALOG | DATABASE <database-name> | TABLE <table-name> | VIEW <view-name> | FUNCTION <function-name> | ANONYMOUS FUNCTION | ANY FILE]You could use this code snippet ...
- 0 kudos