What's new and changed in Data Virtualization

Data Virtualization updates can include new features, bug fixes, and security updates. Releases are listed in reverse chronological order so that the latest release is at the beginning of the topic.

You can see a list of the new features for the platform and all of the services at What's new in IBM Cloud Pak for Data.

Installing or upgrading Data Virtualization

Ready to install or upgrade Data Virtualization?

  • To install Data Virtualization along with the other Cloud Pak for Data services, see Installing Cloud Pak for Data.
  • To upgrade Data Virtualization along with the other Cloud Pak for Data services, see Upgrading Cloud Pak for Data.
  • To install or upgrade Data Virtualization independently, see Data Virtualization.
    Remember: All Cloud Pak for Data components that are associated with an instance of Cloud Pak for Data must be installed at the same version.

Cloud Pak for Data Version 5.0.3

A new version of Data Virtualization was released in September 2024 with Cloud Pak for Data 5.0.3.

Operand version: 3.0.3

This release includes the following changes:

New features
This release of Data Virtualization includes the following feature:
Autocaching to improve query performance
You can now enable autocaching to automate the entire cache lifecycle from creation to deletion. Autocaching leverages the cache recommendation engine to analyze your query workloads and materializes the recommendations. Autocaching also evicts caches that it had created earlier if they are no longer beneficial. As part of this feature, you can customize the name and refresh schedule of the caches, how often you want autocaching to run, the amount of storage space that auto-generated caches can occupy and the type of queries in your workload that you want autocaching to analyze. Autocaching is disabled by default, and you can enable it from the Cache management page.
For details, see Autocaching in Data Virtualization.
Customer-reported issues fixed in this release
The following issues, which were reported by customers, were fixed in this release:
Security issues fixed in this release
The following security issues were fixed in this release:

CVE-2024-0450, CVE-2024-2398, CVE-2024-2961, CVE-2024-3651, CVE-2024-4032, CVE-2024-4076, CVE-2024-5321, CVE-2024-5569, CVE-2024-6387, CVE-2024-6409, CVE-2024-6923, CVE-2024-24806, CVE-2024-25629, CVE-2024-26665, CVE-2024-26720, CVE-2024-26808, CVE-2024-26851, CVE-2024-26853, CVE-2024-26855, CVE-2024-26868, CVE-2024-26908, CVE-2024-27049, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-28182, CVE-2024-28863, CVE-2024-29041, CVE-2024-29131, CVE-2024-29133, CVE-2024-29415, CVE-2024-29736, CVE-2024-32007, CVE-2024-33599, CVE-2024-33600, CVE-2024-33601, CVE-2024-33602, CVE-2024-33883, CVE-2024-35255, CVE-2024-35823, CVE-2024-35835, CVE-2024-36020, CVE-2024-36361, CVE-2024-36883, CVE-2024-37370, CVE-2024-37371, CVE-2024-37891, CVE-2024-38428, CVE-2024-38808, CVE-2024-39338, CVE-2024-39689, CVE-2024-41096, CVE-2024-41110, CVE-2024-41172, CVE-2024-42096, CVE-2024-42102, CVE-2024-42247, CVE-2024-43843, CVE-2024-43864, CVE-2024-43865, CVE-2024-44949

CVE-2023-2976, CVE-2023-6597, CVE-2023-29483, CVE-2023-33201, CVE-2023-33202, CVE-2023-42282, CVE-2023-43804, CVE-2023-45803, CVE-2023-52463, CVE-2023-52582, CVE-2023-52607

CVE-2022-42003, CVE-2022-42004, CVE-2022-48882, CVE-2022-48894, CVE-2022-48895

CVE-2021-29425, CVE-2021-46877, CVE-2021-46914

CVE-2020-8908, CVE-2020-36518

Cloud Pak for Data Version 5.0.0

A new version of Data Virtualization was released in June 2024 with Cloud Pak for Data 5.0.0.

Operand version: 3.0.0

This release includes the following changes:

New features
This release of Data Virtualization includes the following features:
Watson Query is now Data Virtualization
The Watson Query service was renamed to Data Virtualization, and you will notice some changes in the user interface. The IBM Data Virtualization connector is also renamed to IBM Data Virtualization. Your previous settings for the connector remain the same. Only the connector name is changed.
Enforce data protection rules across Cloud Pak for Data
You can now use the new Cloud Pak for Data Data Source Definitions (DSD) to enforce IBM Knowledge Catalog data protection rules consistently across Cloud Pak for Data, regardless of whether you query the object through Data Virtualization or preview it in a catalog or project. A DSD is automatically created when you provision or upgrade your Data Virtualization instance to Cloud Pak for Data 5.0. For details, see Data protection with data source definitions. See also Governing virtual data with data protection rules in Data Virtualization.
New supported data source
REST API is now a supported data source in Data Virtualization.
    • REST API is a generic third-party data source that you access by using an API. This type of data source requires that you first create a Model file to map the API outputs to table structures in Data Virtualization.
    For details, see Supported data sources.
Updates to supported data sources
  • Generic JDBC driver functionality now supports Databricks using the native driver.
  • Spark SQL is a third-party data source that has two authentication options to set a connection: username and password credentials or Kerberos authentication.
For details, see Supported data sources.
Pushdown enhancements to improve query performance
This release of Data Virtualization improves the performance of queries that use pushdown. Query pushdown is an optimization feature that reduces query times and memory use. Data Virtualization now includes the ability to:
    • Support OLAP functions when you connect to Oracle data sources. This support includes functions MIN, MAX, SUM, COUNT, COUNT_BIG, ROW NUMBER/ROWNUMBER, RANK, DENSERANK, DENSE_RANK, STDDEV_SAMP, PERCENTILE_CONT, PERCENTILE_DISC, and PERCENT_RANK when used in the query with the OLAP function specification. For details, see OLAP specification in the IBM Db2 documentation.
    • Common subexpression pushdown to Oracle data sources.
    • Use pushdown for various other string functions, including CASTs, TRIM, BITAND, and others.
Query tables from previous Presto and Databricks catalogs with multiple catalog support
Virtual tables that you create from Presto and Databricks catalogs are now fully accessible. You can run queries on these tables regardless of any changes that you make to the catalog filters. This means that you do not need to switch back to previous Presto or Databricks catalogs to ensure the functionality of existing queries. For details on supported data sources, see Supported data sources in Data Virtualization.
Automatically scale Data Virtualization instances
You can now automatically scale Data Virtualization instances to support high-availability or increase processing capacity, rather than manually setting the size, CPU, and memory resource values after you provision instances. For details, see Scaling Data Virtualization.
Mask multibyte characters for enhanced privacy of sensitive data
You can now perform partial redaction and basic obfuscation of multibyte characters such as symbols, characters from non-Latin alphabets like Chinese or Arabic, and special characters that are used in mathematical notation. The rest of the masking methods that involve multibyte characters are masked with the character “X”. For details, see Masking virtual data in Data Virtualization.
View the data protection rules that are applied to a user
You can now view details about the data protection rules that apply to a Data Virtualization object for a specific user by using the EXT_AUTHORIZER_EXPLAIN stored procedure. For details, see EXT_AUTHORIZER_EXPLAIN stored procedure.
Data Virtualization connections in catalogs now reference the platform connection
When you publish objects to a catalog, the Data Virtualization connections that are created from that publication now reference the main Data Virtualization connection in Platform connections. This means that information such as personal credentials only needs to be defined or updated one time in the Data Virtualization platform connection. All referenced connections now automatically reflect changes that are made to the main Data Virtualization connection.
Enhanced catalog visibility for Presto and Databricks
The Presto and Databricks web client now displays the name of the catalog that you selected in the breadcrumbs of the Explore view, and beside each schema name in the List view.
Enhanced security for profiling results in Data Virtualization views
To prevent unexpected exposure to value distributions through the profiling results of a view, all users are denied access to profiling results in Data Virtualization views in all catalogs and projects.
Customer-reported issues fixed in this release
The following issues, which customers reported, were fixed in this release:
Security issues fixed in this release
The following security issues were fixed in this release:

CVE-2024-0553, CVE-2024-0562, CVE-2024-0841, CVE-2024-1488, CVE-2024-3154, CVE-2024-3177, CVE-2024-3727, CVE-2024-21011, CVE-2024-21012, CVE-2024-21068, CVE-2024-21085, CVE-2024-21094, CVE-2024-22365, CVE-2024-25062, CVE-2024-25742, CVE-2024-25743, CVE-2024-26583, CVE-2024-26584, CVE-2024-26585, CVE-2024-26586, CVE-2024-26593, CVE-2024-26602, CVE-2024-26609, CVE-2024-26610, CVE-2024-26633, CVE-2024-26643, CVE-2024-26688, CVE-2024-26718, CVE-2024-26747, CVE-2024-26804, CVE-2024-26916, CVE-2024-27075, CVE-2024-28752, CVE-2024-28834, CVE-2024-28835, CVE-2024-33655, CVE-2024-34064, CVE-2024-35176, CVE-2024-35893, CVE-2024-35910, CVE-2024-35961

CVE-2023-1076, CVE-2023-2975, CVE-2023-3022, CVE-2023-3159, CVE-2023-3358, CVE-2023-3567, CVE-2023-3758, CVE-2023-3978, CVE-2023-4133, CVE-2023-4194, CVE-2023-4244, CVE-2023-4408, CVE-2023-4504, CVE-2023-5455, CVE-2023-5517, CVE-2023-5679, CVE-2023-6004, CVE-2023-6040, CVE-2023-6121, CVE-2023-6176, CVE-2023-6240, CVE-2023-6516, CVE-2023-6622, CVE-2023-6915, CVE-2023-6918, CVE-2023-6932, CVE-2023-7008, CVE-2023-7104, CVE-2023-24023, CVE-2023-25193, CVE-2023-25584, CVE-2023-25585, CVE-2023-25588, CVE-2023-25775, CVE-2023-27043, CVE-2023-27534, CVE-2023-28322, CVE-2023-28464, CVE-2023-28486, CVE-2023-28487, CVE-2023-29499, CVE-2023-31083, CVE-2023-31124, CVE-2023-31147, CVE-2023-32611, CVE-2023-32636, CVE-2023-32665, CVE-2023-37453, CVE-2023-38409, CVE-2023-38469, CVE-2023-38470, CVE-2023-38471, CVE-2023-38472, CVE-2023-38473, CVE-2023-38546, CVE-2023-39189, CVE-2023-39192, CVE-2023-39193, CVE-2023-39194, CVE-2023-39198, CVE-2023-39325, CVE-2023-42465, CVE-2023-42754, CVE-2023-42755, CVE-2023-45287, CVE-2023-45863, CVE-2023-46218, CVE-2023-47038, CVE-2023-48161, CVE-2023-50387, CVE-2023-50868, CVE-2023-51779, CVE-2023-51780, CVE-2023-52425, CVE-2023-52426, CVE-2023-52434, CVE-2023-52435, CVE-2023-52448, CVE-2023-52454, CVE-2023-52476, CVE-2023-52489, CVE-2023-52522, CVE-2023-52530, CVE-2023-52574, CVE-2023-52578, CVE-2023-52580, CVE-2023-52581, CVE-2023-52587, CVE-2023-52597, CVE-2023-52610, CVE-2023-52620, CVE-2023-52639, CVE-2023-52777

CVE-2022-0264, CVE-2022-1665, CVE-2022-3565, CVE-2022-20566, CVE-2022-23990, CVE-2022-33068, CVE-2022-36280, CVE-2022-41850, CVE-2022-45885, CVE-2022-45934, CVE-2022-48468, CVE-2022-48554, CVE-2022-48619, CVE-2022-48633, CVE-2022-48634, CVE-2022-48700

CVE-2021-3178, CVE-2021-3236, CVE-2021-3444, CVE-2021-3655, CVE-2021-3712, CVE-2021-3753, CVE-2021-4001, CVE-2021-4159, CVE-2021-4209, CVE-2021-20193, CVE-2021-23841, CVE-2021-24032, CVE-2021-25317, CVE-2021-28972, CVE-2021-29657, CVE-2021-33294, CVE-2021-33624, CVE-2021-34556, CVE-2021-34981, CVE-2021-35477, CVE-2021-35937, CVE-2021-35938, CVE-2021-35939, CVE-2021-38166, CVE-2021-38198, CVE-2021-38199, CVE-2021-38206, CVE-2021-39537, CVE-2021-40490, CVE-2021-42694, CVE-2021-43618, CVE-2021-43809, CVE-2021-46913, CVE-2021-46915, CVE-2021-46922, CVE-2021-46926, CVE-2021-46929, CVE-2021-46939, CVE-2021-46961, CVE-2021-46963, CVE-2021-46973, CVE-2021-46976, CVE-2021-46977, CVE-2021-46978, CVE-2021-46981, CVE-2021-46983, CVE-2021-46988, CVE-2021-46990, CVE-2021-46991, CVE-2021-46992, CVE-2021-46997, CVE-2021-47000, CVE-2021-47001, CVE-2021-47002, CVE-2021-47003, CVE-2021-47010, CVE-2021-47011, CVE-2021-47012, CVE-2021-47013, CVE-2021-47015, CVE-2021-47024, CVE-2021-47036, CVE-2021-47038, CVE-2021-47044, CVE-2021-47045, CVE-2021-47090, CVE-2021-47091, CVE-2021-47107, CVE-2021-47116, CVE-2021-47118, CVE-2021-47120, CVE-2021-47130, CVE-2021-47133, CVE-2021-47134, CVE-2021-47136, CVE-2021-47138, CVE-2021-47140, CVE-2021-47141, CVE-2021-47142, CVE-2021-47143, CVE-2021-47144, CVE-2021-47146, CVE-2021-47149, CVE-2021-47152, CVE-2021-47153, CVE-2021-47162, CVE-2021-47163, CVE-2021-47164, CVE-2021-47166, CVE-2021-47167, CVE-2021-47168, CVE-2021-47170, CVE-2021-47171, CVE-2021-47173, CVE-2021-47176, CVE-2021-47177, CVE-2021-47178, CVE-2021-47179, CVE-2021-47183, CVE-2021-47184, CVE-2021-47186, CVE-2021-47192, CVE-2021-47194, CVE-2021-47198, CVE-2021-47201, CVE-2021-47203, CVE-2021-47209, CVE-2021-47211, CVE-2021-47213, CVE-2021-47218, CVE-2021-47242, CVE-2021-47248, CVE-2021-47281, CVE-2021-47284, CVE-2021-47293, CVE-2021-47295, CVE-2021-47302, CVE-2021-47310, CVE-2021-47311, CVE-2021-47321, CVE-2021-47328, CVE-2021-47356, CVE-2021-47357, CVE-2021-47359, CVE-2021-47367, CVE-2021-47374, CVE-2021-47376, CVE-2021-47381, CVE-2021-47387, CVE-2021-47388, CVE-2021-47389, CVE-2021-47390, CVE-2021-47395, CVE-2021-47397, CVE-2021-47402, CVE-2021-47407, CVE-2021-47408, CVE-2021-47412, CVE-2021-47415, CVE-2021-47418, CVE-2021-47419, CVE-2021-47424, CVE-2021-47427, CVE-2021-47448, CVE-2021-47452, CVE-2021-47453, CVE-2021-47456, CVE-2021-47461, CVE-2021-47462, CVE-2021-47464, CVE-2021-47466, CVE-2021-47491, CVE-2021-47492, CVE-2021-47494, CVE-2021-47496, CVE-2021-47498, CVE-2021-47506, CVE-2021-47507, CVE-2021-47514, CVE-2021-47529, CVE-2021-47544, CVE-2021-47552, CVE-2021-47554, CVE-2021-47557, CVE-2021-47562, CVE-2021-47563, CVE-2021-47565, CVE-2021-47566

CVE-2020-1968, CVE-2020-1971, CVE-2020-3702, CVE-2020-8694, CVE-2020-10781, CVE-2020-11494, CVE-2020-11609, CVE-2020-12413, CVE-2020-12656, CVE-2020-12768, CVE-2020-12769, CVE-2020-14150, CVE-2020-14390, CVE-2020-14416, CVE-2020-15778, CVE-2020-16598, CVE-2020-17049, CVE-2020-19185, CVE-2020-19186, CVE-2020-19187, CVE-2020-19188, CVE-2020-19189, CVE-2020-19190, CVE-2020-21674, CVE-2020-24979, CVE-2020-25639, CVE-2020-25645, CVE-2020-25656, CVE-2020-26159, CVE-2020-26555, CVE-2020-27170, CVE-2020-27171, CVE-2020-28097, CVE-2020-29374, CVE-2020-35493, CVE-2020-35494, CVE-2020-35495, CVE-2020-35496, CVE-2020-35507, CVE-2020-35512, CVE-2020-36311, CVE-2020-36777

CVE-2019-1547, CVE-2019-1551, CVE-2019-1559, CVE-2019-1563, CVE-2019-2054, CVE-2019-6110, CVE-2019-8905, CVE-2019-8906, CVE-2019-9071, CVE-2019-9075, CVE-2019-9077, CVE-2019-9674, CVE-2019-9923, CVE-2019-9936, CVE-2019-9937, CVE-2019-12380, CVE-2019-12900, CVE-2019-12904, CVE-2019-12972, CVE-2019-13631, CVE-2019-14250, CVE-2019-15213, CVE-2019-15217, CVE-2019-15218, CVE-2019-15219, CVE-2019-15291, CVE-2019-15505, CVE-2019-15794, CVE-2019-15807, CVE-2019-16229, CVE-2019-16230, CVE-2019-16866, CVE-2019-17543, CVE-2019-18806, CVE-2019-19039, CVE-2019-19054, CVE-2019-19066, CVE-2019-19076, CVE-2019-19080, CVE-2019-19081, CVE-2019-19082, CVE-2019-19083, CVE-2019-19244, CVE-2019-19246, CVE-2019-19462, CVE-2019-19530, CVE-2019-19965, CVE-2019-20095, CVE-2019-20794, CVE-2019-20916

CVE-2018-0734, CVE-2018-1121, CVE-2018-5407, CVE-2018-6872, CVE-2018-7273, CVE-2018-8043, CVE-2018-12641, CVE-2018-12697, CVE-2018-12698, CVE-2018-12699, CVE-2018-12700, CVE-2018-12934, CVE-2018-15594, CVE-2018-15919, CVE-2018-16862, CVE-2018-17360, CVE-2018-17794, CVE-2018-17977, CVE-2018-17985, CVE-2018-18309, CVE-2018-18483, CVE-2018-18484, CVE-2018-18605, CVE-2018-18606, CVE-2018-18607, CVE-2018-18700, CVE-2018-18701, CVE-2018-19211, CVE-2018-19217, CVE-2018-19416, CVE-2018-19517, CVE-2018-19932, CVE-2018-20002, CVE-2018-20225, CVE-2018-20482, CVE-2018-20623, CVE-2018-20651, CVE-2018-20657, CVE-2018-20671, CVE-2018-20673, CVE-2018-20786, CVE-2018-20839, CVE-2018-1000654, CVE-2018-1000876, CVE-2018-1000879, CVE-2018-1000880

CVE-2016-4074