8.1.2

立即下载
This version is available from the Customer Account Center.

此版本是解决 Tableau 8.1 和 8.1.1 中以下产品问题的重要更新。

在 8.0、8.1 或 8.1.1 中创建的,或者升级到这些版本的所有 Salesforce 数据提取可能包含损坏或不准确的数据。使用 Tableau 8.1.2 刷新这些数据提取可纠正问题。计划刷新和手动刷新最初将被迫成为完全刷新。后续刷新将恢复为原先指定的增量刷新。

在 Tableau Desktop 中,系统将提示您先刷新 Salesforce 数据提取,然后再继续使用工作簿。请确保保存工作簿,以保证以后再次打开工作簿时数据正确。

在 Tableau Server 上,原来的视图将继续可用,但要到数据提取刷新后,数据才会正确。

发行日期:
2013/12/22
Desktop 内部版本号:
8100.13.1220.1924
Server 内部版本号:
8100.13.1220.1924
Tableau Desktop (Back to top)
Issue ID
94596

When connecting to Salesforce data, creating multiple connections to the same data would not work and only one connection would be made.

94588

The connection name for extracts from Salesforce data could not be changed.

93827

When connected to a Salesforce data source, fields that contain a percentage were incorrect by a factor of 100. The automatic formatting for these types of columns is now disabled. To format these columns with the percent symbol (%), right-click the field and select Default Properties > Number Format. Then select Number (Custom) and add the percent symbol as a suffix.

Tableau Server (Back to top)
Issue ID
93647

Resolved a privately reported blind SQL injection vulnerability in Tableau Server. The vulnerability could have allowed arbitrary SQL commands to be passed to the Tableau Server backend database for execution. An attacker who successfully exploited the vulnerability could have taken complete control of an instance of Tableau Server. An attacker would have needed valid credentials or the guest account would have had to have been enabled to exploit this vulnerability. This vulnerability is rated Critical for 8.0.x and 8.1.x versions of Tableau Server, and customers are urged to upgrade at their earliest opportunity. Tableau has not received any information to indicate that this vulnerability has been publicly used to attack customers at the time this update was released. Tableau would like to thank Tanya Secker and Christiaan Esterhuizen of Trustwave SpiderLabs for identifying and reporting this issue (CVE-2014-1204) and for working with us to help protect our customers.

non-humans click here