Ability to restrict access to the Import wizard
Valid from Pega Version 8.5
You can now restrict access to the Import wizard so that users implement an automated pipeline to deploy changes between environments such as staging and production. Deployment Manager is one method by which to create pipelines. By using pipelines to propagate changes, users can apply a standardized and automated deployment process for migrating their applications.
For more information, see:
- Ensuring that users migrate applications with a pipeline by restricting the Import wizard
- Understanding model-driven DevOps with Deployment Manager
Security fields in JFrog Artifactory repository do not work
Valid from Pega Version 7.3
The fields in the Security section of the JFrog Artifactory repository rule form, including the Secure protocol field, the Truststore field, and the Keystore field, were not implemented. In the Pega™ Platform 7.3 Designer Studio help, disregard the optional Security section in step 4 of the Configuring a JFrog Artifactory or Amazon S3 repository connection help topic, and disregard the optional Security section in step 5 of the Creating a repository configuration help topic in the 7.3.1 Designer Studio help.
Define function input parameters on the Create or Save As forms
Valid from Pega Version 7.1.8
When creating or updating a Rule-Utility-Function ruleset in Designer Studio, use the Create or Save As forms to define or change parameters as a part of the form. The Parameters section on either of these forms allows you to set the function's name and Java type before opening the function.
Previously, you updated these fields on the Parameters tab for the function after the form was created. Moving these fields to the Create and Save As forms helps to proactively detect functions with the same signature in the same ruleset before saving the function.
For more information, see Defining function input parameters on the Create or Save As forms.
Search and Reporting does not index large items
Valid from Pega Version 8.5
When using the Search and Reporting (SRS) microservice in Pega Platform™ 8.5, you might encounter problems with indexing large out-of-the-box rules. The issue is not visible in Queue Processors, but you can access logs to verify which items the system does not index.
Data encryption across search nodes
Valid from Pega Version 7.3
You can now encrypt communication among search nodes. Encryption secures the data that is transferred across nodes so that it cannot be accessed by unauthorized hosts. Encryption is enabled by default for new installations and upgrades from Pega® 7.1.6 or earlier to Pega 7.3. Encryption is not enabled by default for upgrades from Pega 7.1.7 or later to Pega 7.3. You can enable and disable search encryption from the Search landing page or by using the indexing/distributed/enable_inter_node_encryption Dynamic System Setting.
For more information, see Enabling and disabling encryption for communication among search nodes.
Improve cluster security by limiting concurrent operator sessions
Valid from Pega Version 7.3
You can increase the security of a Pega® Platform cluster by limiting the number of concurrent sessions allowed for each operator. Because operators typically do not require multiple concurrent sessions for performing their work, limiting the number of sessions reduces the chance that an unknown or untrusted person could access systems in the cluster. Use the new setting Number of concurrent sessions allowed for each operator on the Production tab of the System Data Instance form to configure the number of concurrent sessions for operators. You must restart your system when you change this setting. You can also create a list of operators by using the presence/maxsessions/operators/whitelist Dynamic System Setting, to which the maximum number of concurrent sessions setting will not apply.
For more information, see System form - Completing the Production tab.
Ability to periodically defragment the PR_SYS_LOCKS table
Valid from Pega Version 7.1.8
Lock management in Pega 7 is controlled through the database table PR_SYS_LOCKS. Because of the high volume of entries inserted into and deleted from this table during case processing, the data in the PR_SYS_LOCKS table can become highly fragmented, causing degraded performance over time.
You can now periodically defragment this table. The following Dynamic System Settings control when and how often defragmentation takes place using DefragSysLocksDaemon:
-
syslocks/defragIntervalType
-
Custom interval type to run defragmentation
-
Set this first – determines whether defragmentation occurs daily at a specified hour or at a recurring interval
-
- syslocks/defragHourOfDay
- Used to run defragmentation at a specified hour
- Accepts only integer values in the range 0-23
- Example: run defragmentation daily at 1 AM by entering a value of "1"
-
Can be ignored if syslocks/defragIntervalType indicates a a specified periodic interval
- syslocks/defragIntervalInHours
- Used to run defragmentation at specified periodic intervals
- Accepts only integer values > 0
-
Example: run defragmentation every four hours by entering a value of "4"
-
Can be ignored if syslocks/defragIntervalType indicates a specified hour
For more information, see PEGA0056 alert monitors PR_SYS_LOCKS defragmentation performance.