8.1.2

This release is an important update to address the following product issues in Tableau 8.1 and 8.1.1.

All Salesforce extracts that were created in 8.0, 8.1, or 8.1.1 or were upgraded to these versions may contain corrupt or inaccurate data. Refreshing the extracts using Tableau 8.1.2 corrects the issue. Scheduled and manual refreshes will be forced to become a full refresh initially. Subsequent refreshes will return to incremental as originally specified.

In Tableau Desktop, you will be prompted to refresh Salesforce extracts before continuing to use the workbook. Make sure to save the workbook to ensure correct data when the workbook is opened again later.

On Tableau Server, original views will remain available with inaccurate data until the extracts are refreshed.

Release Date:
December 22, 2013
Desktop Build Number:
8100.13.1220.1924
Server Build Number:
8100.13.1220.1924
Tableau Desktop

When connecting to Salesforce data, creating multiple connections to the same data would not work and only one connection would be made.

The connection name for extracts from Salesforce data could not be changed.

When connected to a Salesforce data source, fields that contain a percentage were incorrect by a factor of 100. The automatic formatting for these types of columns is now disabled. To format these columns with the percent symbol (%), right-click the field and select Default Properties > Number Format. Then select Number (Custom) and add the percent symbol as a suffix.

Tableau Server

Resolved a privately reported blind SQL injection vulnerability in Tableau Server. The vulnerability could have allowed arbitrary SQL commands to be passed to the Tableau Server backend database for execution. An attacker who successfully exploited the vulnerability could have taken complete control of an instance of Tableau Server. An attacker would have needed valid credentials or the guest account would have had to have been enabled to exploit this vulnerability. This vulnerability is rated Critical for 8.0.x and 8.1.x versions of Tableau Server, and customers are urged to upgrade at their earliest opportunity. Tableau has not received any information to indicate that this vulnerability has been publicly used to attack customers at the time this update was released. Tableau would like to thank Tanya Secker and Christiaan Esterhuizen of Trustwave SpiderLabs for identifying and reporting this issue (CVE-2014-1204) and for working with us to help protect our customers.

non-humans click here