Skip to content

Commit 0d01ea0

Browse files
authored
Merge pull request #50752 from linda33wj/master
Update ADF copy content
2 parents 09c2950 + 35cdf38 commit 0d01ea0

File tree

3 files changed

+8
-5
lines changed

3 files changed

+8
-5
lines changed

articles/data-factory/connector-hbase.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -39,9 +39,9 @@ The following properties are supported for HBase linked service:
3939
| Property | Description | Required |
4040
|:--- |:--- |:--- |
4141
| type | The type property must be set to: **HBase** | Yes |
42-
| host | The IP address or host name of the HBase server. (i.e. 192.168.222.160, [clustername].azurehdinsight.net) | Yes |
42+
| host | The IP address or host name of the HBase server. (i.e. `[clustername].azurehdinsight.net`, `192.168.222.160·) | Yes |
4343
| port | The TCP port that the HBase instance uses to listen for client connections. The default value is 9090. If you connect to Azure HDInsights, specify port as 443. | No |
44-
| httpPath | The partial URL corresponding to the HBase server. (i.e. /gateway/sandbox/hbase/version) | No |
44+
| httpPath | The partial URL corresponding to the HBase server. (i.e. `/hbaserest0`) | No |
4545
| authenticationType | The authentication mechanism to use to connect to the HBase server. <br/>Allowed values are: **Anonymous**, **Basic** | Yes |
4646
| username | The user name used to connect to the HBase instance. | No |
4747
| password | The password corresponding to the user name. Mark this field as a SecureString to store it securely in Data Factory, or [reference a secret stored in Azure Key Vault](store-credentials-in-key-vault.md). | No |
@@ -51,6 +51,9 @@ The following properties are supported for HBase linked service:
5151
| allowSelfSignedServerCert | Specifies whether to allow self-signed certificates from the server. The default value is false. | No |
5252
| connectVia | The [Integration Runtime](concepts-integration-runtime.md) to be used to connect to the data store. You can use Self-hosted Integration Runtime or Azure Integration Runtime (if your data store is publicly accessible). If not specified, it uses the default Azure Integration Runtime. |No |
5353

54+
>[!NOTE]
55+
>If your cluster doesn't support sticky session like HDInsight, explicitly add node index at the end of the http path setting, e.g. specify `/hbaserest0` instead of `/hbaserest`.
56+
5457
**Example for HDInsights HBase:**
5558

5659
```json
@@ -61,7 +64,7 @@ The following properties are supported for HBase linked service:
6164
"typeProperties": {
6265
"host" : "<cluster name>.azurehdinsight.net",
6366
"port" : "443",
64-
"httpPath" : "<e.g. hbaserest>",
67+
"httpPath" : "/hbaserest0",
6568
"authenticationType" : "Basic",
6669
"username" : "<username>",
6770
"password": {

articles/data-factory/create-self-hosted-integration-runtime.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -219,7 +219,7 @@ At **corporate firewall** level, you need configure the following domains and ou
219219

220220
Domain names | Ports | Description
221221
------------ | ----- | ------------
222-
*.servicebus.windows.net | 443, 80 | Used for communication with Data Movement Service backend
222+
*.servicebus.windows.net | 443 | Used for communication with Data Movement Service backend
223223
*.core.windows.net | 443 | Used for Staged copy using Azure Blob (if configured)
224224
*.frontend.clouddatahub.net | 443 | Used for communication with Data Movement Service backend
225225
download.microsoft.com | 443 | Used for downloading the updates

articles/data-factory/v1/data-factory-data-management-gateway.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ At corporate firewall level, you need configure the following domains and outbou
140140

141141
| Domain names | Ports | Description |
142142
| --- | --- | --- |
143-
| *.servicebus.windows.net |443, 80 |Used for communication with Data Movement Service backend |
143+
| *.servicebus.windows.net |443 |Used for communication with Data Movement Service backend |
144144
| *.core.windows.net |443 |Used for Staged copy using Azure Blob (if configured)|
145145
| *.frontend.clouddatahub.net |443 |Used for communication with Data Movement Service backend |
146146
| *.servicebus.windows.net |9350-9354, 5671 |Optional service bus relay over TCP used by the Copy Wizard |

0 commit comments

Comments
 (0)