Skip to content

Commit 26f2c2e

Browse files
authored
Merge pull request #202172 from whhender/event-hubs-update
Adding optional Event Hubs namespace
2 parents cf5088a + ef6920a commit 26f2c2e

21 files changed

+111
-60
lines changed

articles/purview/catalog-private-link-end-to-end.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: zeinam
66
ms.service: purview
77
ms.subservice: purview-data-catalog
88
ms.topic: how-to
9-
ms.date: 01/12/2022
9+
ms.date: 06/21/2022
1010
# Customer intent: As a Microsoft Purview admin, I want to set up private endpoints for my Microsoft Purview account to access purview account and scan data sources from restricted network.
1111
---
1212

@@ -43,6 +43,9 @@ Using one of the deployment options explained further in this guide, you can dep
4343
6. After completing this guide, adjust DNS configurations if needed.
4444
7. Validate your network and name resolution between management machine, self-hosted IR VM and data sources to Microsoft Purview.
4545

46+
> [!NOTE]
47+
> If you enable a managed event hub after deploying your ingestion private endpoint, you'll need to redeploy the ingestion private endpoint.
48+
4649
## Option 1 - Deploy a new Microsoft Purview account with _account_, _portal_ and _ingestion_ private endpoints
4750

4851
1. Go to the [Azure portal](https://portal.azure.com), and then go to the **Microsoft Purview accounts** page. Select **+ Create** to create a new Microsoft Purview account.

articles/purview/catalog-private-link-troubleshoot.md

Lines changed: 21 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: zeinam
66
ms.service: purview
77
ms.subservice: purview-data-catalog
88
ms.topic: how-to
9-
ms.date: 01/12/2022
9+
ms.date: 06/21/2022
1010
# Customer intent: As a Microsoft Purview admin, I want to set up private endpoints for my Microsoft Purview account, for secure access.
1111
---
1212

@@ -16,13 +16,14 @@ This guide summarizes known limitations related to using private endpoints for M
1616

1717
## Known limitations
1818

19-
- We currently do not support ingestion private endpoints that work with your AWS sources.
20-
- Scanning Azure Multiple Sources using self-hosted integration runtime is not supported.
21-
- Using Azure integration runtime to scan data sources behind private endpoint is not supported.
22-
- Using Azure portal, the ingestion private endpoints can be created via the Microsoft Purview portal experience described in the preceding steps. They can't be created from the Private Link Center.
23-
- Creating DNS A records for ingestion private endpoints inside existing Azure DNS Zones, while the Azure Private DNS Zones are located in a different subscription than the private endpoints is not supported via the Microsoft Purview portal experience. A records can be added manually in the destination DNS Zones in the other subscription.
19+
- We currently don't support ingestion private endpoints that work with your AWS sources.
20+
- Scanning Azure Multiple Sources using self-hosted integration runtime isn't supported.
21+
- Using Azure integration runtime to scan data sources behind private endpoint isn't supported.
22+
- The ingestion private endpoints can be created via the Microsoft Purview governance portal experience described in the preceding steps. They can't be created from the Private Link Center.
23+
- Creating a DNS record for ingestion private endpoints inside existing Azure DNS Zones, while the Azure Private DNS Zones are located in a different subscription than the private endpoints isn't supported via the Microsoft Purview governance portal experience. A record can be added manually in the destination DNS Zones in the other subscription.
24+
- If you enable a managed event hub after deploying an ingestion private endpoint, you'll need to redeploy the ingestion private endpoint.
2425
- Self-hosted integration runtime machine must be deployed in the same VNet or a peered VNet where Microsoft Purview account and ingestion private endpoints are deployed.
25-
- We currently do not support scanning a cross-tenant Power BI tenant, which has a private endpoint configured with public access blocked.
26+
- We currently don't support scanning a cross-tenant Power BI tenant, which has a private endpoint configured with public access blocked.
2627
- For limitation related to Private Link service, see [Azure Private Link limits](../azure-resource-manager/management/azure-subscription-service-limits.md#private-link-limits).
2728

2829
## Recommended troubleshooting steps
@@ -35,7 +36,10 @@ This guide summarizes known limitations related to using private endpoints for M
3536
|Portal |Microsoft Purview Account |mypurview-private-portal |
3637
|Ingestion |Managed Storage Account (Blob) |mypurview-ingestion-blob |
3738
|Ingestion |Managed Storage Account (Queue) |mypurview-ingestion-queue |
38-
|Ingestion |Managed Event Hubs Namespace |mypurview-ingestion-namespace |
39+
|Ingestion |Managed Event Hubs Namespace* |mypurview-ingestion-namespace |
40+
41+
>[!NOTE]
42+
> *Managed Event Hubs Namespace is only needed if it has been enabled on your Microsoft Purview account. You can check in **Managed Resources** under settings on your Microsoft Purview account page in the Azure Portal.
3943
4044
2. If portal private endpoint is deployed, make sure you also deploy account private endpoint.
4145

@@ -44,7 +48,7 @@ This guide summarizes known limitations related to using private endpoints for M
4448
- To verify the correct name resolution, you can use a **NSlookup.exe** command line tool to query `web.purview.azure.com`. The result must return a private IP address that belongs to portal private endpoint.
4549
- To verify network connectivity, you can use any network test tools to test outbound connectivity to `web.purview.azure.com` endpoint to port **443**. The connection must be successful.
4650

47-
3. If Azure Private DNS Zones are used, make sure the required Azure DNS Zones are deployed and there is DNS (A) record for each private endpoint.
51+
3. If Azure Private DNS Zones are used, make sure the required Azure DNS Zones are deployed and there's DNS (A) record for each private endpoint.
4852

4953
4. Test network connectivity and name resolution from management machine to Microsoft Purview endpoint and purview web url. If account and portal private endpoints are deployed, the endpoints must be resolved through private IP addresses.
5054

@@ -79,11 +83,11 @@ This guide summarizes known limitations related to using private endpoints for M
7983
TcpTestSucceeded : True
8084
```
8185
82-
5. If you have created your Microsoft Purview account after 18 August 2021, make sure you download and install the latest version of self-hosted integration runtime from [Microsoft download center](https://www.microsoft.com/download/details.aspx?id=39717).
86+
5. If you've created your Microsoft Purview account after 18 August 2021, make sure you download and install the latest version of self-hosted integration runtime from [Microsoft download center](https://www.microsoft.com/download/details.aspx?id=39717).
8387
8488
6. From self-hosted integration runtime VM, test network connectivity and name resolution to Microsoft Purview endpoint.
8589
86-
7. From self-hosted integration runtime, test network connectivity and name resolution to Microsoft Purview managed resources such as blob queue and Event Hub through port 443 and private IP addresses. (Replace the managed storage account and Event Hubs namespace with corresponding managed resource name assigned to your Microsoft Purview account).
90+
7. From self-hosted integration runtime, test network connectivity and name resolution to Microsoft Purview managed resources such as blob queue and Event Hubs through port 443 and private IP addresses. (Replace the managed storage account and Event Hubs namespace with corresponding managed resource name assigned to your Microsoft Purview account).
8791
8892
```powershell
8993
Test-NetConnection -ComputerName `scansoutdeastasiaocvseab`.blob.core.windows.net -Port 443
@@ -116,7 +120,7 @@ This guide summarizes known limitations related to using private endpoints for M
116120
```powershell
117121
Test-NetConnection -ComputerName `Atlas-1225cae9-d651-4039-86a0-b43231a17a4b`.servicebus.windows.net -Port 443
118122
```
119-
Example of successful outbound connection to Event Hub namespace through private IP address:
123+
Example of successful outbound connection to Event Hubs namespace through private IP address:
120124
121125
```
122126
ComputerName : Atlas-1225cae9-d651-4039-86a0-b43231a17a4b.servicebus.windows.net
@@ -129,7 +133,7 @@ This guide summarizes known limitations related to using private endpoints for M
129133
130134
8. From the network where data source is located, test network connectivity and name resolution to Microsoft Purview endpoint and managed resources endpoints.
131135
132-
9. If data sources are located in on-premises network, review your DNS forwarder configuration. Test name resolution from within the same network where data sources are located to self-hosted integration runtime, Microsoft Purview endpoints and managed resources. It is expected to obtain a valid private IP address from DNS query for each endpoint.
136+
9. If data sources are located in on-premises network, review your DNS forwarder configuration. Test name resolution from within the same network where data sources are located to self-hosted integration runtime, Microsoft Purview endpoints and managed resources. It's expected to obtain a valid private IP address from DNS query for each endpoint.
133137
134138
For more information, see [Virtual network workloads without custom DNS server](../private-link/private-endpoint-dns.md#virtual-network-workloads-without-custom-dns-server) and [On-premises workloads using a DNS forwarder](../private-link/private-endpoint-dns.md#on-premises-workloads-using-a-dns-forwarder) scenarios in [Azure Private Endpoint DNS configuration](../private-link/private-endpoint-dns.md).
135139
@@ -145,7 +149,7 @@ You may receive the following error message when running a scan:
145149
`Internal system error. Please contact support with correlationId:xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx System Error, contact support.`
146150
147151
### Cause
148-
This can be an indication of issues related to connectivity or name resolution between the VM running self-hosted integration runtime and Microsoft Purview's managed resources storage account or Event Hub.
152+
This can be an indication of issues related to connectivity or name resolution between the VM running self-hosted integration runtime and Microsoft Purview's managed resources storage account or Event Hubs.
149153
150154
### Resolution
151155
Validate if name resolution between the VM running Self-Hosted Integration Runtime.
@@ -182,13 +186,13 @@ Review your existing Azure Policy Assignments and make sure deployment of the fo
182186
183187
184188
### Issue
185-
Not authorized to access this Microsoft Purview account. This Microsoft Purview account is behind a private endpoint. Please access the account from a client in the same virtual network (VNet) that has been configured for the Microsoft Purview account's private endpoint.
189+
Not authorized to access this Microsoft Purview account. This Microsoft Purview account is behind a private endpoint. Access the account from a client in the same virtual network (VNet) that has been configured for the Microsoft Purview account's private endpoint.
186190
187191
### Cause
188192
User is trying to connect to Microsoft Purview from a public endpoint or using Microsoft Purview public endpoints where **Public network access** is set to **Deny**.
189193
190194
### Resolution
191-
In this case, to open the Microsoft Purview governance portal, either use a machine that is deployed in the same virtual network as the Microsoft Purview portal private endpoint or use a VM that is connected to your CorpNet in which hybrid connectivity is allowed.
195+
In this case, to open the Microsoft Purview governance portal, either use a machine that is deployed in the same virtual network as the Microsoft Purview governance portal private endpoint or use a VM that is connected to your CorpNet in which hybrid connectivity is allowed.
192196
193197
### Issue
194198
You may receive the following error message when scanning a SQL server, using a self-hosted integration runtime:
@@ -197,7 +201,7 @@ You may receive the following error message when scanning a SQL server, using a
197201
198202
### Cause
199203
Self-hosted integration runtime machine has enabled the FIPS mode.
200-
Federal Information Processing Standards (FIPS) defines a certain set of cryptographic algorithms that are allowed to be used. When FIPS mode is enabled on the machine, some cryptographic classes that the invoked processes depends on are blocked in some scenarios.
204+
Federal Information Processing Standards (FIPS) defines a certain set of cryptographic algorithms that are allowed to be used. When FIPS mode is enabled on the machine, some cryptographic classes that the invoked processes depend on are blocked in some scenarios.
201205
202206
### Resolution
203207
Disable FIPS mode on self-hosted integration server.

articles/purview/concept-best-practices-automation.md

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: tarifat
66
ms.service: purview
77
ms.subservice: purview-data-map
88
ms.topic: conceptual
9-
ms.date: 05/17/2022
9+
ms.date: 06/20/2022
1010
---
1111

1212
# Microsoft Purview automation best practices
@@ -59,7 +59,21 @@ When to use?
5959
* Custom application development or process automation.
6060

6161
## Streaming (Atlas Kafka)
62-
Each Microsoft Purview account comes with a fully managed event hub, accessible via the Atlas Kafka endpoint found via the Azure portal > Microsoft Purview Account > Properties. Microsoft Purview events can be monitored by consuming messages from the event hub. External systems can also use the event hub to publish events to Microsoft Purview as they occur.
62+
Each Microsoft Purview account can enable a fully managed event hub that is accessible via the Atlas Kafka endpoint found via the Azure portal > Microsoft Purview Account > Properties.
63+
64+
To enable this Event Hubs namespace, you can follow these steps:
65+
1. Search for and open your Microsoft Purview account in the [Azure portal](https://portal.azure.com).
66+
1. Select **Managed Resources** under settings on your Microsoft Purview account page in the Azure portal.
67+
:::image type="content" source="media/concept-best-practices/enable-disable-event-hubs.png" alt-text="Screenshot showing the Event Hubs namespace toggle highlighted on the Managed resources page of the Microsoft Purview account page in the Azure portal.":::
68+
1. Select the Enable/Disable toggle to enable your Event Hubs namespace. It can be disabled at any time.
69+
1. Select **Save** to save the choice and begin the enablement or disablement process. This can take several minutes to complete.
70+
:::image type="content" source="media/concept-best-practices/select-save.png" alt-text="Screenshot showing the Managed resources page of the Microsoft Purview account page in the Azure portal with the save button highlighted.":::
71+
72+
>[!NOTE]
73+
>Enabling this Event Hubs namespace does incur a cost for the namespace. For specific details, see [the pricing page](https://azure.microsoft.com/pricing/details/purview/).
74+
75+
76+
Once the namespace is enabled, Microsoft Purview events can be monitored by consuming messages from the event hub. External systems can also use the event hub to publish events to Microsoft Purview as they occur.
6377
* **Consume Events** - Microsoft Purview will send notifications about metadata changes to Kafka topic **ATLAS_ENTITIES**. Applications interested in metadata changes can monitor for these notifications. Supported operations include: `ENTITY_CREATE`, `ENTITY_UPDATE`, `ENTITY_DELETE`, `CLASSIFICATION_ADD`, `CLASSIFICATION_UPDATE`, `CLASSIFICATION_DELETE`.
6478
* **Publish Events** - Microsoft Purview can be notified of metadata changes via notifications to Kafka topic **ATLAS_HOOK**. Supported operations include: `ENTITY_CREATE_V2`, `ENTITY_PARTIAL_UPDATE_V2`, `ENTITY_FULL_UPDATE_V2`, `ENTITY_DELETE_V2`.
6579

0 commit comments

Comments
 (0)