You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/data-factory/connector-google-bigquery.md
+18-11Lines changed: 18 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: jianleishen
7
7
ms.subservice: data-movement
8
8
ms.topic: conceptual
9
9
ms.custom: synapse
10
-
ms.date: 04/14/2025
10
+
ms.date: 06/09/2025
11
11
---
12
12
13
13
# Copy data from Google BigQuery V2 using Azure Data Factory or Synapse Analytics
@@ -74,6 +74,7 @@ The following properties are supported for the Google BigQuery linked service.
74
74
| Property | Description | Required |
75
75
|:--- |:--- |:--- |
76
76
| type | The type property must be set to **GoogleBigQueryV2**. | Yes |
77
+
| version |The version that you specify. Recommend upgrading to the latest version to take advantage of the newest enhancements. | Yes for version 1.1 |
77
78
| projectId | The project ID of the default BigQuery project to query against. | Yes |
78
79
| authenticationType | The OAuth 2.0 authentication mechanism used for authentication.</br>Allowed values are **UserAuthentication** and **ServiceAuthentication**. Refer to sections below this table on more properties and JSON samples for those authentication types respectively. | Yes |
79
80
@@ -94,6 +95,7 @@ Set "authenticationType" property to **UserAuthentication**, and specify the fol
94
95
"name": "GoogleBigQueryLinkedService",
95
96
"properties": {
96
97
"type": "GoogleBigQueryV2",
98
+
"version": "1.1",
97
99
"typeProperties": {
98
100
"projectId" : "<project ID>",
99
101
"authenticationType" : "UserAuthentication",
@@ -127,6 +129,7 @@ Set "authenticationType" property to **ServiceAuthentication**, and specify the
127
129
"name": "GoogleBigQueryLinkedService",
128
130
"properties": {
129
131
"type": "GoogleBigQueryV2",
132
+
"version": "1.1",
130
133
"typeProperties": {
131
134
"projectId": "<project ID>",
132
135
"authenticationType": "ServiceAuthentication",
@@ -220,21 +223,25 @@ To copy data from Google BigQuery, set the source type in the copy activity to *
220
223
221
224
To learn details about the properties, check [Lookup activity](control-flow-lookup-activity.md).
222
225
226
+
## <aname="differences-between-google-bigquery-and-google-bigquery-legacy"></a> Google BigQuery connector lifecycle and upgrade
223
227
224
-
## <aname="upgrade-the-google-bigquery-linked-service"></a> Upgrade the Google BigQuery connector
228
+
The following table shows the release stage and change logs for different versions of the Google BigQuery connector:
225
229
226
-
To upgrade the Google BigQuery connector, create a new Google BigQuery linked service and configure it by referring to [Linked service properties](#linked-service-properties).
230
+
| Version | Release stage | Change log |
231
+
| :----------- | :------- | :------- |
232
+
| Google BigQuery V1 | End of support | / |
233
+
| Google BigQuery V2 (version 1.0) | GA version available | • Service authentication is supported by the Azure integration runtime and the self-hosted integration runtime. <br>The properties `trustedCertPath`, `useSystemTrustStore`, `email` and `keyFilePath` are not supported as they are available on the self-hosted integration runtime only. <br><br> • `requestGoogleDriveScope` is not supported. You need additionally apply the permission in Google BigQuery service by referring to [Choose Google Drive API scopes](https://developers.google.com/drive/api/guides/api-specific-auth) and [Query Drive data](https://cloud.google.com/bigquery/docs/query-drive-data). <br><br> • `additionalProjects` is not supported. As an alternative, [query a public dataset with the Google Cloud console](https://cloud.google.com/bigquery/docs/quickstarts/query-public-dataset-console).<br><br> • NUMBER is read as Decimal data type. <br><br> • Timestamp and Datetime are read as DateTimeOffset data type.|
234
+
| Google BigQuery V2 (version 1.1) | GA version available | • Fixed a bug: when executing multiple statements, the `query` now returns the results of the first statement after excluding the evaluation statements, rather than always returning the result of the first statement. |
227
235
228
-
## <aname="differences-between-google-bigquery-and-google-bigquery-legacy"></a> Differences between Google BigQuery V2 and V1
236
+
###<aname="upgrade-the-google-bigquery-linked-service"></a> Upgrade the Google BigQuery connector
229
237
230
-
The Google BigQuery V2 connector offers new functionalities and is compatible with most features of Google BigQuery V1 connector. The table below shows the feature differences between Google BigQuery V2 and V1.
238
+
To upgrade your Google BigQuery connector:
231
239
232
-
| Google BigQuery V2 | Google BigQuery V1 |
233
-
| :----------- | :------- |
234
-
| Service authentication is supported by the Azure integration runtime and the self-hosted integration runtime.<br>The properties trustedCertPath, useSystemTrustStore, email and keyFilePath are not supported as they are available on the self-hosted integration runtime only. | Service authentication is only supported by the self-hosted integration runtime. <br>Support trustedCertPath, useSystemTrustStore, email and keyFilePath properties. |
235
-
| The following mappings are used from Google BigQuery data types to interim data types used by the service internally. <br><br>Numeric -> Decimal<br>Timestamp -> DateTimeOffset<br>Datetime -> DatetimeOffset | The following mappings are used from Google BigQuery data types to interim data types used by the service internally. <br><br>Numeric -> String<br>Timestamp -> DateTime<br>Datetime -> DateTime |
236
-
| requestGoogleDriveScope is not supported. You need additionally apply the permission in Google BigQuery service by referring to [Choose Google Drive API scopes](https://developers.google.com/drive/api/guides/api-specific-auth) and [Query Drive data](https://cloud.google.com/bigquery/docs/query-drive-data). | Support requestGoogleDriveScope. |
237
-
| additionalProjects is not supported. As an alternative, [query a public dataset with the Google Cloud console](https://cloud.google.com/bigquery/docs/quickstarts/query-public-dataset-console). | Support additionalProjects. |
240
+
-**From V1 to V2:**
241
+
Create a new Google BigQuery linked service and configure it by referring to [Linked service properties](#linked-service-properties).
242
+
243
+
-**From V2 version 1.0 to version 1.1:**
244
+
In the **Edit linked service** page, select **1.1** for version. For more information, see [Linked service properties](#linked-service-properties).
Copy file name to clipboardExpand all lines: articles/governance/policy/concepts/effect-deploy-if-not-exists.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -72,7 +72,7 @@ The `details` property of the DeployIfNotExists effect has all the subproperties
72
72
- A _location_ property must be specified in the _Deployment_ when using subscription level deployments.
73
73
- Default is _ResourceGroup_.
74
74
-`deployment` (required)
75
-
- This property should include the full template deployment as it would be passed to the `Microsoft.Resources/deployments` PUT API. For more information, see the [Deployments REST API](/rest/api/resources/deployments).
75
+
- This property should include the full template deployment as it would be passed to the `Microsoft.Resources/deployments` PUT API. For more information, see the [Deployments REST API](/azure/azure-resource-manager/templates/deploy-rest).
76
76
- Nested `Microsoft.Resources/deployments` within the template should use unique names to avoid contention between multiple policy evaluations. The parent deployment's name can be used as part of the nested deployment name via `[concat('NestedDeploymentName-', uniqueString(deployment().name))]`.
|**[AzureDigitalTwins](/azure/digital-twins/concepts-security#service-tags)**| Azure Digital Twins.<br/><br/>**Note**: This tag or the IP addresses covered by this tag can be used to restrict access to endpoints configured for event routes. | Inbound | No | Yes |
68
68
|**[AzureEventGrid](/azure/event-grid/network-security#service-tags)**| Azure Event Grid. | Both | No | Yes |
69
-
|**[AzureFrontDoor.Frontend](/azure/frontdoor/origin-security)** <br/> **[AzureFrontDoor.Backend](/azure/frontdoor/origin-security)** <br/> **[AzureFrontDoor.FirstParty](/azure/frontdoor/origin-security)** <br/> **[AzureFrontDoor.MicrosoftSecurity](/azure/frontdoor/origin-security)**|*Frontend* service tag contains the IP addresses that clients use to reach Front Door. You can apply the **AzureFrontDoor.Frontend** service tag when you want to control the outbound traffic that can connect to services behind Azure Front Door. *Backend* service tag contains the IP addresses that Azure Front Door uses to access your origins. You can apply this service tag when you [configure security for your origins](../frontdoor/origin-security.md). *FirstParty* and *MicrosoftSecurity* are special tags reserved for a select group of Microsoft services hosted on Azure Front Door. | Both | Yes | Yes |
69
+
| **[AzureFrontDoor.Frontend](/azure/frontdoor/origin-security)** <br/> **[AzureFrontDoor.Backend](/azure/frontdoor/origin-security)** <br/> **[AzureFrontDoor.FirstParty](/azure/frontdoor/origin-security)** <br/> **[AzureFrontDoor.MicrosoftSecurity](/azure/frontdoor/origin-security)** | *Frontend* service tag contains the IP addresses that clients use to reach Front Door. You can apply the **AzureFrontDoor.Frontend** service tag when you want to control the outbound traffic that can connect to services behind Azure Front Door. *Backend* service tag contains the IP addresses that Azure Front Door uses to access your origins. You can apply this service tag when you [configure security for your origins](../frontdoor/origin-security.md). *FirstParty* and *MicrosoftSecurity* are special tags reserved for a select group of Microsoft services hosted on Azure Front Door. *FirstParty* service tag is only available in public cloud while the other service tags are available in public and government clouds. | Both | Yes | Yes |
70
70
|**[AzureHealthcareAPIs](/azure/healthcare-apis/fhir/configure-import-data)**| The IP addresses covered by this tag can be used to restrict access to Azure Health Data Services. | Both | No | Yes |
71
71
|**AzureInformationProtection**| Azure Information Protection.<br/><br/>**Note**: This tag has a dependency on the **AzureActiveDirectory**, **AzureFrontDoor.Frontend** and **AzureFrontDoor.FirstParty** tags. | Outbound | No | Yes |
0 commit comments