You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -265,8 +267,7 @@ You can also create the Spark pool from Synapse Studio by following the steps in
265
267
266
268
### Azure PowerShell
267
269
268
-
The following script creates a Spark pool with two workers and one driver node. Update the values to match your source region workspace Spark pool.
269
-
270
+
The following script creates a Spark pool with two workers and one driver node, and a small cluster size with 4 cores and 32-GB RAM. Update the values to match your source region workspace Spark pool.
270
271
271
272
```powershell
272
273
#Creating a Spark pool with 3 nodes (2 worker + 1 driver) and a small cluster size with 4 cores and 32 GB RAM.
@@ -310,25 +311,22 @@ Run the following PowerShell script to restore the workspace. This script uses t
310
311
> [!IMPORTANT]
311
312
> The dedicated SQL pool name should be the same on both the workspaces.
Transform the Azure Synapse SQL pool resource ID to SQL database ID because currently the command only accepts the SQL database ID.
322
+
For example: `/subscriptions/<SubscriptionId>/resourceGroups/<ResourceGroupName>/providers/Microsoft.Sql/servers/<WorkspaceName>/databases/<DatabaseName>`
321
323
322
324
```powershell
323
-
<#
324
-
Transform Synapse SQL pool resource ID to SQL database ID because currently the command only accepts the SQL database ID.
325
-
For example: /subscriptions/<SubscriptionId>/resourceGroups/<ResourceGroupName>/providers/Microsoft.Sql/servers/<WorkspaceName>/databases/<DatabaseName>
After the dedicated SQL pool is restored, create all the SQL logins in Azure Synapse. To create all the logins, follow the steps in [Create login](/sql/t-sql/statements/create-login-transact-sql?view=azure-sqldw-latest&preserve-view=true).
349
348
350
-
## Step 5: Create a serverless SQL pool, Spark pool database and objects
349
+
## Step 5: Create a serverless SQL pool, Spark pool database, and objects
351
350
352
351
You can't back up and restore serverless SQL pool databases and Spark pools. As a possible workaround, you could:
353
352
@@ -391,13 +390,12 @@ Follow the steps in [Grant permissions to workspace managed identity](security/h
391
390
### Azure PowerShell
392
391
Assign a Storage Blob Data Contributor role to the managed identity of the workspace.
393
392
394
-
```powershell
393
+
Adding Storage Blob Data Contributor to the workspace managed identity on the storage account. The execution of `New-AzRoleAssignment` errors out with the message `Exception of type 'Microsoft.Rest.Azure.CloudException' was thrown.` however it creates the required permissions on the storage account.
# Adding Storage Blob Data Contributor to WS Managed Identity on the storage account. This errors out with the message New-AzRoleAssignment : Exception of type 'Microsoft.Rest.Azure.CloudException' was thrown.
400
-
# But it creates the required permissions on the storage account.
Get the role name, resource ID, and principal ID for the workspace managed identity, then add the Storage Blob Data Contributor Azure role to the SA-MI.
408
+
409
409
```azurecli
410
410
# Getting Role name
411
411
$roleName =az role definition list --query "[?contains(roleName, 'Storage Blob Data Contributor')].{roleName:roleName}" --output tsv
412
412
413
413
#Getting resource id for storage account
414
414
$scope= (az storage account show --name $storageAccountName|ConvertFrom-Json).id
415
415
416
-
#Getting principal ID for WS Managed Identity
416
+
#Getting principal ID for workspace managed identity
417
417
$workSpaceIdentityObjectID=(az synapse workspace show --name $workspaceName --resource-group $resourceGroupName|ConvertFrom-Json).Identity.PrincipalId
418
418
419
419
# Adding Storage Blob Data Contributor Azure role to SA-MI
@@ -425,6 +425,7 @@ az role assignment create --assignee $workSpaceIdentityObjectID `
425
425
## Step 9: Assign Azure Synapse RBAC roles
426
426
427
427
Add all the users who need access to the target workspace with separate roles and permissions. The following PowerShell and CLI script adds an Azure AD user to the Synapse Administrator role in the target region workspace.
428
+
428
429
To get all the Azure Synapse RBAC role names, see [Azure Synapse RBAC roles](security/synapse-workspace-synapse-rbac-roles.md).
429
430
430
431
### Synapse Studio
@@ -436,25 +437,25 @@ To add or delete Azure Synapse RBAC assignments from Synapse Studio, follow the
436
437
437
438
The following PowerShell script adds the Synapse Administrator role assignment to an Azure AD user or group. You can use -RoleDefinitionId instead of -RoleDefinitionName with the following command to add the users to the workspace:
438
439
440
+
439
441
```powershell
440
-
# Add the Synapse RBAC assignment. Use the objectId of the Azure AD user or group you want to assign.
441
442
New-AzSynapseRoleAssignment `
442
443
-WorkspaceName $workspaceName `
443
444
-RoleDefinitionName "Synapse Administrator" `
444
445
-ObjectId 1c02d2a6-ed3d-46ec-b578-6f36da5819c6
445
446
446
-
# Check if user is added to the access control by running this command.
To get the ObjectIds and RoleIds in the source region workspace, run the Get-AzSynapseRoleAssignment command. Assign the same Azure Synapse RBAC roles to the Azure AD users or groups in the target region workspace.
450
+
To get the ObjectIds and RoleIds in the source region workspace, run the `Get-AzSynapseRoleAssignment` command. Assign the same Azure Synapse RBAC roles to the Azure AD users or groups in the target region workspace.
451
451
452
-
Instead of using -ObjectId as the parameter, you can also use -SignInName, where you provide the email address or the user principal name of the user. To find out more about the available options, see [Azure Synapse RBAC - PowerShell cmdlet](/powershell/module/az.synapse/new-azsynapseroleassignment?view=azps-6.3.0&preserve-view=true).
452
+
Instead of using `-ObjectId` as the parameter, you can also use `-SignInName`, where you provide the email address or the user principal name of the user. To find out more about the available options, see [Azure Synapse RBAC - PowerShell cmdlet](/powershell/module/az.synapse/new-azsynapseroleassignment?view=azps-6.3.0&preserve-view=true).
453
453
454
454
### Azure CLI
455
455
456
+
Get the Object ID of the user and assign the required Azure Synapse RBAC permissions to the Azure AD user. You can provide the email address of the user ([email protected]) for the `--assignee` parameter.
457
+
456
458
```azurecli
457
-
#Get the Object Id of the user and assign the required Azure Synapse RBAC permissions to the Azure AD user. You can provide the email address of the user ([email protected]) for the --assignee parameter.
@@ -472,7 +473,7 @@ To learn more about available options, see [Azure Synapse RBAC - CLI](/cli/azure
472
473
Upload all required workspace packages to the new workspace. To automate the process of uploading the workspace packages, see the [Microsoft Azure Synapse Analytics Artifacts client library](https://www.nuget.org/packages/Azure.Analytics.Synapse.Artifacts/1.0.0-preview.10).
473
474
474
475
## Step 11: Permissions
475
-
476
+
476
477
To set up the access control for the target region Azure Synapse workspace, follow the steps in [How to set up access control for your Azure Synapse workspace](security/how-to-set-up-access-control.md).
477
478
478
479
@@ -484,7 +485,7 @@ To re-create the managed private endpoints from the source region workspace in y
484
485
If you wish to discard the target region workspace, delete the target region workspace. To do so, go to the resource group from your dashboard in the portal and select the workspace and select Delete at the top of the Resource group page.
485
486
486
487
## Clean up
487
-
To commit the changes and complete the move of the workspace, delete the source region workspace after testing the workspace in the target region. To do so, go to the resource group which has the source region workspace from your dashboard in the portal and select the workspace and select Delete at the top of the Resource group page.
488
+
To commit the changes and complete the move of the workspace, delete the source region workspace after testing the workspace in the target region. To do so, go to the resource group that has the source region workspace from your dashboard in the portal and select the workspace and select Delete at the top of the Resource group page.
0 commit comments