Skip to content

Commit 8270b98

Browse files
committed
2 parents 354aefc + df848ce commit 8270b98

File tree

3 files changed

+9
-7
lines changed

3 files changed

+9
-7
lines changed

articles/synapse-analytics/sql/query-cosmos-db-analytical-store.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,6 @@ For querying Azure Cosmos DB, the full [SELECT](/sql/t-sql/queries/select-transa
1919

2020
This article explains how to write a query with a serverless SQL pool that queries data from Azure Cosmos DB containers that are enabled with Azure Synapse Link. You can then learn more about building serverless SQL pool views over Azure Cosmos DB containers and connecting them to Power BI models in [this tutorial](./tutorial-data-analyst.md). This tutorial uses a container with an [Azure Cosmos DB well-defined schema](/azure/cosmos-db/analytical-store-introduction#schema-representation). You can also check out the Learn module on how to [Query Azure Cosmos DB with SQL Serverless for Azure Synapse Analytics](/training/modules/query-azure-cosmos-db-with-sql-serverless-for-azure-synapse-analytics/).
2121

22-
>[!NOTE]
23-
> You can't use managed identity to access an Azure Cosmos DB container from serverless SQL pool.
24-
2522
## Prerequisites
2623

2724
- Make sure that you prepare the analytical store:
@@ -37,10 +34,11 @@ This article explains how to write a query with a serverless SQL pool that queri
3734
## Overview
3835

3936
Serverless SQL pool enables you to query Azure Cosmos DB analytical storage using `OPENROWSET` function.
37+
- `OPENROWSET` that uses workspace managed identity to access the analytical store.
4038
- `OPENROWSET` with inline key. This syntax can be used to query Azure Cosmos DB collections without the need to prepare credentials.
4139
- `OPENROWSET` that references a credential that contains the Azure Cosmos DB account key. This syntax can be used to create views on Azure Cosmos DB collections.
4240

43-
### [OPENROWSET with key](#tab/openrowset-key)
41+
### [OPENROWSET with key or managed identity](#tab/openrowset-key)
4442

4543
To support querying and analyzing data in an Azure Cosmos DB analytical store, a serverless SQL pool is used. The serverless SQL pool uses the `OPENROWSET` SQL syntax, so you must first convert your Azure Cosmos DB connection string to this format:
4644

@@ -67,6 +65,11 @@ The SQL connection string has the following format:
6765
```
6866

6967
The region is optional. If omitted, the container's primary region is used.
68+
You can use workspace managed identity instead fo the CosmosDB account key:
69+
70+
```sql
71+
'account=<databases account name>;database=<database_name>;authtype=ManagedIdentity'
72+
```
7073

7174
> [!IMPORTANT]
7275
> There's another optional parameter in connection string called `endpoint`. The `endpoint` param is needed for accounts that don't match the standard `*.documents.azure.com` format. For example, if your Azure Cosmos DB account ends with `.documents.azure.us`, make sure that you add `endpoint=<account name>.documents.azure.us` in the connection string.

articles/virtual-wan/how-to-network-virtual-appliance-inbound.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,6 @@ The following table describes known issues related to the internet inbound/DNAT
7070
|Issue | Description| Mitigation|
7171
|--|--|--|
7272
| DNAT traffic isn't forwarded to the NVA after associating an additional IP address.| After associating additional IP address(es) to an NVA that already has active inbound security rules, DNAT traffic isn't forwarded properly to the NVA due to a code defect. | Use partner orchestration/management software to modify (create or delete existing) configured inbound-security rules to restore connectivity. |
73-
|Inbound security rule configuration scalability| Inbound security rule configuration might fail when a large number (approximately 100) rules are configured.| No mitigation, reach out to Azure Support for fix timelines.|
7473

7574
### Limitations
7675

@@ -86,7 +85,7 @@ The following table describes known issues related to the internet inbound/DNAT
8685

8786
### Considerations
8887

89-
* Inbound Traffic is automatically load-balanced across all healthy instances of the Network Virtual Appliance.
88+
* Inbound traffic is automatically load-balanced across all healthy instances of the Network Virtual Appliance. Virtual WAN uses five-tuple hashing algorithm to distribute flows for backend NVA instances. For certain use cases such as File Transfer Protocol (FTP) where a single application session might have multiple five-tuple flows (e.g. FTP control and data plane packets on different ports), Virtual WAN does not guarantee that all flows in that session are distributed to the same NVA instance.
9089
* In most cases, NVAs must perform source-NAT to the Firewall private IP in addition to destination-NAT to ensure flow symmetry. Certain NVA types might not require source-NAT. Contact your NVA provider for best practices around source-NAT.
9190
* Timeout for idle flows is automatically set to 4 minutes.
9291
* You can assign individual IP address resources generated from an IP address prefix to the NVA as internet inbound IPs. Assign each IP address from the prefix individually.

articles/virtual-wan/roles-permissions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,7 @@ NVAs (Network Virtual Appliances) in Virtual WAN are typically deployed through
182182

183183
|Resource | Required Azure permissions due to resource references |
184184
|---|---|
185-
| networkVirtualAppliances | Microsoft.Network/virtualHubs/read |
185+
| networkVirtualAppliances | Microsoft.Network/virtualHubs/read <br? Microsoft.Network/publicIPAddresses/join|
186186
| networkVirtualAppliances/networkVirtualApplianceConnections | Microsoft.Network/virtualHubs/routeMaps/read <br>Microsoft.Network/virtualHubs/hubRouteTables/read |
187187

188188

0 commit comments

Comments
 (0)