Skip to content

Commit 9c49cdf

Browse files
Merge pull request #220332 from linda33wj/purview
Update SHIR & Azure SQL lineage scan doc
2 parents 7da7a0d + 9a2dc1d commit 9c49cdf

File tree

2 files changed

+13
-14
lines changed

2 files changed

+13
-14
lines changed

articles/purview/manage-integration-runtimes.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: jingwang
66
ms.service: purview
77
ms.subservice: purview-data-map
88
ms.topic: how-to
9-
ms.date: 11/03/2022
9+
ms.date: 12/05/2022
1010
---
1111

1212
# Create and manage a self-hosted integration runtime
@@ -140,7 +140,7 @@ Your self-hosted integration runtime machine needs to connect to several resourc
140140

141141
* The Microsoft Purview services used to manage the self-hosted integration runtime.
142142
* The data sources you want to scan using the self-hosted integration runtime.
143-
* The managed Storage account and optional Event Hubs resource created by Microsoft Purview. Microsoft Purview uses these resources to ingest the results of the scan, among many other things, so the self-hosted integration runtime need to be able to connect with these resources.
143+
* The managed Storage account created by Microsoft Purview. Microsoft Purview uses these resources to ingest the results of the scan, among many other things, so the self-hosted integration runtime need to be able to connect with these resources.
144144

145145
There are two firewalls to consider:
146146

@@ -150,15 +150,15 @@ There are two firewalls to consider:
150150
Here are the domains and outbound ports that you need to allow at both **corporate and Windows/machine firewalls**.
151151

152152
> [!TIP]
153-
> For domains listed with '\<managed_storage_account>' and '\<managed_Event_Hub_resource>', add the name of the managed resources associated with your Microsoft Purview account. You can find them from Azure portal -> your Microsoft Purview account -> Managed resources tab.
153+
> For domains listed with '\<managed_storage_account>', add the name of the managed resources associated with your Microsoft Purview account. You can find them from Azure portal -> your Microsoft Purview account -> Managed resources tab.
154154
155155
| Domain names | Outbound ports | Description |
156156
| ----------------------------- | -------------- | ---------------------------------------- |
157157
| `*.frontend.clouddatahub.net` | 443 | Required to connect to the Microsoft Purview service. Currently wildcard is required as there's no dedicated resource. |
158158
| `*.servicebus.windows.net` | 443 | Required for setting up scan in the Microsoft Purview governance portal. This endpoint is used for interactive authoring from UI, for example, test connection, browse folder list and table list to scope scan. Currently wildcard is required as there's no dedicated resource. |
159-
| `<purview_account>.purview.azure.com` | 443 | Required to connect to Microsoft Purview service. |
160-
| `<managed_storage_account>.blob.core.windows.net` | 443 | Required to connect to the Microsoft Purview managed Azure Blob storage account. |
161-
| `<managed_storage_account>.queue.core.windows.net` | 443 | Required to connect to the Microsoft Purview managed Azure Queue storage account. |
159+
| `<purview_account>.purview.azure.com` | 443 | Required to connect to Microsoft Purview service. If you use Purview [Private Endpoints](catalog-private-link.md), this endpoint is covered by *account private endpoint*. |
160+
| `<managed_storage_account>.blob.core.windows.net` | 443 | Required to connect to the Microsoft Purview managed Azure Blob storage account. If you use Purview [Private Endpoints](catalog-private-link.md), this endpoint is covered by *ingestion private endpoint*. |
161+
| `<managed_storage_account>.queue.core.windows.net` | 443 | Required to connect to the Microsoft Purview managed Azure Queue storage account. If you use Purview [Private Endpoints](catalog-private-link.md), this endpoint is covered by *ingestion private endpoint*. |
162162
| `download.microsoft.com` | 443 | Required to download the self-hosted integration runtime updates. If you have disabled auto-update, you can skip configuring this domain. |
163163
| `login.windows.net`<br>`login.microsoftonline.com` | 443 | Required to sign in to the Azure Active Directory. |
164164

@@ -176,7 +176,7 @@ Depending on the sources you want to scan, you also need to allow other domains
176176
| `<your_ADLS_account>.azuredatalakestore.net` | 443 | When scan Azure Data Lake Store Gen 1. |
177177
| Various domains | Dependent | Domains and ports for any other sources the SHIR will scan. |
178178

179-
For some cloud data stores such as Azure SQL Database and Azure Storage, you need to allow IP address of self-hosted integration runtime machine on their firewall configuration.
179+
For some cloud data stores such as Azure SQL Database and Azure Storage, you may need to allow IP address of self-hosted integration runtime machine on their firewall configuration, or you can create private endpoint of the service in your self-hosted integration runtime's network.
180180

181181
> [!IMPORTANT]
182182
> In most environments, you will also need to make sure that your DNS is correctly configured. To confirm, you can use **nslookup** from your SHIR machine to check connectivity to each of the domains. Each nslookup should return the IP of the resource. If you are using [Private Endpoints](catalog-private-link.md), the private IP should be returned and not the Public IP. If no IP is returned, or if when using Private Endpoints the public IP is returned, you need to address your DNS/VNet association, or your Private Endpoint/VNet peering.
@@ -195,10 +195,10 @@ There are two supported configuration options by Microsoft Purview:
195195

196196
- **Do not use proxy**: The self-hosted integration runtime doesn't explicitly use any proxy to connect to cloud services.
197197
- **Use system proxy**: The self-hosted integration runtime uses the proxy setting that is configured in the executable's configuration files. If no proxy is specified in these files, the self-hosted integration runtime connects to the services directly without going through a proxy.
198+
- **Use custom proxy**: Configure the HTTP proxy setting to use for the self-hosted integration runtime, instead of using configurations in diahost.exe.config and diawp.exe.config. **Address** and **Port** values are required. **User Name** and **Password** values are optional, depending on your proxy's authentication setting. All settings are encrypted with Windows DPAPI on the self-hosted integration runtime and stored locally on the machine.
198199

199-
> [!IMPORTANT]
200-
>
201-
> Currently, **custom proxy** is not supported in Microsoft Purview. In addition, system proxy is supported when scanning Azure data sources and SQL Server; scanning other sources doesn't support proxy.
200+
> [!NOTE]
201+
> Proxy is supported when scanning Azure data sources and SQL Server; scanning other sources doesn't support proxy.
202202
203203
The integration runtime host service restarts automatically after you save the updated proxy settings.
204204

articles/purview/register-scan-azure-sql-database.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: athenads
55
ms.author: athenadsouza
66
ms.service: purview
77
ms.topic: how-to
8-
ms.date: 10/28/2022
8+
ms.date: 12/05/2022
99
ms.custom: template-how-to
1010
---
1111
# Discover and govern Azure SQL Database in Microsoft Purview
@@ -40,11 +40,10 @@ When setting up scan, you can further scope the scan after providing the databas
4040

4141
* Microsoft Purview doesn't support over 800 columns in the Schema tab and it will show "Additional-Columns-Truncated" if there are more than 800 columns.
4242
* Column level lineage is currently not supported in the lineage tab. However, the columnMapping attribute in properties tab of Azure SQL Stored Procedure Run captures column lineage in plain text.
43-
* Stored procedures running remotely from data integration tools like Azure Data Factory is currently not supported
4443
* Data lineage extraction is currently not supported for Functions, Triggers.
4544
* Lineage extraction scan is scheduled and defaulted to run every six hours. Frequency can't be changed.
46-
* If sql views are referenced in stored procedures, they're captured as sql tables currently.
47-
* Lineage extraction is currently not supported, if Azure SQL Server is configured behind a private endpoint.
45+
* If SQL views are referenced in stored procedures, they're captured as SQL tables currently.
46+
* Lineage extraction is currently not supported if your Azure SQL Server disables public access or doesn't allow Azure services to access it.
4847

4948
## Prerequisites
5049

0 commit comments

Comments
 (0)