You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/purview/manage-integration-runtimes.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: jingwang
6
6
ms.service: purview
7
7
ms.subservice: purview-data-map
8
8
ms.topic: how-to
9
-
ms.date: 11/03/2022
9
+
ms.date: 12/05/2022
10
10
---
11
11
12
12
# Create and manage a self-hosted integration runtime
@@ -140,7 +140,7 @@ Your self-hosted integration runtime machine needs to connect to several resourc
140
140
141
141
* The Microsoft Purview services used to manage the self-hosted integration runtime.
142
142
* The data sources you want to scan using the self-hosted integration runtime.
143
-
* The managed Storage account and optional Event Hubs resource created by Microsoft Purview. Microsoft Purview uses these resources to ingest the results of the scan, among many other things, so the self-hosted integration runtime need to be able to connect with these resources.
143
+
* The managed Storage account created by Microsoft Purview. Microsoft Purview uses these resources to ingest the results of the scan, among many other things, so the self-hosted integration runtime need to be able to connect with these resources.
144
144
145
145
There are two firewalls to consider:
146
146
@@ -150,15 +150,15 @@ There are two firewalls to consider:
150
150
Here are the domains and outbound ports that you need to allow at both **corporate and Windows/machine firewalls**.
151
151
152
152
> [!TIP]
153
-
> For domains listed with '\<managed_storage_account>' and '\<managed_Event_Hub_resource>', add the name of the managed resources associated with your Microsoft Purview account. You can find them from Azure portal -> your Microsoft Purview account -> Managed resources tab.
153
+
> For domains listed with '\<managed_storage_account>', add the name of the managed resources associated with your Microsoft Purview account. You can find them from Azure portal -> your Microsoft Purview account -> Managed resources tab.
|`*.frontend.clouddatahub.net`| 443 | Required to connect to the Microsoft Purview service. Currently wildcard is required as there's no dedicated resource. |
158
158
|`*.servicebus.windows.net`| 443 | Required for setting up scan in the Microsoft Purview governance portal. This endpoint is used for interactive authoring from UI, for example, test connection, browse folder list and table list to scope scan. Currently wildcard is required as there's no dedicated resource. |
159
-
|`<purview_account>.purview.azure.com`| 443 | Required to connect to Microsoft Purview service. |
160
-
|`<managed_storage_account>.blob.core.windows.net`| 443 | Required to connect to the Microsoft Purview managed Azure Blob storage account. |
161
-
|`<managed_storage_account>.queue.core.windows.net`| 443 | Required to connect to the Microsoft Purview managed Azure Queue storage account. |
159
+
|`<purview_account>.purview.azure.com`| 443 | Required to connect to Microsoft Purview service. If you use Purview [Private Endpoints](catalog-private-link.md), this endpoint is covered by *account private endpoint*. |
160
+
|`<managed_storage_account>.blob.core.windows.net`| 443 | Required to connect to the Microsoft Purview managed Azure Blob storage account. If you use Purview [Private Endpoints](catalog-private-link.md), this endpoint is covered by *ingestion private endpoint*. |
161
+
|`<managed_storage_account>.queue.core.windows.net`| 443 | Required to connect to the Microsoft Purview managed Azure Queue storage account. If you use Purview [Private Endpoints](catalog-private-link.md), this endpoint is covered by *ingestion private endpoint*. |
162
162
|`download.microsoft.com`| 443 | Required to download the self-hosted integration runtime updates. If you have disabled auto-update, you can skip configuring this domain. |
163
163
|`login.windows.net`<br>`login.microsoftonline.com`| 443 | Required to sign in to the Azure Active Directory. |
164
164
@@ -176,7 +176,7 @@ Depending on the sources you want to scan, you also need to allow other domains
176
176
|`<your_ADLS_account>.azuredatalakestore.net`| 443 | When scan Azure Data Lake Store Gen 1. |
177
177
| Various domains | Dependent | Domains and ports for any other sources the SHIR will scan. |
178
178
179
-
For some cloud data stores such as Azure SQL Database and Azure Storage, you need to allow IP address of self-hosted integration runtime machine on their firewall configuration.
179
+
For some cloud data stores such as Azure SQL Database and Azure Storage, you may need to allow IP address of self-hosted integration runtime machine on their firewall configuration, or you can create private endpoint of the service in your self-hosted integration runtime's network.
180
180
181
181
> [!IMPORTANT]
182
182
> In most environments, you will also need to make sure that your DNS is correctly configured. To confirm, you can use **nslookup** from your SHIR machine to check connectivity to each of the domains. Each nslookup should return the IP of the resource. If you are using [Private Endpoints](catalog-private-link.md), the private IP should be returned and not the Public IP. If no IP is returned, or if when using Private Endpoints the public IP is returned, you need to address your DNS/VNet association, or your Private Endpoint/VNet peering.
@@ -195,10 +195,10 @@ There are two supported configuration options by Microsoft Purview:
195
195
196
196
-**Do not use proxy**: The self-hosted integration runtime doesn't explicitly use any proxy to connect to cloud services.
197
197
-**Use system proxy**: The self-hosted integration runtime uses the proxy setting that is configured in the executable's configuration files. If no proxy is specified in these files, the self-hosted integration runtime connects to the services directly without going through a proxy.
198
+
-**Use custom proxy**: Configure the HTTP proxy setting to use for the self-hosted integration runtime, instead of using configurations in diahost.exe.config and diawp.exe.config. **Address** and **Port** values are required. **User Name** and **Password** values are optional, depending on your proxy's authentication setting. All settings are encrypted with Windows DPAPI on the self-hosted integration runtime and stored locally on the machine.
198
199
199
-
> [!IMPORTANT]
200
-
>
201
-
> Currently, **custom proxy** is not supported in Microsoft Purview. In addition, system proxy is supported when scanning Azure data sources and SQL Server; scanning other sources doesn't support proxy.
200
+
> [!NOTE]
201
+
> Proxy is supported when scanning Azure data sources and SQL Server; scanning other sources doesn't support proxy.
202
202
203
203
The integration runtime host service restarts automatically after you save the updated proxy settings.
Copy file name to clipboardExpand all lines: articles/purview/register-scan-azure-sql-database.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: athenads
5
5
ms.author: athenadsouza
6
6
ms.service: purview
7
7
ms.topic: how-to
8
-
ms.date: 10/28/2022
8
+
ms.date: 12/05/2022
9
9
ms.custom: template-how-to
10
10
---
11
11
# Discover and govern Azure SQL Database in Microsoft Purview
@@ -40,11 +40,10 @@ When setting up scan, you can further scope the scan after providing the databas
40
40
41
41
* Microsoft Purview doesn't support over 800 columns in the Schema tab and it will show "Additional-Columns-Truncated" if there are more than 800 columns.
42
42
* Column level lineage is currently not supported in the lineage tab. However, the columnMapping attribute in properties tab of Azure SQL Stored Procedure Run captures column lineage in plain text.
43
-
* Stored procedures running remotely from data integration tools like Azure Data Factory is currently not supported
44
43
* Data lineage extraction is currently not supported for Functions, Triggers.
45
44
* Lineage extraction scan is scheduled and defaulted to run every six hours. Frequency can't be changed.
46
-
* If sql views are referenced in stored procedures, they're captured as sql tables currently.
47
-
* Lineage extraction is currently not supported, if Azure SQL Server is configured behind a private endpoint.
45
+
* If SQL views are referenced in stored procedures, they're captured as SQL tables currently.
46
+
* Lineage extraction is currently not supported if your Azure SQL Server disables public access or doesn't allow Azure services to access it.
0 commit comments