You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/data-factory/security-and-access-control-troubleshoot-guide.md
+20-20Lines changed: 20 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,21 +50,21 @@ The problem is usually caused by one of the following factors:
50
50
51
51
* If you're using an **Azure IR**, try to disable the firewall setting of the datastore. This approach can resolve the issues in the following two situations:
52
52
53
-
*[Azure IR IP addresses](./azure-integration-runtime-ip-addresses.md)are not in the allow list.
53
+
*[Azure IR IP addresses](./azure-integration-runtime-ip-addresses.md)aren't in the allowlist.
54
54
* The *Allow trusted Microsoft services to access this storage account* feature is turned off for [Azure Blob Storage](./connector-azure-blob-storage.md#supported-capabilities) and [Azure Data Lake Storage Gen 2](./connector-azure-data-lake-storage.md#supported-capabilities).
55
55
* The *Allow access to Azure services* setting isn't enabled for Azure Data Lake Storage Gen1.
56
56
57
57
If none of the preceding methods works, contact Microsoft for help.
58
58
59
-
### Deleted or rejected private end point still shows Aprroved in ADF
59
+
### Deleted or rejected private end point still shows Approved in ADF
60
60
61
61
#### Symptoms
62
62
63
63
You created managed private endpoint from ADF and obtained an approved private endpoint. But, after deleting or rejecting the private endpoint later, the managed private endpoint in ADF still persists to exist and shows "Approved".
64
64
65
65
#### Cause
66
66
67
-
Currently, ADF stops pulling private end point status after it is approved. Hence the status shown in ADF is stale.
67
+
Currently, ADF stops pulling private end point status after it's approved. Hence the status shown in ADF is stale.
68
68
69
69
##### Resolution
70
70
@@ -118,7 +118,7 @@ To resolve the issue, do the following:
118
118
119
119
You're unable to register the IR authentication key on the self-hosted VM because the private link is enabled. You receive the following error message:
120
120
121
-
"Failed to get service token from ADF service with key *************** and time cost is: 0.1250079 second, the error code is: InvalidGatewayKey, activityId is: XXXXXXX and detailed error message is Client IP address is not valid private ip Cause Data factory couldn't access the public network thereby not able to reach out to the cloud to make the successful connection."
121
+
"Failed to get service token from ADF service with key *************** and time cost is: 0.1250079 second, the error code is: InvalidGatewayKey, activityId is: XXXXXXX and detailed error message is Client IP address isn't valid private ip Cause Data factory couldn't access the public network thereby not able to reach out to the cloud to make the successful connection."
122
122
123
123
#### Cause
124
124
@@ -170,18 +170,18 @@ Try to enable public network access on the user interface, as shown in the follo
170
170
### Service private DNS zone overrides Azure Resource Manager DNS resolution causing 'Not found' error
171
171
172
172
#### Cause
173
-
Both Azure Resource Manager and the service are using the same private zone creating a potential conflict on customer's private DNS with a scenario where the Azure Resource Manager records will not be found.
173
+
Both Azure Resource Manager and the service are using the same private zone creating a potential conflict on customer's private DNS with a scenario where the Azure Resource Manager records won't be found.
174
174
175
175
#### Resolution
176
176
1. Find Private DNS zones **privatelink.azure.com** in Azure portal.
177
177
:::image type="content" source="media/security-access-control-troubleshoot-guide/private-dns-zones.png" alt-text="Screenshot of finding Private DNS zones.":::
178
-
2. Check if there is an A record **adf**.
178
+
2. Check if there's an A record **adf**.
179
179
:::image type="content" source="media/security-access-control-troubleshoot-guide/a-record.png" alt-text="Screenshot of A record.":::
180
180
3. Go to **Virtual network links**, delete all records.
181
181
:::image type="content" source="media/security-access-control-troubleshoot-guide/virtual-network-link.png" alt-text="Screenshot of virtual network link.":::
182
182
4. Navigate to your service in Azure portal and recreate the private endpoint for the portal.
183
183
:::image type="content" source="media/security-access-control-troubleshoot-guide/create-private-endpoint.png" alt-text="Screenshot of recreating private endpoint.":::
184
-
5. Go back to Private DNS zones, and check if there is a new private DNS zone **privatelink.adf.azure.com**.
184
+
5. Go back to Private DNS zones, and check if there's a new private DNS zone **privatelink.adf.azure.com**.
185
185
:::image type="content" source="media/security-access-control-troubleshoot-guide/check-dns-record.png" alt-text="Screenshot of new DNS record.":::
186
186
187
187
### Connection error in public endpoint
@@ -190,7 +190,7 @@ Both Azure Resource Manager and the service are using the same private zone crea
190
190
191
191
When copying data with Azure Blob Storage account public access, pipeline runs randomly fail with following error.
192
192
193
-
For example: The Azure Blob Storage sink was using Azure IR (public, not Managed VNet) and the Azure SQL Database source was using the Managed VNet IR. Or source/sink use Managed VNet IR only with storage public access.
193
+
For example: The Azure Blob Storage sink was using Azure IR (public, not Managed virtual network) and the Azure SQL Database source was using the Managed virtual network IR. Or source/sink use Managed virtual network IR only with storage public access.
194
194
195
195
`
196
196
<LogProperties><Text>Invoke callback url with req:
@@ -199,12 +199,12 @@ For example: The Azure Blob Storage sink was using Azure IR (public, not Managed
199
199
200
200
#### Cause
201
201
202
-
The service may still use Managed VNet IR, but you could encounter such error because the public endpoint to Azure Blob Storage in Managed VNet is not reliable based on the testing result, and Azure Blob Storage and Azure Data Lake Gen2 are not supported to be connected through public endpoint from the service's Managed Virtual Network according to [Managed virtual network & managed private endpoints](./managed-virtual-network-private-endpoint.md#outbound-communications-through-public-endpoint-from-a-data-factory-managed-virtual-network).
202
+
The service might still use Managed virtual network IR, but you could encounter such error because the public endpoint to Azure Blob Storage in Managed virtual network isn't reliable based on the testing result, and Azure Blob Storage and Azure Data Lake Gen2 aren't supported to be connected through public endpoint from the service's Managed Virtual Network according to [Managed virtual network & managed private endpoints](./managed-virtual-network-private-endpoint.md#outbound-communications-through-public-endpoint-from-a-data-factory-managed-virtual-network).
203
203
204
204
#### Resolution
205
205
206
-
- Having private endpoint enabled on the source and also the sink side when using the Managed VNet IR.
207
-
- If you still want to use the public endpoint, you can switch to public IR only instead of using the Managed VNet IR for the source and the sink. Even if you switch back to public IR, the service may still use the Managed VNet IR if the Managed VNet IR is still there.
206
+
- Having private endpoint enabled on the source and also the sink side when using the Managed virtual network IR.
207
+
- If you still want to use the public endpoint, you can switch to public IR only instead of using the Managed virtual network IR for the source and the sink. Even if you switch back to public IR, the service may still use the Managed virtual network IR if the Managed virtual network IR is still there.
208
208
209
209
### Internal error while trying to Delete a data factory or Synapse workspace with Customer Managed Key (CMK) and User Assigned Managed Identity (UA-MI)
210
210
@@ -213,35 +213,35 @@ The service may still use Managed VNet IR, but you could encounter such error be
213
213
214
214
#### Cause
215
215
216
-
If you are performing any operations related to CMK, you should complete all operations related to the service first, and then external operations (like Managed Identities or Key Vault operations). For example, if you want to delete all resources, you need to delete the service instance first, and then delete the key vault. If you delete the key vault first, this error will occur since the service can't read the required objects anymore, and it won't be able to validate if deletion is possible or not.
216
+
If you're performing any operations related to CMK, you should complete all operations related to the service first, and then external operations (like Managed Identities or Key Vault operations). For example, if you want to delete all resources, you need to delete the service instance first, and then delete the key vault. If you delete the key vault first, this error occurs since the service can't read the required objects anymore, and it won't be able to validate if deletion is possible or not.
217
217
218
218
#### Resolution
219
219
220
220
There are three possible ways to solve the issue. They are as follows:
221
221
222
222
* You revoked the service's access to Key vault where the CMK key was stored.
223
-
You can reassign access to the following permissions: **Get, Unwrap Key, and Wrap Key**. These permissions are required to enable customer-managed keys. Please refer to [Grant access to customer-managed keys](enable-customer-managed-key.md#grant-data-factory-access-to-azure-key-vault). Once the permission is provided, you should be able to delete the service.
223
+
You can reassign access to the following permissions: **Get, Unwrap Key, and Wrap Key**. These permissions are required to enable customer-managed keys. Refer to [Grant access to customer-managed keys](enable-customer-managed-key.md#grant-data-factory-access-to-azure-key-vault). Once the permission is provided, you should be able to delete the service.
224
224
225
225
* Customer deleted Key Vault / CMK before deleting the service.
226
226
CMK in the service should have "Soft Delete" enabled and "Purge Protect" enabled which has default retention policy of 90 days. You can restore the deleted key.
227
-
Please review [Recover deleted Key](../key-vault/general/key-vault-recovery.md?tabs=azure-portal#list-recover-or-purge-soft-deleted-secrets-keys-and-certificates) and [Deleted Key Value](../key-vault/general/key-vault-recovery.md?tabs=azure-portal#list-recover-or-purge-a-soft-deleted-key-vault)
227
+
Review [Recover deleted Key](../key-vault/general/key-vault-recovery.md?tabs=azure-portal#list-recover-or-purge-soft-deleted-secrets-keys-and-certificates) and [Deleted Key Value](../key-vault/general/key-vault-recovery.md?tabs=azure-portal#list-recover-or-purge-a-soft-deleted-key-vault)
228
228
229
-
* User Assigned Managed Identity (UA-MI) was deleted before the service.
230
-
You can recover from this by using REST API calls, you can do this in an http client of your choice in any programming language. If you have not anything already set up for REST API calls with Azure authentication, the easiest way to do this would be by using Fiddler. Please follow following steps.
229
+
* User Assigned Managed Identity (UA-MI) was deleted before the service.
230
+
You can recover from this by using REST API calls. You can do this in an http client of your choice in any programming language. If you have not anything already set up for REST API calls with Azure authentication, the easiest way to do this 'd be by using Fiddler. Follow following steps.
231
231
232
232
1. Make a GET call using Method: GET Url like `https://management.azure.com/subscriptions/YourSubscription/resourcegroups/YourResourceGroup/providers/Microsoft.DataFactory/factories/YourFactoryName?api-version=2018-06-01`
233
233
234
-
2. You need to create a new User Managed Identity with a different Name (same name may work, but just to be sure, it's safer to use a different name than the one in the GET response)
234
+
2. You need to create a new User Managed Identity with a different Name (the same name might work, but just to be sure, it's safer to use a different name than the one in the GET response)
235
235
236
236
3. Modify the encryption.identity property and identity.userassignedidentities to point to the newly created managed identity. Remove the clientId and principalId from the userAssignedIdentity object.
237
237
238
-
4. Make a PUT call to the same url passing the new body. It is very important that you are passing whatever you got in the GET response, and only modify the identity. Otherwise they would override other settings unintentionally.
238
+
4. Make a PUT call to the same url passing the new body. It's important that you're passing whatever you got in the GET response, and only modify the identity. Otherwise they would override other settings unintentionally.
239
239
240
-
5. After the call succeeds, you will be able to see the entities again and retry deleting.
240
+
5. After the call succeeds, you'll be able to see the entities again and retry deleting.
241
241
242
242
## Sharing Self-hosted Integration Runtime
243
243
244
-
### Sharing a self-hosted IR from a different tenant is not supported
244
+
### Sharing a self-hosted IR from a different tenant isn't supported
0 commit comments