Skip to content

Commit a13f443

Browse files
committed
Merge branch 'release-ignite-arcadia' of https://github.com/MicrosoftDocs/azure-docs-pr into release-ignite-arcadia
2 parents 50cde0e + a350588 commit a13f443

File tree

51 files changed

+554
-103
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+554
-103
lines changed

articles/sql-data-warehouse/TOC.yml

Lines changed: 407 additions & 0 deletions
Large diffs are not rendered by default.
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
---
2+
author: julieMSFT
3+
ms.service: synapse-analytics
4+
ms.topic: include
5+
ms.date: 4/6/2020
6+
ms.author: jrasnick
7+
---
8+
> [!IMPORTANT]
9+
> Azure Synapse Analytics (Workspaces) is currently in public preview.
10+
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.
11+
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).

articles/synapse-analytics/overview-cheat-sheet.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ ms.reviewer: jrasnick
1313

1414
# Azure Synapse Analytics cheat sheet
1515

16+
[!INCLUDE [preview](includes/note-preview.md)]
17+
1618
The Azure Synapse Analytics cheat sheet will guide you through the basic concepts of the service and important commands. This article will be helpful for both new learners and those who want highlights of the essential Azure Synapse topics.
1719

1820
## Architecture

articles/synapse-analytics/overview-what-is.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,9 @@ ms.author: saveenr
1111
ms.reviewer: jrasnick
1212
---
1313

14-
# What is Azure Synapse
14+
# What is Azure Synapse Analytics (workspaces)
15+
16+
[!INCLUDE [preview](includes/note-preview.md)]
1517

1618
Today enterprise analytics requires operating at massive scale on any kind of data--raw, refined, or highly curated. To build these kinds of analytics solutions, enterprises have needed to stitch together big data and data warehousing technologies such as Spark and SQL. Then integrate them into rich data pipelines that work across data in relational stores and data lakes. Solutions like this are difficult to build, configure, secure, and maintain and delay enterprises from quickly getting the insights they need.
1719

articles/synapse-analytics/security/how-to-connect-to-workspace-with-private-links.md

Lines changed: 16 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -10,40 +10,42 @@ ms.reviewer: jrasnick
1010
---
1111

1212
# Connect to your Azure Synapse workspace using private links (preview)
13+
1314
This article will teach you how to create private endpoint to your Azure Synapse workspace. See [private links and private endpoints](https://docs.microsoft.com/azure/private-link/) to learn more.
1415

1516
## Step 1: Open your Azure Synapse workspace in Azure portal
16-
Select **Private endpoint connection** under **Security** and then select **+ Private endpoint**.
17-
![Open Azure Synapse workspace in Azure portal](../media/security/private-endpoint-1.png)
17+
18+
Select **Private endpoint connection** under **Security** and then select **+ Private endpoint**.
19+
![Open Azure Synapse workspace in Azure portal](./media/how-to-connect-to-workspace-with-private-links/private-endpoint-1.png)
1820

1921
## Step 2: Select your subscription and region details
20-
Under the **Basics** tab in the **Create a private endpoint** window, choose your **Subscription** and **Resource Group**. Give a **Name** to the private endpoint that you want to create. Select the **Region** where you want the private endpoint created.
2122

22-
Private endpoints are created in a subnet. The subscription, resource group, and region selected filter the private endpoint subnets. Select **Next: Resource >** when done.
23-
![Select subscription and region details](../media/security/private-endpoint-2.png)
23+
Under the **Basics** tab in the **Create a private endpoint** window, choose your **Subscription** and **Resource Group**. Give a **Name** to the private endpoint that you want to create. Select the **Region** where you want the private endpoint created.
2424

25+
Private endpoints are created in a subnet. The subscription, resource group, and region selected filter the private endpoint subnets. Select **Next: Resource >** when done.
26+
![Select subscription and region details](./media/how-to-connect-to-workspace-with-private-links/private-endpoint-2.png)
2527

2628
## Step 3: Select your Azure Synapse workspace details
27-
Select **Connect to an Azure resource in my directory** in the **Resource** tab. Select the **Subscription** that contains your Azure Synapse workspace. The **Resource type** for creating private endpoints to an Azure Synapse workspace is *Microsoft.Synapse/workspaces*.
29+
30+
Select **Connect to an Azure resource in my directory** in the **Resource** tab. Select the **Subscription** that contains your Azure Synapse workspace. The **Resource type** for creating private endpoints to an Azure Synapse workspace is *Microsoft.Synapse/workspaces*.
2831

2932
Select your Azure Synapse workspace as the **Resource**. Every Azure Synapse workspace has three **Target sub-resource** that you can create a private endpoint to: Sql, SqlOnDemand, and Dev.
3033

3134
Select **Next: Configuration>** to advance to the next part of the setup.
32-
![Select subscription and region details](../media/security/private-endpoint-3.png)
33-
35+
![Select subscription and region details](./media/how-to-connect-to-workspace-with-private-links/private-endpoint-3.png)
3436

35-
In the **Configuration** tab, select the **Virtual network** and the **Subnet** in which the private endpoint should be created. You also need to create a DNS record that maps to the private endpoint.
37+
In the **Configuration** tab, select the **Virtual network** and the **Subnet** in which the private endpoint should be created. You also need to create a DNS record that maps to the private endpoint.
3638

39+
Select **Yes** for **Integrate with private DNS zone** to integrate your private endpoint with a private DNS zone. If you don't have a private DNS zone associated with your VNet, then a new private DNS zone is created. Select **Review + create** when done.
3740

38-
Select **Yes** for **Integrate with private DNS zone** to integrate your private endpoint with a private DNS zone. If you don't have a private DNS zone associated with your VNet, then a new private DNS zone is created. Select **Review + create** when done.
41+
![Select subscription and region details](./media/how-to-connect-to-workspace-with-private-links/private-endpoint-4.png)
3942

40-
![Select subscription and region details](../media/security/private-endpoint-4.png)
43+
When the deployment is complete, open your Azure Synapse workspace in Azure portal and select **Private endpoint connections**. The new private endpoint and private endpoint connection name associated to the private endpoint are shown.
4144

42-
When the deployment is complete, open your Azure Synapse workspace in Azure portal and select **Private endpoint connections**. The new private endpoint and private endpoint connection name associated to the private endpoint are shown.
43-
44-
![Select subscription and region details](../media/security/private-endpoint-5.png)
45+
![Select subscription and region details](./media/how-to-connect-to-workspace-with-private-links/private-endpoint-5.png)
4546

4647
## Next steps
48+
4749
Learn more about [Managed workspace VNet](./synapse-workspace-managed-vnet.md)
4850

4951
Learn more about [Managed private endpoints](./synapse-workspace-managed-private-endpoints.md)

articles/synapse-analytics/security/how-to-create-managed-private-endpoints.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -14,28 +14,31 @@ ms.reviewer: jrasnick
1414
This article will teach you how to create a Managed private endpoint to your data source in Azure. See [Managed private endpoints](./synapse-workspace-managed-private-endpoints.md) to learn more.
1515

1616
## Step 1: Open your Azure Synapse workspace in Azure portal
17+
1718
You can create a Managed private endpoint to your data source from Azure Synapse Studio. Select the **Overview** tab in Azure portal and select **Launch Synapse Studio**.
18-
![Launch Azure Synapse Studio](../media/security/managed-private-endpoint-1.png)
19+
![Launch Azure Synapse Studio](./media/how-to-create-managed-private-endpoints/managed-private-endpoint-1.png)
1920

2021
## Step 2: Navigate to the Managed Virtual Networks tab in Synapse Studio
2122

2223
In Azure Synapse Studio, select the **Manage** tab from the left navigation. Select **Managed Virtual Networks** and then select **+ New**.
23-
![Create a new Managed private endpoint](../media/security/managed-private-endpoint-2.png)
24+
![Create a new Managed private endpoint](./media/how-to-create-managed-private-endpoints/managed-private-endpoint-2.png)
2425

2526
## Step 3: Select the data source type
27+
2628
Select the data source type. In this case, the target data source is an ADLS gen2 account. Select **Continue**.
27-
![Select a target data source type](../media/security/managed-private-endpoint-3.png)
29+
![Select a target data source type](./media/how-to-create-managed-private-endpoints/managed-private-endpoint-3.png)
2830

2931
## Step 4: Enter information about the data source
32+
3033
In the next window, enter information about the data source. In this example, we're creating a Managed private endpoint to an ADLS gen2 account. Enter a **Name** for the Managed private endpoint. Provide an **Azure subscription** and a **Storage account name**. Select **Create**.
31-
![Enter target data source details](../media/security/managed-private-endpoint-4.png)
34+
![Enter target data source details](./media/how-to-create-managed-private-endpoints/managed-private-endpoint-4.png)
3235

3336
## Step 5: Verify that your Managed private endpoint was successfully created
34-
After submitting the request, you'll see its status. To verify the successful creation of your Managed private endpoint was created, check its *Provisioning State*. You may need to wait 1 minute and select **Refresh** to update the provisioning state. You can see that the Managed private endpoint to the ADLS gen2 account was successfully created.
3537

36-
You can also see that the *Approval State* is *Pending*. The owner of the target resource can approve or deny the private endpoint connection request. If the owner approves the private endpoint connection request, then a private link is established. If denied, then a private link isn't established.
37-
![Managed private endpoint creation request status](../media/security/managed-private-endpoint-5.png)
38+
After submitting the request, you'll see its status. To verify the successful creation of your Managed private endpoint was created, check its *Provisioning State*. You may need to wait 1 minute and select **Refresh** to update the provisioning state. You can see that the Managed private endpoint to the ADLS gen2 account was successfully created.
3839

40+
You can also see that the *Approval State* is *Pending*. The owner of the target resource can approve or deny the private endpoint connection request. If the owner approves the private endpoint connection request, then a private link is established. If denied, then a private link isn't established.
41+
![Managed private endpoint creation request status](./media/how-to-create-managed-private-endpoints/managed-private-endpoint-5.png)
3942

4043
## Next steps
4144

articles/synapse-analytics/security/how-to-grant-worspace-managed-identity-permissions.md renamed to articles/synapse-analytics/security/how-to-grant-workspace-managed-identity-permissions.md

Lines changed: 33 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -15,93 +15,103 @@ ms.reviewer: jrasnick
1515
This article teaches you how to grant permissions to the managed identity in Azure synapse workspace. Permissions, in turn, allow access to SQL pools in the workspace and ADLS gen2 storage account through the Azure portal.
1616

1717
>[!NOTE]
18-
>This workspace managed identity will be referred to as managed identity through the rest of this document.
18+
>This workspace managed identity will be referred to as managed identity through the rest of this document.
1919
2020
## Grant the managed identity permissions to the SQL pool
21+
2122
The managed identity grants permissions to the SQL pools in the workspace. With permissions granted, you can orchestrate pipelines that perform SQL pool-related activities. When you create an Azure Synapse workspace using Azure portal, you can grant the managed identity CONTROL permissions on SQL pools.
2223

23-
Select **Security + networking** when you're creating your Azure Synapse workspace. Then select **Grant CONTROL to the workspace's managed identity on SQL pools**.
24+
Select **Security + networking** when you're creating your Azure Synapse workspace. Then select **Grant CONTROL to the workspace's managed identity on SQL pools**.
2425

25-
![CONTROL permission on SQL pools](../media/security/configure-workspace-managed-identity-16.png)
26+
![CONTROL permission on SQL pools](./media/how-to-grant-workspace-managed-identity-permissions/configure-workspace-managed-identity-16.png)
2627

2728
## Grant the managed identity permissions to ADLS gen2 storage account
28-
An ADLS gen2 storage account is required to create an Azure Synapse workspace. To successfully launch Spark pools in Azure Synapse workspace, the Azure Synapse managed identity needs the *Storage Blob Data Contributor* role on this storage account . Pipeline orchestration in Azure Synapse also benefits from this role.
29+
30+
An ADLS gen2 storage account is required to create an Azure Synapse workspace. To successfully launch Spark pools in Azure Synapse workspace, the Azure Synapse managed identity needs the *Storage Blob Data Contributor* role on this storage account . Pipeline orchestration in Azure Synapse also benefits from this role.
2931

3032
### Grant permissions to managed identity during workspace creation
33+
3134
Azure Synapse will attempt to grant the Storage Blob Data Contributor role to the managed identity after you create the Azure Synapse workspace using Azure portal. You provide the ADLS gen2 storage account details in the **Basics** tab.
3235

33-
![Basics tab in workspace creation flow](../media/security/configure-workspace-managed-identity-1.png)
36+
![Basics tab in workspace creation flow](./media/how-to-grant-workspace-managed-identity-permissions/configure-workspace-managed-identity-1.png)
3437

35-
Choose the ADLS gen2 storage account and filesystem in **Account name** and **File system name**.
38+
Choose the ADLS gen2 storage account and filesystem in **Account name** and **File system name**.
3639

37-
![Providing an ADLS gen2 storage account details](../media/security/configure-workspace-managed-identity-2.png)
40+
![Providing an ADLS gen2 storage account details](./media/how-to-grant-workspace-managed-identity-permissions/configure-workspace-managed-identity-2.png)
3841

3942
If the workspace creator is also **Owner** of the ADLS gen2 storage account, then Azure Synapse will assign the *Storage Blob Data Contributor* role to the managed identity. You'll see the following message below the storage account details that you entered.
4043

41-
![Successful Storage Blob Data Contributor assignment](../media/security/configure-workspace-managed-identity-3.png)
44+
![Successful Storage Blob Data Contributor assignment](./media/how-to-grant-workspace-managed-identity-permissions/configure-workspace-managed-identity-3.png)
4245

4346
If the workspace creator isn't the owner of the ADLS gen2 storage account, then Azure Synapse doesn't assign the *Storage Blob Data Contributor* role to the managed identity. The message appearing below the storage account details notifies the workspace creator that they don't have sufficient permissions to grant the *Storage Blob Data Contributor* role to the managed identity.
4447

45-
![Unsuccessful Storage Blob Data Contributor assignment](../media/security/configure-workspace-managed-identity-4.png)
48+
![Unsuccessful Storage Blob Data Contributor assignment](./media/how-to-grant-workspace-managed-identity-permissions/configure-workspace-managed-identity-4.png)
4649

4750
As the message states, you can't create Spark pools unless the *Storage Blob Data Contributor* is assigned to the managed identity.
4851

4952
### Grant permissions to managed identity after workspace creation
53+
5054
During workspace creation, if you don't assign the *Storage Blob Data contributor* to the managed identity, then the **Owner** of the ADLS gen2 storage account manually assigns that role to the identity. The following steps will help you to accomplish manual assignment.
5155

5256
#### Step 1: Navigate to the ADLS gen2 storage account in Azure portal
57+
5358
In Azure portal, open the ADLS gen2 storage account and select **Overview** from the left navigation. You'll only need to assign The *Storage Blob Data Contributor* role at the container or filesystem level. Select **Containers**.
54-
![ADLS gen2 storage account overview](../media/security/configure-workspace-managed-identity-5.png)
59+
![ADLS gen2 storage account overview](./media/how-to-grant-workspace-managed-identity-permissions/configure-workspace-managed-identity-5.png)
5560

5661
#### Step 2: Select the container
57-
The managed identity should have data access to the container (file system) that was provided when the workspace was created. You can find this container or file system in Azure portal. Open the Azure Synapse workspace in Azure portal and select the **Overview** tab from the left navigation.
58-
![ADLS gen2 storage account container](../media/security/configure-workspace-managed-identity-7.png)
62+
63+
The managed identity should have data access to the container (file system) that was provided when the workspace was created. You can find this container or file system in Azure portal. Open the Azure Synapse workspace in Azure portal and select the **Overview** tab from the left navigation.
64+
![ADLS gen2 storage account container](./media/how-to-grant-workspace-managed-identity-permissions/configure-workspace-managed-identity-7.png)
5965

6066

6167
Select that same container or file system to grant the *Storage Blob Data Contributor* role to the managed identity.
62-
![ADLS gen2 storage account container selection](../media/security/configure-workspace-managed-identity-6.png)
68+
![ADLS gen2 storage account container selection](./media/how-to-grant-workspace-managed-identity-permissions/configure-workspace-managed-identity-6.png)
6369

6470
#### Step 3: Navigate to Access control
71+
6572
Select **Access Control (IAM)**.
6673

67-
![Access control(IAM)](../media/security/configure-workspace-managed-identity-8.png)
74+
![Access control(IAM)](./media/how-to-grant-workspace-managed-identity-permissions/configure-workspace-managed-identity-8.png)
6875

6976
#### Step 4: Add a new role assignment
77+
7078
Select **+ Add**.
7179

72-
![Add new role assignment](../media/security/configure-workspace-managed-identity-9.png)
80+
![Add new role assignment](./media/how-to-grant-workspace-managed-identity-permissions/configure-workspace-managed-identity-9.png)
7381

7482
#### Step 5: Select the RBAC role
83+
7584
Select the **Storage Blob Data Contributor** role.
7685

77-
![Select the RBAC role](../media/security/configure-workspace-managed-identity-10.png)
86+
![Select the RBAC role](./media/how-to-grant-workspace-managed-identity-permissions/configure-workspace-managed-identity-10.png)
7887

7988
#### Step 6: Select the Azure AD security principal
89+
8090
Select **Azure AD user, group, or service principal** from the **Assign access to** drop down.
8191

82-
![Select AAD security principal](../media/security/configure-workspace-managed-identity-11.png)
92+
![Select AAD security principal](./media/how-to-grant-workspace-managed-identity-permissions/configure-workspace-managed-identity-11.png)
8393

94+
#### Step 7: Search for the managed identity
8495

85-
#### Step 7: Search for the managed identity
8696
The managed identity's name is also the workspace name. Search for your managed identity by entering you Azure Synapse workspace name in **Select**. You should see the managed identity listed.
8797

88-
![Find the managed identity](../media/security/configure-workspace-managed-identity-12.png)
98+
![Find the managed identity](./media/how-to-grant-workspace-managed-identity-permissions/configure-workspace-managed-identity-12.png)
8999

90100
#### Step 8: Select the managed identity
91101

92102
Select the managed identity to the **Selected members**. Select **Save** to add the role assignment.
93103

94-
![Select the managed identity](../media/security/configure-workspace-managed-identity-13.png)
104+
![Select the managed identity](./media/how-to-grant-workspace-managed-identity-permissions/configure-workspace-managed-identity-13.png)
95105

96106
#### Step 9: Verify that the Storage Blob Data Contributor role is assigned to the managed identity
97107

98108
Select **Access Control(IAM)** and then select **Role assignments**.
99109

100-
![Verify role assignment](../media/security/configure-workspace-managed-identity-14.png)
110+
![Verify role assignment](./media/how-to-grant-workspace-managed-identity-permissions/configure-workspace-managed-identity-14.png)
101111

102112
You should see your managed identity listed under the **Storage Blob Data Contributor** section with the *Storage Blob Data Contributor* role assigned to it.
103-
![ADLS gen2 storage account container selection](../media/security/configure-workspace-managed-identity-15.png)
113+
![ADLS gen2 storage account container selection](./media/how-to-grant-workspace-managed-identity-permissions/configure-workspace-managed-identity-15.png)
104114

105115
## Next steps
106-
[Workspace managed identity](./synapse-workspace-managed-identity.md)
107116

117+
[Workspace managed identity](./synapse-workspace-managed-identity.md)

0 commit comments

Comments
 (0)