You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/synapse-analytics/metadata/database.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,9 +19,9 @@ Azure Synapse Analytics allows the different computational workspace engines to
19
19
20
20
A database created with a Spark job will become visible with that same name to all current and future Spark pools (preview) in the workspace as well as the SQL on-demand engine.
21
21
22
-
If there are SQL pools in the workspace that have metadata synchronization enabled or if a new SQL pool is created with the metadata synchronization enabled, these Spark created databases are automatically mapped into special schemas in the SQL pool database.
22
+
If there are SQL pools in the workspace that have metadata synchronization enabled, or if you create a new SQL pool with the metadata synchronization enabled, these Spark created databases are automatically mapped into special schemas in the SQL pool database.
23
23
24
-
Each such schema is named after the Spark database name with an additional `$` prefix. Both the external and managed tables in the Spark-generated database are exposed as external tables in the corresponding special schema.
24
+
Each schema is named after the Spark database name with an additional `$` prefix. Both the external and managed tables in the Spark-generated database are exposed as external tables in the corresponding special schema.
25
25
26
26
The Spark default database, called `default`, will also be visible in the SQL on-demand context as a database called `default`, and in any of the SQL pool databases with metadata synchronization turned on as the schema `$default`.
27
27
@@ -74,7 +74,7 @@ First create a new Spark database named `mytestdb` using a Spark cluster you hav
74
74
spark.Sql("CREATE DATABASE mytestdb")
75
75
```
76
76
77
-
This creates the Spark database. After a short delay, you can see the database from SQL on-demand. For example, run the following statement from SQL on-demand.
77
+
After a short delay, you can see the database from SQL on-demand. For example, run the following statement from SQL on-demand.
Copy file name to clipboardExpand all lines: articles/synapse-analytics/metadata/overview.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Azure Synapse Analytics shared metadata model
3
-
description: Azure Synapse Analytics provides a shared metadata model where creating a database or table in Apache Spark will make it accessible from its SQL on-demand (preview) and SQL pool engines without duplicating the data or requiring user action.
3
+
description: Azure Synapse Analytics allows the different workspace computational engines to share databases and tables between its Spark pools (preview), SQL on-demand engine (preview), and SQL pools.
4
4
services: synapse-analytics
5
5
author: MikeRys
6
6
ms.service: synapse-analytics
@@ -13,11 +13,11 @@ ms.reviewer: jrasnick
13
13
14
14
# Azure Synapse Analytics shared metadata
15
15
16
-
Azure Synapse Analytics allows the different computational engines of a workspace to share databases and tables between its Spark pools (preview), SQL on-demand engine (preview), and SQL pools.
16
+
Azure Synapse Analytics allows the different workspace computational engines to share databases and tables between its Spark pools (preview), SQL on-demand engine (preview), and SQL pools.
The sharing supports the so-called modern data warehouse pattern and gives the workspace SQL engines access to databases and tables created with Spark. It also allows the SQL engines to create their own objects that are not being shared with the other engines.
20
+
The sharing supports the so-called modern data warehouse pattern and gives the workspace SQL engines access to databases and tables created with Spark. It also allows the SQL engines to create their own objects that aren't being shared with the other engines.
21
21
22
22
## Support the modern data warehouse
23
23
@@ -35,19 +35,19 @@ The shared metadata model supports the modern data warehouse pattern in the foll
35
35
36
36
<!--__Figure 1 -__ Supporting the Modern Data Warehouse Pattern with shared metadata-->
37
37
38
-
The object synchronization occurs asynchronously. Objects will therefore have a slight delay of a few seconds until they appear in the SQL context. Once they appear, they can be queried, but not updated nor changed by the SQL engines that have access to them.
38
+
Object synchronization occurs asynchronously. Objects will have a slight delay of a few seconds until they appear in the SQL context. Once they appear, they can be queried, but not updated nor changed by the SQL engines that have access to them.
Spark allows you to create databases, external and managed tables as well as views. Since Spark views require a Spark engine to process the defining Spark SQL statement, and cannot be processed by a SQL engine, only databases and their contained external and managed tables that use the Parquet storage format are shared with the workspace SQL engines. Spark views are only shared among the Spark pool instances.
44
+
Spark allows you to create databases, external tables, managed tables, and views. Since Spark views require a Spark engine to process the defining Spark SQL statement, and cannot be processed by a SQL engine, only databases and their contained external and managed tables that use the Parquet storage format are shared with the workspace SQL engines. Spark views are only shared among the Spark pool instances.
The Spark databases and tables, as well as their synchronized representations in the SQL engines are secured at the underlying storage level. When the table is queried by any of the engines that the query submitter has the right to use, the query submitter's security principal is being passed through, down to the underlying files, and permissions are checked at the file system level.
50
+
The Spark databases and tables, along with their synchronized representations in the SQL engines, are secured at the underlying storage level. When the table is queried by any of the engines that the query submitter has the right to use, the query submitter's security principal is being passed throughto the underlying files. Permissions are checked at the file system level.
51
51
52
52
For more information, see [Azure Synapse Analytics shared database](database.md).
Copy file name to clipboardExpand all lines: articles/synapse-analytics/security/how-to-connect-to-workspace-with-private-links.md
+11-4Lines changed: 11 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Connect to a Azure Synapse workspace using private links
2
+
title: Connect to an Azure Synapse workspace using private links
3
3
description: This article will teach you how to connect to your Azure Synapse workspace using private links
4
4
author: RonyMSFT
5
5
ms.service: synapse-analytics
@@ -17,18 +17,25 @@ Select **Private endpoint connection** under **Security** and then select **+ Pr
17
17

18
18
19
19
## Step 2: Select your subscription and region details
20
-
Under the **Basics** tab in the **Create a private endpoint** window, choose your **Subscription** and **Resource Group**. Give a **Name** to the private endpoint that you want to create. Select the **Region** where you want the private endpoint created. Private endpoints are created in a subnet. The subscription, resource group and region selected here filters the subnets that you can create the private endpoint in. Select **Next: Resource >** when done.
20
+
Under the **Basics** tab in the **Create a private endpoint** window, choose your **Subscription** and **Resource Group**. Give a **Name** to the private endpoint that you want to create. Select the **Region** where you want the private endpoint created.
21
+
22
+
Private endpoints are created in a subnet. The subscription, resource group, and region selected filter the private endpoint subnets. Select **Next: Resource >** when done.
21
23

22
24
23
25
24
26
## Step 3: Select your Azure Synapse workspace details
25
-
Select **Connect to an Azure resource in my directory** in the **Resource** tab. Select the **Subscription** that contains your Azure Synapse workspace. The **Resource type** for creating private endpoints to an Azure Synapse workspace is *Microsoft.Synapse/workspaces*. Select your Azure Synapse workspace as the **Resource**. Every Azure Synapse workspace has three **Target sub-resource** that you can create a private endpoint to: Sql, SqlOnDemand, and Dev.
27
+
Select **Connect to an Azure resource in my directory** in the **Resource** tab. Select the **Subscription** that contains your Azure Synapse workspace. The **Resource type** for creating private endpoints to an Azure Synapse workspace is *Microsoft.Synapse/workspaces*.
28
+
29
+
Select your Azure Synapse workspace as the **Resource**. Every Azure Synapse workspace has three **Target sub-resource** that you can create a private endpoint to: Sql, SqlOnDemand, and Dev.
26
30
27
31
Select **Next: Configuration>** to advance to the next part of the setup.
28
32

29
33
30
34
31
-
In the **Configuration** tab, select the **Virtual network** and the **Subnet** in which the private endpoint should be created. You also need to create a DNS record that maps to the private endpoint. Select **Yes** for **Integrate with private DNS zone** to integrate your private endpoint with a private DNS zone. If you don't have a private DNS zone associated with your VNet, then a new private DNS zone is created. Select **Review + create** when done.
35
+
In the **Configuration** tab, select the **Virtual network** and the **Subnet** in which the private endpoint should be created. You also need to create a DNS record that maps to the private endpoint.
36
+
37
+
38
+
Select **Yes** for **Integrate with private DNS zone** to integrate your private endpoint with a private DNS zone. If you don't have a private DNS zone associated with your VNet, then a new private DNS zone is created. Select **Review + create** when done.
32
39
33
40

Copy file name to clipboardExpand all lines: articles/synapse-analytics/security/how-to-create-managed-private-endpoints.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,11 +27,13 @@ Select the data source type. In this case, the target data source is an ADLS gen
27
27

28
28
29
29
## Step 4: Enter information about the data source
30
-
In the next window, enter information about the data source. In this example, we are creating a Managed private endpoint to an ADLS gen2 account. Enter a **Name** for the Managed private endpoint. Provide an **Azure subscription** and a **Storage account name**. Select **Create**.
30
+
In the next window, enter information about the data source. In this example, we're creating a Managed private endpoint to an ADLS gen2 account. Enter a **Name** for the Managed private endpoint. Provide an **Azure subscription** and a **Storage account name**. Select **Create**.
31
31

32
32
33
33
## Step 5: Verify that your Managed private endpoint was successfully created
34
-
After your request is submitted, you will see the status of your request. Verify that your Managed private endpoint was created successfully by checking its *Provisioning State*. You may need to wait 1 minute and select **Refresh** to update the provisioning state. You can see that the Managed private endpoint to the ADLS gen2 account was successfully created. You can also see that the *Approval State* is *Pending*. The owner of the target resource can approve or deny the private endpoint connection request. If the owner approves the private endpoint connection request then a private link is established. If denied, then a private link is not established.
34
+
After submitting the request, you'll see its status. To verify the successful creation of your Managed private endpoint was created, check its *Provisioning State*. You may need to wait 1 minute and select **Refresh** to update the provisioning state. You can see that the Managed private endpoint to the ADLS gen2 account was successfully created.
35
+
36
+
You can also see that the *Approval State* is *Pending*. The owner of the target resource can approve or deny the private endpoint connection request. If the owner approves the private endpoint connection request, then a private link is established. If denied, then a private link isn't established.
Copy file name to clipboardExpand all lines: articles/synapse-analytics/security/how-to-grant-worspace-managed-identity-permissions.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,45 +12,45 @@ ms.reviewer: jrasnick
12
12
13
13
# Grant permissions to workspace managed identity (preview)
14
14
15
-
This article teaches you how to grant permissions to the managed identity in Azure synapse workspace to access SQL Pools in the workspace and ADLS gen2 storage account using Azure portal.
15
+
This article teaches you how to grant permissions to the managed identity in Azure synapse workspace. Permissions, in turn, allow access to SQL pools in the workspace and ADLS gen2 storage account through the Azure portal.
16
16
17
17
>[!NOTE]
18
18
>This workspace managed identity will be referred to as managed identity through the rest of this document.
19
19
20
-
## Grant the managed identity permissions to the SQL pools
21
-
The managed identity can be given permissions to the SQL Pools in the workspace. With the permissions granted, you can orchestrate pipelines that performs SQL Pool related activities. When you create an Azure Synapse workspace using Azure portal, you can grant the managed identity CONTROL permissions on SQL Pools.
20
+
## Grant the managed identity permissions to the SQL pool
21
+
The managed identity grants permissions to the SQL pools in the workspace. With permissions granted, you can orchestrate pipelines that perform SQL pool-related activities. When you create an Azure Synapse workspace using Azure portal, you can grant the managed identity CONTROL permissions on SQL pools.
22
22
23
-
Select **Security + networking** when you are creating your Azure Synapse workspace. Then select **Grant CONTROL to the workspace's managed identity on SQL pools**.
23
+
Select **Security + networking** when you're creating your Azure Synapse workspace. Then select **Grant CONTROL to the workspace's managed identity on SQL pools**.
24
24
25
-

25
+

26
26
27
27
## Grant the managed identity permissions to ADLS gen2 storage account
28
-
An ADLS gen2 storage account is required to create an Azure Synapse workspace. The Azure Synapse managed identity needs *Storage Blob Data Contributor* role on this storage account to successfully launch Spark pools in Azure Synapse workspace. Pipeline orchestration in Azure Synapse also benefits from this role.
28
+
An ADLS gen2 storage account is required to create an Azure Synapse workspace. To successfully launch Spark pools in Azure Synapse workspace, the Azure Synapse managed identity needs the *Storage Blob Data Contributor* role on this storage account . Pipeline orchestration in Azure Synapse also benefits from this role.
29
29
30
30
### Grant permissions to managed identity during workspace creation
31
-
Azure Synapse will attempt to grant Storage Blob Data Contributor role to the managed identity when the Azure Synapse workspace is created using Azure portal. You provide the ADLS gen2 storage account details in the **Basics** tab.
31
+
Azure Synapse will attempt to grant the Storage Blob Data Contributor role to the managed identity after you create the Azure Synapse workspace using Azure portal. You provide the ADLS gen2 storage account details in the **Basics** tab.
32
32
33
33

34
34
35
35
Choose the ADLS gen2 storage account and filesystem in **Account name** and **File system name**.
36
36
37
37

38
38
39
-
If the workspace creator is also **Owner** of the ADLS gen2 storage account then Azure Synapse will assign the *Storage Blob Data Contributor* role to the managed identity. You will see the following message below the storage account details that you entered.
39
+
If the workspace creator is also **Owner** of the ADLS gen2 storage account, then Azure Synapse will assign the *Storage Blob Data Contributor* role to the managed identity. You'll see the following message below the storage account details that you entered.
40
40
41
41

42
42
43
-
If the workspace creator is not the owner of the ADLS gen2 storage account, then Azure Synapse does not assign the *Storage Blob Data Contributor* role to the managed identity. The message below the storage account details lets the workspace creator know that they do not have sufficient permissions to grant the *Storage Blob Data Contributor* role to the managed identity.
43
+
If the workspace creator isn't the owner of the ADLS gen2 storage account, then Azure Synapse doesn't assign the *Storage Blob Data Contributor* role to the managed identity. The message appearing below the storage account details notifies the workspace creator that they don't have sufficient permissions to grant the *Storage Blob Data Contributor* role to the managed identity.
44
44
45
45

46
46
47
-
As the message above states, you cannot create spark pools unless the *Storage Blob Data Contributor* is assigned to the managed identity.
47
+
As the message states, you can't create Spark pools unless the *Storage Blob Data Contributor* is assigned to the managed identity.
48
48
49
49
### Grant permissions to managed identity after workspace creation
50
-
if the *Storage Blob Data contributor*role could not be assigned to the managed identity during workspace creation, then the **Owner** of the ADLS gen2 storage account needs to manually assign that role to the identity. Follow these steps to accomplish that.
50
+
During workspace creation, if you don't assign the *Storage Blob Data contributor* to the managed identity, then the **Owner** of the ADLS gen2 storage account manually assigns that role to the identity. The following steps will help you to accomplish manual assignment.
51
51
52
52
#### Step 1: Navigate to the ADLS gen2 storage account in Azure portal
53
-
In Azure portal, open the ADLS gen2 storage account and select **Overview** from the left navigation. The *Storage Blob Data Contributor* role only needs to be assigned at the container or filesystem level. Select **Containers**.
53
+
In Azure portal, open the ADLS gen2 storage account and select **Overview** from the left navigation. You'll only need to assign The *Storage Blob Data Contributor* role at the container or filesystem level. Select **Containers**.
0 commit comments