Skip to content

Commit a813280

Browse files
committed
[msid] ms.custom: has-adal-ref 02 (tracking)
1 parent 02b0dfe commit a813280

File tree

8 files changed

+130
-129
lines changed

8 files changed

+130
-129
lines changed

articles/data-factory/connector-troubleshoot-guide.md

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,22 @@
11
---
22
title: Troubleshoot Azure Data Factory Connectors
3-
description: Learn how to troubleshoot connector issues in Azure Data Factory.
3+
description: Learn how to troubleshoot connector issues in Azure Data Factory.
44
services: data-factory
55
author: linda33wj
66
ms.service: data-factory
77
ms.topic: troubleshooting
88
ms.date: 01/09/2020
99
ms.author: jingwang
1010
ms.reviewer: craigg
11+
ms.custom: has-adal-ref
1112
---
1213

1314
# Troubleshoot Azure Data Factory Connectors
1415

1516
[!INCLUDE[appliesto-adf-asa-md](includes/appliesto-adf-asa-md.md)]
1617

1718
This article explores common troubleshooting methods for connectors in Azure Data Factory.
18-
19+
1920

2021
## Azure Blob Storage
2122

@@ -58,8 +59,8 @@ This article explores common troubleshooting methods for connectors in Azure Dat
5859
- **Symptoms**: When copying data into Cosmos DB, you hit the following error:
5960

6061
```
61-
Message=Partition range id 0 | Failed to import mini-batch.
62-
Exception was Message: {"Errors":["Encountered exception while executing function. Exception = Error: {\"Errors\":[\"Unique index constraint violation.\"]}...
62+
Message=Partition range id 0 | Failed to import mini-batch.
63+
Exception was Message: {"Errors":["Encountered exception while executing function. Exception = Error: {\"Errors\":[\"Unique index constraint violation.\"]}...
6364
```
6465
6566
- **Cause**: There are two possible causes:
@@ -68,7 +69,7 @@ This article explores common troubleshooting methods for connectors in Azure Dat
6869
6970
- If you use **Upsert** as write behavior and you set another unique key to the container, this error means you source data have rows/objects with different IDs but same value for the defined unique key.
7071
71-
- **Resolution**:
72+
- **Resolution**:
7273
7374
- For cause1, set **Upsert** as write behavior.
7475
- For cause 2, make sure each document has different value for defined unique key.
@@ -87,13 +88,13 @@ Cosmos DB calculates RU from [here](../cosmos-db/request-units.md#request-unit-c
8788
8889
- **Resolution**: Here are two solutions:
8990
90-
1. **Increase the container RU** to bigger value in Cosmos DB, which will improve the copy activity performance, though incur more cost in Cosmos DB.
91+
1. **Increase the container RU** to bigger value in Cosmos DB, which will improve the copy activity performance, though incur more cost in Cosmos DB.
9192
9293
2. Decrease **writeBatchSize** to smaller value (such as 1000) and set **parallelCopies** to smaller value such as 1, which will make copy run performance worse than current but will not incur more cost in Cosmos DB.
9394
9495
### Column missing in column mapping
9596
96-
- **Symptoms**: When you import schema for Cosmos DB for column mapping, some columns are missing.
97+
- **Symptoms**: When you import schema for Cosmos DB for column mapping, some columns are missing.
9798
9899
- **Cause**: ADF infers the schema from the first 10 Cosmos DB documents. If some columns/properties don't have value in those documents, they won't be detected by ADF thus won't show up.
99100
@@ -116,7 +117,7 @@ Cosmos DB calculates RU from [here](../cosmos-db/request-units.md#request-unit-c
116117
- **Cause**: There are two ways to represent UUID in BSON - UuidStardard and UuidLegacy. By default, UuidLegacy is used to read data. You will hit error if your UUID data in MongoDB is UuidStandard.
117118
118119
- **Resolution**: In MongoDB connection string, add option "**uuidRepresentation=standard**". For more information, see [MongoDB connection string](connector-mongodb.md#linked-service-properties).
119-
120+
120121
121122
## Azure Data Lake Storage Gen2
122123
@@ -161,10 +162,10 @@ Cosmos DB calculates RU from [here](../cosmos-db/request-units.md#request-unit-c
161162
162163
### Error message: The remote server returned an error: (403) Forbidden
163164
164-
- **Symptoms**: Copy activity fail with the following error:
165+
- **Symptoms**: Copy activity fail with the following error:
165166
166167
```
167-
Message: The remote server returned an error: (403) Forbidden..
168+
Message: The remote server returned an error: (403) Forbidden..
168169
Response details: {"RemoteException":{"exception":"AccessControlException""message":"CREATE failed with error 0x83090aa2 (Forbidden. ACL verification failed. Either the resource does not exist or the user is not authorized to perform the requested operation.)....
169170
```
170171
@@ -177,15 +178,15 @@ Cosmos DB calculates RU from [here](../cosmos-db/request-units.md#request-unit-c
177178
- **Symptoms**: Copy activity fail with the following error:
178179
179180
```
180-
Failed to get access token by using service principal.
181+
Failed to get access token by using service principal.
181182
ADAL Error: service_unavailable, The remote server returned an error: (503) Server Unavailable.
182183
```
183184
184185
- **Cause**: When the Service Token Server (STS) owned by Azure Active Directory is not unavailable, i.e., too
185-
busy to handle requests, it returns an HTTP error 503.
186+
busy to handle requests, it returns an HTTP error 503.
186187
187188
- **Resolution**: Rerun the copy activity after several minutes.
188-
189+
189190
190191
## Azure SQL Data Warehouse/Azure SQL Database/SQL Server
191192
@@ -360,7 +361,7 @@ busy to handle requests, it returns an HTTP error 503.
360361
ErrorCode=FailedDbOperation,Type=Microsoft.DataTransfer.Common.Shared.HybridDeliveryException,
361362
Message=Error happened when loading data into SQL Data Warehouse.,
362363
Source=Microsoft.DataTransfer.ClientLibrary,Type=System.Data.SqlClient.SqlException,
363-
Message=Query aborted-- the maximum reject threshold (0 rows) was reached while reading from an external source: 1 rows rejected out of total 415 rows processed. (/file_name.txt)
364+
Message=Query aborted-- the maximum reject threshold (0 rows) was reached while reading from an external source: 1 rows rejected out of total 415 rows processed. (/file_name.txt)
364365
Column ordinal: 18, Expected data type: DECIMAL(x,x), Offending value:..
365366
```
366367
@@ -373,9 +374,9 @@ busy to handle requests, it returns an HTTP error 503.
373374
- **Symptoms**: You copy data into Azure SQL Data Warehouse using PolyBase, and hit the following error:
374375
375376
```
376-
Message=110802;An internal DMS error occurred that caused this operation to fail.
377-
Details: Exception: Microsoft.SqlServer.DataWarehouse.DataMovement.Common.ExternalAccess.HdfsAccessException,
378-
Message: Java exception raised on call to HdfsBridge_CreateRecordReader.
377+
Message=110802;An internal DMS error occurred that caused this operation to fail.
378+
Details: Exception: Microsoft.SqlServer.DataWarehouse.DataMovement.Common.ExternalAccess.HdfsAccessException,
379+
Message: Java exception raised on call to HdfsBridge_CreateRecordReader.
379380
Java exception message:HdfsBridge::CreateRecordReader - Unexpected error encountered creating the record reader.: Error [HdfsBridge::CreateRecordReader - Unexpected error encountered creating the record reader.] occurred while accessing external file.....
380381
```
381382
@@ -412,7 +413,7 @@ busy to handle requests, it returns an HTTP error 503.
412413
- **Cause**: Azure SQL Data Warehouse hit issue querying the external table in Azure Storage.
413414
414415
- **Resolution**: Run the same query in SSMS and check if you see the same result. If yes, open a support ticket to Azure SQL Data Warehouse and provide your SQL DW server and database name to further troubleshoot.
415-
416+
416417
417418
## Delimited Text Format
418419
@@ -677,4 +678,3 @@ For more troubleshooting help, try these resources:
677678
* [MSDN forum](https://social.msdn.microsoft.com/Forums/home?sort=relevancedesc&brandIgnore=True&searchTerm=data+factory)
678679
* [Stack Overflow forum for Data Factory](https://stackoverflow.com/questions/tagged/azure-data-factory)
679680
* [Twitter information about Data Factory](https://twitter.com/hashtag/DataFactory)
680-

articles/remote-rendering/how-tos/authentication.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ author: florianborn71
55
ms.author: flborn
66
ms.date: 02/12/2019
77
ms.topic: how-to
8+
ms.custom: has-adal-ref
89
---
910

1011
# Configure authentication

articles/sql-database/active-directory-interactive-connect-azure-sql-db.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
2-
title: ActiveDirectoryInteractive connects to SQL
2+
title: ActiveDirectoryInteractive connects to SQL
33
description: "C# Code example, with explanations, for connecting to Azure SQL Database by using SqlAuthenticationMethod.ActiveDirectoryInteractive mode."
44
services: sql-database
55
ms.service: sql-database
66
ms.subservice: security
7-
ms.custom: active directory
7+
ms.custom: active directory, has-adal-ref
88
ms.devlang:
99
ms.topic: conceptual
1010
author: GithubMirek
@@ -75,7 +75,7 @@ To register and set necessary permissions for your application:
7575

7676
### Set an Azure AD admin for your SQL Database server
7777

78-
For your C# program to run, an Azure SQL server admin needs to assign an Azure AD admin for your SQL Database server.
78+
For your C# program to run, an Azure SQL server admin needs to assign an Azure AD admin for your SQL Database server.
7979

8080
On the **SQL Server** page, select **Active Directory admin** > **Set admin**.
8181

@@ -238,9 +238,9 @@ namespace ADInteractive5
238238
/// <summary>
239239
/// SqlAuthenticationProvider - Is a public class that defines 3 different Azure AD
240240
/// authentication methods. The methods are supported in the new .NET 4.7.2.
241-
/// .
241+
/// .
242242
/// 1. Interactive, 2. Integrated, 3. Password
243-
/// .
243+
/// .
244244
/// All 3 authentication methods are based on the Azure
245245
/// Active Directory Authentication Library (ADAL) managed library.
246246
/// </summary>

articles/sql-database/sql-database-aad-authentication-configure.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ description: Learn how to connect to SQL Database, managed instance, and Azure S
44
services: sql-database
55
ms.service: sql-database
66
ms.subservice: security
7-
ms.custom: azure-synapse
8-
ms.devlang:
7+
ms.custom: azure-synapse, has-adal-ref
8+
ms.devlang:
99
ms.topic: conceptual
1010
author: GithubMirek
1111
ms.author: mireks
@@ -19,7 +19,7 @@ This article shows you how to create and populate Azure AD, and then use Azure A
1919
> [!NOTE]
2020
> This article applies to Azure SQL server, and to both SQL Database and Azure Synapse. For simplicity, SQL Database is used when referring to both SQL Database and Azure Synapse.
2121
22-
> [!IMPORTANT]
22+
> [!IMPORTANT]
2323
> Connecting to SQL Server running on an Azure VM is not supported using an Azure Active Directory account. Use a domain Active Directory account instead.
2424
2525
## Azure AD authentication methods
@@ -184,7 +184,7 @@ As a best practice for existing Azure AD admins for MI created before GA, and st
184184
- If an Azure AD login exists in the master database for MI, created using the T-SQL command `CREATE LOGIN [myaadaccount] FROM EXTERNAL PROVIDER`,
185185
it can't be set up as an Azure AD admin for MI. You'll experience an error setting the login as an Azure AD admin using the Azure portal, PowerShell, or CLI commands to create the Azure AD login.
186186
- The login must be dropped in the master database using the command `DROP LOGIN [myaadaccount]`, before the account can be created as an Azure AD admin.
187-
- Set up the Azure AD admin account in the Azure portal after the `DROP LOGIN` succeeds.
187+
- Set up the Azure AD admin account in the Azure portal after the `DROP LOGIN` succeeds.
188188
- If you can't set up the Azure AD admin account, check in the master database of the managed instance for the login. Use the following command: `SELECT * FROM sys.server_principals`
189189
- Setting up an Azure AD admin for MI will automatically create a login in the master database for this account. Removing the Azure AD admin will automatically drop the login from the master database.
190190
@@ -271,11 +271,11 @@ The following two procedures show you how to provision an Azure Active Directory
271271

272272
4. In the **Active Directory admin** page, select **Set admin**.
273273

274-
![SQL servers set Active Directory admin](./media/sql-database-aad-authentication/sql-servers-set-active-directory-admin.png)
274+
![SQL servers set Active Directory admin](./media/sql-database-aad-authentication/sql-servers-set-active-directory-admin.png)
275275

276276
5. In the **Add admin** page, search for a user, select the user or group to be an administrator, and then select **Select**. (The Active Directory admin page shows all members and groups of your Active Directory. Users or groups that are grayed out cannot be selected because they are not supported as Azure AD administrators. (See the list of supported admins in the **Azure AD Features and Limitations** section of [Use Azure Active Directory Authentication for authentication with SQL Database or Azure Synapse](sql-database-aad-authentication.md).) Role-based access control (RBAC) applies only to the portal and is not propagated to SQL Server.
277277

278-
![Select Azure Active Directory admin](./media/sql-database-aad-authentication/select-azure-active-directory-admin.png)
278+
![Select Azure Active Directory admin](./media/sql-database-aad-authentication/select-azure-active-directory-admin.png)
279279

280280
6. At the top of the **Active Directory admin** page, select **SAVE**.
281281

@@ -437,7 +437,7 @@ A federated domain user account that is imported into a managed domain as an ext
437437
> [!NOTE]
438438
> Azure AD users are marked in the database metadata with type E (EXTERNAL_USER) and for groups with type X (EXTERNAL_GROUPS). For more information, see [sys.database_principals](https://msdn.microsoft.com/library/ms187328.aspx).
439439
440-
## Connect to the user database or Azure Synapse by using SSMS or SSDT
440+
## Connect to the user database or Azure Synapse by using SSMS or SSDT
441441

442442
To confirm the Azure AD administrator is properly set up, connect to the **master** database using the Azure AD administrator account.
443443
To provision an Azure AD-based contained database user (other than the server administrator that owns the database), connect to the database with an Azure AD identity that has access to the database.
@@ -447,7 +447,7 @@ To provision an Azure AD-based contained database user (other than the server ad
447447
448448
## Using an Azure AD identity to connect using SSMS or SSDT
449449

450-
The following procedures show you how to connect to a SQL database with an Azure AD identity using SQL Server Management Studio or SQL Server Database Tools.
450+
The following procedures show you how to connect to a SQL database with an Azure AD identity using SQL Server Management Studio or SQL Server Database Tools.
451451

452452
### Active Directory integrated authentication
453453

@@ -457,7 +457,7 @@ Use this method if you are logged into Windows using your Azure Active Directory
457457

458458
![Select AD Integrated Authentication][11]
459459

460-
2. Select the **Options** button, and on the **Connection Properties** page, in the **Connect to database** box, type the name of the user database you want to connect to. For more information, see the article [Multi-factor AAD auth](sql-database-ssms-mfa-authentication.md#azure-ad-domain-name-or-tenant-id-parameter) on the differences between the Connection Properties for SSMS 17.x and 18.x.
460+
2. Select the **Options** button, and on the **Connection Properties** page, in the **Connect to database** box, type the name of the user database you want to connect to. For more information, see the article [Multi-factor AAD auth](sql-database-ssms-mfa-authentication.md#azure-ad-domain-name-or-tenant-id-parameter) on the differences between the Connection Properties for SSMS 17.x and 18.x.
461461

462462
![Select the database name][13]
463463

@@ -547,7 +547,7 @@ The following statements, connect using version 13.1 of sqlcmd, which is availab
547547
> `sqlcmd` with the `-G` command does not work with system identities, and requires a user principal login.
548548
549549
```cmd
550-
sqlcmd -S Target_DB_or_DW.testsrv.database.windows.net -G
550+
sqlcmd -S Target_DB_or_DW.testsrv.database.windows.net -G
551551
sqlcmd -S Target_DB_or_DW.testsrv.database.windows.net -U [email protected] -P MyAADPassword -G -l 30
552552
```
553553

0 commit comments

Comments
 (0)