You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/data-factory/azure-ssis-integration-runtime-express-virtual-network-injection.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -60,7 +60,7 @@ For detailed instructions, see the [Grant virtual network permissions](azure-ssi
60
60
61
61
## <aname="ip"></a>Configure a static public IP address
62
62
63
-
If you want to use a static public IP address for the outbound traffic of your Azure-SSIS IR, so you can allow it on your firewalls, you must configure [virtual network network address translation (NAT)](../virtual-network/nat-overview.md) to set it up.
63
+
If you want to use a static public IP address for the outbound traffic of your Azure-SSIS IR, so you can allow it on your firewalls, you must configure [virtual network network address translation (NAT)](../virtual-network/nat-gateway/nat-overview.md) to set it up.
Copy file name to clipboardExpand all lines: articles/data-factory/azure-ssis-integration-runtime-standard-virtual-network-injection.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -68,7 +68,7 @@ If you want to bring your own static public IP addresses for the outbound traffi
68
68
69
69
- Exactly two unused ones that are not already associated with other Azure resources should be provided. The extra one will be used when we periodically upgrade your Azure-SSIS IR. Note that one public IP address can't be shared among your active Azure-SSIS IRs.
70
70
71
-
- They should both be static ones of standard type. Refer to the [SKUs of public IP address](../virtual-network/public-ip-addresses.md#sku) section for more details.
71
+
- They should both be static ones of standard type. Refer to the [SKUs of public IP address](../virtual-network/ip-services/public-ip-addresses.md#sku) section for more details.
72
72
73
73
- They should both have a DNS name. If you haven't provided a DNS name when creating them, you can do so on Azure portal.
74
74
@@ -186,7 +186,7 @@ Following our guidance in the [Configure an NSG](#nsg) section above, you must i
186
186
187
187
- If you need to access Azure Files, you must open port *445* for outbound TCP traffic with *0.0.0.0/0* or your Azure Files FQDN as destination.
188
188
189
-
- If you configure a virtual network service endpoint for Azure Storage/Container Registry/Event Hubs/SQL by enabling *Microsoft.Storage*/*Microsoft.ContainerRegistry*/*Microsoft.EventHub*/*Microsoft.Sql* resources, repectively, in your subnet, all traffic between your Azure-SSIS IR and these services in the same/paired regions will be routed to Azure backbone network instead of your firewall appliance/service.
189
+
- If you configure a virtual network service endpoint for Azure Storage/Container Registry/Event Hubs/SQL by enabling *Microsoft.Storage*/*Microsoft.ContainerRegistry*/*Microsoft.EventHub*/*Microsoft.Sql* resources, respectively, in your subnet, all traffic between your Azure-SSIS IR and these services in the same/paired regions will be routed to Azure backbone network instead of your firewall appliance/service.
190
190
191
191
- You should open port *80* for outbound TCP traffic with the following certificate revocation list (CRL) download sites as destination:
192
192
@@ -216,9 +216,9 @@ If you need not audit/inspect the outbound traffic from your Azure-SSIS IR, you
216
216
217
217
To enable standard virtual network injection, your Azure-SSIS IR needs to create certain network resources in the same resource group as the virtual network. These resources include:
218
218
219
-
- An Azure load balancer, with the name *<Guid>-azurebatch-cloudserviceloadbalancer*.
220
-
- An Azure public IP address, with the name *<Guid>-azurebatch-cloudservicepublicip*.
221
-
- An NSG, with the name *<Guid>-azurebatch-cloudservicenetworksecuritygroup*.
219
+
- An Azure load balancer, with the name _\<Guid\>-azurebatch-cloudserviceloadbalancer_.
220
+
- An Azure public IP address, with the name _\<Guid\>-azurebatch-cloudservicepublicip_.
221
+
- An NSG, with the name _\<Guid\>-azurebatch-cloudservicenetworksecuritygroup_.
222
222
223
223
> [!NOTE]
224
224
> You can now bring your own static public IP addresses for Azure-SSIS IR. In this scenario, we'll create the Azure load balancer and NSG in the same resource group as your static public IP addresses instead of the virtual network.
|**Azure-SSIS IR starting duration**| Around 30 minutes. | Around 5 minutes. |
24
24
|**Azure subscription & resource group settings**|*Microsoft.Batch* must be registered as a resource provider in the virtual network subscription.<br/><br/>Creation of a public IP address, load balancer, and network security group (NSG) must be allowed in the virtual network resource group. |*Microsoft.Batch* must be registered as a resource provider in the virtual network subscription. |
25
25
|**Virtual network subnet**| Subnet mustn’t be dedicated to other Azure services. | Subnet mustn’t be dedicated to other Azure services.<br/><br/>Subnet must be delegated to *Microsoft.Batch/batchAccounts*. |
Copy file name to clipboardExpand all lines: articles/data-factory/how-to-use-sql-managed-instance-with-ir.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
---
2
2
title: Use Azure SQL Managed Instance with Azure-SQL Server Integration Services (SSIS) in Azure Data Factory
3
3
description: Learn how to use Azure SQL Managed Instance with SQL Server Integration Services (SSIS) in Azure Data Factory.
4
-
author: chugugrace
5
-
ms.author: chugu
4
+
author: swinarko
5
+
ms.author: sawinark
6
6
ms.service: data-factory
7
7
ms.subservice: tutorials
8
8
ms.topic: conceptual
9
-
ms.date: 4/15/2020
9
+
ms.date: 10/27/2021
10
10
---
11
11
# Use Azure SQL Managed Instance with SQL Server Integration Services (SSIS) in Azure Data Factory
12
12
@@ -60,7 +60,7 @@ You can now move your SQL Server Integration Services (SSIS) projects, packages,
60
60
61
61
| Transport protocol | Source | Source port range | Destination |Destination port range |
62
62
|---|---|---|---|---|
63
-
|TCP|Static IP address of Azure-SSIS IR <br> For details, see [Bring Your Own Public IP for Azure-SSIS IR](azure-ssis-integration-runtime-virtual-network-configuration.md#publicIP).|*|VirtualNetwork|3342|
63
+
|TCP|Static IP address of Azure-SSIS IR <br> For details, see [Bring Your Own Public IP for Azure-SSIS IR](azure-ssis-integration-runtime-standard-virtual-network-injection.md#ip).|*|VirtualNetwork|3342|
64
64
65
65
1.**Outbound requirement of Azure-SSIS IR**, to allow outbound traffic to SQL Managed Instance.
66
66
@@ -105,7 +105,7 @@ You can now move your SQL Server Integration Services (SSIS) projects, packages,
105
105
|---|---|---|---|---|---|
106
106
| TCP | VirtualNetwork | * | VirtualNetwork | 1433, 11000-11999 |Allow outbound traffic to SQL Managed Instance. If connection policy is set to **Proxy** instead of **Redirect**, only port 1433 is needed. |
107
107
| TCP | VirtualNetwork | * | AzureCloud | 443 | The nodes of your Azure-SSIS IR in the virtual network use this port to access Azure services, such as Azure Storage and Azure Event Hubs. |
108
-
| TCP | VirtualNetwork | * | Internet | 80 | (Optional) The nodes of your Azure-SSIS IR in the virtual network use this port to download a certificate revocation list from the internet. If you block this traffic, you might experience performance downgrade when start IR and lose capability to check certificate revocation list for certificate usage. If you want to further narrow down destination to certain FQDNs, refer to [Use Azure ExpressRoute or User Defined Route(UDR)](./azure-ssis-integration-runtime-virtual-network-configuration.md#route).|
108
+
| TCP | VirtualNetwork | * | Internet | 80 | (Optional) The nodes of your Azure-SSIS IR in the virtual network use this port to download a certificate revocation list from the internet. If you block this traffic, you might experience performance downgrade when start IR and lose capability to check certificate revocation list for certificate usage. If you want to further narrow down destination to certain FQDNs, refer to [Configure User Defined Routes (UDRs)](azure-ssis-integration-runtime-standard-virtual-network-injection.md#udr).|
109
109
| TCP | VirtualNetwork | * | Storage | 445 | (Optional) This rule is only required when you want to execute SSIS package stored in Azure Files. |
Copy file name to clipboardExpand all lines: articles/data-factory/monitor-integration-runtime.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to monitor different types of integration runtime in Azur
4
4
ms.service: data-factory
5
5
ms.subservice: monitoring
6
6
ms.topic: conceptual
7
-
ms.date: 08/11/2020
7
+
ms.date: 10/27/2021
8
8
author: minhe-msft
9
9
ms.author: hemin
10
10
ms.custom: devx-track-azurepowershell
@@ -265,7 +265,7 @@ On the **DIAGNOSE CONNECTIVITY** tile of your Azure-SSIS IR monitoring page, you
265
265
266
266
#### STATIC PUBLIC IP ADDRESSES tile
267
267
268
-
If you bring your own static public IP addresses for Azure-SSIS IR, you'll see the **STATIC PUBLIC IP ADDRESSES** tile on your Azure-SSIS IR monitoring page (see [Bringing your own static public IP addresses for Azure-SSIS IR](azure-ssis-integration-runtime-virtual-network-configuration.md#publicIP)). On this tile, you can select links designating your first/second static public IP addresses for Azure-SSIS IR to pop up a window, where you can copy their resource ID (`/subscriptions/YourAzureSubscripton/resourceGroups/YourResourceGroup/providers/Microsoft.Network/publicIPAddresses/YourPublicIPAddress`) from a text box. On the pop-up window, you can also select the **See your first/second static public IP address settings** link to manage your first/second static public IP address in Azure portal.
268
+
If you bring your own static public IP addresses for Azure-SSIS IR, you'll see the **STATIC PUBLIC IP ADDRESSES** tile on your Azure-SSIS IR monitoring page (see [Bringing your own static public IP addresses for Azure-SSIS IR](azure-ssis-integration-runtime-standard-virtual-network-injection.md#ip)). On this tile, you can select links designating your first/second static public IP addresses for Azure-SSIS IR to pop up a window, where you can copy their resource ID (`/subscriptions/YourAzureSubscripton/resourceGroups/YourResourceGroup/providers/Microsoft.Network/publicIPAddresses/YourPublicIPAddress`) from a text box. On the pop-up window, you can also select the **See your first/second static public IP address settings** link to manage your first/second static public IP address in Azure portal.
269
269
270
270
:::image type="content" source="media/monitor-integration-runtime/monitor-azure-ssis-integration-runtime-static.png" alt-text="Monitor your Azure-SSIS IR - STATIC tile":::
0 commit comments