You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/machine-learning/apache-spark-environment-configuration.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ In this quickstart guide, you learn how to perform interactive data wrangling us
28
28
1. Navigate to the Azure Machine Learning studio UI
29
29
2. In the icon section at the top right of the screen, select **Manage preview features** (megaphone icon)
30
30
3. In the **Managed preview feature** panel, toggle the **Run notebooks and jobs on managed Spark** feature to **on**
31
-
:::image type="content" source="media/quickstart-spark-data-wrangling/how-to-enable-managed-spark-preview.png" lightbox="media/quickstart-spark-data-wrangling/how-to-enable-managed-spark-preview.png" alt-text="Screenshot showing the option to enable the Managed Spark preview.":::
31
+
:::image type="content" source="media/apache-spark-environment-configuration/how-to-enable-managed-spark-preview.png" lightbox="media/quickstart-spark-data-wrangling/how-to-enable-managed-spark-preview.png" alt-text="Screenshot showing the option to enable the Managed Spark preview.":::
32
32
33
33
## Store Azure storage account credentials as secrets in Azure Key Vault
34
34
@@ -38,12 +38,12 @@ To store Azure storage account credentials as secrets in the Azure Key Vault usi
38
38
1. Select **Secrets** from the left panel.
39
39
1. Select **+ Generate/Import**.
40
40
41
-
:::image type="content" source="media/interactive-data-wrangling-with-apache-spark-azure-ml/azure-key-vault-secrets-generate-import.png" alt-text="Screenshot showing the Azure Key Vault Secrets Generate Or Import tab.":::
41
+
:::image type="content" source="media/apache-spark-environment-configuration/azure-key-vault-secrets-generate-import.png" alt-text="Screenshot showing the Azure Key Vault Secrets Generate Or Import tab.":::
42
42
43
43
1. At the **Create a secret** screen, enter a **Name** for the secret you want to create.
44
44
1. Navigate to Azure Blob Storage Account, in the Azure portal, as seen in this image:
45
45
46
-
:::image type="content" source="media/interactive-data-wrangling-with-apache-spark-azure-ml/storage-account-access-keys.png" alt-text="Screenshot showing the Azure access key and connection string values screen.":::
46
+
:::image type="content" source="media/apache-spark-environment-configuration/storage-account-access-keys.png" alt-text="Screenshot showing the Azure access key and connection string values screen.":::
47
47
1. Select **Access keys** from the Azure Blob Storage Account page left panel.
48
48
1. Select **Show** next to **Key 1**, and then **Copy to clipboard** to get the storage account access key.
49
49
> [!Note]
@@ -59,7 +59,7 @@ To store Azure storage account credentials as secrets in the Azure Key Vault usi
59
59
1. In the **Secret value** textbox, enter the access key credential for the Azure storage account, which was copied to the clipboard in the earlier step.
60
60
1. Select **Create**.
61
61
62
-
:::image type="content" source="media/interactive-data-wrangling-with-apache-spark-azure-ml/create-a-secret.png" alt-text="Screenshot showing the Azure secret creation screen.":::
62
+
:::image type="content" source="media/apache-spark-environment-configuration/create-a-secret.png" alt-text="Screenshot showing the Azure secret creation screen.":::
63
63
64
64
> [!TIP]
65
65
> [Azure CLI](../key-vault/secrets/quick-create-cli.md) and [Azure Key Vault secret client library for Python](../key-vault/secrets/quick-create-python.md#sign-in-to-azure) can also create Azure Key Vault secrets.
@@ -76,21 +76,21 @@ assign **Reader** and **Storage Blob Data Reader** roles to the user identity of
76
76
1. Open the [Microsoft Azure portal](https://portal.azure.com).
77
77
1. Search and select the **Storage accounts** service.
78
78
79
-
:::image type="content" source="media/quickstart-spark-data-wrangling/find-storage-accounts-service.png" lightbox="media/quickstart-spark-data-wrangling/find-storage-accounts-service.png" alt-text="Expandable screenshot showing Storage accounts service search and selection, in Microsoft Azure portal.":::
79
+
:::image type="content" source="media/apache-spark-environment-configuration/find-storage-accounts-service.png" lightbox="media/quickstart-spark-data-wrangling/find-storage-accounts-service.png" alt-text="Expandable screenshot showing Storage accounts service search and selection, in Microsoft Azure portal.":::
80
80
81
81
1. On the **Storage accounts** page, select the Azure Data Lake Storage (ADLS) Gen 2 storage account from the list. A page showing the storage account **Overview** will open.
82
82
83
-
:::image type="content" source="media/quickstart-spark-data-wrangling/storage-accounts-list.png" lightbox="media/quickstart-spark-data-wrangling/storage-accounts-list.png" alt-text="Expandable screenshot showing selection of the Azure Data Lake Storage (ADLS) Gen 2 storage account Storage account.":::
83
+
:::image type="content" source="media/apache-spark-environment-configuration/storage-accounts-list.png" lightbox="media/quickstart-spark-data-wrangling/storage-accounts-list.png" alt-text="Expandable screenshot showing selection of the Azure Data Lake Storage (ADLS) Gen 2 storage account Storage account.":::
84
84
85
85
1. Select **Access Control (IAM)** from the left panel
1. Find and select role **Storage Blob Data Contributor**
91
91
1. Select **Next**
92
92
93
-
:::image type="content" source="media/quickstart-spark-data-wrangling/add-role-assignment-choose-role.png" lightbox="media/quickstart-spark-data-wrangling/add-role-assignment-choose-role.png" alt-text="Screenshot showing the Azure add role assignment screen.":::
93
+
:::image type="content" source="media/apache-spark-environment-configuration/add-role-assignment-choose-role.png" lightbox="media/quickstart-spark-data-wrangling/add-role-assignment-choose-role.png" alt-text="Screenshot showing the Azure add role assignment screen.":::
94
94
95
95
1. Select **User, group, or service principal**.
96
96
1. Select **+ Select members**.
@@ -99,11 +99,11 @@ assign **Reader** and **Storage Blob Data Reader** roles to the user identity of
99
99
1. Select the appropriate user identity
100
100
1. Select **Next**
101
101
102
-
:::image type="content" source="media/quickstart-spark-data-wrangling/add-role-assignment-choose-members.png" lightbox="media/quickstart-spark-data-wrangling/add-role-assignment-choose-members.png" alt-text="Screenshot showing the Azure add role assignment screen Members tab.":::
102
+
:::image type="content" source="media/apache-spark-environment-configuration/add-role-assignment-choose-members.png" lightbox="media/quickstart-spark-data-wrangling/add-role-assignment-choose-members.png" alt-text="Screenshot showing the Azure add role assignment screen Members tab.":::
103
103
104
104
1. Select **Review + Assign**
105
105
106
-
:::image type="content" source="media/quickstart-spark-data-wrangling/add-role-assignment-review-and-assign.png" lightbox="media/quickstart-spark-data-wrangling/add-role-assignment-review-and-assign.png" alt-text="Screenshot showing the Azure add role assignment screen review and assign tab.":::
106
+
:::image type="content" source="media/apache-spark-environment-configuration/add-role-assignment-review-and-assign.png" lightbox="media/quickstart-spark-data-wrangling/add-role-assignment-review-and-assign.png" alt-text="Screenshot showing the Azure add role assignment screen review and assign tab.":::
107
107
1. Repeat steps 2-13 for **Contributor** role assignment.
108
108
109
109
Once the user identity has the appropriate roles assigned, data in the Azure storage account should become accessible.
Copy file name to clipboardExpand all lines: articles/machine-learning/interactive-data-wrangling-with-apache-spark-azure-ml.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -135,7 +135,7 @@ To start interactive data wrangling with the user identity passthrough:
135
135
To wrangle data by access through a service principal:
136
136
137
137
1. Verify that the service principal has **Contributor**and**Storage Blob Data Contributor** [role assignments](./apache-spark-environment-configuration.md#add-role-assignments-in-azure-storage-accounts) in the Azure Data Lake Storage (ADLS) Gen 2 storage account.
138
-
1. [Create Azure Key Vault secrets](#store-azure-storage-account-credentials-as-secrets-in-azure-key-vault) for the service principal tenant ID, client ID and client secret values.
138
+
1. [Create Azure Key Vault secrets](./apache-spark-environment-configuration.md#store-azure-storage-account-credentials-as-secrets-in-azure-key-vault) for the service principal tenant ID, client ID and client secret values.
139
139
1. Select Managed (Automatic) Spark compute **Azure Machine Learning Spark Compute** under **Azure Machine Learning Spark**from the **Compute** selection menu, or select an attached Synapse Spark pool under **Synapse Spark pool (Preview)**from the **Compute** selection menu
140
140
1. To set the service principal tenant ID, client IDand client secret in the configuration, execute the following code sample.
141
141
- The `get_secret()` call in the code depends on name of the Azure Key Vault, and the names of the Azure Key Vault secrets created for the service principal tenant ID, client IDand client secret. The corresponding property name/values to setin the configuration are as follows:
@@ -181,7 +181,7 @@ To wrangle data by access through a service principal:
181
181
182
182
### Import and wrangle data from Azure Blob storage
183
183
184
-
You can access Azure Blob storage data with either the storage account access key or a shared access signature (SAS) token. You should [store these credentials in the Azure Key Vault as a secret](#store-azure-storage-account-credentials-as-secrets-in-azure-key-vault), and set them as properties in the session configuration.
184
+
You can access Azure Blob storage data with either the storage account access key or a shared access signature (SAS) token. You should [store these credentials in the Azure Key Vault as a secret](./apache-spark-environment-configuration.md#store-azure-storage-account-credentials-as-secrets-in-azure-key-vault), and set them as properties in the session configuration.
185
185
186
186
To start interactive data wrangling:
187
187
1. At the Azure Machine Learning studio left panel, select **Notebooks**.
0 commit comments