Skip to content

Commit e123d09

Browse files
authored
Merge pull request #293426 from whhender/january-freshness-2025
January freshness 2025 - part 3
2 parents 074ba64 + fd4f752 commit e123d09

8 files changed

+99
-117
lines changed
Loading

articles/synapse-analytics/security/synapse-workspace-ip-firewall.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: ashinMSFT
55
ms.service: azure-synapse-analytics
66
ms.topic: overview
77
ms.subservice: security
8-
ms.date: 09/16/2022
8+
ms.date: 01/22/2025
99
ms.author: danzhang
1010
ms.reviewer: wiassaf
1111
---
@@ -23,14 +23,14 @@ IP firewall rules grant or deny access to your Azure Synapse workspace based on
2323
There are two ways IP firewall rules are added to an Azure Synapse workspace. To add an IP firewall to your workspace, select **Networking** and check **Allow connections from all IP addresses** during workspace creation.
2424

2525
> [!Important]
26-
> This feature is only available to Azure Synapse workspaces not associated with a Managed VNet.
26+
> This feature is only available to Azure Synapse workspaces not associated with a Managed Virtual Network.
2727
2828
:::image type="content" source="./media/synpase-workspace-ip-firewall/azure-synapse-workspace-networking-connections-all-ip-addresses.png" lightbox="./media/synpase-workspace-ip-firewall/azure-synapse-workspace-networking-connections-all-ip-addresses.png" alt-text="Screenshot that highlights the Security tab, and the 'Allow connections from all IP addresses' checkbox.":::
2929

3030
You can also add IP firewall rules to a Synapse workspace after the workspace is created. Select **Firewalls** under **Security** from Azure portal. To add a new IP firewall rule, give it a name, Start IP, and End IP. Select **Save** when done.
3131

3232
> [!NOTE]
33-
> The Public network access feature is only available to Azure Synapse workspaces associated with Azure Synapse Analytics Managed Virtual Network. However, you can still open your Azure Synapse workspaces to the public network regardless of its association with managed VNet. For more information, see [Public network access](connectivity-settings.md#public-network-access).
33+
> The Public network access feature is only available to Azure Synapse workspaces associated with Azure Synapse Analytics Managed Virtual Network. However, you can still open your Azure Synapse workspaces to the public network regardless of its association with managed virtual network. For more information, see [Public network access](connectivity-settings.md#public-network-access).
3434
3535
:::image type="content" source="./media/synpase-workspace-ip-firewall/azure-synapse-workspace-networking-firewalls-add-client-ip.png" lightbox="./media/synpase-workspace-ip-firewall/azure-synapse-workspace-networking-firewalls-add-client-ip.png" alt-text="Screenshot of the Networking page of a Synapse Workspace, highlighting the Add client IP button and rules fields.":::
3636

@@ -55,7 +55,7 @@ For more information on the methods to manage the firewall programmatically, see
5555
- [PowerShell](/powershell/module/az.synapse/new-azsynapsefirewallrule)
5656
- [Azure CLI](/cli/azure/sql/server/firewall-rule)
5757

58-
## Next steps
58+
## Related content
5959

6060
- Create an [Azure Synapse Workspace](../quickstart-create-workspace.md)
6161
- Create an Azure Synapse workspace with a [Managed workspace Virtual Network](./synapse-workspace-managed-vnet.md)

articles/synapse-analytics/security/synapse-workspace-managed-vnet.md

Lines changed: 13 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: ashinMSFT
55
ms.service: azure-synapse-analytics
66
ms.topic: overview
77
ms.subservice: security
8-
ms.date: 08/16/2021
8+
ms.date: 01/22/2025
99
ms.author: seshin
1010
ms.reviewer: wiassaf
1111
---
@@ -18,25 +18,25 @@ This article will explain Managed Virtual Network in Azure Synapse Analytics.
1818

1919
When you create your Azure Synapse workspace, you can choose to associate it to a Microsoft Azure Virtual Network. The Virtual Network associated with your workspace is managed by Azure Synapse. This Virtual Network is called a *Managed workspace Virtual Network*.
2020

21-
Managed workspace Virtual Network provides you value in four ways:
21+
Managed workspace Virtual Network provides you with value in four ways:
2222

2323
- With a Managed workspace Virtual Network you can offload the burden of managing the Virtual Network to Azure Synapse.
2424
- You don't have to configure inbound NSG rules on your own Virtual Networks to allow Azure Synapse management traffic to enter your Virtual Network. Misconfiguration of these NSG rules causes service disruption for customers.
2525
- You don't need to create a subnet for your Spark clusters based on peak load.
2626
- Managed workspace Virtual Network along with Managed private endpoints protects against data exfiltration. You can only create Managed private endpoints in a workspace that has a Managed workspace Virtual Network associated with it.
2727

28-
Creating a workspace with a Managed workspace Virtual Network associated with it ensures that your workspace is network isolated from other workspaces. Azure Synapse provides various analytic capabilities in a workspace: Data integration,serverless Apache Spark pool, dedicated SQL pool, and serverless SQL pool.
28+
Creating a workspace with a Managed workspace Virtual Network associated with it ensures that your workspace is network isolated from other workspaces. Azure Synapse provides various analytic capabilities in a workspace: Data integration, serverless Apache Spark pool, dedicated SQL pool, and serverless SQL pool.
2929

3030
If your workspace has a Managed workspace Virtual Network, Data integration and Spark resources are deployed in it. A Managed workspace Virtual Network also provides user-level isolation for Spark activities because each Spark cluster is in its own subnet.
3131

32-
Dedicated SQL pool and serverless SQL pool are multi-tenant capabilities and therefore reside outside of the Managed workspace Virtual Network. Intra-workspace communication to dedicated SQL pool and serverless SQL pool use Azure private links. These private links are automatically created for you when you create a workspace with a Managed workspace Virtual Network associated to it.
32+
Dedicated SQL pool and serverless SQL pool are multitenant capabilities and therefore reside outside of the Managed workspace Virtual Network. Intra-workspace communication to dedicated SQL pool and serverless SQL pool use Azure private links. These private links are automatically created for you when you create a workspace with a Managed workspace Virtual Network associated to it.
3333

3434
>[!IMPORTANT]
35-
>You cannot change this workspace configuration after the workspace is created. For example, you cannot reconfigure a workspace that does not have a Managed workspace Virtual Network associated with it and associate a Virtual Network to it. Similarly, you cannot reconfigure a workspace with a Managed workspace Virtual Network associated to it and disassociate the Virtual Network from it.
35+
>You can't change this workspace configuration after the workspace is created. For example, you can't reconfigure a workspace that doesn't have a Managed workspace Virtual Network associated with it and associate a Virtual Network to it. Similarly, you can't reconfigure a workspace with a Managed workspace Virtual Network associated to it and disassociate the Virtual Network from it.
3636
3737
## Create an Azure Synapse workspace with a Managed workspace Virtual Network
3838

39-
If you have not already done so, register the Network resource provider. Registering a resource provider configures your subscription to work with the resource provider. Choose *Microsoft.Network* from the list of resource providers when you [register](../../azure-resource-manager/management/resource-providers-and-types.md).
39+
If you haven't already done so, register the Network resource provider. Registering a resource provider configures your subscription to work with the resource provider. Choose *Microsoft.Network* from the list of resource providers when you [register](../../azure-resource-manager/management/resource-providers-and-types.md#azure-portal).
4040

4141
To create an Azure Synapse workspace that has a Managed workspace Virtual Network associated with it, select the **Networking** tab in Azure portal and check the **Enable managed virtual network** checkbox.
4242

@@ -47,26 +47,22 @@ If you leave the checkbox unchecked, then your workspace won't have a Virtual Ne
4747
4848
:::image type="content" source="./media/synpase-workspace-ip-firewall/azure-synapse-analytics-networking-managed-virtual-network-outbound-traffic.png" lightbox="./media/synpase-workspace-ip-firewall/azure-synapse-analytics-networking-managed-virtual-network-outbound-traffic.png" alt-text="Screenshot of the Create Synapse workspace networking page, with the Managed virtual network option Enabled and the Allow outbound data traffic only to approved targets option to Yes.":::
4949

50-
After you choose to associate a Managed workspace Virtual Network with your workspace, you can protect against data exfiltration by allowing outbound connectivity from the Managed workspace Virtual Network only to approved targets using [Managed private endpoints](./synapse-workspace-managed-private-endpoints.md). Select **Yes** to limit outbound traffic from the Managed workspace Virtual Network to targets through Managed private endpoints.
51-
52-
50+
After you choose to associate a Managed workspace Virtual Network with your workspace, you can protect against data exfiltration by allowing outbound connectivity from the Managed workspace Virtual Network only to approved targets using [Managed private endpoints](./synapse-workspace-managed-private-endpoints.md). Select **Yes** to limit outbound traffic from the Managed workspace Virtual Network to targets through Managed private endpoints.
5351

5452
:::image type="content" source="./media/synpase-workspace-ip-firewall/azure-synapse-workspace-managed-virtual-network-allow-outbound-traffic.png" lightbox="./media/synpase-workspace-ip-firewall/azure-synapse-workspace-managed-virtual-network-allow-outbound-traffic.png" alt-text="Screenshot of the Managed virtual network page, with the Allow outbound data traffic only to approved targets option to Yes.":::
5553

5654
Select **No** to allow outbound traffic from the workspace to any target.
5755

58-
You can also control the targets to which Managed private endpoints are created from your Azure Synapse workspace. By default, Managed private endpoints to resources in the same AAD tenant that your subscription belongs to are allowed. If you want to create a Managed private endpoint to a resource in an AAD tenant that is different from the one that your subscription belongs to, then you can add that AAD tenant by selecting **+ Add**. You can either select the AAD tenant from the dropdown or manually enter the AAD tenant ID.
56+
You can also control the targets to which Managed private endpoints are created from your Azure Synapse workspace. By default, Managed private endpoints to resources in the same Microsoft Entra ID tenant that your subscription belongs to are allowed. If you want to create a Managed private endpoint to a resource in a Microsoft Entra ID tenant that is different from the one that your subscription belongs to, then you can add that Microsoft Entra ID tenant by selecting **+ Add**. You can either select the Microsoft Entra ID tenant from the dropdown or manually enter the Microsoft Entra ID tenant ID.
5957

60-
:::image type="content" source="./media/synpase-workspace-ip-firewall/azure-synapse-workspace-managed-virtual-network-private-endpoints-azure-ad.png" lightbox="./media/synpase-workspace-ip-firewall/azure-synapse-workspace-managed-virtual-network-private-endpoints-azure-ad.png" alt-text="Screenshot of the Managed virtual network page, with the Add button for Azure Tenant Tenants highlighted.":::
58+
:::image type="content" source="./media/synpase-workspace-ip-firewall/azure-synapse-workspace-managed-virtual-network-private-endpoints-azure-ad.png" lightbox="./media/synpase-workspace-ip-firewall/azure-synapse-workspace-managed-virtual-network-private-endpoints-azure-ad.png" alt-text="Screenshot of the Managed virtual network page, with the Add button for Azure Tenants highlighted.":::
6159

6260
After the workspace is created, you can check whether your Azure Synapse workspace is associated to a Managed workspace Virtual Network by selecting **Overview** from Azure portal.
6361

6462
:::image type="content" source="./media/synpase-workspace-ip-firewall/azure-synapse-analytics-overview-managed-virtual-network-enabled.png" lightbox="./media/synpase-workspace-ip-firewall/azure-synapse-analytics-overview-managed-virtual-network-enabled.png" alt-text="Screenshot of the Azure Synapse workspace overview page indicating that a managed virtual network is enabled.":::
6563

66-
## Next steps
67-
68-
Create an [Azure Synapse Workspace](../quickstart-create-workspace.md)
69-
70-
Learn more about [Managed private endpoints](./synapse-workspace-managed-private-endpoints.md)
64+
## Related content
7165

72-
[Create Managed private endpoints to your data sources](./how-to-create-managed-private-endpoints.md)
66+
- Create an [Azure Synapse Workspace](../quickstart-create-workspace.md)
67+
- Learn more about [Managed private endpoints](./synapse-workspace-managed-private-endpoints.md)
68+
- [Create Managed private endpoints to your data sources](./how-to-create-managed-private-endpoints.md)

articles/synapse-analytics/spark/synapse-spark-sql-pool-import-export.md

Lines changed: 7 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: kalyankadiyala-Microsoft
55
ms.service: azure-synapse-analytics
66
ms.topic: overview
77
ms.subservice: spark
8-
ms.date: 05/10/2022
8+
ms.date: 01/22/2025
99
ms.author: kakadiya
1010
ms.reviewer: ktuckerdavis, aniket.adnaik
1111
---
@@ -46,9 +46,9 @@ At a high-level, the connector provides the following capabilities:
4646

4747
![A high-level data flow diagram to describe the connector's orchestration of a write request.](./media/synapse-spark-sql-pool-import-export/synapse-dedicated-sql-pool-spark-connector-write-orchestration.png)
4848

49-
## Pre-requisites
49+
## Prerequisites
5050

51-
Pre-requisites such as setting up required Azure resources and steps to configure them are discussed in this section.
51+
Prerequisites such as setting up required Azure resources and steps to configure them are discussed in this section.
5252

5353
### Azure resources
5454

@@ -94,7 +94,7 @@ A basic authentication approach requires user to configure `username` and `passw
9494
There are two ways to grant access permissions to Azure Data Lake Storage Gen2 - Storage Account:
9595

9696
* Role based Access Control role - [Storage Blob Data Contributor role](../../role-based-access-control/built-in-roles.md#storage-blob-data-contributor)
97-
* Assigning the `Storage Blob Data Contributor Role` grants the User permissions to read, write and delete from the Azure Storage Blob Containers.
97+
* Assigning the `Storage Blob Data Contributor Role` grants the User permissions to read, write, and delete from the Azure Storage Blob Containers.
9898
* RBAC offers a coarse control approach at the container level.
9999
* [Access Control Lists (ACL)](../../storage/blobs/data-lake-storage-access-control.md)
100100
* ACL approach allows for fine-grained controls over specific paths and/or files under a given folder.
@@ -152,7 +152,7 @@ To successfully bootstrap and orchestrate the read or write operation, the Conne
152152
Following is the list of configuration options based on usage scenario:
153153

154154
* **Read using Microsoft Entra ID based authentication**
155-
* Credentials are auto-mapped, and user isn't required to provide specific configuration options.
155+
* Credentials are automapped, and user isn't required to provide specific configuration options.
156156
* Three-part table name argument on `synapsesql` method is required to read from respective table in Azure Synapse Dedicated SQL Pool.
157157
* **Read using basic authentication**
158158
* Azure Synapse Dedicated SQL End Point
@@ -281,7 +281,7 @@ dfToReadFromTable.show()
281281
> * Table name and query cannot be specified at the same time.
282282
> * Only select queries are allowed. DDL and DML SQLs are not allowed.
283283
> * The select and filter options on dataframe are not pushed down to the SQL dedicated pool when a query is specified.
284-
> * Read from a query is only available in Spark 3.1 and 3.2.
284+
> * Read from a query is only available in Spark 3.
285285
286286
##### [Scala](#tab/scala2)
287287

@@ -569,18 +569,6 @@ dfToReadFromQueryAsArgument.show()
569569

570570
#### Write Request - `synapsesql` method signature
571571

572-
The method signature for the Connector version built for [Spark 2.4.8](./apache-spark-24-runtime.md) has one less argument, than that applied to the Spark 3.1.2 version. Following are the two method signatures:
573-
574-
* Spark Pool Version 2.4.8
575-
576-
```Scala
577-
synapsesql(tableName:String,
578-
tableType:String = Constants.INTERNAL,
579-
location:Option[String] = None):Unit
580-
```
581-
582-
* Spark Pool Version 3.1.2
583-
584572
##### [Scala](#tab/scala3)
585573

586574
```Scala
@@ -974,7 +962,7 @@ By default, a write response is printed to the cell output. On failure, the curr
974962
* When writing large data sets, it's important to factor in the impact of [DWU Performance Level](../../synapse-analytics/sql-data-warehouse/quickstart-scale-compute-portal.md) setting that limits [transaction size](../../synapse-analytics/sql-data-warehouse/sql-data-warehouse-develop-transactions.md#transaction-size).
975963
* Monitor [Azure Data Lake Storage Gen2](../../storage/blobs/data-lake-storage-best-practices.md) utilization trends to spot throttling behaviors that can [impact](../../storage/common/scalability-targets-standard-account.md) read and write performance.
976964

977-
## References
965+
## Related content
978966

979967
* [Runtime library versions](../../synapse-analytics/spark/apache-spark-3-runtime.md)
980968
* [Azure Storage](../../storage/blobs/data-lake-storage-introduction.md)

0 commit comments

Comments
 (0)