Skip to content

Commit eb60031

Browse files
authored
Merge pull request #94952 from sgsshankar/sgsshankar-msft-snowflake-patch-2
Updated Data Strategies to reflect Snowflake
2 parents 099a1f2 + b5987cc commit eb60031

File tree

2 files changed

+6
-4
lines changed

2 files changed

+6
-4
lines changed

articles/data-factory/connector-snowflake.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ If your data store is located inside an on-premises network, an Azure virtual ne
4242

4343
If your data store is a managed cloud data service, you can use the Azure Integration Runtime. If the access is restricted to IPs that are approved in the firewall rules, you can add [Azure Integration Runtime IPs](azure-integration-runtime-ip-addresses.md) to the allowed list.
4444

45-
The Snowflake account that is used for Source or Sink should have the necessary `USAGE` access on the Database and Read / Write access on Schema and the Tables/Views under it. In addition, it should also have `CREATE STAGE` on the schema to be able to create the External stage with SAS URI.
45+
The Snowflake account that is used for Source or Sink should have the necessary `USAGE` access on the database and read/write access on schema and the tables/views under it.. In addition, it should also have `CREATE STAGE` on the schema to be able to create the External stage with SAS URI.
4646

4747
The following Account properties values must be set
4848

articles/data-factory/data-access-strategies.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ This should work in many scenarios, and we do understand that a unique Static IP
4141
For more information about supported network security mechanisms on data stores in Azure Integration Runtime and Self-hosted Integration Runtime, see below two tables.
4242
* **Azure Integration Runtime**
4343

44-
| Data Stores | Supported Network Security Mechanism on Data Stores | Private Link | Trusted Service | Static IP range | Service Tags | Allow Azure Services |
44+
| Data Stores | Supported Network Security Mechanism on Data Stores | Private Link | Trusted Service | Static IP range | Service Tags | Allow Azure Services |
4545
|------------------------------|-------------------------------------------------------------|---------------------|-----------------|--------------|----------------------|-----------------|
4646
| Azure PaaS Data stores | Azure Cosmos DB | Yes | - | Yes | - | Yes |
4747
| | Azure Data Explorer | - | - | Yes* | Yes* | - |
@@ -52,9 +52,11 @@ For more information about supported network security mechanisms on data stores
5252
| | Azure SQL DB, Azure Synapse Analytics), SQL Ml | Yes (only Azure SQL DB/DW) | - | Yes | - | Yes |
5353
| | Azure Key Vault (for fetching secrets/ connection string) | yes | Yes | Yes | - | - |
5454
| Other PaaS/ SaaS Data stores | AWS S3, SalesForce, Google Cloud Storage, etc. | - | - | Yes | - | - |
55+
| | Snowflake | Yes | - | Yes | - | - |
5556
| Azure IaaS | SQL Server, Oracle, etc. | - | - | Yes | Yes | - |
56-
| On-premises IaaS | SQL Server, Oracle, etc. | - | - | Yes | - | - |
57-
57+
| On-premises IaaS | SQL Server, Oracle, etc. | - | - | Yes | - | -
58+
59+
5860
**Applicable only when Azure Data Explorer is virtual network injected, and IP range can be applied on NSG/ Firewall.*
5961

6062
* **Self-hosted Integration Runtime (in VNet/on-premises)**

0 commit comments

Comments
 (0)