Skip to content

Commit f89084a

Browse files
Merge pull request #234164 from ssabat/master
Fixed grammar
2 parents 86b232d + f90ef72 commit f89084a

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/data-factory/security-and-access-control-troubleshoot-guide.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: data-factory
77
ms.subservice: integration-runtime
88
ms.custom: synapse
99
ms.topic: troubleshooting
10-
ms.date: 11/04/2022
10+
ms.date: 04/11/2023
1111
ms.author: lle
1212
---
1313

@@ -64,7 +64,7 @@ You created managed private endpoint from ADF and obtained an approved private e
6464

6565
#### Cause
6666

67-
Currently, ADF stops pulling private end point status after the it is approved. Hence the status shown in ADF is stale.
67+
Currently, ADF stops pulling private end point status after it is approved. Hence the status shown in ADF is stale.
6868

6969
##### Resolution
7070

@@ -172,7 +172,7 @@ Try to enable public network access on the user interface, as shown in the follo
172172
#### Cause
173173
Both Azure Resource Manager and the service are using the same private zone creating a potential conflict on customer’s private DNS with a scenario where the Azure Resource Manager records will not be found.
174174
175-
#### Solution
175+
#### Resolution
176176
1. Find Private DNS zones **privatelink.azure.com** in Azure portal.
177177
:::image type="content" source="media/security-access-control-troubleshoot-guide/private-dns-zones.png" alt-text="Screenshot of finding Private DNS zones.":::
178178
2. Check if there is an A record **adf**.
@@ -201,7 +201,7 @@ For example: The Azure Blob Storage sink was using Azure IR (public, not Managed
201201
202202
The service may still use Managed VNet IR, but you could encounter such error because the public endpoint to Azure Blob Storage in Managed VNet is not reliable based on the testing result, and Azure Blob Storage and Azure Data Lake Gen2 are not supported to be connected through public endpoint from the service's Managed Virtual Network according to [Managed virtual network & managed private endpoints](./managed-virtual-network-private-endpoint.md#outbound-communications-through-public-endpoint-from-a-data-factory-managed-virtual-network).
203203
204-
#### Solution
204+
#### Resolution
205205
206206
- Having private endpoint enabled on the source and also the sink side when using the Managed VNet IR.
207207
- If you still want to use the public endpoint, you can switch to public IR only instead of using the Managed VNet IR for the source and the sink. Even if you switch back to public IR, the service may still use the Managed VNet IR if the Managed VNet IR is still there.
@@ -215,7 +215,7 @@ The service may still use Managed VNet IR, but you could encounter such error be
215215
216216
If you are performing any operations related to CMK, you should complete all operations related to the service first, and then external operations (like Managed Identities or Key Vault operations). For example, if you want to delete all resources, you need to delete the service instance first, and then delete the key vault. If you delete the key vault first, this error will occur since the service can't read the required objects anymore, and it won't be able to validate if deletion is possible or not.
217217
218-
#### Solution
218+
#### Resolution
219219
220220
There are three possible ways to solve the issue. They are as follows:
221221

0 commit comments

Comments
 (0)