You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/data-factory/security-and-access-control-troubleshoot-guide.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.service: data-factory
7
7
ms.subservice: integration-runtime
8
8
ms.custom: synapse
9
9
ms.topic: troubleshooting
10
-
ms.date: 11/04/2022
10
+
ms.date: 04/11/2023
11
11
ms.author: lle
12
12
---
13
13
@@ -64,7 +64,7 @@ You created managed private endpoint from ADF and obtained an approved private e
64
64
65
65
#### Cause
66
66
67
-
Currently, ADF stops pulling private end point status after the it is approved. Hence the status shown in ADF is stale.
67
+
Currently, ADF stops pulling private end point status after it is approved. Hence the status shown in ADF is stale.
68
68
69
69
##### Resolution
70
70
@@ -172,7 +172,7 @@ Try to enable public network access on the user interface, as shown in the follo
172
172
#### Cause
173
173
Both Azure Resource Manager and the service are using the same private zone creating a potential conflict on customer’s private DNS with a scenario where the Azure Resource Manager records will not be found.
174
174
175
-
#### Solution
175
+
#### Resolution
176
176
1. Find Private DNS zones **privatelink.azure.com** in Azure portal.
177
177
:::image type="content" source="media/security-access-control-troubleshoot-guide/private-dns-zones.png" alt-text="Screenshot of finding Private DNS zones.":::
178
178
2. Check if there is an A record **adf**.
@@ -201,7 +201,7 @@ For example: The Azure Blob Storage sink was using Azure IR (public, not Managed
201
201
202
202
The service may still use Managed VNet IR, but you could encounter such error because the public endpoint to Azure Blob Storage in Managed VNet is not reliable based on the testing result, and Azure Blob Storage and Azure Data Lake Gen2 are not supported to be connected through public endpoint from the service's Managed Virtual Network according to [Managed virtual network & managed private endpoints](./managed-virtual-network-private-endpoint.md#outbound-communications-through-public-endpoint-from-a-data-factory-managed-virtual-network).
203
203
204
-
#### Solution
204
+
#### Resolution
205
205
206
206
- Having private endpoint enabled on the source and also the sink side when using the Managed VNet IR.
207
207
- If you still want to use the public endpoint, you can switch to public IR only instead of using the Managed VNet IR for the source and the sink. Even if you switch back to public IR, the service may still use the Managed VNet IR if the Managed VNet IR is still there.
@@ -215,7 +215,7 @@ The service may still use Managed VNet IR, but you could encounter such error be
215
215
216
216
If you are performing any operations related to CMK, you should complete all operations related to the service first, and then external operations (like Managed Identities or Key Vault operations). For example, if you want to delete all resources, you need to delete the service instance first, and then delete the key vault. If you delete the key vault first, this error will occur since the service can't read the required objects anymore, and it won't be able to validate if deletion is possible or not.
217
217
218
-
#### Solution
218
+
#### Resolution
219
219
220
220
There are three possible ways to solve the issue. They are as follows:
0 commit comments