You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: data-explorer/kusto/api/get-started/app-client-network-restrictions.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ ms.reviewer: yogilad
5
5
ms.author: spelluru
6
6
author: spelluru
7
7
ms.topic: how-to
8
-
ms.date: 11/16/2025
8
+
ms.date: 12/01/2025
9
9
ms.custom:
10
10
---
11
11
@@ -35,9 +35,9 @@ This article gives step-by-step guidance on managing DNS restrictions in Kusto t
35
35
36
36
:::image type="content" source="../../media/bypass-dns-restrictions/kusto-explorer-options.png" alt-text="Screenshot of the Options editor open with the Additional Trusted Hosts field highlighted.":::
37
37
38
-
## Bypass DNS restrictions with Azure Data Explorer
38
+
## Bypass DNS restrictions with Azure Data Explorer web UI
39
39
40
-
1. Open Azure Data Explorer.
40
+
1. Open [Azure Data Explorer](https://dataexplorer.azure.com/home).
41
41
1. Select the *Settings* icon in the top-right corner.
42
42
1. Select **Connection**.
43
43
1. In **Additional trusted hosts**, add the fully qualified hostname or DNS suffix (preceded with an asterisk `*`) you want to work with. List multiple FQDNs or DNS suffixes by separating them with a semicolon `;`.
@@ -49,7 +49,7 @@ This article gives step-by-step guidance on managing DNS restrictions in Kusto t
49
49
For command-line applications and tools, disable DNS validation entirely by passing a command-line argument or setting an environment variable.
50
50
51
51
> [!NOTE]
52
-
> Disabling DNS validation using environment variables affects all applications and tools using the C# SDK, including Kusto Explorer, Light Ingest, Kusto CLI, Perkus, and any third-party application developed with the C# Kusto SDK.
52
+
> Disabling DNS validation using environment variables affects all applications and tools using the C# SDK, including Kusto Explorer, Light Ingest, Kusto CLI, and any third-party application developed with the C# Kusto SDK.
53
53
54
54
To disable using a command-line argument, add the following argument to the tool's command line.
Copy file name to clipboardExpand all lines: data-explorer/lightingest.md
+10-8Lines changed: 10 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,11 +3,11 @@ title: Use LightIngest to ingest data into Azure Data Explorer
3
3
description: Learn about LightIngest, a command-line utility for ad-hoc data ingestion into Azure Data Explorer.
4
4
ms.reviewer: tzgitlin
5
5
ms.topic: how-to
6
-
ms.date: 11/03/2025
6
+
ms.date: 11/18/2025
7
7
---
8
8
9
9
# Use LightIngest to ingest data into Azure Data Explorer
10
-
10
+
11
11
[LightIngest](https://github.com/Azure/Kusto-Lightingest/blob/main/README.md) is a command-line utility for ad-hoc data ingestion into Azure Data Explorer. The utility can pull source data from a local folder, an Azure blob storage container, or an Amazon S3 bucket.
12
12
13
13
LightIngest is most useful when you want to ingest a large amount of data, because there's no time constraint on ingestion duration. It's also useful when you want to later query records according to the time they were created, and not the time they were ingested.
@@ -20,13 +20,16 @@ For an example of how to autogenerate a LightIngest command, see [ingest histori
20
20
21
21
* LightIngest. Get LightIngest in one of two ways:
22
22
*[Download LightIngest binaries for your operating system](https://github.com/Azure/Kusto-Lightingest/releases). Make sure to unzip the binaries after download.
23
-
23
+
24
24
*[Install LightIngest as a .NET tool](https://www.nuget.org/packages/Microsoft.Azure.Kusto.LightIngest). This method requires that you have the .NET SDK version 6.0 or higher installed on your machine. Then, run the following command:
> Consider using the [queued ingestion commands](/kusto/management/data-ingestion/queued-ingestion-use-case?view=azure-data-explorer&preserve-view=true) as they do not require installing software.
32
+
30
33
## Run LightIngest
31
34
32
35
To run LightIngest:
@@ -110,18 +113,18 @@ The argument values must include:
110
113
> [!IMPORTANT]
111
114
> When you specify that the creation time should be overridden, make sure the `Lookback` property in the target table's effective [Extents merge policy](/kusto/management/merge-policy?view=azure-data-explorer&preserve-view=true) aligns with the values in your file or blob paths.
112
115
113
-
**Examples**
116
+
**Examples**
117
+
118
+
* A blob name that contains the datetime as follows: `historicalvalues19840101.parquet` (the timestamp is four digits for the year, two digits for the month, and two digits for the day of month),
114
119
115
-
* A blob name that contains the datetime as follows: `historicalvalues19840101.parquet` (the timestamp is four digits for the year, two digits for the month, and two digits for the day of month),
116
-
117
120
The value for `-creationTimePattern` argument is part of the filename: *"'historicalvalues'yyyyMMdd'.parquet'"*
118
121
119
122
```kusto
120
123
LightIngest "https://ingest-{Cluster name and region}.kusto.windows.net;Fed=True" -db:{Database} -table:Trips -source:"https://{Account}.blob.core.windows.net/{ROOT_CONTAINER};{StorageAccountKey}" -creationTimePattern:"'historicalvalues'yyyyMMdd'.parquet'"
* For a blob URI that refers to hierarchical folder structure, like `https://storageaccount/mycontainer/myfolder/2002/12/01/blobname.extension`,
127
+
* For a blob URI that refers to hierarchical folder structure, like `https://storageaccount/mycontainer/myfolder/2002/12/01/blobname.extension`,
125
128
126
129
The value for `-creationTimePattern` argument is part of the folder structure: *"'folder/'yyyy/MM/dd'/blob'"*
127
130
@@ -220,4 +223,3 @@ LightIngest performs three actions that can use managed identity for authenticat
220
223
* **Connect to Azure Storage to download blobs**: Use "-ingestmi" to specify a managed identity installed on the Kusto service that has read privileges on the storage container.
221
224
222
225
* **Connect to Azure Storage to list container blobs**: Use the "-storageMi" argument to specify a managed identity installed on the client VM that has list privileges on the storage container. If you use this method but not the previous one (connect to Azure storage to download blobs), the managed identity must have read privileges as well and a token is passed to the Kusto service to be used for the ingestion. Set all three arguments.
0 commit comments