You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: data-explorer/create-table-wizard.md
+9-4Lines changed: 9 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Create a table in Azure Data Explorer
3
3
description: Learn how to easily create a table and manually define the schema in Azure Data Explorer with the table creation wizard.
4
4
ms.reviewer: aksdi
5
5
ms.topic: how-to
6
-
ms.date: 03/07/2024
6
+
ms.date: 11/13/2024
7
7
# Customer intent: As a data engineer, I want to create an empty table in Azure Data Explorer so that I can ingest data and query it.
8
8
---
9
9
# Create a table in Azure Data Explorer
@@ -33,19 +33,19 @@ Creating a table is an important step in the process of [data ingestion](ingest-
33
33
34
34
The **Create table** window opens with the **Destination** tab selected.
35
35
36
-
1. The **Cluster** and **Database** fields are prepopulated. You may select different values from the drop-down menu.
36
+
1. The **Cluster** and **Database** fields are prepopulated. You can select different values from the drop-down menu.
37
37
1. In **Table name**, enter a name for your table.
38
38
39
39
> [!TIP]
40
-
> Table names can be up to 1024 characters including alphanumeric, hyphens, and underscores. Special characters aren't supported.
40
+
> Table names can be up to 1024 characters including alphanumeric, hyphens, and underscores. Special characters aren't supported.
41
41
42
42
1. Select **Next: Schema**
43
43
44
44
## Schema tab
45
45
46
46
1. Select **Add new column** and the **Edit columns** panel opens.
47
47
1. For each column, enter **Column name** and **Data type**. Create more columns by selecting **Add column**.
48
-
48
+
49
49
:::image type="content" source="media/create-table-wizard/edit-columns.png" alt-text="Screenshot of Edit columns pane, in which you input the column name and data type in Azure Data Explorer.":::
50
50
51
51
1. Select **Save**. The schema is displayed.
@@ -59,3 +59,8 @@ A new table is created in your target destination, with the schema you defined.
Copy file name to clipboardExpand all lines: data-explorer/security-network-managed-private-endpoint-create.md
+122-6Lines changed: 122 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,14 @@
1
1
---
2
2
title: Create a managed private endpoint for Azure Data Explorer
3
-
description: In this article, you'll learn how to create a managed private endpoint for Azure Data Explorer.
3
+
description: In this article, you learn how to create a managed private endpoint for Azure Data Explorer.
4
4
ms.reviewer: eladb
5
5
ms.topic: how-to
6
-
ms.date: 04/05/2022
6
+
ms.date: 11/18/2024
7
7
---
8
8
9
9
# Create a managed private endpoint for Azure Data Explorer
10
10
11
-
Managed private endpoints are required to connect to Azure resources that are highly protected. They are one-way private connections that allow Azure Data Explorer to connect to other protected services. In this article, you'll learn how to create a managed private endpoint and connect it to your data source.
11
+
Managed private endpoints are required to connect to Azure resources that are highly protected. They're one-way private connections that allow Azure Data Explorer to connect to other protected services. In this article, you'll learn how to create a managed private endpoint and connect it to your data source.
12
12
13
13
## Prerequisites
14
14
@@ -37,15 +37,14 @@ You can create a managed private endpoint using the portal for your cluster to u
37
37
| Resource type |*Microsoft.Storage/storageAccounts*| Select the relevant resources type you want for your data source. |
38
38
| Resource name |*share*| Choose the cluster that should be used as the destination for the new Azure Private Endpoint |
39
39
| Target sub-resource |*blob*| Select the relevant target for your data source. |
40
-
||||
41
40
42
41
1. select **Create** to create the managed private endpoint resource.
43
42
44
43
## Create a managed private endpoint using the REST API
45
44
46
45
Creating a managed private endpoint requires a single API call to the *Kusto* resource provider. You can establish a managed private endpoint to the following resource types:
47
46
48
-
* Microsoft.Storage/storageAccounts (sub-resource may be "blob" or "dfs")
47
+
* Microsoft.Storage/storageAccounts (sub-resource can be "blob" or "dfs")
@@ -183,7 +182,7 @@ To check the progress of the managed private endpoint migration, use the followi
183
182
184
183
## Approve the managed private endpoint
185
184
186
-
Whichever method you used to create the managed private endpoint using, you must approve its creation on target resource. The following example shows the approval of a managed private endpoint to an Event Hubs service.
185
+
Whichever method you used to create the managed private endpoint, you must approve its creation on the target resource. To approve a managed private endpoint to an Event Hubs service:
187
186
188
187
1. In the Azure portal, navigate to your Event Hubs service and then select **Networking**.
189
188
@@ -197,6 +196,123 @@ Whichever method you used to create the managed private endpoint using, you must
197
196
198
197
Your cluster can now connect to the resource using the managed private endpoint connection.
199
198
199
+
## Create multiple managed private endpoints
200
+
201
+
You can create multiple managed private endpoints using ARM templates and Terraform. The following examples ensure that the managed private endpoint to the Event Hubs namespace is created before the one to the Storage account.
202
+
203
+
### [ARM template](#tab/ARM-template)
204
+
205
+
The following example uses an ARM template to create two managed private endpoints in an Azure Data Explorer cluster. The first endpoint connects to an Event Hubs namespace. The second endpoint connects to a Storage account, with a dependency that ensures that the Event Hubs endpoint is created first.
The following example uses a Terraform configuration that creates two managed private endpoints in an Azure Data Explorer cluster. The first endpoint connects to an Event Hubs namespace. The second endpoint connects to a Storage account, with a dependency that ensures that the Event Hubs endpoint is created first.
278
+
279
+
```hcl
280
+
resource "azapi_resource" "mpe_to_eventhub" {
281
+
type = "Microsoft.Kusto/clusters/managedPrivateEndpoints@2023-08-15"
282
+
name = "mpeToEventHub"
283
+
parent_id = "<the resource id of the cluster>"
284
+
body = jsonencode({
285
+
properties = {
286
+
groupId = "namespace"
287
+
privateLinkResourceId = "<The ARM resource ID of the EventHub for which the managed private endpoint is created.>"
288
+
requestMessage = "Please Approve."
289
+
}
290
+
})
291
+
}
292
+
293
+
resource "azapi_resource" "mpe_to_storage" {
294
+
type = "Microsoft.Kusto/clusters/managedPrivateEndpoints@2023-08-15"
295
+
name = "mpeToStorage"
296
+
parent_id = "<the resource id of the cluster>"
297
+
body = jsonencode({
298
+
properties = {
299
+
groupId = "blob"
300
+
privateLinkResourceId = "<The ARM resource ID of the Storage Account for which the managed private endpoint is created.>"
301
+
requestMessage = "Please Approve."
302
+
}
303
+
})
304
+
depends_on = [
305
+
azapi_resource.mpe_to_eventhub
306
+
]
307
+
}
308
+
```
309
+
310
+
---
311
+
312
+
## Automatic approval
313
+
314
+
You can [automatically approve](/azure/private-link/private-endpoint-overview#access-to-a-private-link-resource-using-approval-workflow) a managed private endpoint if the requesting identity has the **Microsoft.\<Provider>/\<ResourceType>/privateEndpointConnectionsApproval/action** permission on the target resource of the managed private endpoint.
315
+
200
316
## Related content
201
317
202
318
*[Troubleshooting private endpoints in Azure Data Explorer](security-network-private-endpoint-troubleshoot.md)
0 commit comments