Git Product home page Git Product logo

azure / data-management-zone Goto Github PK

View Code? Open in Web Editor NEW
165.0 21.0 85.0 14.57 MB

Template to deploy the Data Management Zone of Cloud Scale Analytics (former Enterprise-Scale Analytics). The Data Management Zone provides data governance and management capabilities for the data platform of an organization.

License: MIT License

PowerShell 10.07% Shell 21.81% Dockerfile 0.57% Bicep 67.55%
enterprise-scale arm azure architecture policy-driven data-platform bicep data-mesh data-fabric enterprise-scale-analytics

data-management-zone's Introduction

Cloud-Scale Analytics Scenario - Data Management Zone

Objective

The Cloud-Scale Analytics Scenario provides a prescriptive data platform design coupled with Azure best practices and design principles. These principles serve as a compass for subsequent design decisions across critical technical domains. The architecture will continue to evolve alongside the Azure platform and is ultimately driven by the various design decisions that organizations must make to define their Azure data journey.

The Cloud-scale Analytics architecture consists of two core building blocks:

  1. Data Management Landing Zone which provides all data management and data governance capabilities for the data platform of an organization.
  2. Data Landing Zone which is a logical construct and a unit of scale in the Cloud-scale Analytics architecture that enables data retention and execution of data workloads for generating insights and value with data.

The architecture is modular by design and allows organizations to start small with a single Data Management Landing Zone and Data Landing Zone, but also allows to scale to a multi-subscription data platform environment by adding more Data Landing Zones to the architecture. Thereby, the reference design allows to implement different modern data platform patterns like data-mesh, data-fabric as well as traditional datalake architectures. Cloud-scale Analytics has been very well aligned with the data-mesh approach, and is ideally suited to help organizations build data products and share these across business units of an organization. If core recommendations are followed, the resulting target architecture will put the customer on a path to sustainable scale.

Cloud-scale Analytics


The Cloud-scale Analytics architecture represents the strategic design path and target technical state for your Azure data platform.


This repository describes the Data Management Landing Zone, which is classified as data management hub. It is the heart of the Cloud-scale Analytics architecture pattern and enables central governance of data assets across all Data Landing Zones. Data Management and Analytics scenario targets the deployment of a single Data Management Landing Zone instance inside a tenant of an organization.

Note: Before getting started with the deployment, please make sure you are familiar with the complementary documentation in the Cloud Adoption Framework. After deploying your Data Management Landing Zone, please move on to the Data Landing Zone deployment to create an environment in which you can start working on generating insights and value with data. The minimal recommended setup consists of a single Data Management Landing Zone and a single Data Landing Zone.

Deploy Cloud-Scale Analytics Scenario

The Cloud-scale Analytics architecture is modular by design and allows customers to start with a small footprint and grow over time. In order to not end up in a migration project, customers should decide upfront how they want to organize data domains across Data Landing Zones. All Cloud-scale Analytics architecture building blocks can be deployed through the Azure Portal as well as through GitHub Actions workflows and Azure DevOps Pipelines. The template repositories contain sample YAML pipelines to more quickly get started with the setup of the environments.

Reference implementation Description Deploy to Azure Link
Cloud-Scale Analytics Scenario Deploys a Data Management Landing Zone and one or multiple Data Landing Zone all at once. Provides less options than the the individual Data Management Landing Zone and Data Landing Zone deployment options. Helps you to quickly get started and make yourself familiar with the reference design. For more advanced scenarios, please deploy the artifacts individually. Deploy To Azure
Data Management Landing Zone Deploys a single Data Management Landing Zone to a subscription. Deploy To Azure Repository
Data Landing Zone Deploys a single Data Landing Zone to a subscription. Please deploy a Data Management Landing Zone first. Deploy To Azure Repository
Data Product Batch Deploys a Data Workload template for Data Batch Analysis to a resource group inside a Data Landing Zone. Please deploy a Data Management Landing Zone and Data Landing Zone first. Deploy To Azure Repository
Data Product Streaming Deploys a Data Workload template for Data Streaming Analysis to a resource group inside a Data Landing Zone. Please deploy a Data Management Landing Zone and Data Landing Zone first. Deploy To Azure Repository
Data Product Analytics Deploys a Data Workload template for Data Analytics and Data Science to a resource group inside a Data Landing Zone. Please deploy a Data Management Landing Zone and Data Landing Zone first. Deploy To Azure Repository

Deploy Data Management Landing Zone

To deploy the Data Management Landing Zone into your Azure Subscription, please follow the step-by-step instructions:

  1. Prerequisites
  2. Create repository
  3. Setting up Service Principal
  4. Template Deployment
    1. GitHub Action Deployment
    2. Azure DevOps Deployment
  5. Known Issues

Contributing

Please review the Contributor's Guide for more information on how to contribute to this project via Issue Reports and Pull Requests.

data-management-zone's People

Contributors

aaliraaza avatar abdale avatar amanjeetsingh avatar analyticjeremy avatar baatch avatar eldarku avatar esbran avatar hallihan avatar hardstl avatar ievsantillan avatar kbhatiagit avatar mariekekortsmit avatar marvinbuss avatar mboswell avatar microsoft-github-operations[bot] avatar microsoftopensource avatar mike-leuer avatar sasever avatar shaneosborne avatar vanwinkelseppe avatar xigyenge avatar zeinab-mk avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

data-management-zone's Issues

A new Azure Private DNS zone is required for Azure Purview portal private endpoint

Starting from 27 September 2021 at 15:30 UTC, portal private endpoint for Azure Purview requires a separate Azure Private DNS Zone (privatelink.purviewstudio.azure.com).

For ESA, this means we should deploy a new Azure Private DNS zones in Data Management subscription:
image

image

Purview account name A record should be added to privatelink.purview.azure.com zone and Web A record must be added to privatelink.purviewstudio.azure.com zone.

image

in general, 5 Azure Private DNS zones are required for Azure Purview for account, portal and ingestion PEs:

image

Add Outputs for Purview Managed Resources

Describe the solution you'd like
Add Outputs for managed Purview resources to further enhance the Purview integration in Data Landing Zone and Data Products. This will allow to automatically host private endpoints for Purview on managed vnets for ADF within the Data Landing Zone and potentially also within the Data Products.

Error for nonexistent firewall?

Not urgent. Logging this for post-vacation analysis, @marvinbuss

image

Since when you select the above option, it uses the existing firewall and does not create a new one, but throws an error after deployment (dependency issue?).

image

Suggestion: Add warning when deploying rules to existing Azure Firewall Policy

The issue:

image

When deploying to using an existing Firewall inside of an existing ESLZ setup, if during ESLZ deployment the DNS proxy was not enabled, the data management landing zone deployment fails as it requires the DNS proxy to be enabled. It might be an idea to include a warning here that please ensure DNS proxy is enabled in your existing firewall policy as seen below otherwise deployment will fail.

image

Bug Report: RP registration issue with Purview

Describe the bug
Some users are seeing the following error message when deploying ESA through the Portal experience:

"Failed to get resource provider Microsoft.EventHub, requestId: <ID>. Exception: (Exception) ErrorCode:AuthorizationFailed. Message:The client '<clientId>' with object id '<objectId>' does not have authorization to perform action 'Microsoft.Resources/subscriptions/providers/read' over scope '/subscriptions/<subscriptionId>' or the scope is invalid. If access was recently granted, please refresh your credentials.. Target:.."

Steps to reproduce

  1. Deploy ESA through all-in-one deployment or deploy Data Management Zone and make sure that Microsoft.EventHub and Microsoft.Storage are not registered.
  2. Deploy them through the Deploy to Azure Button

Randomize key vault resource names

Given the fact that when Key Vault resources are deleted, they are retained for x amount of days because of soft-delete capability in the product, you cannot remove the existing deployment and create new resources with the same name until the soft-delete period. Please consider randomizing the resources names so customers can redeploy the environment if they ever need to start over again.

Deployment failed in south east asia

correlation id: f874e407-556b-44d6-8af0-a5409fb27f70

image

error regarding purview deployment, no more purview instances allowed:

{ "status": "Failed", "error": { "code": "DeploymentFailed", "message": "At least one resource deployment operation failed. Please list deployment operations for details. Please see https://aka.ms/DeployOperations for usage details.", "details": [ { "code": "BadRequest", "message": "{\r\n \"error\": {\r\n \"code\": \"InvalidTemplateDeployment\",\r\n \"message\": \"The template deployment 'purview001' is not valid according to the validation procedure. The tracking id is 'c307c7c9-4e94-4d31-8c13-90179a34698a'. See inner errors for details.\",\r\n \"details\": [\r\n {\r\n \"code\": \"2005\",\r\n \"message\": \"Tenant 72f988bf-86f1-41af-91ab-2d7cd011db47 with 100 accounts has surpassed its resource quota for southeastasia location. Please try creating in other available locations or contact support.\"\r\n }\r\n ]\r\n }\r\n}" } ] } }

Region: South East Asia

Deploy Rules to Azure Firewall Policy error

I'm seeing this error when I try to deploy into a Enterprise-scale environment:

image

{
  "code": "SubscriptionNotFound",
  "message": "The subscription 'grp-azfwpolicy-eastus2' could not be found."
}

Screenshot of the configuration:

image

ADO Deployment Vnet Peering

Wrong path to the Vnet Peering deploy and param file in the networkDeployment.yml in the step #deploy vnet peering 001

Deployment failed in west europe

The deployment of the dataManagement zone was successful, but not the one for the dataLandingZone.
Correlation ID: f953f92e-3406-4414-99c2-bec526a01554

Add warning in Portal to register RPs

Describe the solution you'd like
Add a warning in the ESA Portal deployment to make sure users check the RP registration for various services like EventHub, Storage, etc.
Alternatively, register RP via POST Call.

Add Note About Global Uniqueness of Prefix in Azure Template

When using the "Deploy to Azure" button, the custom template asks for a "Data Management Zone Prefix" in the second step. In the description of the field or in the info tooltip, it might be helpful to mention that this prefix should be globally unique.

In the workshops we have run, one of the common errors that users encounter is that they try to use a very common prefix like dmz or dataman. I know we don't have a way for the UI to check for global uniqueness, but if we put a note on the screen, it might prompt the user to think a little harder about the prefix they select. This could help prevent a very common issue.

Add Policy Definitions to Enterprise-Scale Landing Zones

Add custom policy definitions to Enterprise-Scale Landing Zones and automatically enforce necessary policies:

Improvements

  • Remove NSG rules for public access.
  • Update comment in Update Parameters Process docs for ADO. ADO users were thinking that they only have to update the ADO workflow file. @xigyenge
  • Update Data Landing Zone Name to something else in data domain and data product
  • Separate workflows into separate files: This requires discussions and is a question of simplicity vs best practice
  • Be clear on the subnet resource ID in domains and products. @xigyenge
  • Look into Purview issue
  • Create Parameter for Vnet CIDR range
  • Add supported regions to Docs @xigyenge
  • Be clear on the Synapse Storage Account and filesystem variable @xigyenge
  • Error purview in known issues - Data Hub repo only@xigyenge

Template Is Invalid When Applying Tags

Describe the bug
I used the "Deploy to Azure" button to deploy the "Enterprise-Scale Analytics" template. On the fourth step, I tried to add tags to my deployment. When I clicked the "Create" button, I received a template validation error.

When I removed my tags, the process ran correctly.

Steps to reproduce

  1. Use the portal.enterpriseScaleAnalytics.json template
  2. Add tags to the deployment
  3. Get validation error when creating the resources

Error message

{"code":"InvalidTemplate","message":"Deployment template parse failed: 'Error reading string. Unexpected token: StartObject. Path 'EnterpriseScaleAnalytics'.'."}

Screenshots
esa-tag-error

Run Tests

  • Power BI Gateway
  • SelfHostetAgent GitHub
  • DNS Forwarder

Problematic Policies

Propblematic policies from Enterprise Scale:

IoTHub:

  • Microsoft.Security/IoTSecuritySolutions does not work when deploying via Policy

Synapse:

  • No effect with Microsoft.Synapse/workspaces/managedVirtualNetworkSettings.linkedAccessCheckOnTargetResource
  • No effect with Microsoft.Synapse/workspaces/bigDataPools/defaultSparkLogFolder
  • Internal Server Error with Microsoft.Synapse/workspaces/sqlPools/metadataSync
{
    "status": "Failed",
    "error": {
        "code": "HttpWrapOperationAsyncFailed",
        "message": "System.InvalidOperationException : The stream was already consumed. It cannot be read again.\r\n   at System.Net.Http.StreamContent.PrepareContent()\r\n   at System.Net.Http.StreamContent.SerializeToStreamAsync(Stream stream, TransportContext context)\r\n   at System.Net.Http.HttpContent.CopyToAsync(Stream stream, TransportContext context)\r\n   at System.Net.Http.HttpClientHandler.GetRequestStreamCallback(IAsyncResult ar)\r\n--- End of stack trace from previous location where exception was thrown ---\r\n   at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw()\r\n   at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)\r\n   at Microsoft.Analytics.Common.Http.RequestResponseLoggingHandler.<SendAsync>d__6.MoveNext() in S:\\src\\common\\Microsoft.Analytics.Common\\Http\\RequestResponseLoggingHandler.cs:line 44\r\n--- End of stack trace from previous location where exception was thrown ---\r\n   at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw()\r\n   at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)\r\n   at Microsoft.Analytics.Common.PartnerApi.SubscriptionIdBasedAuthorizationHeaderAppenderForArm.<SendAsync>d__8.MoveNext() in S:\\src\\common\\Microsoft.Analytics.Common\\PartnerApi\\SubscriptionIdBasedAuthorizationHeaderAppenderForArm.cs:line 67\r\n--- End of stack trace from previous location where exception was thrown ---\r\n   at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw()\r\n   at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)\r\n   at Microsoft.Analytics.Common.Http.RetryWebRequestHandler.<>c__DisplayClass12_0.<<SendAsync>b__0>d.MoveNext() in S:\\src\\common\\Microsoft.Analytics.Common\\Http\\RetryWebRequestHandler.cs:line 150\r\n--- End of stack trace from previous location where exception was thrown ---\r\n   at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw()\r\n   at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)\r\n   at Microsoft.Analytics.Common.Extensions.RetryExtensions.<>c__DisplayClass4_0`2.<<ExecuteFuncWithRetry>b__0>d.MoveNext() in S:\\src\\common\\Microsoft.Analytics.Common\\Extensions\\RetryExtensions.cs:line 0\r\n--- End of stack trace from previous location where exception was thrown ---\r\n   at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw()\r\n   at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)\r\n   at Microsoft.Analytics.Common.Extensions.RetryExtensions.<ExecuteFuncWithRetry>d__4`2.MoveNext() in S:\\src\\common\\Microsoft.Analytics.Common\\Extensions\\RetryExtensions.cs:line 0\r\n--- End of stack trace from previous location where exception was thrown ---\r\n   at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw()\r\n   at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)\r\n   at Microsoft.Analytics.Common.PartnerApi.SqlResourceProviderClient.<Microsoft-Analytics-Common-PartnerApi-ISqlResourceProviderClient-ProxyExecutePutActionAsync>d__26.MoveNext() in S:\\src\\common\\Microsoft.Analytics.Common\\PartnerApi\\SqlResourceProviderClient.cs:line 293\r\n--- End of stack trace from previous location where exception was thrown ---\r\n   at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw()\r\n   at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)\r\n   at Microsoft.Analytics.Common.PartnerApi.SqlManagedResourceGroupResourceProviderClient.<Microsoft-Analytics-Common-PartnerApi-ISqlResourceProviderClient-ProxyExecutePutActionAsync>d__26.MoveNext() in S:\\src\\common\\Microsoft.Analytics.Common\\PartnerApi\\SqlManagedResourceGroupResourceProviderClient.cs:line 204\r\n--- End of stack trace from previous location where exception was thrown ---\r\n   at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw()\r\n   at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)\r\n   at Microsoft.Analytics.RpApiSvc.Controllers.SqlCompute.ExecutePutAction.<PerformSqlRpOperation>d__1.MoveNext() in S:\\src\\services\\rpc\\Microsoft.Analytics.RpApiSvc\\Controllers\\SqlCompute\\ExecutePutAction.cs:line 35\r\n--- End of stack trace from previous location where exception was thrown ---\r\n   at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw()\r\n   at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)\r\n   at Microsoft.Analytics.RpApiSvc.Controllers.SqlCompute.SqlComputeAsyncProxyOperationBase.<Microsoft-Analytics-RpApiSvc-Controllers-IRpRequest-Process>d__15.MoveNext() in S:\\src\\services\\rpc\\Microsoft.Analytics.RpApiSvc\\Controllers\\SqlCompute\\SqlComputeAsyncProxyOperationBase.cs:line 88\r\n--- End of stack trace from previous location where exception was thrown ---\r\n   at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw()\r\n   at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)\r\n   at Microsoft.Analytics.Common.Http.BaseController.<HttpWrapOperationAsync>d__9.MoveNext() in S:\\src\\common\\Microsoft.Analytics.Common\\Http\\BaseController.cs:line 53"
    }
}

DataFactory:

  • No effect with Microsoft.DataFactory/factories/publicNetworkAccess

EventHub:

  • Microsoft.EventHub/namespaces/maximumThroughputUnits does not work porperly

Bug Report

All Repos:

  • Fixed that the prefix for the DLZ can be larger than 11 characters. Previously, it has taken max. 12 chars.
  • Added additional guidance to the instructions in the PR
  • Role Assignment section requires more guidance and explanation
  • Tags

Data Hub:

  • continue-on-error for Purview in ADO and GHA
  • Fix type in README dataNodeDeployment.yml
  • Reduced prefix length to 30 of public IP prefix resource
  • Global DNS error: GHA is failing even though Deployment successfully completes - Possible Root Cause identified by engineers and working now on the fix
  • Purview Issue: Authentication and missing claims 'puid' or 'altsecid' or 'oid'

Data Node:

  • Removed role assignments from Synapse and ADF
  • Removed linkedServices, which requires role assignment
  • continue-on-error for SHIR sharing in ADO and GHA
  • more details added on the Role Assignment section from readme file
  • added comment on updateParameter.yml file regarding purview_Id value to be left empty string in case none is deployed
  • Regional issues: Discuss issue with team

Data Domain - Batch:

Data Domain - Streaming:

Data Product - Analytics:

Data Product - Reporting:

ACTION REQUIRED: Microsoft needs this private repository to complete compliance info

There are open compliance tasks that need to be reviewed for your data-hub repo.

Action required: 4 compliance tasks

To bring this repository to the standard required for 2021, we require administrators of this and all Microsoft GitHub repositories to complete a small set of tasks within the next 60 days. This is critical work to ensure the compliance and security of your Azure GitHub organization.

Please take a few minutes to complete the tasks at: https://repos.opensource.microsoft.com/orgs/Azure/repos/data-hub/compliance

  • The GitHub AE (GitHub inside Microsoft) migration survey has not been completed for this private repository
  • No Service Tree mapping has been set for this repo. If this team does not use Service Tree, they can also opt-out of providing Service Tree data in the Compliance tab.
  • No repository maintainers are set. The Open Source Maintainers are the decision-makers and actionable owners of the repository, irrespective of administrator permission grants on GitHub.
  • Classification of the repository as production/non-production is missing in the Compliance tab.

You can close this work item once you have completed the compliance tasks, or it will automatically close within a day of taking action.

If you no longer need this repository, it might be quickest to delete the repo, too.

GitHub inside Microsoft program information

More information about GitHub inside Microsoft and the new GitHub AE product can be found at https://aka.ms/gim or by contacting [email protected]

FYI: current admins at Microsoft include @marvinbuss, @daltondhcp, @esbran

Improve Network setup

  • Add Firewall rules
  • Add Route Tables and Route Table rules
  • Add Public IP Prefixes for Azure Firewall
  • Add NSG base rules (Overwrite baseline rules etc.)
  • Add ANM

Add Script for Cleanup

Describe the solution you'd like
Add a script for cleanup of all resources after testing the environment.

$filter = 'prefix-'
Get-AzResourceGroup | ? ResourceGroupName -match $filter | Select-Object ResourceGroupName

$filter = 'prefix-'
Get-AzResourceGroup | ? ResourceGroupName -match $filter | Remove-AzResourceGroup -AsJob -Force

ADO Depoyment - wrong resourcegroupName

@marvinbuss - in the networkDeployment.yml, we should deploy the storage account in the integration resource group, not in the Management, right? Please confirm if so :)
Currently in the ado workflow the value from the storage rg is
resourceGroupName: '$(AZURE_RESOURCE_GROUP_NAME_MANAGEMENT)'

Improve Network Range Validation in Portal

Describe the solution you'd like
Improve the network range validation in the portal for unexperienced users. Check the following:

  • Overlap of address ranges (Subnet within Vnet)
  • Overlap of address ranges (Overlapping Subnets)

Register Azure Purview Provider

It would be nice if registering required Resource Providers for deploying Azure Purview can be included in the deployment templates:

  • Microsoft.Purview
  • Microsoft.Storage
  • Microsoft.EventHub

note: in case you consider including this feature SPN may require additional role.

To Do Items

Data Hub:

  • Deployment automation for new Domains, Products and Landing Zones - In Progress
    Clone repo (find solution)
  • Network Manager Config
  • Update self-hosted Agents - In Progress
  • Move templates to Node (SHIR, ADF, )
  • Add automation to workflows (LogicApp, Automation, Scripts, etc.)
  • Power BI Gateway Template
  • Add Key Vault access for Purview

Data Node

  • ADB Hive to Atlas Synch (on time schedule) - In Progress
  • Add Purview souces through Powershell - In Progress
  • Data Tokenization
  • Databricks automation - blocked
  • Databricks SCIM automation - blocked
  • Databricks Private Link - In Progress, testing required
  • Automated Ingestion Framework
  • Add Share SHIR Template
  • Evaluate new storage feature
  • Remove Triggers again from Node
  • Add Synapse PW to KV (all templates)

Data Domain Batch

Data Domain Streaming:

  • IoT Hub tests - Done

Data Product Analytics:

  • Test AML Private Clusters and get them working - In Progress/Blocked (Support)
  • Add Databricks Connection Template

Other tasks:

  • Create Purview presentation
  • Documentation for Domains and Products
  • Testing of Domains and Products
  • Domain and Product: Convert Subnet to private link subnet
  • Check RG names in Products and domains and check for //

Add Guidance for hosting Self-Hosted Agents in ESA

Describe the solution you'd like
Add some guidance describing how users can host a self-hosted agent in their Data Management Zone or Data Landing Zone. This should include:

  • Short doc describing the steps that need to be followed
  • Automation of Setup via ARM/Bicep for ADO
  • Portal UI for Self-hosted Agent for ADO

Enterprise Scale Analytics Support in Azure Gov

Describe the bug
I am not able to deploy Enterprise Scale Analytics ("ESA") in Azure Gov. The deployment template does not allow me to choose any region.

Question: Is ESA supported in Azure Gov? If not, is there an ETA?

Steps to reproduce

  1. Navigate to https://portal.azure.us/#blade/Microsoft_Azure_CreateUIDef/CustomDeploymentBlade/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Fdata-management-zone%2Fmain%2Fdocs%2Freference%2FenterpriseScaleAnalytics.json/uiFormDefinitionUri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Fdata-management-zone%2Fmain%2Fdocs%2Freference%2Fportal.enterpriseScaleAnalytics.json
  • Note that I had to change from portal.azure.com to portal.azure.us
  1. Proceed to "Data Management Zone" tab
  2. Expand "Location" dropdown

Screenshots

image

Azure Purview Private Endpoints

Describe the bug
all 5 Private Endpoints for Azure Purview are deployed inside the governance resource group, however, only account and portal private endpoints are linked to Azure Purview. the ingestion private endpoints are not linked. we need to use them to enable network isolation for end-to-end scan scenarios.

Steps to reproduce

  1. Deploy Azure Purview using ARM template or deploy the entire Data Management Landing Zone.
  2. From Azure Portal open Azure Purview blade \ Networking/. Validate if private links are listed in Ingestion private endpoint connections tab.

Screenshots
image

image

Feature Request: Add Contributing.md

Describe the solution you'd like
Please create contribution guidelines for users to help them get started contributing to the repository.

  • Technical details wrt how to make changes, engineering principles, contributing guidelines (@sasever)
  • Improve PR Templates (@marvinbuss)

Development, Test, Production

Discussed in #133

Originally posted by rokahr July 30, 2021
After having done several deployments I think it would be beneficial if you could briefly describe what is going to change between Dev, Test and Prod deployment. Do we deploy different resources, is it only the naming, do we have changes in policies etc.? It's just an idea and more towards the UI

Add option to add additional Root Collection Admins in Purview

Describe the solution you'd like
When deploying the Data Management Zone through GH Actions or Azure DevOps, the deployment is executed through a Service Principle. This has the effect that only the Service Principle gets added as Root Collection Admin in Purview. To overcome this, we need to add the option to add additional Users as Root Collection Admins in Purview.

Policies must be implemented

Missing Policies:

  • Create DNS A records
  • Create retention policies for SQL DB etc.
  • Share SHIR
  • SQL Auditing settings (Azure SQL, Synapse, etc.)
  • Azure Defender for SQL (Azure SQL, Synapse, etc.)
  • Azure Synapse encryption with cmk
  • Storage encryption with cmk
  • AML encryption with cmk
  • TDE synapse SQL pools
  • Append to deploy for managedIdentitySqlControlSettings
  • dataFlowProperties and other computeProperties for Microsoft.Synapse/workspaces/integrationRuntimes/Managed.typeProperties.
  • Databricks: requireInfrastructureEncryption, prepareEncryption, encryption, ...
  • Cosmos Network settings: IPs and virtual networks --> only PEs
  • Cosmos Customer managed Keys
    ...

Cannot Run a Second Deployment

Describe the bug
I used the "Deploy to Azure" button to deploy the "Enterprise-Scale Analytics" template. My first deployment ran successfully. I wanted to run the template again, but I couldn't because the deployment name dataManagementZoneDeployment was already in use.

Can we add a random string to the end of the deployment name so the names are unique?

Steps to reproduce

  1. Use the portal.enterpriseScaleAnalytics.json template to run a deployment
  2. Use the same template again to create a second deployment
  3. Get validation error

Error message

{"code":"InvalidDeploymentLocation","message":"Invalid deployment location 'eastus2'. The deployment 'dataManagementZoneDeployment' already exists in location 'centralus'."}

Screenshots
duplicate-deployment-name-error

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.