Azure Synapse Studio ServerLess SQL Pool Access Error - azure

I am not able to access any of my Server Less SQL Pool in Azure Synapse. I can create new Spark Pool but not SQL Pool.
Error is :
**You don't have access to the serverless SQL pool, Built-in. To be granted access, contact a Synapse Administrator for this workspace.**
When I look back my access privileges, I am the owner of the Azure Synapse Workspace and I do have contributor access too. Simultaneously, I am the "SQL Active Directory admin
Additionally I do have "Storage Blob Data Contributor" to access the storage account.
how do ensure thatI have access to BuiltIn ServerLess SQL Pool ?
Additionally, when I open Synapse Studio I can see following pop error. Any advise, please?

The Synapse Team is constantly updating the Synapse RBAC/privileges feature. The IAM in Azure is for the resource itself. You'll need to check the Workspace RBAC inside the Synapse Studio:
At present, you'll need either Synapse Administrator or Synapse SQL Administrator role to access the Serverless SQL pool.

Related

Azure connectivity and Access error error code 403

Error 1: Failed to load one or more resources due to no access, error code 403.
I checked with the answers here but they don't work for me. As the screenshots below suggest, I am the service administrator, owner and contributor of the Synapse workspace. I also allow public access to the Synapse workspace.
Error 2: If I check the access control on Synapse studio portal, it says I am not the synapse administrator but I am actually the service administrator of the entire subscription.
Error 3: Cannot create an SQL pool.
The Azure IAM/RBAC roles are for working with the Azure resource, but the Synapse workspace also has its own access control. You will need to grant permissions/RBAC inside the workspace itself. [documentation]
I recommend using Groups to manage permissions, but you can start by adding yourself as a Synapse Administrator.
For Error1: You may try the following steps and let us know.
This article - Disabling Public Network Access in Synapse helps to resolve the issue.
For Error2:Make sure you have Synapse Administrator role in the Manage => Security => Access Control
For more details, refer to Grant access to SQL pools.

How can i setup unity catalog in databricks?

how can i setup unity catalog in azure databricks from azure portal, setting up from metastore, containers
I have created premium azure databricks workspace but still unable to link metastore to it to run unity catalog.
What error you have, where you stucked ?
I followed this instruction (it is nicely written):
https://learn.microsoft.com/en-us/azure/databricks/data-governance/unity-catalog/get-started
It is important that you need Global Administrator role in Azure or someone with this role who can granted you Account admin role here:
https://accounts.azuredatabricks.net/login/

Failed to access the Azure Dedicated SQL pool with the given credentials

Our organization having an Azure Synapse Dedicated Pool instance. I am trying to register the Azure Synapse Dedicated Pool with Azure Purview and want to scan the Synapse DB. However, I am getting the following Error every time:
“Failed to access the Azure Dedicated SQL pool with the given credentials”
Following are the process I followed to Register the Data Source:
I opened “Purview Studio”
There I have created a “Collection”
Then I go to “Register Sources”
Then I search for “Azure Synapse Dedicated Pool”
Then I select the subscription where my Azure Synapse Dedicated Pool is present
Then I Registered my Data Source
Now I am trying to create a New Scan for my Synapse Dedicated Pool
The problem starts from here, First of all I selected the subscription, then I selected the resource group and then I selected the Synapse DB name. I tried two authentication methods to authenticate my Synapse Instance. First one is Purview MSI account and second one is SQL Authentication. I have added my Purview MSI account as a user in Synapse Dedicated pool using following command.
CREATE USER [PurviewAccountName] FROM EXTERNAL PROVIDER
GO
EXEC sp_addrolemember 'db_datareader', [PurviewAccountName]
GO
Now I tried to test the connection but it is not working and giving me following Error:
“Failed to access the Azure Dedicated SQL pool with Purview MSI account”
My Azure Synapse Dedicated Pool instance in not publically accessible, we have put it behind the private link. I can connect my Azure Synapse Instance using VPN connectivity on my machine and login through SSMS and Azure Data Studio.
I also tried with SQL authentication by using SQL username and Password which is kept under the keyvault. I have checked it multiple times and I am confident I have configured it correctly. But still when I try to test the connection. It is showing following error:
“Failed to access the Azure Dedicated SQL pool with the given credentials”
Some where I have read I need self-hosted-integration runtime if the Azure Synapse instance is behind private link.
So I installed integration runtime on my machine, configure it and tested for the Synapse connection with SQL Authentication by connecting to VPN. Self-Hosted IR configured successfully. I tested with both the IR. Azure IR and Self-hosted-IR. But no luck, I am getting the same error.
I have also added Purview MSI account to Access Policy in keyVault and provided GET, List permission on keys and Secrets.
However, I am not getting what I am missing here and why it is giving me the same error.
Any help on this is really means a lot me..
CREATE USER [PurviewAccountName] FROM EXTERNAL PROVIDER
GO
EXEC sp_addrolemember 'db_datareader', [PurviewAccountName]
GO
According to Microsoft official documentation, to execute the above command one must be Azure Synapse Administrator in the workspace. It is alsi required that your purview account name must have reader role set which can be done from Access Control (IAM) under the Azure Synapse Workspace resource.
To create SQL Pools, Apache Spark Pools and Integration Runtimes, users must have at least Azure Contributor role in the workspace. The contributor role also allows these users to manage the resources, including pausing and scaling. If you're- using Azure Portal or Synapse Studio to create SQL Pools, Apache Spark Pools and INtegration Runtimes, then you need Azure Contributor role at the resource group level.
To GRANT access to a Dedicated SQL Pool database, the scripts can be run by the workspace creator or any member of the workspace1_SynapseAdministrators group.
Follow the below steps in the Azure Synapse SQL script editor:
Create the USER in the database by running the following command on the target database, selected using the Connect to dropdown:
CREATE USER [<alias#domain.com>] FROM EXTERNAL PROVIDER;
Grant a user a role to access the database
EXEC sp_addrolemember 'db_owner', '<alias#domain.com>'

Using Azure SQL Migration extension on Azure Data Studio

I have connected my azure account in Data Studio and I am using Azure SQL migration extension (v0.1.12) to migrate on-prem SQL to Azure Managed Instance.
However my subscription details are not getting fetched.
Screen Shot Attached Here
When I manually add Azure Subscription details I am getting following error
Manually Entered Details
And the error message Error
The issue seems to be more of access level issues.
Below are the type of access levels that you need to have for creating Azure Migrate Appliance project
Contributor or Owner permissions in the Azure subscription.
Permissions to register Azure Active Directory (Azure AD) apps.
Owner or Contributor and User Access Administrator permissions in the Azure subscription to create an instance of Azure Key Vault, which is used during agentless server migration.
Below are the steps to set contributor or Owner permissions
From Azure Subscriptions panel select the subscription
Move to Access Control IAM and select Add role Assignment
Assign the following roles.
For complete information check the Microsoft Document on providing access.

User and Application Service account setup in Azure SQL Datawarehouse

We just completed the data migration from Teradata system to Azure SQL DW.
Now we just need to provide necessary access to all supporting Teradata Users and Service accounts to Azure SQL DW. For this i have some basic query:
All the accounts/Users are of domain type,so can i use Azure Active
directory to set up those accounts and configure it to have access
Azure SQL DW. Please let me know the process.
What kind of privilege/Access is needed in Azure Portal for
creating those account within Azure Active Directory.
In Azure SQL DW how do i add Azure AD account to specific roles
that i'll be creating. How the authentication will happen here.
Let me know if the above steps is feasible. Is there any alternative approach in providing on-prem User accounts access to Azure SQL DW
Thanks
You can follow the instructions on the Use Azure Active Directory Authentication for authentication with SQL Database, Managed Instance, or SQL Data Warehouse for setting up Azure Active Directory with SQL Data Warehouse. A subscription admin can configure the permissions - see the Configure and manage Azure Active Directory authentication with SQL Database, Managed Instance, or SQL Data Warehouse.
In addition, there is a description of how to create AD users Adding AD Users and Security Groups to Azure SQL Data Warehouse. It's a simple matter of using the CREATE USER and CREATE LOGIN statements.
For users:
CREATE USER <alias#domain> FROM EXTERNAL PROVIDER WITH DEFAULT_SCHEMA = <schema>;
For security groups:
CREATE USER <Security Group Display Name> FROM EXTERNAL PROVIDER WITH DEFAULT_SCHEMA = <schema>;

Resources