Troubleshoot your scans and connections in the Microsoft Purview Data Map
Alt
This article describes how to troubleshoot connection errors while setting up scans on data sources in Microsoft Purview, or errors that could occur with your scans.
Permission the credential on the data source
If you're using a managed identity or service principal as a method of authentication for scans, you'll have to allow these identities to have access to your data source.
There are specific instructions for each source type.
Tábhachtach
Verify that you have followed all prerequisite and authentication steps for the source you are connecting to.
You can find all available sources listed in the Microsoft Purview supported sources article.
Verifying Azure Role-based Access Control to enumerate Azure resources in the Microsoft Purview governance portal
Registering single Azure data source
To register a single data source in Microsoft Purview, such as an Azure Blob Storage or an Azure SQL Database, you must be granted at least Reader role on the resource or inherited from higher scope such as resource group or subscription. Some Azure RBAC roles, such as Security Admin, don't have read access to view Azure resources in control plane.
Verify this by following the steps below:
From the Azure portal, navigate to the resource that you're trying to register in Microsoft Purview. If you can view the resource, it's likely, that you already have at least reader role on the resource.
Select Access control (IAM) > Role Assignments.
Search by name or email address of the user who is trying to register data sources in Microsoft Purview.
Verify if any role assignments, such as Reader, exist in the list or add a new role assignment if needed.
Scanning multiple Azure data sources
From the Azure portal, navigate to the subscription or the resource group.
Select Access Control (IAM) from the left menu.
Select +Add.
In the Select input box, select the Reader role and enter your Microsoft Purview account name (which represents its MSI name).
Select Save to finish the role assignment.
Repeat the steps above to add the identity of the user who is trying to create a new scan for multiple data sources in Microsoft Purview.
Scanning data sources using Private Link
If public endpoint is restricted on your data sources, to scan Azure data sources using Private Link, you need to set up a Self-hosted integration runtime and create a credential.
Tábhachtach
Scanning multiple data sources which contain databases as Azure SQL database with Deny public network access, would fail. To scan these data sources using private Endpoint, instead use registering single data source option.
Are you using a self-hosted integration runtime? Check that it's up to date with the latest software and that it's connected to your network.
Test connection passes but scan fails with connection error
Are you using private endpoints or virtual networks? Confirm your network settings, paying attention to your Network Security Group (NSG) rules.
Receive JDK error when using a self-hosted integration runtime
Many sources that require a self-hosted integration runtime also require a certain version of Java to be installed on the machine where the self-hosted integration runtime is hosted. If you receive a JDK error, check the prerequisites on your specific data source's page and install the recommended JDK version.
Azure HPC là một chức năng đám mây được xây dựng theo mục đích cho khối lượng công việc AI của HPC &, sử dụng bộ xử lý cạnh hàng đầu và kết nối liên kết InfiniBand lớp HPC, để cung cấp hiệu suất, khả năng mở rộng và giá trị ứng dụng tốt nhất. Azure HPC cho phép người dùng mở khóa sự đổi mới, năng suất và sự nhanh nhẹn trong kinh doanh, thông qua một loạt các công nghệ HPC & AI có thể được phân bổ linh động khi nhu cầu kỹ thuật và doanh nghiệp của bạn thay đổi. Lộ trình học tập này là một chuỗi các mô-đun gi
This article describes how you can set up a private endpoint to connect to your Microsoft Purview account and scan data sources from restricted network for an end to end isolation.