MS Learn module: Create dashboards in Azure Data Explorer

This article is contributed. See the original author and article here.

Dashboards tell a story through visualizations, and are an excellent way to view your data and see all of your most important insights at a glance. Azure Data Explorer dashboards in the web UI natively support the Kusto Query Language over data hosted in Azure Data Explorer. These dashboards will help you progress quickly from raw data to shared insights.


 


In the new module, you will create a dashboard from a query in Azure Data Explorer web UI. Add new tiles. Create dashboard parameters, and cross-filters for the parameters.


Create dashboards in Azure Data Explorer


 


More ADX MS Learn modules: 



  1. MS Learn: Introduction to Azure Data Explorer , 

  2. MS Learn: Write your first query with Kusto Query Language

  3. MS Learn: Gain insights from your data by using Kusto Query Language

  4. MS Learn: Characterize an unfamiliar dataset with Azure Data Explorer – Training | Microsoft Learn

  5. MS Learn: Create dashboards in Azure Data Explorer – Training | Microsoft Learn

Microsoft is headed to VMware Explore 2022 in Barcelona

This article is contributed. See the original author and article here.

After seeing everyone in person at the San Francisco VMware Explore event, we are even more excited for Barcelona! If you want to know about Azure, the work we are doing with VMware, or just have a great conversation, we’d love to talk to you so stop by our booth! We will even have some cool stickers too.


 


This year we will have a bunch of sessions with Microsoft employees on stage, so if you’re building out your schedule check them out:


 


Microsoft Keynote: Transform your VMware Workloads with Microsoft Azure


Speaker:  Jeff Woolsey, Principal PM Manager, Microsoft


Date/Time:  Wednesday, November 9 @ 9:00 – 10:00 CET


 


Jeff will share how customers can transform their on-prem VMware environments using Microsoft Azure. Keynote attendees will learn how to:



  • Address end of support for vSphere, Windows Server, and SQL Server

  • Use familiar VMware skills to migrate or extend your VMware environment to the cloud, including hybrid cloud options with Azure VMware Solution and Azure Arc

  • Modernize hybrid work with Azure Virtual Desktop and Horizon Cloud 


 


In addition, here are some other Microsoft Azure-related sessions that we highly recommend for learning more about Azure + VMware:


 






















































 Time, Topic



Session Title



Tuesday, November 8


11:00 – 12:00 CET


Azure VMware Solution



Migrate and Modernize with Cloud Solutions from Microsoft Azure VMware



Tuesday, November 8


11:15 – 12:45 CET


Azure VMware Solution



Instructor-led Hands-On Lab: Learn how to integrate Azure VMware Solution with Native Azure Services



Tuesday, November 8


11:45 – 12:15 CET


Azure VMware Solution


Azure Virtual Desktop



Hybrid, Multicloud, Windows Server & SQL Server 2012 End of Support



Tuesday, November 8


12:30 – 13:30 CET


Azure VMware Solution



What’s New in Azure VMware Solution



Wednesday, November 9


9:00 – 10:00 CET


Azure VMware Solution


Horizon Cloud on Azure



Microsoft Keynote: Transform your VMware Workloads with Microsoft Azure



Wednesday, November 9


10:30 – 11:30 CET


Azure VMware Solution



Automating Azure VMware Solution Onboarding and Configure NVA Networking Demo



Wednesday, November 9


12:00 – 13:00 CET


Azure Arc + vSphere



Bring Azure ARC to Your VMware vSphere Environments



Wednesday, November 9


13:00 – 13:30 CET


Azure VMware Solution



“Ask Me Anything” With Microsoft Azure VMware Solution Experts



Wednesday, November 9


13:30 – 14:30 CET


Azure Virtual Desktop



Maximizing Azure Virtual Desktop performance with Intel powered VM’s



Wednesday, November 9


15:00 – 16:00 CET


Azure VMware Solution


Azure Virtual Desktop



Hybrid & Multicloud Innovation with Microsoft



Wednesday, November 9


15:15 – 16:45 CET


Azure VMware Solution



Instructor-led Hands-On Lab: Learn how to integrate Azure VMware Solution with Native Azure Services



 

Released: Microsoft.Data.SqlClient 5.1 Preview 1

This article is contributed. See the original author and article here.

Microsoft.Data.SqlClient 5.1 Preview 1 has been released. This release contains improvements and updates to the Microsoft.Data.SqlClient data provider for SQL Server.


Our plan is to provide GA releases twice a year with two or three preview releases in between. This cadence should provide time for feedback and allow us to deliver features and fixes in a timely manner. This third 5.0 preview includes fixes and changes over the previous preview release.


Fixed



  • Fixed ReadAsync() behavior to register Cancellation token action before streaming results. #1781

  • Fixed NullReferenceException when assigning null to SqlConnectionStringBuilder.Encrypt. #1778

  • Fixed missing HostNameInCertificate property in .NET Framework Reference Project. #1776

  • Fixed async deadlock issue when sending attention fails due to network failure. #1766

  • Fixed failed connection requests in ConnectionPool in case of PoolBlock. #1768

  • Fixed hang on infinite timeout and managed SNI. #1742

  • Fixed Default UTF8 collation conflict. #1739


Changed



  • Updated Microsoft.Data.SqlClient.SNI (.NET Framework dependency) and Microsoft.Data.SqlClient.SNI.runtime (.NET Core/Standard dependency) version to 5.1.0-preview1.22278.1. #1787 which includes TLS 1.3 Support and fix for AppDomain crash in issue #1418

  • Changed the SqlConnectionEncryptOption string parser to public. #1771

  • Converted ExecuteNonQueryAsync to use async context object. #1692

  • Code health improvements #1604 #1598 #1595 #1443


Known issues



  • When using Encrypt=Strict with TLS v1.3, the TLS handshake occurs twice on initial connection on .NET Framework due to a timeout during the TLS handshake and a retry helper re-establishes the connection; however, on .NET Core, it will throw a System.ComponentModel.Win32Exception (258): The wait operation timed out. and is being investigated. If you’re using Microsoft.Data.SqlClient with .NET Core on Windows 11, you will need to enable the managed SNI on Windows context switch using following statement AppContext.SetSwitch(“Switch.Microsoft.Data.SqlClient.UseManagedNetworkingOnWindows”, true); to use TLS v1.3 or disabling TLS 1.3 from the registry by assigning 0 to the following HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSecurityProvidersSCHANNELProtocolsTLS 1.3ClientEnabled registry key and it’ll use TLS v1.2 for the connection. This will be fixed in a future release.


 


For the full list of changes in Microsoft.Data.SqlClient 5.1 Preview 1, please see the Release Notes.


 


To try out the new package, add a NuGet reference to Microsoft.Data.SqlClient in your application and pick the 5.1 preview 1 version.


 


We appreciate the time and effort you spend checking out our previews. It makes the final product that much better. If you encounter any issues or have any feedback, head over to the SqlClient GitHub repository and submit an issue.


 


David Engel

Managing Azure NetApp Files preview features with Terraform Cloud and AzAPI Provider

Managing Azure NetApp Files preview features with Terraform Cloud and AzAPI Provider

This article is contributed. See the original author and article here.

Table of Contents


 


Abstract


Introduction


Scenario


Azure NetApp Files backup preview enablement


Managing Resource Providers in Terraform


Terraform Configuration


Terraform AzAPI and AzureRM Providers


Declaring the Azure NetApp Files infrastructure


Azure NetApp Files backup policy creation


Assigning a backup policy to an Azure NetApp Files volume


AzAPI to AzureRM migration


Summary


Additional Information


 


Abstract


 


This article demonstrates how to enable the use of preview features in Azure NetApp Files in combination with Terraform Cloud and the AzAPI provider. In this example we enhance data protection with Azure NetApp Files backup (preview) by enabling and creating backup policies using the AzAPI Terraform provider and leveraging Terraform Cloud for the deployment.


 


Co-authors: John Alfaro (NetApp)


 


Introduction


 


As Azure NetApp Files development progresses new features are continuously being brought to market. Some of those features arrive in a typical Azure ‘preview’ fashion first. These features normally do not get included into Terraform before general availability (GA). A recent example of such a preview feature at the time of writing is Azure NetApp Files backup.


 


In addition to snapshots and cross-region replication, Azure NetApp Files data protection has extended to include backup vaulting of snapshots. Using Azure NetApp Files backup, you can create backups of your volumes based on volume snapshots for longer term retention. At the time of writing, Azure NetApp files backup is a preview feature, and has not yet been included in the Terraform AzureRM provider. For that reason, we decided to use the Terraform AzAPI provider to enable and manage this feature.


 


Azure NetApp Files backup provides fully managed backup solution for long-term recovery, archive, and compliance.


 



  • Backups created by the service are stored in an Azure storage account independent of volume snapshots. The Azure storage account will be zone-redundant storage (ZRS) where availability zones are available or locally redundant storage (LRS) in regions without support for availability zones.

  • Backups taken by the service can be restored to an Azure NetApp Files volume within the region.

  • Azure NetApp Files backup supports both policy-based (scheduled) backups and manual (on-demand) backups. In this article, we will be focusing on policy-based backups.


 


For more information regarding this capability go to Azure NetApp Files backup documentation.


 


Scenario


 


In the following scenario, we will demonstrate how Azure NetApp Files backup can be enabled and managed using the Terraform AzAPI provider. To provide additional redundancy for our backups, we will backup our volumes in the Australia East region, taking advantage of zone-redundant storage (ZRS).


 


GeertVanTeylingen_1-1666260655880.png


 


Azure NetApp Files backup preview enablement


To enable the preview feature for Azure NetApp Files, you need to enable the preview feature. In this case, this feature needs to be requested via the Public Preview request form. Once the feature is enabled, it will appear as ‘Registered’.


 


Get-AzProviderFeature -ProviderNamespace “Microsoft.NetApp” -Feature ANFBackupPreview

FeatureName ProviderName RegistrationState
———– ———— —————–
ANFBackupPreview Microsoft.NetApp Registered

 









(!) Note


 


A ‘Pending’ status means that the feature needs to be enabled by Microsoft before it can be used.



 


Managing Resource Providers in Terraform


 


In case you manage resource providers and its features using Terraform you will find that registering the preview feature will fail with the below message, which is expected as it is a forms-based opt-in feature.


 


Resource “azurerm_resource_provider_registration” “anfa” {
   name     = “Microsoft.NetApp”
   feature {
     name       = “ANFSDNAppliance”
     registered = true
   }
   feature {
     name       = “ANFChownMode”
     registered = true
   }
   feature {
     name       = “ANFUnixPermissions”
     registered = true
   }
   feature {
     name = “ANFBackupPreview”
     registered = true
    }
 } 

 


GeertVanTeylingen_0-1666261153399.png


 


Terraform Configuration


 


We are deploying Azure NetApp Files using a module with the Terraform AzureRM provider and configuring the backup preview feature using the AzAPI provider.


 


Microsoft has recently released the Terraform AzAPI provider which helps to break the barrier in the infrastructure as code (IaC) development process by enabling us to deploy features that are not yet released in the AzureRM provider. The definition is quite clear and taken from the provider GitHub page.


 


The AzAPI provider is a very thin layer on top of the Azure ARM REST APIs. This new provider can be used to authenticate to and manage Azure resources and functionality using the Azure Resource Manager APIs directly.


 


The code structure we have used looks like the sample below. However, if using Terraform Cloud you use the private registry for module consumption. For this article, we are using local modules.


 


ANF Repo
        |_Modules
            |_ANF_Pool
        |       |_ main.tf
        |       |_ variables.tf
        |       |_ outputs.tf
        |   |_ ANF_Volume
        |       |_ main.tf
        |       |_ variables.tf
        |       |_ outputs.tf       
        |_ main.tf
        |_ providers.tf
        |_ variables.tf
        |_ outputs.tf 

 


Terraform AzAPI and AzureRM Providers


 


We have declared the Terraform providers configuration to be used as below.


 


 provider “azurerm” {
  skip_provider_registration = true
  features {}
}
 
provider “azapi” {
}
 
terraform {
  required_providers {
    azurerm = {
      source  = “hashicorp/azurerm”
      version = “~> 3.00”
    }
 
    azapi = {
      source = “azure/azapi”
    }
  }
} 

 


Declaring the Azure NetApp Files infrastructure


 


To create the Azure NetApp Files infrastructure, we will be declaring and deploying the following resources:


 



  • NetApp account

  • capacity pool

  • volume

  • export policy which contains one or more export rules that provide client access rules


 


resource “azurerm_netapp_account” “analytics” {
  name                = “cero-netappaccount”
  location            = data.azurerm_resource_group.one.location
  resource_group_name = data.azurerm_resource_group.one.name
}
 
module “analytics_pools” {
  source   = “./modules/anf_pool”
 
  for_each = local.pools
 
  account_name        = azurerm_netapp_account.analytics.name
  resource_group_name =    azurerm_netapp_account.analytics.resource_group_name
  location            = azurerm_netapp_account.analytics.location
  volumes             = each.value
  tags                = var.tags
}

 


To configure Azure NetApp Files policy-based backups for a volume there are some requirements. For more info about these requirements, please check requirements and considerations for Azure NetApp Files backup.


 



  • snapshot policy must be configured and enabled

  • Azure NetApp Files backup is supported in the following regions. In this example we are using the Australia East region.


 


After deployment, you will be able to see the backup icon as part of the NetApp account as below.


 


GeertVanTeylingen_1-1666261358871.png


 


Azure NetApp Files backup policy creation


 


The creation of the backup policy is similar to a snapshot policy and has its own Terraform resource. The backup policy is a child element of the NetApp account. You’ll need to use the ‘azapi_resource’ resource type with the latest API version. 


 









(!) Note


 


It is helpful to install the Terraform AzAPI provider extension in VSCode, as it will make development easier with the IntelliSense completion.



 


The code looks like this:


 


resource “azapi_resource” “backup_policy” {
  type      = “Microsoft.NetApp/netAppAccounts/backupPolicies@2022-01-01”
  parent_id = azurerm_netapp_account.analytics.id
  name      = “test”
  location  = “australiaeast”
 
  body = jsonencode({
    properties = {
      enabled              = true
      dailyBackupsToKeep   = 1
      weeklyBackupsToKeep  = 0
      monthlyBackupsToKeep = 0
    }
  })
}

 









(!) Note


 


The ‘parent_id’ is the resource id of the NetApp account



 


Because we are deploying this in the Australia East region, which has support for availability zones, the Azure storage account used will be configured with zone-redundant storage (ZRS), as documented under Requirements and considerations for Azure NetApp Files backup. In the Azure Portal, within the volume context, it will look like the following:


 


GeertVanTeylingen_2-1666261532885.png


 









(!) Note


 


Currently Azure NetApp File backups supports backing up the daily, weekly, and monthly local snapshots created by the associated snapshot policy to the Azure Storage account.



 


The first snapshot created when the backup feature is enabled is called a baseline snapshot, and its name includes the prefix ‘snapmirror’.


 


GeertVanTeylingen_3-1666261563655.png


 


Assigning a backup policy to an Azure NetApp Files volume


 


The next step in the process is to assign the backup policy to an Azure NetApp Files volume. Once again, as this is not yet supported by the AzureRM provider, we will use the `azapi_update_resource` as it allows us to manage the resource properties we need from the existing NetApp account. Additionally, it does use the same auth methods as the AzureRM provider. In this case, the configuration code looks like the following where the data protection block is added to the volume configuration.


 


resource “azapi_update_resource” “vol_backup” {
  type        = “Microsoft.NetApp/netAppAccounts/capacityPools/volumes@2021-10-01”
  resource_id = module.analytics_pools[“pool1”].volumes.volume1.volume.id
  body = jsonencode({
    properties = {
      dataProtection = {
        backup = {
          backupEnabled  = true
          backupPolicyId = azapi_resource.backup_policy.id
          policyEnforced = true
        }
      }
      unixPermissions = “0740”,
      exportPolicy = {
        rules = [{
          ruleIndex = 1,
          chownMode = “unRestricted” }
        ]
      }
    }
  })
}

 


The data protection policy will look like the screenshot below indicating the specified volume is fully protected within the region.


 


GeertVanTeylingen_4-1666261660085.png


 


AzAPI to AzureRM migration


 


At some point, the resources created using the AzAPI provider will become available in the AzureRM provider, which is the recommended way to provision infrastructure as code in Azure. To make code migration a bit easier, Microsoft has provided the AzAPI2AzureRM migration tool.


 


Summary


 


The Terraform AzAPI provider is a tool to deploy Azure features that have not yet been integrated in to the AzureRM Terraform provider. As we see more adoption of preview features in Azure NetApp Files this new functionality will give us deployment support to manage zero-day and preview features, such as Azure NetApp Files backup and more.


 


Additional Information



  1. https://learn.microsoft.com/azure/azure-netapp-files

  2. https://learn.microsoft.com/azure/azure-netapp-files/backup-introduction

  3. https://learn.microsoft.com/azure/azure-netapp-files/backup-requirements-considerations

  4. https://learn.microsoft.com/azure/developer/terraform/overview-azapi-provider#azapi2azurerm-migration-tool

  5. https://registry.terraform.io/providers/hashicorp/azurerm

  6. https://registry.terraform.io/providers/Azure/azapi

  7. https://github.com/Azure/terraform-provider-azapi

Microsoft 365 expands data residency commitments and capabilities

Microsoft 365 expands data residency commitments and capabilities

This article is contributed. See the original author and article here.

Commercial and public sector organizations continue to look for new ways to advance their goals, improve efficiencies, and create positive employee experiences. The rise of the digital workforce and the current economic environment compels organizations to utilize public cloud applications to benefit from efficiency and cost reduction.

The post Microsoft 365 expands data residency commitments and capabilities appeared first on Microsoft 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.