Azure Event Hubs – Capture event streams in Parquet format to data lakes and warehouses

Azure Event Hubs – Capture event streams in Parquet format to data lakes and warehouses

This article is contributed. See the original author and article here.

Azure Event Hubs enables you to stream millions of events per second from any source using Kafka, AMQP or HTTPS protocols. Using Event Hubs capture feature, you can load real-time streaming data to data lakes, warehouses, and other storage services, so that they can be processed or analyzed by analytics services.


 


Today we are excited to announce the preview of Apache Parquet capturing support in Azure Event Hubs.


 


Why Apache Parquet for big data analytics?


Apache Parquet is column-oriented storage format that is designed for efficient data storage and retrieval. It’s open source and is not tied to any processing framework, data model or programming language. Parquet is ideal for storing any kind of big data and is built to support efficient compression and encoding schemes.  


 


Capture streaming data in Parquet format using Event Hubs


Using Azure Event Hubs, no code editor for event processing, you can automatically capture streaming data in an Azure Data Lake Storage Gen2 account in Parquet format. The no code editor allows you to easily develop an Azure Stream Analytics job without writing a single line of code.


 


parquet.png


Once data is captured, any analytics service of your choice can process or analyze Parquet data.


 


Get Started Today



 


 

Build collaborative apps with Microsoft Teams

Build collaborative apps with Microsoft Teams

This article is contributed. See the original author and article here.

This year at Microsoft Build 2022, we are sharing several enhancements and new capabilities for developers building collaborative apps for Teams and Microsoft 365. Read on to get a full recap of our Build announcements.

The post Build collaborative apps with Microsoft Teams appeared first on Microsoft 365 Blog.

Brought to you by Dr. Ware, Microsoft Office 365 Silver Partner, Charleston SC.

Azure SQL Data Exfiltration Controls: Outbound Firewall Rules aka OFRs

This article is contributed. See the original author and article here.

Data loss prevention is a major concern with all customers who would like to have granular control over their data and how it gets exported from their databases on Azure.


The steps below guide on how Outbound Firewall Rules can be leveraged to improve the security posture and ensure data gets exported only to approved Azure Storage accounts. All other Azure Storage accounts are treated as unapproved unless explicitly whitelisted.


 


The steps below use Azure APIs and Powershell cmdlets to implement the lockdown and enable OFRs.


 


Pre-requisites:

1. Valid Service Principal based Azure Active Directory (AAD) token for authentication of requests.


2. Latest version of Azure Powershell cmdlets


 


To enable Restrict Outbound Network Access and add/create OFRs using APIs

 


1. Check the current OFR configuration of the SQL Server using a GET request on


 


https://management.azure.com/subscriptions/{{subId}}/resourceGroups/{{sqlRg}}/providers/Microsoft.Sql/servers/{{sqlServer}}?api-version=2021-02-01-preview


where


{{subId}} = Subscription ID
{{sqlRg}} = Resource Group hosting the SQL server
{{sqlServer}} = name of the SQL server


 


It should show that the restrictOutboundNetworkAccess is disabled.


 


2. Create two storage accounts on Azure Storage. Example:


– auditallowstorage


– auditdenystorage


 


3. Export database to both storage accounts. The export should be successful for both accounts.


 


4. Issue a PUT request to Enable RestrictOutboundNetworkAccess on the SQL server using SQL API


https://management.azure.com/subscriptions/{{subId}}/resourceGroups/{{sqlRg}}/providers/Microsoft.Sql/servers/{{sqlServer}}?api-version=2021-02-01-preview


with JSON body as

{ "properties" : 
       {"restrictOutboundNetworkAccess": "Enabled"},
              "location": "<sql_server_region>"
}

where


{{subId}} = Subscription ID


{{sqlRg}} = Resource Group hosting the SQL server


{{sqlServer}} = name of the SQL server


<server_region> = region where the SQL server is hosted


 


5. Verify that the restrictOutboundNetworkAccess property is now set to Enabled by issuing a GET request on


https://management.azure.com/subscriptions/{{subId}}/resourceGroups/{{sqlRg}}/providers/Microsoft.Sql/servers/{{sqlServer}}/outboundfirewallrules?api-version=2021-02-01-preview


where


{{subId}} = Subscription ID


{{sqlRg}} = Resource Group hosting the SQL server


{{sqlServer}} = name of the SQL server


 


It should show that the provisioned state is “ready” for restrictOutboundNetworkAccess


 


6. Ensure that there is no existing Outbound Firewall Rule in place using this Powershell command:


 

Get-AzSqlServerOutboundFirewallRule -ServerName <sql_server_name> -ResourceGroupName <resource_group_name>

where
<resource_group_name> = Resource Group hosting the SQL server


<sql_server_name> = name of the SQL server


 


7. Export database again to both of the storage accounts (auditallowstorage and auditdenystorage). This should fail.


 


8. Create OFR only for storage account auditallowstorage using this PUT request:


https://management.azure.com/subscriptions/{{subId}}/resourceGroups/{{sqlRg}}/providers/Microsoft.Sql/servers/{{sqlServer}}/outboundfirewallrules/{{saName}}.blob.core.windows.net?api-version=2021-02-01-preview


 


where


{{subId}} = Subscription ID


{{sqlRg}} = Resource Group hosting the SQL server


{{sqlServer}} = name of the SQL server


{{saName}} = Storage Account name for which OFR is created. In this case, its auditallowstorage


 


9. Verify that OFR was successfully created for storage account using this Powershell command:


 

Get-AzSqlServerOutboundFirewallRule -ServerName <sql_server_name> -ResourceGroupName <resource_group_name>

 


where


<resource_group_name> = Resource Group hosting the SQL server


<sql_server_name> = name of the SQL server


It should show the list of the allowed FQDN (Fully Qualified Domain Name). In this case, its auditallowstorage.


 


10. Export database to storage account auditallowstorage. This should be successful.


 


11. Export database to storage account auditdenystorage should still fail.


 


To disable Restrict Outbound Network Access and remove OFRs

 


1. Remove all Outbound Firewall Rules:

Remove-AzSqlServerOutboundFirewallRule -ServerName <sql_server_name> -ResourceGroupName <resource_group_name> -AllowedFQDN <sa_name>.blob.core.windows.net


where


<resource_group_name> = Resource Group hosting the SQL server


<sql_server_name> = name of the SQL server
<sa_name> = Storage Account Name


 


2. Issue a PUT request to disable RestrictOutboundNetworkAccess on the SQL server using SQL API


 


https://management.azure.com/subscriptions/{{subId}}/resourceGroups/{{sqlRg}}/providers/Microsoft.Sql/servers/{{sqlServer}}?api-version=2021-02-01-preview


 


with JSON body as

{ "properties" : 
       {"restrictOutboundNetworkAccess": "Disabled"},
              "location": "<sql_server_region>"
}

 


where


{{subId}} = Subscription ID


{{sqlRg}} = Resource Group hosting the SQL server


{{sqlServer}} = name of the SQL server


<server_region> = region where the SQL server is hosted


 


3. Verify that the restrictOutboundNetworkAccess property is disabled on the SQL server by issuing the following GET request on


https://management.azure.com/subscriptions/{{subId}}/resourceGroups/{{sqlRg}}/providers/Microsoft.Sql/servers/{{sqlServer}}?api-version=2021-02-01-preview


 


where


{{subId}} = Subscription ID


{{sqlRg}} = Resource Group hosting the SQL server


{{sqlServer}} = name of the SQL server


 


To enable Restrict Outbound Network Access and add/create OFRs using Powershell

 


1. Execute the following command to enable restrictOutboundNetworkAccess property on the SQL server:

Set-AzSqlServer -ServerName <server_name> -ResourceGroupName <resource_group> -RestrictOutboundNetworkAccess "Enabled"

 


where


<server_name> = name of the SQL server
<resource_group> = name of the resource group


 


2. Check the current list of Outbound Firewall Rules on the SQL server:

Get-AzSqlServerOutboundFirewallRule -ServerName <server_name> -ResourceGroupName <resource_group>

 


where


<server_name> = name of the SQL server
<resource_group> = name of the resource group


 


3. Export database again to both of the storage accounts (auditallowstorage and auditdenystorage). This should fail.


 


4. Add a new Outbound Firewall Rule on the server using the command:

New-AzSqlServerOutboundFirewallRule -ServerName <server_name> -ResourceGroupName <resource_group> -AllowedFQDN <sa_name>.blob.core.windows.net


where


<resource_group> = Resource Group hosting the SQL server


<server_name> = name of the SQL server
<sa_name> = Storage Account Name


 


5. List the OFRs on the server using the following command:

Get-AzSqlServerOutboundFirewallRule -ServerName <server_name> -ResourceGroupName <resource_group>

 


6. Export database to storage account auditallowstorage. This should be successful


 


7. Export database to storage auditdenystorage should still fail.


 


Hope this was useful folks! Feel free to get in touch :)

Experiencing Latency and Data Loss issue in Azure Portal for Many Data Types – 05/22 – Resolved

This article is contributed. See the original author and article here.

Final Update: Sunday, 22 May 2022 08:22 UTC

We’ve confirmed that all systems are back to normal with no customer impact as of 05/22, 07:19 UTC. Our logs show the incident started on 05/22, 04:44 UTC and that during the 2 hours and 36 minutes that it took to resolve the issue. Some customers using Application Insights components in USGOV Virginia ingesting telemetry in USGOV Texas and USDoD Central geographical regions may have experienced intermittent data latency, data gaps and incorrect alert activation.
  • Root Cause: The failure was due to backend dependent service becoming unhealthy.
  • Incident Timeline: 2 Hours & 35 minutes – 05/22, 04:44 UTC through 05/22, 07:19 UTC
We understand that customers rely on Application Insights as a critical service and apologize for any impact this incident caused.

-Anmol

Join Mixed Reality Dev Days on June 8-9 where we’ll introduce the public preview of MRTK3

Join Mixed Reality Dev Days on June 8-9 where we’ll introduce the public preview of MRTK3

This article is contributed. See the original author and article here.

DevDays-EmailHeader-01.png


 


If you’re not already familiar with Mixed Reality Toolkit (MRTK), it’s an open-source project led by Microsoft that provides UX building blocks for MR and VR applications. The experiences you build with MRTK can run on any device that supports the OpenXR runtime such as HoloLens and Meta Quest. We’ve heard from the community that they love the richness of the MRTK UI controls and that it reduces development time, especially for apps that need to run on multiple platforms. Components for hand and eye tracking, inputs, solvers, diagnostic tools, scene management, and more can help you to build experiences that look great with less effort.


 


We’re excited to share the next release of this powerful toolkit, MRTK3 Public Preview, at Mixed Reality Dev Days on June 8-9.  With MRTK3, you’ll have the option of a lighter-weight solution which allows you to select only the components of the toolkit you need. The release also includes a new interaction system, new theming and databinding features, Unity canvas support, and an updated design language that can help you refresh your app’s look and add polish. Additionally, native OpenXR support makes it even easier to target multiple devices such as HoloLens, Meta Quest, Windows Mixed Reality, and future OpenXR-supported devices.


 


Be the first to learn about MRTK3 at a free event, online or in-person 


Join us June 8th and 9th via livestream or at the Microsoft Campus in Redmond, WA. Either way, you’ll learn about MRTK3 directly from the engineers who are building the latest features.  Catch deep technical sessions, provide feedback to the team, and ask your questions live. 


By attending in-person, you’ll have access to even more goodness.  



  • Network with the Microsoft team and other developers.  

  • Catch a fireside chat or panel discussion 

  • Get expanded session content covering: 



  • How to build applications with C# and OpenXR using StereoKit, a code-first, open-source library for cross-platform development. 

  • Introduction to Babylon.js and how easy it is to bring mixed reality to the web. 

  • Recently released HoloLens features like Moving Platform Mode 


 


Participate in the online hackathon 


Mixed Reality Dev Days also marks the kickoff of a month-long online hackathon where you can compete for prizes while getting hands on with MRTK3 public preview or StereoKit. Join a team or build a solo project with access to expert support. 


Learn more about Mixed Reality Dev Days and sign up now.


 


We look forward to connecting with you soon!


 


Mixed Reality Dev Days Team