Skip to content

Latest commit

 

History

History
244 lines (134 loc) · 14.4 KB

module11.md

File metadata and controls

244 lines (134 loc) · 14.4 KB

Module 11 - Securely scan sources using Self-Hosted Integration Runtimes

< Previous Module - Home - Next Module >

📢 Introduction

Microsoft Purview comes with a managed infrastructure component called AutoResolveIntegrationRuntime. This component is required when scanning sources and most useful when connecting to data stores and computes services with public accessible endpoints. However some of your sources might be VM-based or can be applications that either sit in a private network (VNET) or other networks, such as on-premises. For these kind of scenarios a Self-Hosted Integration Runtime (SHIR) is recommended.

In this lab you learn how to setup a more complex scenario of using a SHIR and private virtual network. First, you'll deploy a virtual network and storage account, then you will deploy and use private endpoints to route all traffic securely, without using any public accessible endpoints. Lastly, you configure the SHIR, Azure Key Vault and configure everything in Microsoft Purview.

🤔 Prerequisites

🎯 Objectives

  • Connect to on premise data source using a self-hosted integration runtime.

Table of Contents

  1. Virtual network creation
  2. Storage account creation
  3. Private endpoint creation
  4. Self-hosted integration runtime installation
  5. Key vault creation
  6. Key Vault configuration within Microsoft Purview
  7. Summary

1. Virtual network creation

  1. For deploying your Self-Hosted Integration Runtime you first need to create a new virtual network. This is needed for the virtual machine and private endpoint to be created. Open the Azure Portal, search for Virtual Network and click Create. First you need to give your new network a name. I’m using the same resource group that is used for Microsoft Purview.

    ALT

  2. Next you need to define your address spaces. If the proposed 10.0.0.0 is what you like, you can continue and hit next.

    ALT

2. Storage account creation

  1. Next we will setup a storage account for demonstration. This is the resource that will be scanned during this demo. Select create new resource, choose Storage Account, select the resource group you just created, provide a unique name, and hit next.

    ALT

  2. For the Storage Account we will ensure that hierarchical namespaces are selected. Click next to jump over to the Networking tab.

    ALT

  3. For networking, select Private endpoint as the connectivity method. Don’t create any private endpoints at this stage. This comes later.

    ALT

  4. After this step you can hit review + create, finalize and wait for the storage account to be created.

3. Private endpoint creation

Your next step is creating a private endpoint: a network interface that uses a private IP address from your virtual network. This network interface connects you privately and securely to your storage account. It also means all network traffic is routed internally, which is useful to mitigate network exfiltration risks.

  1. For creating a new private endpoint, go to your storage account. Click on networking on the left side. Go to private endpoints and click on the + icon.

    ALT

  2. Start with the basics by providing a name. This will be name of your network interface created in the virtual network.

    ALT

  3. Next, you need to select which resource type you want to expose. For this demo we will use blob.

    ALT

  4. The last configuration is selecting which virtual network the private endpoint must be deployed within. You should use the virtual network which you created in the previous steps. For the Private IP configuration you can select to dynamically allocate IP addresses.

    ALT

  5. When returning to the network overview settings, there is one additional step: allowing network traffic from your subnet. Go back to the firewall and virtual networks settings within your Storage Account. Add an existing virtual network, select your subnet from the list, and click Add.

    ALT

  6. The virtual network should be added to the list. Don’t forget to hit the ‘save’ button!

    ALT

  7. After this configuration you’re set. Let’s continue and setup your virtual machine.

4. Self-hosted integration runtime installation

A self-hosted integration runtime is a software component that scans for metadata. You can install on many different types of (virtual) machines. You can download it from the following location: https://www.microsoft.com/download/details.aspx?id=39717

For this demo you will be using Windows 10. Open the Azure Portal again to search for virtual machines.

  1. Create new and select Windows 10 Pro as the image version. Remember to enter a username and password. Click next to examine the network settings. The newly created virtual network using the 10.0.0.0 space should be selected here.

    ALT

  2. After the virtual machine has been created, download the RDP file for easily taking over remote control.

    ALT

  3. After downloading your RDP file, open it and enter your username and password from the previous section. If everything goes well, you should be connected and see the virtual machine’s desktop. To validate that your private endpoint works correctly, open CMD and type:

    nslookup storageaccountname.blob.core.windows.net
    
  4. If everything works correctly, the privatelink.blob.core.windows.net should show up in the list. This means is that your default access location has become an alias for an internal address. Although you use a public name, network is routed internally via the virtual network.

    ALT

  5. When everything is working, you must download the self-hosted integration runtime package. The installation is straight forward. Just hit next and wait for the service to show up. While waiting, you should open Microsoft Purview. Open the data map and go to integration runtimes. Hit + new and select the self-hosted from the panel and continue.

    ALT

  6. After completing the wizard, you see a link where you can download the latest version of the runtime. You also find two keys. Copy the first one to your clipboard.

    ALT

  7. Next, go back to your virtual machine. Copy paste the link into the manager and hit ‘register’. Wait a minute or so, the integration runtime should show up in the list very soon!

    ALT

  8. If everything works well your self-hosted integration runtime should be running within Purview. Congrats that you made it this far!

    ALT

5. Key vault creation

For securely accessing your storage account you will store your storage account key in a Key Vault. A key vault is a central place for managing your keys, secrets, credentials and certifications. This avoids keys get lost or changing these is a cumbersome task.

  1. For creating a Key Vault go back to your Azure Portal. Search for Key Vault, hit create, provide a name and hit create.

    ALT

  2. After deployment you need to ensure that Microsoft Purview has read access to the Key Vault. Open Key Vault, go to Access configuration, and hit Go to access policies.

    ALT

  3. Because the Account Key is just a secret we will only provide access for Get and List, see below. Click next when ready.

    ALT

  4. For providing access you need to use the system-managed identity of Microsoft Purview. This identity has the same name as your Purview instance name. Find it, select it and hit Next.

    ALT

  5. Next you need to ensure two things: 1) purview’s managed identity has access to read from the storage account 2) the storage account key has been stored in the Key Vault. Go back to your storage account. Navigate to IAM and give your Purview Managed Identity the role: Storage Blob Data Reader. Detailed instructions can be found here.

    ALT

  6. Next, go to Access keys within the storage account section. Show the keys using the button at the top. Select Key1 and copy the secret to your clipboard. Head back to your Key Vault.

    ALT

  7. Within your Key Vault, select Secrets and choose Generate/Import. The dialog below should pop up. Enter a name for your secret and copy/paste the Storage Account Key value from your clipboard. Hit Create to store your newly created secret.

    ALT

6. Key Vault configuration within Microsoft Purview

Now the Storage Account Key has been stored in the Key Vault it is time to move back to Microsoft Purview for your final configuration. Go to your settings panel on the right and select Credentials.

  1. Click on Manage Key Vault connections, provide a new name and select your newly created key vault from the list. Hit create for saving.

    ALT

  2. Next, you need to store a new credential. Click on + New, enter a new name, select Account Key from the list of authentication options. Finally, you need to enter a secret name. It is important that this name exactly matches the name of your secret in the Key Vault! Hit create to finalize.

    ALT

  3. Now you can move to Sources. Register a new source, select Azure Data Lake Storage Gen2 and select your storage account from the list.

    ALT

  4. Next you need to start scanning your source. Click new scan and select your Self-Hosted Integration Runtime from the list. Before you continue ensure everything works by testing your connection.

    ALT

  5. If everything works you should be able to select your folders and start scanning!

    ALT

7. Summary

This has been a long read, but also demonstrates how you can use your own integration runtime to securely scan sources. With some additional overhead all data and metadata traffic remains secure within your own virtual network. There’s no risk for any data exfiltration!

💡 Did you know?

The Purview Integration Runtime can also be used to scan and ingest metadata assets from Azure cloud services that are hidden behind private endpoints, such as Azure Data Lake, Azure SQL Database, Azure Cosmos DB and more.

🎓 Knowledge Check

https://aka.ms/purviewlab/q11

  1. What is an Self-Hosted Integration Runtime used for?

    A) It's used for copying data from or to an on-premises data store or networks with access control
    B) It's used for copying data between cloud based data stores or networks with public endpoints
    C) It's used for copying data between managed environments

  2. Self-Hosted Integration Runtime can be shared across multiple services when installed on one machine/VM.

    A) True
    B) False

  3. Which Azure services can be scanned and have metadata assets ingested from using the self-hosted integration runtime?

    A) Azure Blob Storage
    B) Azure SQL Database
    C) Azure Synapse Analytics
    D) All of these
    E) None of these

🎉 Summary

In this module, you learned how to install the self-hosted integration runtime to your virtual machine network and get it connected up to Microsoft Purview. If you'd like continue with this module to complete further tasks, please feel free to complete the tutorial links below:

Continue >