The ultimate Microsoft Fabric, Power BI, Azure AI, and SQL learning event: Join us in Stockholm, September 24-27, 2024.
Save €200 with code MSCUST on top of early bird pricing!
Find everything you need to get certified on Fabric—skills challenges, live sessions, exam prep, role guidance, and more. Get started
I have various reports that will connect to on-prem SQL Server DBs (via the enterprise gateway connections) and now what will also bring in data in Azure SQL DB. I've done some experimenetation and I can get this to work. I can use the gateway connection for the on-prem database and enter credentials directly in the service "Schedule Refresh" settings for the Azure SQL DB.
BUT.... ideally I'd like to use an account with a non-expiring password and governed by IT (i.e. a resource account the not everyone knows) for the Azure SQL DB access similar to like we do for our On-Prem gateway connections. So.... I tested also creating a Gateway connection to the Azure SQL DB using a straight SQL Auth User ID/Password. That worked fine and the dataset refreshed.
My question is this...... in this scenario, where I use the gateway connection to the Azure SQL DB will the Gateway suck all the data down on-prem (from Azure SQL DB) and then push it back up to the service?
That would make it "cloud to on-prem to cloud" as opposed to "cloud to cloud". With small amounts of data that may be acceptable from a cost and refresh time persepctive but not for larger datasets. I can do a network trace but wondered if anyone had any insight here. I do understand that you can also setup a gateway in an Azure VM. That might be an option but would have additional cost ramifications.
Any input is appreciated.
GilbertQ, thanks for the response.
I do know that users can setup the credentials for the refresh out in the service. My concern is that when their passowords expire the refreshes will fail. I want to use an IT controlled userid/password combination with a never expiring password and I don't want to give those credentials out to my business users. So.. the only solution for that would be for any business user that wants to publish a dataset accessing teh Azure SQL DB to contact IT to setup their refresh schedule. That is not ideal.
Defining a connection on the gateway does allow me to have an IT managed solution that does not expose the IT controlled userid/password because there I can define the connection (I would be the only one knowing the credentials) on the Gateway and I could add each business user as a person that can publish and use that connection. That may cause the data to traverse cloud to on prem to cloud. I'll be tracing this scenario Wed with my network guys.
Join the community in Stockholm for expert Microsoft Fabric learning including a very exciting keynote from Arun Ulag, Corporate Vice President, Azure Data.
Check out the August 2024 Power BI update to learn about new features.
User | Count |
---|---|
56 | |
25 | |
14 | |
12 | |
12 |
User | Count |
---|---|
106 | |
38 | |
28 | |
22 | |
22 |