简体   繁体   English

Azure 数据湖文件中的逻辑视图

[英]Logical views in Azure Data lake file

I have a requirement to classify PII and Non PII data from Azure Data lake Gen 1 file.我需要对 Azure Data Lake Gen 1 文件中的 PII 和非 PII 数据进行分类。 As i am looking not to duplicate the Physical file creation in Data lake, can we create logical views in Data lake preferably compare to materialized views.由于我不希望复制数据湖中的物理文件创建,我们能否在数据湖中创建逻辑视图,最好与物化视图进行比较。

Preferable Technology - Azure Synapse analytics/ Databricks / VM with spark process,...首选技术 - Azure Synapse 分析/Databricks/VM 与 Spark 进程,...

Also technology which is easy to Integrate with Active Directory for RBAC.还有易于与 RBAC 的 Active Directory 集成的技术。

Let me know the possibilities.让我知道可能性。

You can achieve this today with Azure Synapse SQL on-demand.您现在可以使用 Azure Synapse SQL 按需实现这一目标。 Here is how:方法如下:

  1. Create a database创建数据库
  2. Create database scoped credentials创建数据库范围的凭据
  3. Create external data source using that credential使用该凭据创建外部数据源
  4. Create both VIEWs over files在文件上创建两个视图

Here are some docs that can help you with these steps: https://docs.microsoft.com/en-us/azure/synapse-analytics/sql/create-use-external-tables https://docs.microsoft.com/en-us/azure/synapse-analytics/sql/create-use-views以下是一些可以帮助您完成这些步骤的文档: https : //docs.microsoft.com/en-us/azure/synapse-analytics/sql/create-use-external-tables https://docs.microsoft.com /en-us/azure/synapse-analytics/sql/create-use-views

Once that is done, you should create logins and inside of the database create users tied to those logins.完成后,您应该创建登录名,并在数据库内部创建与这些登录名相关联的用户。 This doc can help: https://docs.microsoft.com/en-us/azure/synapse-analytics/sql/access-control#database-level-permission该文档可以提供帮助: https : //docs.microsoft.com/en-us/azure/synapse-analytics/sql/access-control#database-level-permission

Now you should grant appropriate permissions, based on your description I think you would need these permissions:现在您应该根据您的描述授予适当的权限,我认为您需要这些权限:

  1. GRANT SELECT on a VIEW – doc: https://docs.microsoft.com/en-us/sql/t-sql/statements/grant-object-permissions-transact-sql?view=sql-server-ver15视图上的 GRANT SELECT – 文档: https : //docs.microsoft.com/en-us/sql/t-sql/statements/grant-object-permissions-transact-sql? view = sql-server-ver15
  2. GRANT REFERENCES on a CREDENTIAL – doc: https://docs.microsoft.com/en-us/sql/t-sql/statements/grant-database-scoped-credential-transact-sql?view=sql-server-ver15授予凭证上的引用 – 文档: https ://docs.microsoft.com/en-us/sql/t-sql/statements/grant-database-scoped-credential-transact-sql?view = sql-server-ver15
  3. DENY ADMINISTER DATABASE BULK OPERATIONS – doc: https://docs.microsoft.com/en-us/sql/t-sql/statements/deny-database-permissions-transact-sql?view=sql-server-ver15拒绝管理数据库批量操作 – 文档: https ://docs.microsoft.com/en-us/sql/t-sql/statements/deny-database-permissions-transact-sql?view=sql-server-ver15

This will give you a database with views and users that can access VIEW they were allowed to access and they won't be able to create new objects in the database nor use the credential to do random queries over the lake.这将为您提供一个包含视图和用户的数据库,这些用户可以访问他们被允许访问的 VIEW,并且他们将无法在数据库中创建新对象,也无法使用凭据对湖进行随机查询。

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM