You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: data-explorer/business-continuity-overview.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.custom:
13
13
14
14
# Business continuity and disaster recovery overview
15
15
16
-
Business continuity and disaster recovery in Azure Data Explorer enables your business to continue operating in the face of a disruption. This article discusses availability (intra-region) and disaster recovery. It details native capabilities and architectural considerations for a resilient Azure Data Explorer deployment. It details recovery from human errors, high availability, followed by multiple disaster recovery configurations. These configurations depend on resiliency requirements such as Recovery Point Objective (RPO) and Recovery Time Objective (RTO), needed effort, and cost.
16
+
Business continuity and disaster recovery in Azure Data Explorer enables your business to continue operating in the face of a disruption. This article discusses availability (intra-region) and disaster recovery. It details native capabilities and architectural considerations for a reliable Azure Data Explorer deployment. It details recovery from human errors, high availability, followed by multiple disaster recovery configurations. These configurations depend on recoverability requirements such as Recovery Point Objective (RPO) and Recovery Time Objective (RTO), needed effort, and cost.
17
17
18
18
## Mitigate disruptive events
19
19
@@ -75,7 +75,7 @@ Azure Data Explorer doesn't provide automatic protection against the outage of a
75
75
76
76
## Disaster recovery configurations
77
77
78
-
This section details multiple disaster recovery configurations depending on resiliency requirements (RPO and RTO), needed effort, and cost.
78
+
This section details multiple disaster recovery configurations depending on recoverability requirements (RPO and RTO), needed effort, and cost.
79
79
80
80
Recovery time objective (RTO) refers to the time to recover from a disruption. For example, RTO of 2 hours means the application has to be up and running within two hours of a disruption. Recovery point objective (RPO) refers to the interval of time that might pass during a disruption before the quantity of data lost during that period is greater than the allowable threshold. For example, if the RPO is 24 hours, and an application has data beginning from 15 years ago, they're still within the parameters of the agreed-upon RPO.
81
81
@@ -119,7 +119,7 @@ The Active-Hot configuration is similar to the [Active-Active configuration](#ac
119
119
120
120
### On-demand data recovery configuration
121
121
122
-
This solution offers the least resiliency (highest RPO and RTO), is the lowest in cost and highest in effort. In this configuration, there's no data recovery cluster. Configure continuous export of curated data (unless raw and intermediate data is also required) to a storage account that is configured GRS (Geo Redundant Storage). A data recovery cluster is spun up if there's a disaster recovery scenario. At that time, DDLs, configuration, policies, and processes are applied. Data is ingested from storage with the ingestion property [kustoCreationTime](ingest-data-event-grid-overview.md) to override the ingestion time that defaults to system time.
122
+
This solution offers the least recoverability (highest RPO and RTO), is the lowest in cost and highest in effort. In this configuration, there's no data recovery cluster. Configure continuous export of curated data (unless raw and intermediate data is also required) to a storage account that is configured GRS (Geo Redundant Storage). A data recovery cluster is spun up if there's a disaster recovery scenario. At that time, DDLs, configuration, policies, and processes are applied. Data is ingested from storage with the ingestion property [kustoCreationTime](ingest-data-event-grid-overview.md) to override the ingestion time that defaults to system time.
123
123
124
124
:::image type="content" source="media/business-continuity-overview/on-demand-data-recovery-cluster.png" alt-text="On-demand data recovery cluster configuration.":::
125
125
@@ -129,7 +129,7 @@ This solution offers the least resiliency (highest RPO and RTO), is the lowest i
129
129
130
130
### Summary of disaster recovery configuration options
Copy file name to clipboardExpand all lines: data-explorer/kusto/management/data-export/continuous-data-export.md
+12Lines changed: 12 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -102,12 +102,14 @@ Followed by:
102
102
```
103
103
104
104
::: moniker range="azure-data-explorer"
105
+
105
106
## Continuous export from a table with Row Level Security
106
107
107
108
To create a continuous export job with a query that references a table with [Row Level Security policy](../../management/row-level-security-policy.md), you must:
108
109
109
110
* Provide a managed identity as part of the continuous export configuration. For more information, see [Use a managed identity to run a continuous export job](continuous-export-with-managed-identity.md).
110
111
* Use [impersonation](../../api/connection-strings/storage-connection-strings.md#impersonation) authentication for the external table to which the data is exported.
112
+
111
113
::: moniker-end
112
114
113
115
## Continuous export to delta table - Preview
@@ -159,15 +161,25 @@ To define continuous export to a delta table, do the following steps:
159
161
160
162
**Policies**:
161
163
164
+
:::moniker range="azure-data-explorer"
165
+
162
166
* Continuous export can't be enabled on a table with [Row Level Security policy](../../management/row-level-security-policy.md) unless specific conditions are met. For more information, see [Continuous export from a table with Row Level Security](#continuous-export-from-a-table-with-row-level-security).
163
167
* Continuous export can't be configured on a table with [restricted view access policy](../restricted-view-access-policy.md).
164
168
169
+
::: moniker-end
170
+
:::moniker range="microsoft-fabric"
171
+
172
+
* Continuous export can't be configured on a table with [restricted view access policy](../restricted-view-access-policy.md).
173
+
174
+
::: moniker-end
175
+
165
176
## Related content
166
177
167
178
:::moniker range="microsoft-fabric"
168
179
169
180
*[.create or alter continuous-export](create-alter-continuous.md)
Copy file name to clipboardExpand all lines: data-explorer/kusto/management/row-level-security-policy.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,9 +38,9 @@ For more information, see [management commands for managing the Row Level Securi
38
38
* There's no limit on the number of tables on which Row Level Security policy can be configured.
39
39
* Row Level Security policy cannot be configured on [External Tables](../query/schema-entities/external-tables.md).
40
40
* The RLS policy can't be enabled on a table under the following circumstances:
41
-
*When it's referenced by an [update policy](update-policy.md)query, while the update policy is not configured with a managed identity.
42
-
*When it's referenced by a [continuous export](../management/data-export/continuous-data-export.md) that uses an authentication method other than impersonation.
43
-
*When a [restricted view access policy](restricted-view-access-policy.md)is configured for the table.
41
+
*The table is referenced by an [update policy](update-policy.md)that doesn’t use a managed identity. A managed identity is required so the engine can securely determine which rows from the referenced tables are allowed to be queried.
42
+
*The table is referenced by a [continuous export](../management/data-export/continuous-data-export.md) that doesn't uss the `impersonate`authentication method. Impersonation ensures that only users who have access to the target storage account can read the exported (and potentially sensitive) data.
43
+
*The table has [restricted view access policy](restricted-view-access-policy.md) configured.
44
44
* The RLS query can't reference other tables that have Row Level Security policy enabled.
45
45
* The RLS query can't reference tables located in other databases.
0 commit comments