-
Notifications
You must be signed in to change notification settings - Fork 87
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create inventory of service principals and direct files access in Azure for a Spark session #310
Comments
I believe this is issue is not completed, since we are not crawling SPN from Spark session level settings in user codes |
@qziyuan we can start working on it once we complete the table migration critical path |
this is not in our critical path, as we can crawl for SPN usage directly through Azure APIs - https://github.com/databrickslabs/ucx/blob/main/src/databricks/labs/ucx/azure/access.py#L23-L31 |
@dipankarkush-db : Could you confirm that ucx already covers your question? If the service principal is used through Spark settings, we find it due its permissions on storage accounts. We might not find its credentials, but we recommend to use access connectors instead. If it covers your question, then we need to rewrite this issue to remove these spark configuration settings during code migrations as the authentication is handled by UC. |
Closing in favour of #2021 |
In Azure, data access is authorized using service principals using Spark session settings.
We need a feature in the tool to create an inventory of all service principals and direct files/mount points that are currently being used in the workspace along with the objects in teh spark session
The text was updated successfully, but these errors were encountered: