This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# SETTING UP JAVA DEVELOPMENT ENV ON MAC | |
1. Create bash_profile | |
1. cd ~/ | |
1. touch .bash_profile | |
2. Install HomeBrew | |
1. Open the “Terminal” application, found in /Applications/Utilities/ | |
1. Run the command : /usr/bin/ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)" | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This document demonstrates how to perform secured ingestion from an external snowflake into Azure Blob store using Databricks secrets and Azure Keyvault | |
# Use secrets to keep data secure | |
Sometimes accessing data requires that you authenticate to external data sources through JDBC. | |
Instead of directly entering your credentials into a notebook, use Azure Databricks secrets to store your credentials and reference them in notebooks and jobs. | |
# Types of secrets | |
There are 2 types of secrets Databricks backed scopes and Azure KeyVault backed scopes. | |
We would prefer using Azure Keyvault backed scopes whenever possible because it has much better security controls than | |
Databricks backed scope which would only be for testing. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## Programmatically Purging Azure Frontdoor CDN With AzDevops | |
1. Create a Azure Service Connection by creating a service principal so that devops process has access to perform pruging operation on frontdoor resource | |
1. Create a App Registration -> as spn-devops-dev | |
2. Goto Certificates and Secrets -> Add secret , note the ApplicationId and Secret | |
3. Goto Frontdoor instance -> open Access Control (IAM) -> Add Role Assignment -> Role as "Contributor" -> Assign Access To-> "user, groups or service principal" -> Select -> search for service principal spn-devops-dev -> Select | |
4. Note the Azure Service Connection name - as mymap-dev-service-connection | |
2. Add environment variables for Azure FrontDoor, ResourceGroup and Service Connection | |
3. Add a purging step which depends on the successly deploy. This ensure the cdn cache is refreshed with newer contents from the build after every build. |