Set up connection from Azure Data Factory to Databricks
Both, Azure Data Factory and Azure Databricks offer transformations at scale when it comes to ELT processing. On top of that, ADF allows you to orchestrate the whole solution in an easy way. In a case, when you prefer to use Scala, Python or SQL code in your process, rather than Mapping Data Flow in ADF – you must link ADF to Databricks. I will show you how to do that in two ways.
In this short video, I will present two methods and their differences, and as always the demo:
DEMO 1: Connect via PAT (Personal Access Token)
DEMO 2: Connect via MSI (Managed Identity Authentication)
About author
You might also like
ASF 012 video invitation
Hi all, The next episode of ASF podcast is almost ready. Do you know who is the next guest?
ADF – Continuous Integration & Deployment with Azure DevOps
Building CI/CD process for Azure Data Factory is not quite straightforward. Furthermore, there are a few different methods of doing that. Before we begin doing that, we must set up
Azure Databricks – create new workspace and cluster
In this post, I will quickly show you how to create a new Databricks in Azure portal, create our first cluster and how to start work with it. This post
1 Comment
Simon
May 12, 13:13Hi Kamil,
thanks a lot for the great video. I know the video is quite old but maybe you still see my question:
I’m working at the moment on an architecture like the one you showed me, but the databricks workspace will be deployed automatically via terraform.
So in this configuration it is not feasible to asign contributor rights for the managed identity to the databricks resource itself, since the service principle of the terraform agent does not have the rights to assign roles to users.
My idea is to give the managed identity contributor rights to the resource group into which the databricks workspace will be deployed, but contributor rights to the whole resource group is a little bit much rights for this use case …
Do you know if there is a role like “databricks contributor” in Azure that I could give to the managed identity instead?
I searched for it, but I was not able to find a feasible role…
Thanks a lot!
Simon