You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/big-data-cluster/cluster-manage-notebooks.md
+13-2Lines changed: 13 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ Once all dependencies are installed, but **Run all cells** fails, each notebook
26
26
This section contains a set of notebooks useful for installing and uninstalling command-line tools and packages needed to manage SQL Server Big Data Clusters.
27
27
28
28
|Name |Description |
29
-
|---|---|---|---|
29
+
|---|---|
30
30
|SOP010 - Upgrade a big data cluster|Use this notebook to upgrade a Big Data Cluster using azdata. |
31
31
|SOP012 - Install unixodbc for Mac|Use this notebook when getting errors while using brew install the odbc for SQL Server.|
32
32
|SOP036 - Install kubectl command-line interface|Use this notebook to install kubectl command-line interface regardless your OS.|
@@ -44,13 +44,24 @@ This section contains a set of notebooks useful for installing and uninstalling
44
44
|SOP064 - Uninstall azdata CLI (using package manager)|Use this notebook to uninstall azdata CLI (using package manager).|
45
45
|SOP069 - Install ODBC for SQL Server|Use this notebook to install ODBC driver since some subcommands in azdata require the SQL Server ODBC driver.|
46
46
47
+
## Encryption at Rest utilities on Big Data Cluster (BDC)
48
+
49
+
This section contains a set of notebooks useful for managing Encryption at Rest features on BDC.
50
+
51
+
|Name |Description |
52
+
|---|---|
53
+
|SOP0124 - List Keys for Encryption at Rest|Use this notebook list all HDFS keys.|
54
+
|SOP0128 - Enable HDFS Encryption zones in Big Data Clusters|Use this notebook to enable HDFS Encryption Zones when upgrading to CU8 from CU6 or previous. Not required on new deployments of CU8+ or when upgrading to CU9.|
55
+
|SOP0125 - Delete Key For Encryption at Rest|Use this notebook to delete HDFS encryption zone keys. __Caution!__|
56
+
|SOP0126 - Backup Keys For Encryption at Rest|Use this notebook to backup HDFS encryption zone keys.|
57
+
|SOP0127 - Restore Keys For Encryption at Rest|Use this notebook to restore HDFS encryption zone keys.|
47
58
48
59
## Managing Certificates on Big Data Clusters (BDC)
49
60
50
61
A set of notebooks to run a notebook for managing Certificates on Big Data Clusters.
51
62
52
63
|Name |Description |
53
-
|---|---|---|---|
64
+
|---|---|
54
65
|CER001 - Generate a Root CA certificate|Generate a Root CA certificate. Consider using one Root CA certificate for all non-production clusters in each environment, as this technique reduces the number of Root CA certificates that need to be uploaded to clients connecting to these clusters. |
55
66
|CER002 - Download existing Root CA certificate|Use this notebook to download a generated Root CA certificate from a cluster.|
56
67
|CER003 - Upload existing Root CA certificate|CER003 - Upload existing Root CA certificate.|
Copy file name to clipboardExpand all lines: docs/big-data-cluster/encryption-at-rest-concepts-and-configuration.md
+37-21Lines changed: 37 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,9 +24,9 @@ SQL Server Big Data Clusters stores data in the following two locations:
24
24
To be able to transparently encrypt data in SQL Server Big Data Clusters, there are two possible approaches:
25
25
26
26
*__Volume encryption__. This approach is supported by the Kubernetes platform and is expected as a best practice for Big Data Clusters deployments. This guide does not cover volume encryption. Consult your Kubernetes platform or appliance documentation for guides on how to properly encrypt volumes that will be used for SQL Server Big Data Clusters.
27
-
*__Application level encryption__. This architecture refers to the encryption of data by the application handling the data before it is written to disk. In case the volumes are exposed, an attacker wouldn’t be able to restore data artifacts elsewhere, unless the destination system also has been configured with the same encryption keys.
27
+
*__Application level encryption__. This architecture refers to the encryption of data by the application handling the data before it is written to disk. In case the volumes are exposed, an attacker wouldn’t be able to restore data artifacts elsewhere, unless the destination system also has been configured with the same encryption keys.
28
28
29
-
The Encryption at Rest feature set of SQL Server Big Data Clusters supports the core scenario of application level encryption for the SQL Server and HDFS components.
29
+
The __Encryption at Rest feature set of SQL Server Big Data Clusters__ supports the core scenario of __application level encryption__ for the __SQL Server__ and __HDFS__ components.
30
30
31
31
The following capabilities are provided:
32
32
@@ -43,9 +43,6 @@ A Controller hosted service responsible for managing keys and certificates for t
43
43
* Hadoop KMS compatibility. It acts as the key management service for HDFS component on BDC.
44
44
* SQL Server TDE certificate management.
45
45
46
-
The following feature is not supported at this time:
47
-
**Keys Versioning support*.
48
-
49
46
We will reference this service as __BDC KMS__ throughout the rest of this document. Also the term __BDC__ is used to refer to the __SQL Server Big Data Clusters__ computing platform.
50
47
51
48
### System-managed keys and certificates
@@ -60,9 +57,9 @@ User provided keys and certificates to be managed by BDC KMS, commonly known as
60
57
61
58
External key solutions compatible with BDC KMS for external delegation. This capability isn't supported at this time.
62
59
63
-
## Encryption at rest on SQL Server Big Data Clusters CU8
60
+
## Encryption at rest on SQL Server Big Data Clusters
64
61
65
-
SQL Server Big Data Clusters CU8 is the initial release of the Encryption at rest feature set. Read this document carefully to completely assess your scenario.
62
+
Read this document carefully to completely assess your scenario.
66
63
67
64
The feature set introduces the __BDC KMS controller service__ to provide system-managed keys and certificates for data encryption at rest on both SQL Server and HDFS. Those keys and certificates are service-managed and this documentation provides operational guidance on how to interact with the service.
68
65
@@ -75,7 +72,7 @@ The feature set introduces the __BDC KMS controller service__ to provide system-
75
72
* Master instance BDC provisioned databases and user databases won’t be encrypted automatically. DBAs may use the installed certificate to encrypt any database.
76
73
* Compute pool and storage pool will be automatically encrypted using the system-generated certificate.
77
74
* Data pool encryption, albeit technically possible using T-SQL `EXECUTE AT` commands, is discouraged and unsupported at this time. Using this technique to encrypt data pool databases might not be effective and encryption may not be happening at the desired state. It also creates an incompatible upgrade path towards next releases.
78
-
*There is no certificate rotation at this time. It is supported to decrypt and then encrypt with a new certificate using T-SQL commands if not on HA deployments.
75
+
*SQL Server key rotation is achieved using standard T-SQL administrative commands. Please read [SQL Server Big Data Clusters transparent data encryption (TDE) at rest usage guide](encryption-at-rest-sql-server-tde.md) for complete instructions.
79
76
* Encryption monitoring happens through existing standard SQL Server DMVs for TDE.
80
77
* It is supported to back up and restore a TDE enabled database into the cluster.
81
78
* HA is supported. If a database on the primary instance of SQL Server is encrypted, then all secondary replica of the database will be encrypted as well.
@@ -86,12 +83,20 @@ The feature set introduces the __BDC KMS controller service__ to provide system-
86
83
* A system-generated key will be provisioned in Hadoop KMS. The key name is `securelakekey`. On CU8 the default key is 256-bit and we support 256-bit AES encryption.
87
84
* A default encryption zone will be provisioned using the above system-generated key on a path named `/securelake`.
88
85
* Users can create additional keys and encryption zones using specific instructions provided in this guide. Users will be able to choose the key size of 128, 192, or 256 during key creation.
89
-
*In place key rotation for HDFS is not possible in CU8. As an alternative, the data can be moved from one encryption zone to another using distcp.
86
+
*HDFS Encryption Zones key rotation is achieved using azdata. Please read [SQL Server Big Data Clusters HDFS Encryption Zones usage guide](encryption-at-rest-hdfs-encryption-zones.md) for complete instructions.
90
87
* It's not supported to perform HDFS Tiering mounting on top of an encryption zone.
91
88
92
-
## Configuration guide
89
+
## Encryption at Rest Administration
90
+
91
+
The following list contains the administration capabilities for Encryption at Rest
93
92
94
-
SQL Server Big Data Clusters encryption at rest is a service-managed feature and, depending on your deployment path, may require additional steps.
93
+
*[SQL Server TDE](encryption-at-rest-sql-server-tde.md) management is performed using standard T-SQL commands.
94
+
*[HDFS Encryption Zones](encryption-at-rest-hdfs-encryption-zones.md) and HDFS key management is performed using azdata commands.
95
+
* The following administration features are performed using [Operational Notebooks](cluster-manage-notebooks.md):
96
+
- HDFS key backup and recover
97
+
- HDFS key deletion
98
+
99
+
## Configuration guide
95
100
96
101
During __new deployments of SQL Server Big Data Clusters__, CU8 onwards, __encryption at rest will be enabled and configured by default__. That means:
97
102
@@ -101,14 +106,11 @@ During __new deployments of SQL Server Big Data Clusters__, CU8 onwards, __encry
101
106
102
107
Requirements and default behaviors described in the previous section apply.
103
108
104
-
If __upgrading your cluster to CU8__, __read carefully the next section__.
109
+
__If performing a new deployment of SQL Server BDC CU8 onwards or upgrading directly to CU9, no additional steps are required__.
105
110
106
-
### Upgrading to CU8
111
+
### Upgrade scenarios
107
112
108
-
> [!CAUTION]
109
-
> Before upgrading to SQL Server Big Data Clusters CU8 perform a complete backup of your data.
110
-
111
-
On existing clusters, the upgrade process won't enforce encryption on user data and won't configure HDFS encryption zones. This behavior is by design and the following needs to be considered per component:
113
+
On existing clusters, the upgrade process won't enforce new encryption or re-encryption on user data that was not already encrypted. This behavior is by design and the following needs to be considered per component:
112
114
113
115
*__SQL Server__
114
116
@@ -119,17 +121,31 @@ On existing clusters, the upgrade process won't enforce encryption on user data
119
121
*__HDFS__
120
122
121
123
1.__HDFS__. The upgrade process won't touch HDFS files and folders outside encryption zones.
122
-
1.__Encryption Zones won't be configured__. The Hadoop KMS component won't be configured to use BDC KMS. In order to configure and enable HDFS encryption zones feature after upgrade follow the next section.
123
124
124
-
### Enable HDFS encryption zones after upgrade
125
+
### Upgrading to CU9 from CU8 or earlier
126
+
127
+
No additional steps are required.
128
+
129
+
### Upgrading to CU8 from CU6 or earlier
130
+
131
+
> [!CAUTION]
132
+
> Before upgrading to SQL Server Big Data Clusters CU8 perform a complete backup of your data.
133
+
134
+
135
+
__Encryption Zones won't be configured__. The Hadoop KMS component won't be configured to use BDC KMS. In order to configure and enable HDFS encryption zones feature after upgrade follow instructions of the next section.
136
+
137
+
#### Enable HDFS encryption zones after upgrade to CU8
138
+
139
+
If you upgraded your cluster to CU8 (`azdata upgrade`) and want to enable HDFS encryption zones there are two options available:
125
140
126
-
Execute the following actions if you upgraded your cluster to CU8 (`azdata upgrade`) and want to enable HDFS encryption zones.
141
+
* Execution of the Azure Data Studio [Operational Notebook](cluster-manage-notebooks.md) named __SOP0128 - Enable HDFS Encryption zones in Big Data Clusters__ to perform the configuration.
[!INCLUDE[SQL Server 2019](../includes/applies-to-version/sqlserver2019.md)]
17
17
18
-
This guide demonstrates how to use Encryption at Rest capabilities of SQL Server Big Data Clusters to encrypt HDFS folders using Encryption Zones.
18
+
This guide demonstrates how to use Encryption at Rest capabilities of SQL Server Big Data Clusters to encrypt HDFS folders using Encryption Zones. It also covers HDFS key management tasks.
19
19
20
-
Note that there is already a default encryption zone mounted at __```/securelake```__ ready to be used. It was created with a system generated 256-bit key named __securelakekey__. This key can be used to create additional encryption zones.
20
+
Note that there is a default encryption zone mounted at __```/securelake```__ ready to be used. It was created with a system generated 256-bit key named __securelakekey__. This key can be used to create additional encryption zones.
21
21
22
22
## <aid="prereqs"></a> Prerequisites
23
23
24
-
-[SQL Server Big Data Cluster CU8+](release-notes-big-data-cluster.md) with Active Directory Integration.
24
+
-[SQL Server Big Data Cluster CU8+](release-notes-big-data-cluster.md) with [Active Directory](active-directory-prerequisites.md) Integration.
25
25
- User with administrative privileges.
26
-
27
-
## Login into the name node
28
-
29
-
Use [Active Directory connection instructions](active-directory-connect.md) to perform cluster login. Log into the namenode (nmnode-0-0) to issue key and encryption zones commands.
1. In order to create a custom key for HDFS encryption. Sizes possible are 128, 192 256. Default is 256
97
+
98
+
```console
99
+
azdata hdfs key create --name key1 --size 256
100
+
```
101
+
102
+
## Next steps
103
+
104
+
Use azdata with Big Data Clusters, see [What are [!INCLUDE[big-data-clusters-2019](../includes/ssbigdataclusters-ver15.md)]?](big-data-cluster-overview.md).
105
+
106
+
Use azdata with [Azure Arc enabled data services](/azure/azure-arc/data/)
Copy file name to clipboardExpand all lines: docs/big-data-cluster/release-notes-big-data-cluster.md
+10-4Lines changed: 10 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -92,8 +92,8 @@ SQL Server 2019 CU9 for SQL Server Big Data Clusters, includes important capabil
92
92
93
93
Clusters using `mssql-conf` for SQL Server master instance configurations require additional steps after upgrading to CU9. Follow the instructions [here](bdc-upgrade-configuration.md).
94
94
95
-
- Improved experience for encryption at rest.
96
-
- Ability to install Python packages at Spark job submission time.
95
+
- Improved [!INCLUDE[azdata](../includes/azure-data-cli-azdata.md)]experience for encryption at rest.
96
+
- Ability to dynamically install Python Spark packages using virtual environments.
97
97
- Upgraded software versions for most of our OSS components (Grafana, Kibana, FluentBit, etc.) to ensure BDC images are up to date with the latest enhancements and fixes. See [Open-source software reference](reference-open-source-software.md).
98
98
- Other miscellaneous improvements and bug fixes.
99
99
@@ -248,7 +248,7 @@ SQL Server 2019 General Distribution Release 1 (GDR1) - introduces general avail
248
248
249
249
### HA SQL Server Database Encryption key encryptor rotation
250
250
251
-
-**Affected releases**: All big data cluster HA deployments irrespective of the release.
251
+
-**Affected releases**: All version up to CU8. Resolved for CU9.
252
252
253
253
-**Issue and customer impact**: With SQL Server deployed with HA, the certificate rotation for the encrypted database fails. When the following command is executed on the master pool, an error message will appear:
254
254
```
@@ -257,7 +257,13 @@ SQL Server 2019 General Distribution Release 1 (GDR1) - introduces general avail
257
257
CERTIFICATE <NewCertificateName>
258
258
```
259
259
There is no impact, the command fails and the target database encryption is preserved using the previous certificate.
260
-
260
+
261
+
### Enabling HDFS Encryption Zones support on CU8
262
+
263
+
- **Affected releases**: This scenario surfaces when upgrading specifically to CU8 release from CU6 or previous. This won't happen on new deployments of CU8+ or when upgrading directly to CU9.
264
+
265
+
- **Issue and customer impact**: HDFS Encryption Zones support is not enabled by default in this scenario and need to be configured using the steps provided in the [configuration guide](encryption-at-rest-concepts-and-configuration.md).
266
+
261
267
### Empty Livy jobs before you apply cumulative updates
262
268
263
269
- **Affected releases**: All version up to CU6. Resolved for CU8.
0 commit comments