Book Image

Scalable Data Analytics with Azure Data Explorer

By : Jason Myerscough
Book Image

Scalable Data Analytics with Azure Data Explorer

By: Jason Myerscough

Overview of this book

Azure Data Explorer (ADX) enables developers and data scientists to make data-driven business decisions. This book will help you rapidly explore and query your data at scale and secure your ADX clusters. The book begins by introducing you to ADX, its architecture, core features, and benefits. You'll learn how to securely deploy ADX instances and navigate through the ADX Web UI, cover data ingestion, and discover how to query and visualize your data using the powerful Kusto Query Language (KQL). Next, you'll get to grips with KQL operators and functions to efficiently query and explore your data, as well as perform time series analysis and search for anomalies and trends in your data. As you progress through the chapters, you'll explore advanced ADX topics, including deploying your ADX instances using Infrastructure as Code (IaC). The book also shows you how to manage your cluster performance and monthly ADX costs by handling cluster scaling and data retention periods. Finally, you'll understand how to secure your ADX environment by restricting access with best practices for improving your KQL query performance. By the end of this Azure book, you'll be able to securely deploy your own ADX instance, ingest data from multiple sources, rapidly query your data, and produce reports with KQL and Power BI.
Table of Contents (18 chapters)
1
Section 1: Introduction to Azure Data Explorer
5
Section 2: Querying and Visualizing Your Data
11
Section 3: Advanced Azure Data Explorer Topics

Chapter 10: Azure Data Explorer Security

As recently as 6 years ago, the emphasis on public cloud security was not what it is today. I remember that, at one point, disk encryption was not available on storage accounts. Then, it became an option that could be enabled, and today, it is enabled by default.

One of the biggest concerns with the public cloud is ensuring that our data and resources are not accessible to just about anyone on the internet. In this chapter, we will learn how to secure our Azure Data Explorer (ADX) instances using identity management and how to perform network filtering on unwanted traffic and bad actors.

We will begin by introducing some of the basic terminology and concepts you should be familiar with, such as the principle of least privilege and role-based access control (RBAC). Next, we will explore the concepts of identity management with Azure Active Directory (AAD). We will also learn about the differences between security principals, users, groups...