Book Image

Scalable Data Analytics with Azure Data Explorer

By : Jason Myerscough
Book Image

Scalable Data Analytics with Azure Data Explorer

By: Jason Myerscough

Overview of this book

Azure Data Explorer (ADX) enables developers and data scientists to make data-driven business decisions. This book will help you rapidly explore and query your data at scale and secure your ADX clusters. The book begins by introducing you to ADX, its architecture, core features, and benefits. You'll learn how to securely deploy ADX instances and navigate through the ADX Web UI, cover data ingestion, and discover how to query and visualize your data using the powerful Kusto Query Language (KQL). Next, you'll get to grips with KQL operators and functions to efficiently query and explore your data, as well as perform time series analysis and search for anomalies and trends in your data. As you progress through the chapters, you'll explore advanced ADX topics, including deploying your ADX instances using Infrastructure as Code (IaC). The book also shows you how to manage your cluster performance and monthly ADX costs by handling cluster scaling and data retention periods. Finally, you'll understand how to secure your ADX environment by restricting access with best practices for improving your KQL query performance. By the end of this Azure book, you'll be able to securely deploy your own ADX instance, ingest data from multiple sources, rapidly query your data, and produce reports with KQL and Power BI.
Table of Contents (18 chapters)
1
Section 1: Introduction to Azure Data Explorer
5
Section 2: Querying and Visualizing Your Data
11
Section 3: Advanced Azure Data Explorer Topics

Summary

In this chapter, we learned about the importance of security, especially on the public cloud, and introduced some of the basic terminology and concepts you should be familiar with, such as the principle of least privilege and RBAC. Next, we introduced the concepts of identity management with AAD, explained the differences between security principals, users, groups, and service principals, and the different levels of access, such as the management plane versus the data plane.

Next, we demonstrated how to restrict access to your ADX cluster using virtual networks and subnet delegation.

Finally, we introduced NSGs and explained how to use them to filter inbound traffic. Then, we demonstrated how to route inbound traffic from your public IP.

In the next chapter, you will discover how to troubleshoot performance issues with queries and learn about the best practices for writing queries and managing your clusters.