Microsoft is giving away 50,000 FREE Microsoft Certification exam vouchers. Get Fabric certified for FREE! Learn more
Content
I will do a series of posts regarding Fabric connectivity. As there are a lot of topics to cover such as inbound, outbound, public and private endpoints, managed private endpoints etc., it will be easier to break these into smaller dedicated posts.
I already have a series for Synapse connectivity and you can find those here:
First I would like to explore the Fabric DW / SQL Endpoint public endpoint connectivity. But before diving into troubleshooting, it’s essential to understand the key components involved in establishing a connection:
You first need to think about what the source is and what is the destination and and the various components in between:
From Microsoft Fabric Portal you can get the Fully Qualified Domain Name (FQDN), something like [xxxx-xxxx.datawarehouse.fabric.microsoft.com] used for your client to reach your Microsoft Fabric DW or Lakehouse SQL analytics endpoint that can be used as the [server name] in a connection.
Fabric DW connection only requires OUTBOUND TCP port 1433 to be open.
ATTENTION!
When configuring your firewall, ensure that outbound port 1433 is open for the (FQDN and additional IPs), as specified in the documentation.
To ensure proper access, you need to allow the Power BI service tags for firewall access. For more information, see Power BI Service Tags. You cannot use the Fully Qualified Domain Name (FQDN) of the TDS Endpoint alone. Allowing the Power BI service tags is necessary for connectivity through the firewall.
Below you can find diagram to better visualize scenario
For people that came from Synapse world, this will work in similar way as the redirect connection
If you do simple test connection and monitor it using Wireshark ( Synapse Connectivity Series Part #4 - Advanced network troubleshooting and network trace analysis ) using filters like samples below, you will be able to visuallize what is happening behind scene
You will be able to find the 2 endpoints / connections and related IPs
You can then use wireshark function to follow up each individual conversation to check status and what could have blocked your connection
Here you can see initial conversation with FQDN [xxxx-xxxx.datawarehouse.fabric.microsoft.com] / IP [52.150.139.133] / port [1433]
Here you can see redirected conversation on TDS Endpoint [XXXX-pbidedicated.windows.net] / IP [52.150.139.166] / port [1433]
To make a failure happen, I will add an entry in hosts file, redirecting a name to wrong ip like 127.0.0.1, but would have similar results as a firewall blocking port
To be more visual, this is what is happening
From client I got error below
Note that in this example, the connection using the FQDN obtained from the Fabric portal works properly. What is actually failing is the redirected connection (You can see destination IP = 127.0.0.1 I forced to go to cause an error)
Based on the information shared above you need to open your firewall not only to FQDN, but also to a REDIRECT connection whose name or IP address may vary.
This configuration will also depend if your client is inside Azure or Outside Azure, if your network uses Azure Firewall or Third Party Firewall.
Check below some generial guideline:
Required: Datamart SQL | datamart.fabric.microsoft.com | TCP 1433 |
Required: Datamart SQL | datamart.pbidedicated.microsoft.com | TCP 1433 |
Required: Datamart SQL | *.pbidedicated.microsoft.com | TCP 1433 |
Required: Fabric DW SQL | datawarehouse.fabric.microsoft.com | TCP 1433 |
Required: Fabric DW SQL | datawarehouse.pbidedicated.microsoft.com | TCP 1433 |
Required: Fabric DW SQL | *.pbidedicated.microsoft.com | TCP 1433 |
Required: Fabric DW SQL | *.pbidedicated.windows.net | TCP 1433 |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.