Skip to content

Commit 8eb5c47

Browse files
authored
Update export-to-data-lake.md
1 parent 342f0fc commit 8eb5c47

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

powerapps-docs/maker/common-data-service/export-to-data-lake.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: "Export to data lake | MicrosoftDocs"
33
description: "Learn how to export entity data to an Azure data lake in Power Apps"
44
ms.custom: ""
5-
ms.date: 04/27/2020
5+
ms.date: 07/23/2020
66
ms.reviewer: "Mattp123"
77
ms.service: powerapps
88
ms.suite: ""
@@ -87,7 +87,7 @@ Your Common Data Service environment is linked to the Azure Data Lake Storage Ge
8787
> [!NOTE]
8888
> The data exported by Export to data lake service is encrypted at rest in Azure Data Lake Storage Gen2. Additionally, transient data in the blob storage is also encrypted at rest. Encryption in Azure Data Lake Storage Gen2 helps you protect your data, implement enterprise security policies, and meet regulatory compliance requirements. More information: [Azure Data Encryption-at-Rest]( /azure/security/fundamentals/encryption-atrest)
8989
90-
> Currently, we do not support providing public IPs for Export to data lake service that can be used in **Azure Data Lake firewall settings**. Public IP network rules have no effect on requests originating from the same Azure region as the storage account. Services deployed in the same region as the storage account use private Azure IP addresses for communication. Thus, you cannot restrict access to specific Azure services based on their public outbound IP address range.
90+
> Currently, you can't provide public IPs for Export to data lake service that can be used in **Azure Data Lake firewall settings**. Public IP network rules have no effect on requests originating from the same Azure region as the storage account. Services deployed in the same region as the storage account use private Azure IP addresses for communication. Thus, you can't restrict access to specific Azure services based on their public outbound IP address range.
9191
More information: [Configure Azure Storage firewalls and virtual networks]( /azure/storage/common/storage-network-security)
9292

9393
## Manage entity data to the data lake

0 commit comments

Comments
 (0)