Load Data from Azure Event Hubs

SingleStore can be configured as an event hub in Azure Event Hubs.

Prerequisites

You need an Azure account with access to Event Hubs. You will also need to create an Event Hubs namespace, which gives you a unique FQDN.

Get Connection String from Azure Portal

After creating the namespace, you’ll need a connection string to communicate with Event Hubs.

  1. On the Azure portal, in the left navigation menu, select All services.

  2. In the Analytics section, select Event Hubs.

  3. From the list of event hubs, select the SingleStore event hub.

  4. On the Event Hubs Namespace page, in the left navigation menu, select Shared Access Policies.

  5. From the list of policies, select the relevant shared access policy.

  6. In the selected policy dialog, copy the Connection string-primary key.

Here is a sample pipeline:

CREATE PIPELINE `data_ingest`
AS LOAD DATA KAFKA 'front2back2eventhub.servicebus.windows.net:9093/table-update'
CONFIG '{"security.protocol": "sasl_ssl","sasl.mechanism": "PLAIN","sasl.username": "$ConnectionString"}'
CREDENTIALS '{"sasl.password": "<password>"}'
BATCH_INTERVAL 2500
ENABLE OUT_OF_ORDER OPTIMIZATION
INTO TABLE `test`;

Last modified: July 8, 2024

Was this article helpful?

Verification instructions

Note: You must install cosign to verify the authenticity of the SingleStore file.

Use the following steps to verify the authenticity of singlestoredb-server, singlestoredb-toolbox, singlestoredb-studio, and singlestore-client SingleStore files that have been downloaded.

You may perform the following steps on any computer that can run cosign, such as the main deployment host of the cluster.

  1. (Optional) Run the following command to view the associated signature files.

    curl undefined
  2. Download the signature file from the SingleStore release server.

    • Option 1: Click the Download Signature button next to the SingleStore file.

    • Option 2: Copy and paste the following URL into the address bar of your browser and save the signature file.

    • Option 3: Run the following command to download the signature file.

      curl -O undefined
  3. After the signature file has been downloaded, run the following command to verify the authenticity of the SingleStore file.

    echo -n undefined |
    cosign verify-blob --certificate-oidc-issuer https://oidc.eks.us-east-1.amazonaws.com/id/CCDCDBA1379A5596AB5B2E46DCA385BC \
    --certificate-identity https://kubernetes.io/namespaces/freya-production/serviceaccounts/job-worker \
    --bundle undefined \
    --new-bundle-format -
    Verified OK