You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-sql/database/database-copy.md
+10-3Lines changed: 10 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -111,9 +111,9 @@ Database1 can be a single or pooled database. Copying between different tier poo
111
111
112
112
```sql
113
113
-- Execute on the master database to start copying
114
-
CREATEDATABASE"Database2"
115
-
AS COPY OF "Database1"
116
-
(SERVICE_OBJECTIVE = ELASTIC_POOL( name ="pool1" ) );
114
+
CREATEDATABASEDatabase2
115
+
AS COPY OF Database1
116
+
(SERVICE_OBJECTIVE = ELASTIC_POOL( name ='pool1' ) );
117
117
```
118
118
119
119
### Copy to a different server
@@ -130,6 +130,13 @@ CREATE DATABASE Database2 AS COPY OF server1.Database1;
130
130
> [!IMPORTANT]
131
131
> Both servers' firewalls must be configured to allow inbound connection from the IP of the client issuing the T-SQL CREATE DATABASE ... AS COPY OF command. To determine the source IP address of current connection, execute `SELECT client_net_address FROM sys.dm_exec_connections WHERE session_id = @@SPID;`
132
132
133
+
Similarly, the below command copies Database1 on server1 to a new database named Database2 within an elastic pool called pool2, on server2.
134
+
135
+
```sql
136
+
-- Execute on the master database of the target server (server2) to start copying from Server1 to Server2
137
+
CREATEDATABASEDatabase2AS COPY OF server1.Database1 (SERVICE_OBJECTIVE = ELASTIC_POOL( name ='pool2' ) );
138
+
```
139
+
133
140
### Copy to a different subscription
134
141
135
142
You can use the steps in the [Copy a SQL Database to a different server](#copy-to-a-different-server) section to copy your database to a server in a different subscription using T-SQL. Make sure you use a login that has the same name and password as the database owner of the source database. Additionally, the login must be a member of the `dbmanager` role or a server administrator, on both source and target servers.
@@ -81,6 +81,7 @@ These are the current limitations to the Elastic Jobs service. We're actively w
81
81
| :---- | :--------- |
82
82
| The Elastic Job agent needs to be recreated and started in the new region after a failover/move to a new Azure region. | The Elastic Jobs service stores all its job agent and job metadata in the jobs database. Any failover or move of Azure resources to a new Azure region will also move the jobs database, job agent and jobs metadata to the new Azure region. However, the Elastic Job agent is a compute only resource and needs to be explicitly re-created and started in the new region before jobs will start executing again in the new region. Once started, the Elastic Job agent will resume executing jobs in the new region as per the previously defined job schedule. |
83
83
| Concurrent jobs limit. | Currently, the preview is limited to 100 concurrent jobs. |
84
+
| Excessive Audit logs from Jobs database | The Elastic Job agent operates by constantly polling the Job database to check for the arrival of new jobs and other CRUD operations. If auditing is enabled on the server that houses a Jobs database, a large amount of audit logs may be generated by the Jobs database. This can be mitigated by filtering out these audit logs using the `Set-AzSqlServerAudit` command with a predicate expression.<BR/><BR/>For example:<BR/> `Set-AzSqlServerAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage" -PredicateExpression "database_principal_name <> '##MS_JobAccount##'"`<BR/><BR/>This command will only filter out Job Agent to Jobs database audit logs, not Job Agent to any target databases audit logs.|
[!INCLUDE[appliesto-sqldb-sqlmi-asa](../includes/appliesto-sqldb-sqlmi-asa.md)] :::image type="icon" source="../media/applies-to/yes.png" border="false"::: SQL Server (all supported versions)
17
17
18
-
This article lists the set of built-in rules that are used to flag security vulnerabilities and highlight deviations from best practices, such as misconfigurations, excessive permissions, and unprotected sensitive data. The rules are based on Microsoft's best practices and focus on the security issues that present the biggest risks to your database and its valuable data. They cover both database-level issues as well as server-level security issues, like server firewall settings and server-level permissions. These rules also represent many of the requirements from various regulatory bodies to meet their compliance standards.
18
+
This article lists the set of built-in rules that are used to flag security vulnerabilities and highlight deviations from best practices, such as misconfigurationsand excessive permissions. The rules are based on Microsoft's best practices and focus on the security issues that present the biggest risks to your database and its valuable data. They cover both database-level issues as well as server-level security issues, like server firewall settings and server-level permissions. These rules also represent many of the requirements from various regulatory bodies to meet their compliance standards.
19
19
20
20
The rules shown in your database scans depend on the SQL version and platform that was scanned.
21
21
@@ -107,7 +107,6 @@ SQL Vulnerability Assessment rules have five categories, which are in the follow
107
107
|VA1223 |Certificate keys should use at least 2048 bits |High |Certificate keys are used in RSA and other encryption algorithms to protect data. These keys need to be of enough length to secure the user's data. This rule checks that the key's length is at least 2048 bits for all certificates. |<nobr>SQL Server 2012+<nobr/><br/><br/>SQL Managed Instance<br/><br/>SQL Database<br/><br/>Azure Synapse |
108
108
|VA1224 |Asymmetric keys' length should be at least 2048 bits |High |Database asymmetric keys are used in many encryption algorithms these keys need to be of enough length to secure the encrypted data this rule checks that all asymmetric keys stored in the database are of length of at least 2048 bits |<nobr>SQL Server 2012<nobr/><br/><br/><nobr>SQL Server 2014<nobr/><br/><br/>SQL Database |
109
109
|VA1279 |Force encryption should be enabled for TDS |High |When the Force Encryption option for the Database Engine is enabled all communications between client and server is encrypted regardless of whether the 'Encrypt connection' option (such as from SSMS) is checked or not. This rule checks that Force Encryption option is enabled. |<nobr>SQL Server 2012+<nobr/> |
110
-
|VA1288 |Sensitive data columns should be classified |Medium |This rule checks if the scanned database has potentially sensitive data that has not been classified. |<nobr/>SQL Database |
111
110
|VA2060 |SQL Threat Detection should be enabled at the server level |Medium |SQL Threat Detection provides a layer of security that detects potential vulnerabilities and anomalous activity in databases such as SQL injection attacks and unusual behavior patterns. When a potential threat is detected Threat Detection sends an actionable real-time alert by email and in Microsoft Defender for Cloud, which includes clear investigation and remediation steps for the specific threat. For more information, please see [Configure threat detection](./threat-detection-configure.md). This check verifies that SQL Threat Detection is enabled |<nobr/><br/>SQL Managed Instance<br/><br/>SQL Database<br/><br/>Azure Synapse |
| CU16 | Ubuntu 20.04 LTS | 1.21 | containerd 1.4.6<br/>CRI-O 1.20.4 | Block only | Block only |
37
38
| CU15 | Ubuntu 20.04 LTS | 1.21 | containerd 1.4.6<br/>CRI-O 1.20.4 | Block only | Block only |
38
39
| CU14 | Ubuntu 20.04 LTS | 1.21 | containerd 1.4.6<br/>CRI-O 1.20.4 | Block only | Block only |
39
40
| CU13 | Ubuntu 20.04 LTS | 1.20 | containerd 1.4.6<br/>CRI-O 1.20.0 | Block only | Block only |
@@ -49,14 +50,15 @@ Restrictions:
49
50
Reference architecture and white papers for [!INCLUDE[big-data-clusters-nover](../includes/ssbigdataclusters-ss-nover.md)] can be found on the following pages:
50
51
51
52
*[SQL Server 2019](https://www.microsoft.com/sql-server/sql-server-2019)
52
-
*[SQL Server Big Data Clusters partners](../sql-server/partner-big-data-cluster.md)
53
+
*[SQL Server 2019 Big Data Clusters partners](../sql-server/partner-big-data-cluster.md)
53
54
54
55
## Release history
55
56
56
57
The following table lists the release history for [!INCLUDE[ssbigdataclusters-ver15](../includes/ssbigdataclusters-ver15.md)].
57
58
58
59
| Release <sup>1</sup> |[!INCLUDE[ssbigdataclusters-ver15](../includes/ssbigdataclusters-ver15.md)] version |[!INCLUDE [azure-data-cli-azdata](../includes/azure-data-cli-azdata.md)] version <sup>2</sup> | Release date |
59
60
|--|--|--|--|
61
+
|[CU16](release-notes-cumulative-update-16.md)| 15.0.4223.1 | 20.3.11 | May 2 2022 |
60
62
|[CU15](release-notes-cumulative-update-15.md)| 15.0.4198.2 | 20.3.10 | Jan 27 2022 |
61
63
|[CU14](release-notes-cumulative-update-14.md)| 15.0.4188.2 | 20.3.9 | Nov 22 2021 |
0 commit comments