Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit 01b3962

Browse files
committed
Merge branch 'main' into release-dallas
2 parents c9f2116 + b33e72d commit 01b3962

23 files changed

Lines changed: 406 additions & 33 deletions

azure-sql/database/database-copy.md

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -111,9 +111,9 @@ Database1 can be a single or pooled database. Copying between different tier poo
111111

112112
```sql
113113
-- Execute on the master database to start copying
114-
CREATE DATABASE "Database2"
115-
AS COPY OF "Database1"
116-
(SERVICE_OBJECTIVE = ELASTIC_POOL( name = "pool1" ) );
114+
CREATE DATABASE Database2
115+
AS COPY OF Database1
116+
(SERVICE_OBJECTIVE = ELASTIC_POOL( name = 'pool1' ) );
117117
```
118118

119119
### Copy to a different server
@@ -130,6 +130,13 @@ CREATE DATABASE Database2 AS COPY OF server1.Database1;
130130
> [!IMPORTANT]
131131
> Both servers' firewalls must be configured to allow inbound connection from the IP of the client issuing the T-SQL CREATE DATABASE ... AS COPY OF command. To determine the source IP address of current connection, execute `SELECT client_net_address FROM sys.dm_exec_connections WHERE session_id = @@SPID;`
132132
133+
Similarly, the below command copies Database1 on server1 to a new database named Database2 within an elastic pool called pool2, on server2.
134+
135+
```sql
136+
-- Execute on the master database of the target server (server2) to start copying from Server1 to Server2
137+
CREATE DATABASE Database2 AS COPY OF server1.Database1 (SERVICE_OBJECTIVE = ELASTIC_POOL( name = 'pool2' ) );
138+
```
139+
133140
### Copy to a different subscription
134141

135142
You can use the steps in the [Copy a SQL Database to a different server](#copy-to-a-different-server) section to copy your database to a server in a different subscription using T-SQL. Make sure you use a login that has the same name and password as the database owner of the source database. Additionally, the login must be a member of the `dbmanager` role or a server administrator, on both source and target servers.

azure-sql/database/elastic-jobs-overview.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: conceptual
1010
author: srinia
1111
ms.author: srinia
1212
ms.reviewer: kendralittle, mathoma
13-
ms.date: 12/18/2018
13+
ms.date: 05/03/2022
1414
---
1515
# Create, configure, and manage elastic jobs (preview)
1616
[!INCLUDE[appliesto-sqldb](../includes/appliesto-sqldb.md)]
@@ -81,6 +81,7 @@ These are the current limitations to the Elastic Jobs service. We're actively w
8181
| :---- | :--------- |
8282
| The Elastic Job agent needs to be recreated and started in the new region after a failover/move to a new Azure region. | The Elastic Jobs service stores all its job agent and job metadata in the jobs database. Any failover or move of Azure resources to a new Azure region will also move the jobs database, job agent and jobs metadata to the new Azure region. However, the Elastic Job agent is a compute only resource and needs to be explicitly re-created and started in the new region before jobs will start executing again in the new region. Once started, the Elastic Job agent will resume executing jobs in the new region as per the previously defined job schedule. |
8383
| Concurrent jobs limit. | Currently, the preview is limited to 100 concurrent jobs. |
84+
| Excessive Audit logs from Jobs database | The Elastic Job agent operates by constantly polling the Job database to check for the arrival of new jobs and other CRUD operations. If auditing is enabled on the server that houses a Jobs database, a large amount of audit logs may be generated by the Jobs database. This can be mitigated by filtering out these audit logs using the `Set-AzSqlServerAudit` command with a predicate expression.<BR/><BR/>For example:<BR/> `Set-AzSqlServerAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage" -PredicateExpression "database_principal_name <> '##MS_JobAccount##'"`<BR/><BR/>This command will only filter out Job Agent to Jobs database audit logs, not Job Agent to any target databases audit logs.|
8485

8586
## Best practices for creating jobs
8687

azure-sql/database/elastic-jobs-tsql-create-manage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.topic: how-to
1212
author: srinia
1313
ms.author: srinia
1414
ms.reviewer: kendralittle, mathoma
15-
ms.date: 02/01/2021
15+
ms.date: 05/03/2022
1616
---
1717
# Use Transact-SQL (T-SQL) to create and manage Elastic Database Jobs (preview)
1818
[!INCLUDE[appliesto-sqldb](../includes/appliesto-sqldb.md)]
@@ -243,7 +243,7 @@ SELECT @poolEndTime = dateadd(minute, -30, @endTime)
243243
SELECT elastic_pool_name , end_time, elastic_pool_dtu_limit, avg_cpu_percent, avg_data_io_percent, avg_log_write_percent, max_worker_percent, max_session_percent,
244244
avg_storage_percent, elastic_pool_storage_limit_mb FROM sys.elastic_pool_resource_stats
245245
WHERE end_time > @poolStartTime and end_time <= @poolEndTime;
246-
'),
246+
',
247247
@credential_name = 'job_credential',
248248
@target_group_name = 'ElasticJobGroup',
249249
@output_type = 'SqlDatabase',

azure-sql/database/sql-database-vulnerability-assessment-rules.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,14 @@ ms.topic: reference
88
author: davidtrigano
99
ms.author: datrigan
1010
ms.reviewer: kendralittle, vanto, mathoma
11-
ms.date: 05/06/2021
11+
ms.date: 05/02/2021
1212
monikerRange: "=azuresql||=azuresql-db||=azuresql-mi"
1313
---
1414

1515
# SQL Vulnerability Assessment rules reference guide
1616
[!INCLUDE[appliesto-sqldb-sqlmi-asa](../includes/appliesto-sqldb-sqlmi-asa.md)] :::image type="icon" source="../media/applies-to/yes.png" border="false"::: SQL Server (all supported versions)
1717

18-
This article lists the set of built-in rules that are used to flag security vulnerabilities and highlight deviations from best practices, such as misconfigurations, excessive permissions, and unprotected sensitive data. The rules are based on Microsoft's best practices and focus on the security issues that present the biggest risks to your database and its valuable data. They cover both database-level issues as well as server-level security issues, like server firewall settings and server-level permissions. These rules also represent many of the requirements from various regulatory bodies to meet their compliance standards.
18+
This article lists the set of built-in rules that are used to flag security vulnerabilities and highlight deviations from best practices, such as misconfigurations and excessive permissions. The rules are based on Microsoft's best practices and focus on the security issues that present the biggest risks to your database and its valuable data. They cover both database-level issues as well as server-level security issues, like server firewall settings and server-level permissions. These rules also represent many of the requirements from various regulatory bodies to meet their compliance standards.
1919

2020
The rules shown in your database scans depend on the SQL version and platform that was scanned.
2121

@@ -107,7 +107,6 @@ SQL Vulnerability Assessment rules have five categories, which are in the follow
107107
|VA1223 |Certificate keys should use at least 2048 bits |High |Certificate keys are used in RSA and other encryption algorithms to protect data. These keys need to be of enough length to secure the user's data. This rule checks that the key's length is at least 2048 bits for all certificates. |<nobr>SQL Server 2012+<nobr/><br/><br/>SQL Managed Instance<br/><br/>SQL Database<br/><br/>Azure Synapse |
108108
|VA1224 |Asymmetric keys' length should be at least 2048 bits |High |Database asymmetric keys are used in many encryption algorithms these keys need to be of enough length to secure the encrypted data this rule checks that all asymmetric keys stored in the database are of length of at least 2048 bits |<nobr>SQL Server 2012<nobr/><br/><br/><nobr>SQL Server 2014<nobr/><br/><br/>SQL Database |
109109
|VA1279 |Force encryption should be enabled for TDS |High |When the Force Encryption option for the Database Engine is enabled all communications between client and server is encrypted regardless of whether the 'Encrypt connection' option (such as from SSMS) is checked or not. This rule checks that Force Encryption option is enabled. |<nobr>SQL Server 2012+<nobr/> |
110-
|VA1288 |Sensitive data columns should be classified |Medium |This rule checks if the scanned database has potentially sensitive data that has not been classified. |<nobr/>SQL Database |
111110
|VA2060 |SQL Threat Detection should be enabled at the server level |Medium |SQL Threat Detection provides a layer of security that detects potential vulnerabilities and anomalous activity in databases such as SQL injection attacks and unusual behavior patterns. When a potential threat is detected Threat Detection sends an actionable real-time alert by email and in Microsoft Defender for Cloud, which includes clear investigation and remediation steps for the specific threat. For more information, please see [Configure threat detection](./threat-detection-configure.md). This check verifies that SQL Threat Detection is enabled |<nobr/><br/>SQL Managed Instance<br/><br/>SQL Database<br/><br/>Azure Synapse |
112111

113112
## Installation Updates and Patches

azure-sql/docfx.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,8 @@
6767
"recommendations": true,
6868
"_op_documentIdPathDepotMapping": {
6969
"./": {
70-
"depot_name": "Azure.azure-documents"
70+
"depot_name": "Azure.azure-documents",
71+
"folder_relative_path_in_docset": "articles/azure-sql/"
7172
}
7273
}
7374
},

docs/big-data-cluster/release-notes-big-data-cluster.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ description: This article describes the latest updates and known issues for SQL
55
author: WilliamDAssafMSFT
66
ms.author: wiassaf
77
ms.reviewer: hudequei
8-
ms.date: 01/31/2022
8+
ms.date: 05/03/2022
99
ms.topic: conceptual
1010
ms.prod: sql
1111
ms.technology: big-data-cluster
1212
---
1313

14-
# SQL Server Big Data Clusters platform release notes
14+
# SQL Server 2019 Big Data Clusters platform release notes
1515

1616
[!INCLUDE[SQL Server 2019](../includes/applies-to-version/sqlserver2019.md)]
1717

@@ -34,6 +34,7 @@ The following table contains the tested configuration matrix for each release of
3434

3535
| Release | Container OS | Kubernetes API | Runtime | Data Storage | Log Storage |
3636
| ----------- | ------------ | ------- | ------- | ------------ | ----------- |
37+
| CU16 | Ubuntu 20.04 LTS | 1.21 | containerd 1.4.6<br/>CRI-O 1.20.4 | Block only | Block only |
3738
| CU15 | Ubuntu 20.04 LTS | 1.21 | containerd 1.4.6<br/>CRI-O 1.20.4 | Block only | Block only |
3839
| CU14 | Ubuntu 20.04 LTS | 1.21 | containerd 1.4.6<br/>CRI-O 1.20.4 | Block only | Block only |
3940
| CU13 | Ubuntu 20.04 LTS | 1.20 | containerd 1.4.6<br/>CRI-O 1.20.0 | Block only | Block only |
@@ -49,14 +50,15 @@ Restrictions:
4950
Reference architecture and white papers for [!INCLUDE[big-data-clusters-nover](../includes/ssbigdataclusters-ss-nover.md)] can be found on the following pages:
5051

5152
* [SQL Server 2019](https://www.microsoft.com/sql-server/sql-server-2019)
52-
* [SQL Server Big Data Clusters partners](../sql-server/partner-big-data-cluster.md)
53+
* [SQL Server 2019 Big Data Clusters partners](../sql-server/partner-big-data-cluster.md)
5354

5455
## Release history
5556

5657
The following table lists the release history for [!INCLUDE[ssbigdataclusters-ver15](../includes/ssbigdataclusters-ver15.md)].
5758

5859
| Release <sup>1</sup> | [!INCLUDE[ssbigdataclusters-ver15](../includes/ssbigdataclusters-ver15.md)] version | [!INCLUDE [azure-data-cli-azdata](../includes/azure-data-cli-azdata.md)] version <sup>2</sup> | Release date |
5960
|--|--|--|--|
61+
| [CU16](release-notes-cumulative-update-16.md) | 15.0.4223.1 | 20.3.11 | May 2 2022 |
6062
| [CU15](release-notes-cumulative-update-15.md) | 15.0.4198.2 | 20.3.10 | Jan 27 2022 |
6163
| [CU14](release-notes-cumulative-update-14.md) | 15.0.4188.2 | 20.3.9 | Nov 22 2021 |
6264
| [CU13](release-notes-cumulative-update-13.md) | 15.0.4178.15 | 20.3.8 | Sept 9 2021 |

0 commit comments

Comments
 (0)