Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit 138bad8

Browse files
authored
Merge branch 'MicrosoftDocs:main' into patch-13
2 parents 7dbdceb + 75b451a commit 138bad8

27 files changed

Lines changed: 352 additions & 254 deletions

.github/workflows/allow-signoff-for-files.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,6 @@ jobs:
3030
"docs/database-engine/availability-groups/windows/contained-availability-groups-overview.md",
3131
"docs/t-sql/statements/create-availability-group-transact-sql.md",
3232
"docs/database-engine/configure-windows/server-configuration-options-sql-server.md",
33-
"docs/toc.yml",
3433
"docs/database-engine/availability-groups/windows/availability-group-lease-healthcheck-timeout.md",
3534
"docs/t-sql/database-console-commands/dbcc-traceon-trace-flags-transact-sql.md"
3635
]'

azure-sql/database/authentication-azure-ad-only-authentication-create-server.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ The following section provides you with examples and scripts on how to create a
4444
In our examples, we're enabling Microsoft Entra-only authentication during server or managed instance creation, with a system assigned server admin and password. This will prevent server admin access when Microsoft Entra-only authentication is enabled, and only allows the Microsoft Entra admin to access the resource. It's optional to add parameters to the APIs to include your own server admin and password during server creation. However, the password can't be reset until you disable Microsoft Entra-only authentication. An example of how to use these optional parameters to specify the server admin login name is presented in the [PowerShell](?tabs=azure-powershell#azure-sql-database) tab on this page.
4545

4646
> [!NOTE]
47-
> To change the existing properties after server or managed instance creation, other existing APIs should be used. For more information, see [Managing Microsoft Entra-only authentication using APIs](authentication-azure-ad-only-authentication.md#managing-azure-ad-only-authentication-using-apis) and [Configure and manage Microsoft Entra authentication with Azure SQL](authentication-aad-configure.md).
47+
> To change the [Microsoft Entra-only authentication](authentication-azure-ad-only-authentication.md) property after server or managed instance creation, other existing APIs should be used. For more information, see [Managing Microsoft Entra-only authentication using APIs](authentication-azure-ad-only-authentication.md#managing-azure-ad-only-authentication-using-apis).
4848
>
4949
> If Microsoft Entra-only authentication is set to false, which it is by default, a server admin and password will need to be included in all APIs during server or managed instance creation.
5050

azure-sql/database/automatic-tuning-email-notifications-configure.md

Lines changed: 87 additions & 53 deletions
Large diffs are not rendered by default.

azure-sql/database/hyperscale-named-replica-configure.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to configure and manage Hyperscale named replica so that
44
author: WilliamDAssafMSFT
55
ms.author: wiassaf
66
ms.reviewer: atsingh, dinethi, rsetlem
7-
ms.date: 02/26/2024
7+
ms.date: 04/24/2025
88
ms.service: azure-sql-database
99
ms.subservice: scale-out
1010
ms.custom: devx-track-azurecli, devx-track-azurepowershell
@@ -226,6 +226,19 @@ DELETE https://management.azure.com/subscriptions/00000000-1111-2222-3333-444444
226226
> [!IMPORTANT]
227227
> Named replicas will be automatically removed when the primary replica from which they have been created is deleted.
228228
229+
## Optimizing named replica configuration
230+
231+
It is recommended to configure the named replica with the same compute size (vCores) as the primary replica. If the primary replica experiences a heavy write workload, a named replica with a lower compute size might not be able to keep up, causing replication lag. To maintain the recoverability SLAs, primary's transaction log rate can be temporarily reduced to allow its secondaries to catch up.
232+
233+
If you choose to create the named replica with a different compute size (vCores) than the primary, monitor the log IO rate on the primary over time. This helps estimate the minimal compute size required for the named replica to sustain the replication load. For more information, consider the following objects:
234+
235+
- The [sys.dm_hs_database_log_rate()](/sql/relational-databases/system-dynamic-management-views/sys-dm-hs-database-log-rate) dynamic management function (DMF) provides additional details to help understand log rate reduction, if any. It can indicate which specific secondary replica is behind in applying log records and the total size of the unapplied transaction log.
236+
- To retrieve historical log IO data, use [sys.resource_stats](/sql/relational-databases/system-catalog-views/sys-resource-stats-azure-sql-database) view.
237+
- For recent log IO data with higher granularity that better reflects short-term spikes, use [sys.dm_db_resource_stats](/sql/relational-databases/system-dynamic-management-views/sys-dm-db-resource-stats-azure-sql-database).
238+
239+
For more information, see to the [Azure SQL Database Hyperscale Performance Diagnostics](hyperscale-performance-diagnostics.md#reduced-log-rate-waits).
240+
241+
229242
## Related content
230243

231244
- [Hyperscale secondary replicas](service-tier-hyperscale-replicas.md)

azure-sql/managed-instance/native-windows-principals.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ In order to use the **Windows** authentication metadata mode, the user environme
4949

5050
The **Windows** authentication metadata mode helps modernize authentication for application, and unblocks migration challenges to SQL Managed Instance. Here are some common scenarios where the **Windows** authentication metadata mode can be used to address customer challenges:
5151

52-
- The complexities of setting up [Windows Authentication for Azure SQL Managed Instance using Microsoft Entra ID and Kerberos](winauth-azuread-setup.md).
52+
- The overhead of migrating Windows logins to Microsoft Entra ID for [Windows authentication with Azure SQL Managed Instance using Microsoft Entra ID and Kerberos](winauth-azuread-setup.md).
5353
- Read-only replica failovers in [Managed Instance link](managed-instance-link-feature-overview.md).
5454
- Synchronization of [Microsoft Entra authentication for SQL Server](/sql/relational-databases/security/authentication-access/azure-ad-authentication-sql-server-overview).
5555

azure-sql/managed-instance/timezones-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -192,7 +192,7 @@ Using the same time zone across a primary and secondary instance in a failover g
192192
| India Standard Time | (UTC+05:30) Chennai, Kolkata, Mumbai, New Delhi |
193193
| Sri Lanka Standard Time | (UTC+05:30) Sri Jayawardenepura |
194194
| Nepal Standard Time | (UTC+05:45) Kathmandu |
195-
| Central Asia Standard Time | (UTC+06:00) Nur-Sultan |
195+
| Central Asia Standard Time | (UTC+06:00) Astana |
196196
| Bangladesh Standard Time | (UTC+06:00) Dhaka |
197197
| Omsk Standard Time | (UTC+06:00) Omsk |
198198
| Myanmar Standard Time | (UTC+06:30) Yangon (Rangoon) |

azure-sql/managed-instance/transact-sql-tsql-differences-sql-server.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article discusses the Transact-SQL (T-SQL) differences between
44
author: danimir
55
ms.author: danil
66
ms.reviewer: mathoma, bonova, danil, randolphwest
7-
ms.date: 02/17/2025
7+
ms.date: 04/23/2025
88
ms.service: azure-sql-managed-instance
99
ms.subservice: service-overview
1010
ms.topic: reference
@@ -423,7 +423,7 @@ For more information about configuring transactional replication, see the follow
423423
Resource governor is supported. However, there are several behavior differences:
424424

425425
- To modify resource governor configuration in SQL Managed Instance, you must be in the context of the `master` database on the primary replica.
426-
- Resource governor configuration changes made on the primary replica propagate to all secondary replicas. However, changes to the currently effective configuration on a secondary replica might not be immediate. To make the changes effective on a secondary replica, [connect](../database/read-scale-out.md#connect-to-a-read-only-replica) to the replica and execute `ALTER RESOURCE GOVERNOR RECONFIGURE`.
426+
- Resource governor configuration changes made on the primary replica propagate to all secondary replicas. However, changes to the currently effective configuration on a secondary replica might not be immediate. To make the changes effective on a secondary replica, [connect](../database/read-scale-out.md#connect-to-a-read-only-replica) to the `master` database on a secondary replica and execute `ALTER RESOURCE GOVERNOR RECONFIGURE`.
427427
- In SQL Server, if the `REQUEST_MAX_CPU_TIME_SEC` setting is configured for a workload group and a batch request exceeds the configured CPU time, the `cpu_threshold_exceeded` event fires but the request is not terminated unless a trace flag is enabled. In SQL Managed Instance, the same event fires and the request is always terminated. For more information, see [REQUEST_MAX_CPU_TIME_SEC](/sql/t-sql/statements/create-workload-group-transact-sql#request_max_cpu_time_sec--value).
428428
- The maximum number of resource pools you can create is 40.
429429

azure-sql/virtual-machines/windows/failover-cluster-instance-azure-shared-disks-manually-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Before you complete the instructions in this article, you should already have:
3838

3939
## Add Azure shared disk
4040

41-
[Deploy a managed with the shared disk feature enabled](/azure/virtual-machines/disks-shared-enable#deploy-shared-disks). Set `maxShares` to **align with the number of cluster nodes** to make the disk shareable across all FCI nodes.
41+
[Deploy a managed disk with the shared disk feature enabled](/azure/virtual-machines/disks-shared-enable#deploy-shared-disks). Set `maxShares` to **align with the number of cluster nodes** to make the disk shareable across all FCI nodes.
4242
Premium SSD, Premium SSDv2 and Ultra Disk are supported disk types to use with a SQL Server failover cluster instance.
4343

4444
Use zone-redundant storage (ZRS) whenever possible.

docs/connect/ado-net/sql/bulk-copy-example-setup.md

Lines changed: 4 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -31,10 +31,7 @@ To create the tables necessary for the code samples to run correctly, you must r
3131
USE AdventureWorks2022;
3232
GO
3333

34-
IF EXISTS (SELECT * FROM dbo.sysobjects
35-
WHERE id = object_id(N'[dbo].[BulkCopyDemoMatchingColumns]')
36-
AND OBJECTPROPERTY(id, N'IsUserTable') = 1)
37-
DROP TABLE [dbo].[BulkCopyDemoMatchingColumns]
34+
DROP TABLE IF EXISTS [dbo].[BulkCopyDemoMatchingColumns]
3835

3936
CREATE TABLE [dbo].[BulkCopyDemoMatchingColumns]([ProductID] [int] IDENTITY(1,1) NOT NULL,
4037
[Name] [nvarchar](50) NOT NULL,
@@ -44,10 +41,7 @@ CREATE TABLE [dbo].[BulkCopyDemoMatchingColumns]([ProductID] [int] IDENTITY(1,1)
4441
[ProductID] ASC
4542
) ON [PRIMARY]) ON [PRIMARY]
4643

47-
IF EXISTS (SELECT * FROM dbo.sysobjects
48-
WHERE id = object_id(N'[dbo].[BulkCopyDemoDifferentColumns]')
49-
AND OBJECTPROPERTY(id, N'IsUserTable') = 1)
50-
DROP TABLE [dbo].[BulkCopyDemoDifferentColumns]
44+
DROP TABLE IF EXISTS [dbo].[BulkCopyDemoDifferentColumns]
5145

5246
CREATE TABLE [dbo].[BulkCopyDemoDifferentColumns]([ProdID] [int] IDENTITY(1,1) NOT NULL,
5347
[ProdNum] [nvarchar](25) NOT NULL,
@@ -57,10 +51,7 @@ CREATE TABLE [dbo].[BulkCopyDemoDifferentColumns]([ProdID] [int] IDENTITY(1,1) N
5751
[ProdID] ASC
5852
) ON [PRIMARY]) ON [PRIMARY]
5953

60-
IF EXISTS (SELECT * FROM dbo.sysobjects
61-
WHERE id = object_id(N'[dbo].[BulkCopyDemoOrderHeader]')
62-
AND OBJECTPROPERTY(id, N'IsUserTable') = 1)
63-
DROP TABLE [dbo].[BulkCopyDemoOrderHeader]
54+
DROP TABLE IF EXISTS [dbo].[BulkCopyDemoOrderHeader]
6455

6556
CREATE TABLE [dbo].[BulkCopyDemoOrderHeader]([SalesOrderID] [int] IDENTITY(1,1) NOT NULL,
6657
[OrderDate] [datetime] NOT NULL,
@@ -70,10 +61,7 @@ CREATE TABLE [dbo].[BulkCopyDemoOrderHeader]([SalesOrderID] [int] IDENTITY(1,1)
7061
[SalesOrderID] ASC
7162
) ON [PRIMARY]) ON [PRIMARY]
7263

73-
IF EXISTS (SELECT * FROM dbo.sysobjects
74-
WHERE id = object_id(N'[dbo].[BulkCopyDemoOrderDetail]')
75-
AND OBJECTPROPERTY(id, N'IsUserTable') = 1)
76-
DROP TABLE [dbo].[BulkCopyDemoOrderDetail]
64+
DROP TABLE IF EXISTS [dbo].[BulkCopyDemoOrderDetail]
7765

7866
CREATE TABLE [dbo].[BulkCopyDemoOrderDetail]([SalesOrderID] [int] NOT NULL,
7967
[SalesOrderDetailID] [int] NOT NULL,

0 commit comments

Comments
 (0)