Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit 4131fe4

Browse files
committed
Merge branch 'main' into rw-0907-2017cu31
2 parents 7f44dda + 7406eed commit 4131fe4

1,905 files changed

Lines changed: 10446 additions & 15007 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.azure-sql.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -539,6 +539,16 @@
539539
"source_path_from_root": "/azure-sql/database/predictive-model-build-compare-tutorial.md",
540540
"redirect_url": "/sql/machine-learning/tutorials/r-predictive-model-train?context=/azure/azure-sql/managed-instance/context/ml-context&view=azuresqldb-mi-current",
541541
"redirect_document_id": false
542+
},
543+
{
544+
"source_path_from_root": "/azure-sql/managed-instance/custom-dns-configure.md",
545+
"redirect_url": "/azure/azure-sql/managed-instance/resolve-private-domain-names",
546+
"redirect_document_id": false
547+
},
548+
{
549+
"source_path_from_root": "/azure-sql/managed-instance/synchronize-vnet-dns-servers-setting-on-virtual-cluster.md",
550+
"redirect_url": "/azure/azure-sql/managed-instance/resolve-private-domain-names",
551+
"redirect_document_id": false
542552
}
543553
]
544554
}

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59454,6 +59454,11 @@
5945459454
"source_path": "docs/tools/sqlpackage/troubleshooting-import-export-sqlpackage.md",
5945559455
"redirect_url": "/sql/tools/sqlpackage/troubleshooting-issues-and-performance-with-sqlpackage",
5945659456
"redirect_document_id": false
59457+
},
59458+
{
59459+
"source_path": "docs/sql-server/partner-big-data-cluster.md",
59460+
"redirect_url": "/sql/big-data-cluster/partner-big-data-cluster",
59461+
"redirect_document_id": false
5945759462
}
5945859463
]
5945959464
}

azure-sql/database/audit-write-storage-account-behind-vnet-firewall.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,7 @@ For audit to write to a storage account behind a VNet or firewall, the following
3939
> * The storage account must be on the same tenant and at the same location as the [logical SQL server](logical-servers.md) (it's OK to be on different subscriptions).
4040
> * The Azure Storage account requires `Allow trusted Microsoft services to access this storage account`. Set this on the Storage Account **Firewalls and Virtual networks**.
4141
> * You must have `Microsoft.Authorization/roleAssignments/write` permission on the selected storage account. For more information, see [Azure built-in roles](/azure/role-based-access-control/built-in-roles).
42+
> * **User managed identity authentication** type for enabling auditing to storage behind firewall is not currently supported.
4243
4344
> [!NOTE]
4445
> When Auditing to stoarge account is already enabled on a server / db, and if the target storage account is moved behind a firewall, we lose write access to

azure-sql/database/auditing-overview.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ You can use SQL Database auditing to:
3939
4040
### Auditing limitations
4141

42-
- **User managed identity** authentication type for enabling auditing to **storage** is not currently supported.
42+
- **User managed identity** authentication type for enabling auditing to **storage behind firewall** is not currently supported.
4343
- Enabling auditing on a paused **Azure Synapse** is not supported. To enable auditing, resume Azure Synapse.
4444
- Auditing for **Azure Synapse SQL pools** supports default audit action groups **only**.
4545
- When you configure the auditing for your [logical server in Azure](logical-servers.md) or Azure SQL Database with log destination as the storage account, the target storage account must be enabled with access to storage account keys. If the storage account is configured to use Azure AD authentication only and not configured for access key usage, the auditing cannot be configured. <!-- REST API reference: - /rest/api/sql/2021-08-01-preview/server-blob-auditing-policies/create-or-update -->
@@ -52,7 +52,7 @@ An auditing policy can be defined for a specific database or as a default [serve
5252

5353
- If *server auditing is enabled*, it *always applies to the database*. The database will be audited, regardless of the database auditing settings.
5454

55-
- When auditing policy is defined at the database-level to a Log Analytics workspace or an Event Hub destination, the following operations will not keep the source database-level auditing policy:
55+
- When auditing policy is defined at the database-level to a Log Analytics workspace or an Event Hubs destination, the following operations will not keep the source database-level auditing policy:
5656
- [Database copy](database-copy.md)
5757
- [Point-in-time restore](recovery-using-backups.md)
5858
- [Geo-replication](active-geo-replication-overview.md) (Secondary database will not have database-level auditing)
@@ -78,7 +78,7 @@ An auditing policy can be defined for a specific database or as a default [serve
7878
- For details about the log format, hierarchy of the storage folder and naming conventions, see the [Blob Audit Log Format Reference](./audit-log-format.md).
7979
- Auditing on [Read-Only Replicas](read-scale-out.md) is automatically enabled. For further details about the hierarchy of the storage folders, naming conventions, and log format, see the [SQL Database Audit Log Format](audit-log-format.md).
8080
- When using Azure AD Authentication, failed logins records will *not* appear in the SQL audit log. To view failed login audit records, you need to visit the [Azure Active Directory portal](/azure/active-directory/reports-monitoring/concept-sign-ins), which logs details of these events.
81-
- Logins are routed by the gateway to the specific instance where the database is located. In the case of AAD logins, the credentials are verified before attempting to use that user to login into the requested database. In the case of failure, the requested database is never accessed, so no auditing occurs. In the case of SQL logins, the credentials are verified on the requested data, so in this case they can be audited. Successful logins, which obviously reach the database, are audited in both cases.
81+
- Logins are routed by the gateway to the specific instance where the database is located. In the case of Azure AD logins, the credentials are verified before attempting to use that user to login into the requested database. In the case of failure, the requested database is never accessed, so no auditing occurs. In the case of SQL logins, the credentials are verified on the requested data, so in this case they can be audited. Successful logins, which obviously reach the database, are audited in both cases.
8282
- After you've configured your auditing settings, you can turn on the new threat detection feature and configure emails to receive security alerts. When you use threat detection, you receive proactive alerts on anomalous database activities that can indicate potential security threats. For more information, see [Getting started with threat detection](threat-detection-overview.md).
8383
- After a database with auditing enabled is copied to another [logical server](logical-servers.md), you may receive an email notifying you that the audit failed. This is a known issue and auditing should work as expected on the newly copied database.
8484

@@ -97,7 +97,7 @@ The following section describes the configuration of auditing using the Azure po
9797

9898
> [!NOTE]
9999
> - Enabling auditing on a paused dedicated SQL pool is not possible. To enable auditing, un-pause the dedicated SQL pool. Learn more about [dedicated SQL pool](/azure/synapse-analytics/sql/best-practices-dedicated-sql-pool).
100-
> - When auditing is configured to a Log Analytics workspace or to an Event Hub destination via the Azure portal or PowerShell cmdlet, a [Diagnostic Setting](/azure/azure-monitor/essentials/diagnostic-settings) is created with "SQLSecurityAuditEvents" category enabled.
100+
> - When auditing is configured to a Log Analytics workspace or to an Event Hubs destination via the Azure portal or PowerShell cmdlet, a [Diagnostic Setting](/azure/azure-monitor/essentials/diagnostic-settings) is created with "SQLSecurityAuditEvents" category enabled.
101101
102102
1. Go to the [Azure portal](https://portal.azure.com).
103103
2. Navigate to **Auditing** under the Security heading in your **SQL database** or **SQL server** pane.
@@ -132,8 +132,9 @@ You have the option of choosing a different storage destination for this auditin
132132

133133
### <a id="audit-storage-destination"></a>Audit to storage destination
134134

135-
To configure writing audit logs to a storage account, select **Storage** when you get to the **Auditing** section. Select the Azure storage account where logs will be saved, and then select the retention period by opening **Advanced properties**. Then click **Save**. Logs older than the retention period are deleted.
135+
To configure writing audit logs to a storage account, select **Storage** when you get to the **Auditing** section. Select the Azure storage account where you want to save your logs. You can use the following two storage authentication types: managed identity and storage access keys. For managed identity, system and user managed identity is supported. By default, the primary user identity assigned to the server is selected. If there is no user identity, then a system assigned identity is created and used for authentication purposes. After you have chosen an authentication type, select a retention period by opening **Advanced properties* and selecting **Save**. Logs older than the retention period are deleted.
136136

137+
137138
> [!NOTE]
138139
> If you are deploying from the Azure portal, be sure that the storage account is in the same region as your database and server. If you are deploying through other methods, the storage account can be in any region.
139140
@@ -150,7 +151,7 @@ To configure writing audit logs to a Log Analytics workspace, select **Log Analy
150151

151152
For more details about Azure Monitor Log Analytics workspace, see [Designing your Azure Monitor Logs deployment](/azure/azure-monitor/logs/design-logs-deployment)
152153

153-
### <a id="audit-event-hub-destination"></a>Audit to Event Hub destination
154+
### <a id="audit-event-hub-destination"></a>Audit to Event Hubs destination
154155

155156
To configure writing audit logs to an event hub, select **Event Hub**. Select the event hub where logs will be written and then click **Save**. Be sure that the event hub is in the same region as your database and server.
156157

azure-sql/database/auto-failover-group-configure-sql-db.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -107,6 +107,9 @@ Create your failover group and add your database to it using PowerShell.
107107
Write-host "Successfully added the database to the failover group..."
108108
```
109109

110+
> [!NOTE]
111+
> It's possible to deploy your auto-failover group across subscriptions by using the `-PartnerSubscriptionId` parameter in Azure Powershell starting with [Az.SQL 3.11.0](https://www.powershellgallery.com/packages/Az.Sql/3.11.0). To learn more, review the following [Example](/powershell/module/az.sql/new-azsqldatabasefailovergroup#example-3).
112+
110113
---
111114

112115
## Test failover

azure-sql/database/automated-backups-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how Azure SQL Database automatically backs up all databases a
55
author: SudhirRaparla
66
ms.author: nvraparl
77
ms.reviewer: mathoma, wiassaf, danil
8-
ms.date: 07/20/2022
8+
ms.date: 09/14/2022
99
ms.service: sql-database
1010
ms.subservice: backup-restore
1111
ms.topic: conceptual
@@ -211,7 +211,7 @@ If you delete a database, the system keeps backups in the same way that it would
211211

212212
For SQL Database, you can configure full LTR backups for up to 10 years in Azure Blob Storage. After the LTR policy is configured, full backups are automatically copied to a different storage container weekly.
213213

214-
To meet various compliance requirements, you can select different retention periods for weekly, monthly, and/or yearly full backups. The frequency depends on the policy. For example, setting `W=0, M=1` would create an LTR copy monthly. For more information about LTR, see [Long-term retention](long-term-retention-overview.md). Databases in the Hyperscale service tier don't currently support long-term retention.
214+
To meet various compliance requirements, you can select different retention periods for weekly, monthly, and/or yearly full backups. The frequency depends on the policy. For example, setting `W=0, M=1` would create an LTR copy monthly. For more information about LTR, see [Long-term retention](long-term-retention-overview.md). Databases in the Hyperscale service tier don't currently support long-term retention.
215215

216216
Updating the backup storage redundancy for an existing database applies the change only to subsequent backups taken in the future and not for existing backups. All existing LTR backups for the database will continue to reside in the existing storage blob. New backups will be replicated based on the configured backup storage redundancy.
217217

azure-sql/database/connect-query-nodejs.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -152,6 +152,7 @@ Open a command prompt and create a folder named *sqltest*. Open the folder you c
152152
} else {
153153
queryDatabase();
154154
}
155+
connection.close();
155156
});
156157

157158
connection.connect();

azure-sql/database/dns-alias-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Azure SQL Database has a Domain Name System (DNS) server. PowerShell and REST AP
1818
A *DNS alias* can be used in place of the server name. Client programs can use the alias in their connection strings. The DNS alias provides a translation layer that can redirect your client programs to different servers. This layer spares you the difficulties of having to find and edit all the clients and their connection strings.
1919

2020
> [!NOTE]
21-
> In Azure Synapse Analytics, the Azure SQL logical server DNS alias is only supported for dedicated SQL Pool (formerly DW). For dedicated SQL pools in Azure Synapse workspaces, the DNS alias is not currently supported.
21+
> In Azure Synapse Analytics, the Azure SQL logical server DNS alias is only supported for dedicated SQL Pool (formerly DW). For dedicated SQL pools in Azure Synapse workspaces, the DNS alias is not currently supported. [What's the difference?](https://aka.ms/dedicatedSQLpooldiff)
2222
2323
Common uses for a DNS alias include the following cases:
2424

@@ -114,4 +114,4 @@ Presently, a DNS alias has the following limitations:
114114

115115
## Next steps
116116

117-
- [PowerShell for DNS Alias to Azure SQL Database](dns-alias-powershell-create.md)
117+
- [PowerShell for DNS Alias to Azure SQL Database](dns-alias-powershell-create.md)

azure-sql/database/doc-changes-updates-release-notes-whats-new.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ titleSuffix: Azure SQL Database
44
description: Learn about the new features and documentation improvements for Azure SQL Database.
55
author: MashaMSFT
66
ms.author: mathoma
7-
ms.date: 08/01/2022
7+
ms.date: 09/14/2022
88
ms.service: sql-database
99
ms.subservice: service-overview
1010
ms.topic: conceptual
@@ -42,7 +42,7 @@ The following table lists the features of Azure SQL Database that are currently
4242
| [SQL Database emulator](local-dev-experience-sql-database-emulator.md) | The Azure SQL Database emulator provides the ability to locally validate database and query design together with client application code in a simple and frictionless model as part of the application development process. |
4343
| [SQL Database Projects extension](/sql/azure-data-studio/extensions/sql-database-project-extension) | An extension to develop databases for Azure SQL Database with Azure Data Studio and VS Code. A SQL project is a local representation of SQL objects that comprise the schema for a single database, such as tables, stored procedures, or functions. |
4444
| [SQL Insights](/azure/azure-monitor/insights/sql-insights-overview) | SQL Insights (preview) is a comprehensive solution for monitoring any product in the Azure SQL family. SQL Insights (preview) uses dynamic management views to expose the data you need to monitor health, diagnose problems, and tune performance.|
45-
45+
| [UMI for auditing](auditing-overview.md) | Configure the storage account for your SQL auditing logs by using User Managed Identity (UMI). |
4646

4747
## General availability (GA)
4848

@@ -68,11 +68,20 @@ The following table lists the features of Azure SQL Database that have transitio
6868

6969
Learn about significant changes to the Azure SQL Database documentation.
7070

71+
### September 2022
72+
73+
| Changes | Details |
74+
| --- | --- |
75+
| **Cross-subscription failover group with Azure PowerShell** | It's now possible to deploy your auto-failover group for a single database across subscriptions by using Azure PowerShell. To learn more, review [Configure auto-failover group](auto-failover-group-configure-sql-db.md?view=azuresql&tabs=azure-powershell&pivots=azure-sql-single-db&preserve-view=true#create-failover-group). |
76+
| **UMI support for auditing preview** | It's now possible to configure the storage account used for SQL auditing logs by using User Managed Identity (UMI). This feature is currently in preview. Review [auditing](auditing-overview.md) to learn more. |
77+
78+
7179
### August 2022
7280

7381
| Changes | Details |
7482
| --- | --- |
75-
| **Zone redundant configuration for Hyperscale databases** | The zone redundant configuration feature utilizes [Azure Availability Zones](/azure/availability-zones/az-overview#availability-zones) to replicate databases across multiple physical locations within an Azure region. By selecting [zone redundancy](high-availability-sla.md#hyperscale-service-tier-zone-redundant-availability), you can make your Hyperscale databases resilient to a much larger set of failures, including catastrophic datacenter outages, without any changes to the application logic. This configuration option is now generally available. To learn more, review [Zone redundant configuration for Hyperscale databases](high-availability-sla.md#hyperscale-service-tier-zone-redundant-availability). |
83+
| **Zone redundant configuration for Hyperscale databases GA** | The zone redundant configuration feature utilizes [Azure Availability Zones](/azure/availability-zones/az-overview#availability-zones) to replicate databases across multiple physical locations within an Azure region. By selecting [zone redundancy](high-availability-sla.md#hyperscale-service-tier-zone-redundant-availability), you can make your Hyperscale databases resilient to a much larger set of failures, including catastrophic datacenter outages, without any changes to the application logic. This configuration option is now generally available. To learn more, review [Zone redundant configuration for Hyperscale databases](high-availability-sla.md#hyperscale-service-tier-zone-redundant-availability). |
84+
| **Query Store hints GA** | You can use query hints to optimize your query execution via the OPTION clause. This feature is now generally available for Azure SQL Database. To learn more, review [Query Store hints](/sql/relational-databases/performance/query-store-hints?view=azuresqldb-current&preserve-view=true). |
7685

7786
### June 2022
7887

azure-sql/database/elastic-query-vertical-partitioning.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,10 @@ CREATE EXTERNAL TABLE [dbo].[customer]
109109
[c_lastname] nvarchar(256) NOT NULL,
110110
[street] nvarchar(256) NOT NULL,
111111
[city] nvarchar(256) NOT NULL,
112-
[state] nvarchar(20) NULL,
112+
[state] nvarchar(20) NULL
113+
)
114+
WITH
115+
(
113116
DATA_SOURCE = RemoteReferenceData
114117
);
115118
```

0 commit comments

Comments
 (0)