You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-sql/database/audit-write-storage-account-behind-vnet-firewall.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,6 +39,7 @@ For audit to write to a storage account behind a VNet or firewall, the following
39
39
> * The storage account must be on the same tenant and at the same location as the [logical SQL server](logical-servers.md) (it's OK to be on different subscriptions).
40
40
> * The Azure Storage account requires `Allow trusted Microsoft services to access this storage account`. Set this on the Storage Account **Firewalls and Virtual networks**.
41
41
> * You must have `Microsoft.Authorization/roleAssignments/write` permission on the selected storage account. For more information, see [Azure built-in roles](/azure/role-based-access-control/built-in-roles).
42
+
> ***User managed identity authentication** type for enabling auditing to storage behind firewall is not currently supported.
42
43
43
44
> [!NOTE]
44
45
> When Auditing to stoarge account is already enabled on a server / db, and if the target storage account is moved behind a firewall, we lose write access to
Copy file name to clipboardExpand all lines: azure-sql/database/auditing-overview.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,7 @@ You can use SQL Database auditing to:
39
39
40
40
### Auditing limitations
41
41
42
-
-**User managed identity** authentication type for enabling auditing to **storage** is not currently supported.
42
+
-**User managed identity** authentication type for enabling auditing to **storage behind firewall** is not currently supported.
43
43
- Enabling auditing on a paused **Azure Synapse** is not supported. To enable auditing, resume Azure Synapse.
44
44
- Auditing for **Azure Synapse SQL pools** supports default audit action groups **only**.
45
45
- When you configure the auditing for your [logical server in Azure](logical-servers.md) or Azure SQL Database with log destination as the storage account, the target storage account must be enabled with access to storage account keys. If the storage account is configured to use Azure AD authentication only and not configured for access key usage, the auditing cannot be configured. <!-- REST API reference: - /rest/api/sql/2021-08-01-preview/server-blob-auditing-policies/create-or-update -->
@@ -52,7 +52,7 @@ An auditing policy can be defined for a specific database or as a default [serve
52
52
53
53
- If *server auditing is enabled*, it *always applies to the database*. The database will be audited, regardless of the database auditing settings.
54
54
55
-
- When auditing policy is defined at the database-level to a Log Analytics workspace or an Event Hub destination, the following operations will not keep the source database-level auditing policy:
55
+
- When auditing policy is defined at the database-level to a Log Analytics workspace or an Event Hubs destination, the following operations will not keep the source database-level auditing policy:
-[Geo-replication](active-geo-replication-overview.md) (Secondary database will not have database-level auditing)
@@ -78,7 +78,7 @@ An auditing policy can be defined for a specific database or as a default [serve
78
78
- For details about the log format, hierarchy of the storage folder and naming conventions, see the [Blob Audit Log Format Reference](./audit-log-format.md).
79
79
- Auditing on [Read-Only Replicas](read-scale-out.md) is automatically enabled. For further details about the hierarchy of the storage folders, naming conventions, and log format, see the [SQL Database Audit Log Format](audit-log-format.md).
80
80
- When using Azure AD Authentication, failed logins records will *not* appear in the SQL audit log. To view failed login audit records, you need to visit the [Azure Active Directory portal](/azure/active-directory/reports-monitoring/concept-sign-ins), which logs details of these events.
81
-
- Logins are routed by the gateway to the specific instance where the database is located. In the case of AAD logins, the credentials are verified before attempting to use that user to login into the requested database. In the case of failure, the requested database is never accessed, so no auditing occurs. In the case of SQL logins, the credentials are verified on the requested data, so in this case they can be audited. Successful logins, which obviously reach the database, are audited in both cases.
81
+
- Logins are routed by the gateway to the specific instance where the database is located. In the case of Azure AD logins, the credentials are verified before attempting to use that user to login into the requested database. In the case of failure, the requested database is never accessed, so no auditing occurs. In the case of SQL logins, the credentials are verified on the requested data, so in this case they can be audited. Successful logins, which obviously reach the database, are audited in both cases.
82
82
- After you've configured your auditing settings, you can turn on the new threat detection feature and configure emails to receive security alerts. When you use threat detection, you receive proactive alerts on anomalous database activities that can indicate potential security threats. For more information, see [Getting started with threat detection](threat-detection-overview.md).
83
83
- After a database with auditing enabled is copied to another [logical server](logical-servers.md), you may receive an email notifying you that the audit failed. This is a known issue and auditing should work as expected on the newly copied database.
84
84
@@ -97,7 +97,7 @@ The following section describes the configuration of auditing using the Azure po
97
97
98
98
> [!NOTE]
99
99
> - Enabling auditing on a paused dedicated SQL pool is not possible. To enable auditing, un-pause the dedicated SQL pool. Learn more about [dedicated SQL pool](/azure/synapse-analytics/sql/best-practices-dedicated-sql-pool).
100
-
> - When auditing is configured to a Log Analytics workspace or to an Event Hub destination via the Azure portal or PowerShell cmdlet, a [Diagnostic Setting](/azure/azure-monitor/essentials/diagnostic-settings) is created with "SQLSecurityAuditEvents" category enabled.
100
+
> - When auditing is configured to a Log Analytics workspace or to an Event Hubs destination via the Azure portal or PowerShell cmdlet, a [Diagnostic Setting](/azure/azure-monitor/essentials/diagnostic-settings) is created with "SQLSecurityAuditEvents" category enabled.
101
101
102
102
1. Go to the [Azure portal](https://portal.azure.com).
103
103
2. Navigate to **Auditing** under the Security heading in your **SQL database** or **SQL server** pane.
@@ -132,8 +132,9 @@ You have the option of choosing a different storage destination for this auditin
132
132
133
133
### <aid="audit-storage-destination"></a>Audit to storage destination
134
134
135
-
To configure writing audit logs to a storage account, select **Storage** when you get to the **Auditing** section. Select the Azure storage account where logs will be saved, and then select the retention period by opening **Advanced properties**. Then click**Save**. Logs older than the retention period are deleted.
135
+
To configure writing audit logs to a storage account, select **Storage** when you get to the **Auditing** section. Select the Azure storage account where you want to save your logs. You can use the following two storage authentication types: managed identity and storage access keys. For managed identity, system and user managed identity is supported. By default, the primary user identity assigned to the server is selected. If there is no user identity, then a system assigned identity is created and used for authentication purposes. After you have chosen an authentication type, select a retention period by opening **Advanced properties* and selecting**Save**. Logs older than the retention period are deleted.
136
136
137
+
137
138
> [!NOTE]
138
139
> If you are deploying from the Azure portal, be sure that the storage account is in the same region as your database and server. If you are deploying through other methods, the storage account can be in any region.
139
140
@@ -150,7 +151,7 @@ To configure writing audit logs to a Log Analytics workspace, select **Log Analy
150
151
151
152
For more details about Azure Monitor Log Analytics workspace, see [Designing your Azure Monitor Logs deployment](/azure/azure-monitor/logs/design-logs-deployment)
152
153
153
-
### <aid="audit-event-hub-destination"></a>Audit to Event Hub destination
154
+
### <aid="audit-event-hub-destination"></a>Audit to Event Hubs destination
154
155
155
156
To configure writing audit logs to an event hub, select **Event Hub**. Select the event hub where logs will be written and then click **Save**. Be sure that the event hub is in the same region as your database and server.
Copy file name to clipboardExpand all lines: azure-sql/database/auto-failover-group-configure-sql-db.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -107,6 +107,9 @@ Create your failover group and add your database to it using PowerShell.
107
107
Write-host "Successfully added the database to the failover group..."
108
108
```
109
109
110
+
> [!NOTE]
111
+
> It's possible to deploy your auto-failover group across subscriptions by using the `-PartnerSubscriptionId` parameter in Azure Powershell starting with [Az.SQL 3.11.0](https://www.powershellgallery.com/packages/Az.Sql/3.11.0). To learn more, review the following [Example](/powershell/module/az.sql/new-azsqldatabasefailovergroup#example-3).
Copy file name to clipboardExpand all lines: azure-sql/database/automated-backups-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: Learn how Azure SQL Database automatically backs up all databases a
5
5
author: SudhirRaparla
6
6
ms.author: nvraparl
7
7
ms.reviewer: mathoma, wiassaf, danil
8
-
ms.date: 07/20/2022
8
+
ms.date: 09/14/2022
9
9
ms.service: sql-database
10
10
ms.subservice: backup-restore
11
11
ms.topic: conceptual
@@ -211,7 +211,7 @@ If you delete a database, the system keeps backups in the same way that it would
211
211
212
212
For SQL Database, you can configure full LTR backups for up to 10 years in Azure Blob Storage. After the LTR policy is configured, full backups are automatically copied to a different storage container weekly.
213
213
214
-
To meet various compliance requirements, you can select different retention periods for weekly, monthly, and/or yearly full backups. The frequency depends on the policy. For example, setting `W=0, M=1` would create an LTR copy monthly. For more information about LTR, see [Long-term retention](long-term-retention-overview.md). Databases in the Hyperscale service tier don't currently support long-term retention.
214
+
To meet various compliance requirements, you can select different retention periods for weekly, monthly, and/or yearly full backups. The frequency depends on the policy. For example, setting `W=0, M=1` would create an LTR copy monthly. For more information about LTR, see [Long-term retention](long-term-retention-overview.md). Databases in the Hyperscale service tier don't currently support long-term retention.
215
215
216
216
Updating the backup storage redundancy for an existing database applies the change only to subsequent backups taken in the future and not for existing backups. All existing LTR backups for the database will continue to reside in the existing storage blob. New backups will be replicated based on the configured backup storage redundancy.
Copy file name to clipboardExpand all lines: azure-sql/database/dns-alias-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ Azure SQL Database has a Domain Name System (DNS) server. PowerShell and REST AP
18
18
A *DNS alias* can be used in place of the server name. Client programs can use the alias in their connection strings. The DNS alias provides a translation layer that can redirect your client programs to different servers. This layer spares you the difficulties of having to find and edit all the clients and their connection strings.
19
19
20
20
> [!NOTE]
21
-
> In Azure Synapse Analytics, the Azure SQL logical server DNS alias is only supported for dedicated SQL Pool (formerly DW). For dedicated SQL pools in Azure Synapse workspaces, the DNS alias is not currently supported.
21
+
> In Azure Synapse Analytics, the Azure SQL logical server DNS alias is only supported for dedicated SQL Pool (formerly DW). For dedicated SQL pools in Azure Synapse workspaces, the DNS alias is not currently supported.[What's the difference?](https://aka.ms/dedicatedSQLpooldiff)
22
22
23
23
Common uses for a DNS alias include the following cases:
24
24
@@ -114,4 +114,4 @@ Presently, a DNS alias has the following limitations:
114
114
115
115
## Next steps
116
116
117
-
-[PowerShell for DNS Alias to Azure SQL Database](dns-alias-powershell-create.md)
117
+
-[PowerShell for DNS Alias to Azure SQL Database](dns-alias-powershell-create.md)
Copy file name to clipboardExpand all lines: azure-sql/database/doc-changes-updates-release-notes-whats-new.md
+12-3Lines changed: 12 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ titleSuffix: Azure SQL Database
4
4
description: Learn about the new features and documentation improvements for Azure SQL Database.
5
5
author: MashaMSFT
6
6
ms.author: mathoma
7
-
ms.date: 08/01/2022
7
+
ms.date: 09/14/2022
8
8
ms.service: sql-database
9
9
ms.subservice: service-overview
10
10
ms.topic: conceptual
@@ -42,7 +42,7 @@ The following table lists the features of Azure SQL Database that are currently
42
42
|[SQL Database emulator](local-dev-experience-sql-database-emulator.md)| The Azure SQL Database emulator provides the ability to locally validate database and query design together with client application code in a simple and frictionless model as part of the application development process. |
43
43
|[SQL Database Projects extension](/sql/azure-data-studio/extensions/sql-database-project-extension)| An extension to develop databases for Azure SQL Database with Azure Data Studio and VS Code. A SQL project is a local representation of SQL objects that comprise the schema for a single database, such as tables, stored procedures, or functions. |
44
44
|[SQL Insights](/azure/azure-monitor/insights/sql-insights-overview)| SQL Insights (preview) is a comprehensive solution for monitoring any product in the Azure SQL family. SQL Insights (preview) uses dynamic management views to expose the data you need to monitor health, diagnose problems, and tune performance.|
45
-
45
+
|[UMI for auditing](auditing-overview.md)| Configure the storage account for your SQL auditing logs by using User Managed Identity (UMI). |
46
46
47
47
## General availability (GA)
48
48
@@ -68,11 +68,20 @@ The following table lists the features of Azure SQL Database that have transitio
68
68
69
69
Learn about significant changes to the Azure SQL Database documentation.
70
70
71
+
### September 2022
72
+
73
+
| Changes | Details |
74
+
| --- | --- |
75
+
|**Cross-subscription failover group with Azure PowerShell**| It's now possible to deploy your auto-failover group for a single database across subscriptions by using Azure PowerShell. To learn more, review [Configure auto-failover group](auto-failover-group-configure-sql-db.md?view=azuresql&tabs=azure-powershell&pivots=azure-sql-single-db&preserve-view=true#create-failover-group). |
76
+
|**UMI support for auditing preview**| It's now possible to configure the storage account used for SQL auditing logs by using User Managed Identity (UMI). This feature is currently in preview. Review [auditing](auditing-overview.md) to learn more. |
77
+
78
+
71
79
### August 2022
72
80
73
81
| Changes | Details |
74
82
| --- | --- |
75
-
|**Zone redundant configuration for Hyperscale databases**| The zone redundant configuration feature utilizes [Azure Availability Zones](/azure/availability-zones/az-overview#availability-zones) to replicate databases across multiple physical locations within an Azure region. By selecting [zone redundancy](high-availability-sla.md#hyperscale-service-tier-zone-redundant-availability), you can make your Hyperscale databases resilient to a much larger set of failures, including catastrophic datacenter outages, without any changes to the application logic. This configuration option is now generally available. To learn more, review [Zone redundant configuration for Hyperscale databases](high-availability-sla.md#hyperscale-service-tier-zone-redundant-availability). |
83
+
|**Zone redundant configuration for Hyperscale databases GA**| The zone redundant configuration feature utilizes [Azure Availability Zones](/azure/availability-zones/az-overview#availability-zones) to replicate databases across multiple physical locations within an Azure region. By selecting [zone redundancy](high-availability-sla.md#hyperscale-service-tier-zone-redundant-availability), you can make your Hyperscale databases resilient to a much larger set of failures, including catastrophic datacenter outages, without any changes to the application logic. This configuration option is now generally available. To learn more, review [Zone redundant configuration for Hyperscale databases](high-availability-sla.md#hyperscale-service-tier-zone-redundant-availability). |
84
+
|**Query Store hints GA**| You can use query hints to optimize your query execution via the OPTION clause. This feature is now generally available for Azure SQL Database. To learn more, review [Query Store hints](/sql/relational-databases/performance/query-store-hints?view=azuresqldb-current&preserve-view=true). |
0 commit comments