You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -77,7 +77,7 @@ INSERT INTO [dbo].[CustomerInformation] ([CustomerID], [CustomerName], [Company]
77
77
78
78
To create an external data source, execute the following command on the Orders database:
79
79
80
-
```tsql
80
+
```sql
81
81
CREATE EXTERNAL DATA SOURCE MyElasticDBQueryDataSrc WITH
82
82
(TYPE = RDBMS,
83
83
LOCATION = '<server_name>.database.windows.net',
@@ -90,7 +90,7 @@ CREATE EXTERNAL DATA SOURCE MyElasticDBQueryDataSrc WITH
90
90
91
91
Create an external table on the Orders database, which matches the definition of the CustomerInformation table:
92
92
93
-
```tsql
93
+
```sql
94
94
CREATE EXTERNAL TABLE [dbo].[CustomerInformation]
95
95
( [CustomerID] [int] NOT NULL,
96
96
[CustomerName] [varchar](50) NOT NULL,
@@ -103,7 +103,7 @@ WITH
103
103
104
104
Once you have defined your external data source and your external tables, you can now use T-SQL to query your external tables. Execute this query on the Orders database:
What resource types and purchasing models support Hyperscale?
35
35
answer: |
36
-
The Hyperscale service tier is only available for single databases using the vCore-based purchasing model in Azure SQL Database.
36
+
The Hyperscale service tier is only available for single databases using the vCore-based purchasing model in Azure SQL Database. It is not available in the DTU-based purchasing model.
37
37
38
38
- question: |
39
39
How does the Hyperscale service tier differ from the General Purpose and Business Critical service tiers?
Copy file name to clipboardExpand all lines: azure-sql/managed-instance/doc-changes-updates-known-issues.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -206,7 +206,7 @@ Several system views, performance counters, error messages, XEvents, and error l
206
206
207
207
**Workaround**: Use `sys.databases` view to resolve the actual database name from the physical database name, specified in the form of GUID database identifiers:
208
208
209
-
```tsql
209
+
```sql
210
210
SELECT name as ActualDatabaseName, physical_database_name as GUIDDatabaseIdentifier
Copy file name to clipboardExpand all lines: azure-sql/migration-guides/managed-instance/sql-server-to-managed-instance-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -189,7 +189,7 @@ If you have memory-optimized tables or memory-optimized table types in your on-p
189
189
- Choose the Business Critical tier for your target SQL managed instance that supports In-Memory OLTP.
190
190
- If you want to migrate to the General Purpose tier in Azure SQL Managed Instance, remove memory-optimized tables, memory-optimized table types, and natively compiled SQL modules that interact with memory-optimized objects before migrating your databases. You can use the following T-SQL query to identify all objects that need to be removed before migration to the General Purpose tier:
Copy file name to clipboardExpand all lines: docs/big-data-cluster/big-data-cluster-key-versions.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -146,14 +146,14 @@ The main encryption key will be rotated using `azdata bdc kms set –key-provide
146
146
147
147
The asymmetric key can be seen using the following T-SQL query, with the `sys.asymmetric_keys` system catalog view.
148
148
149
-
```tsql
149
+
```sql
150
150
USE master;
151
151
select*fromsys.asymmetric_keys;
152
152
```
153
153
154
154
The asymmetric key will appear with the naming convention "tde_asymmetric_key_\<version\>". The SQL Server administrator can then change the protector of the DEK to the asymmetric key using [ALTER DATABASE ENCRYPTION KEY](../t-sql/statements/alter-database-encryption-key-transact-sql.md). For example, use the following T-SQL command:
155
155
156
-
```tsql
156
+
```sql
157
157
USE db1;
158
158
ALTERDATABASE ENCRYPTION KEY ENCRYPTION BY SERVER ASYMMETRIC KEY tde_asymmetric_key_0;
Copy file name to clipboardExpand all lines: docs/connect/odbc/using-always-encrypted-with-the-odbc-driver.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -114,7 +114,7 @@ The table below summarizes the behavior of queries, depending on whether Always
114
114
115
115
The following examples illustrate retrieving and modifying data in encrypted columns. The examples assume a table with the following schema. The SSN and BirthDate columns are encrypted.
0 commit comments