Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit 7dfb69c

Browse files
committed
Bringing even with master.
2 parents 884970f + bc27194 commit 7dfb69c

924 files changed

Lines changed: 4915 additions & 10230 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

docs/linux/sql-server-linux-migrate-restore-database.md

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -159,6 +159,44 @@ To restore the database backup, you can use the **RESTORE DATABASE** Transact-SQ
159159
160160
You should get a message the database is successfully restored.
161161
162+
`RESTORE DATABASE` may return an error like the following example:
163+
164+
```bash
165+
File 'YourDB_Product' cannot be restored to 'Z:\Microsoft SQL Server\MSSQL11.GLOBAL\MSSQL\Data\YourDB\YourDB_Product.ndf'. Use WITH MOVE to identify a valid location for the file.
166+
Msg 5133, Level 16, State 1, Server servername, Line 1
167+
Directory lookup for the file "Z:\Microsoft SQL Server\MSSQL11.GLOBAL\MSSQL\Data\YourDB\YourDB_Product.ndf" failed with the operating system error 2(The system cannot find the file specified.).
168+
```
169+
170+
In this case, the database contains secondary files. If these files are not specified in the `MOVE` clause of `RESTORE DATABASE`, the restore procedure will try to create them in the same path as the original server.
171+
172+
You can list all files included in the backup:
173+
```sql
174+
RESTORE FILELISTONLY FROM DISK = '/var/opt/mssql/backup/YourDB.bak'
175+
GO
176+
```
177+
You should get a list like the one below (listing only the two first columns):
178+
```sql
179+
LogicalName PhysicalName ..............
180+
----------------------------------------------------------------------------------------------------------------------
181+
YourDB Z:\Microsoft SQL Server\MSSQL11.GLOBAL\MSSQL\Data\YourDB\YourDB.mdf ..............
182+
YourDB_Product Z:\Microsoft SQL Server\MSSQL11.GLOBAL\MSSQL\Data\YourDB\YourDB_Product.ndf ..............
183+
YourDB_Customer Z:\Microsoft SQL Server\MSSQL11.GLOBAL\MSSQL\Data\YourDB\YourDB_Customer.ndf ..............
184+
YourDB_log Z:\Microsoft SQL Server\MSSQL11.GLOBAL\MSSQL\Data\YourDB\YourDB_Log.ldf ..............
185+
```
186+
187+
You can use this list to create `MOVE` clauses for the additional files. In this example, the `RESTORE DATABASE` is:
188+
189+
```sql
190+
RESTORE DATABASE YourDB
191+
FROM DISK = '/var/opt/mssql/backup/YourDB.bak'
192+
WITH MOVE 'YourDB' TO '/var/opt/mssql/data/YourDB.mdf',
193+
MOVE 'YourDB_Product' TO '/var/opt/mssql/data/YourDB_Product.ndf',
194+
MOVE 'YourDB_Customer' TO '/var/opt/mssql/data/YourDB_Customer.ndf',
195+
MOVE 'YourDB_Log' TO '/var/opt/mssql/data/YourDB_Log.ldf'
196+
GO
197+
```
198+
199+
162200
1. Verify the restoration by listing all of the databases on the server. The restored database should be listed.
163201
164202
```sql

docs/relational-databases/indexes/columnstore-indexes-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ When you create a table with the `CREATE TABLE` statement, you can create the ta
141141
|Create a table as a columnstore.|[CREATE TABLE (Transact-SQL)](../../t-sql/statements/create-table-transact-sql.md)|Beginning with [!INCLUDE[ssSQL15](../../includes/sssql15-md.md)], you can create the table as a clustered columnstore index. You don't have to first create a rowstore table and then convert it to columnstore.|
142142
|Create a memory table with a columnstore index.|[CREATE TABLE (Transact-SQL)](../../t-sql/statements/create-table-transact-sql.md)|Beginning with [!INCLUDE[ssSQL15](../../includes/sssql15-md.md)], you can create a memory-optimized table with a columnstore index. The columnstore index can also be added after the table is created by using the `ALTER TABLE ADD INDEX` syntax.|
143143
|Convert a rowstore table to a columnstore.|[CREATE COLUMNSTORE INDEX (Transact-SQL)](../../t-sql/statements/create-columnstore-index-transact-sql.md)|Convert an existing heap or binary tree to a columnstore. Examples show how to handle existing indexes and also the name of the index when performing this conversion.|
144-
|Convert a columnstore table to a rowstore.|[CREATE CLUSTERED INDEX (Transact-SQL) or DROP INDEX](../../t-sql/statements/create-columnstore-index-transact-sql.md)|Usually this conversion isn't necessary, but there can be times when you need to convert. Examples show how to convert a columnstore to a heap or clustered index.|
144+
|Convert a columnstore table to a rowstore.|[CREATE CLUSTERED INDEX (Transact-SQL)](../../t-sql/statements/create-columnstore-index-transact-sql.md#d-convert-a-columnstore-table-to-a-rowstore-table-with-a-clustered-index) or [Convert a columnstore table back to a rowstore heap](../../t-sql/statements/create-columnstore-index-transact-sql.md#e-convert-a-columnstore-table-back-to-a-rowstore-heap) |Usually this conversion isn't necessary, but there can be times when you need to convert. Examples show how to convert a columnstore to a heap or clustered index.|
145145
|Create a columnstore index on a rowstore table.|[CREATE COLUMNSTORE INDEX (Transact-SQL)](../../t-sql/statements/create-columnstore-index-transact-sql.md)|A rowstore table can have one columnstore index. Beginning with [!INCLUDE[ssSQL15](../../includes/sssql15-md.md)], the columnstore index can have a filtered condition. Examples show the basic syntax.|
146146
|Create performant indexes for operational analytics.|[Get started with columnstore for real-time operational analytics](../../relational-databases/indexes/get-started-with-columnstore-for-real-time-operational-analytics.md)|Describes how to create complementary columnstore and btree indexes, so that OLTP queries use btree indexes and analytics queries use columnstore indexes.|
147147
|Create performant columnstore indexes for data warehousing.|[Columnstore indexes for data warehousing](~/relational-databases/indexes/columnstore-indexes-data-warehouse.md)|Describes how to use btree indexes on columnstore tables to create performant data warehousing queries.|

docs/relational-databases/security/encryption/always-encrypted-client-development.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@ ms.topic: conceptual
1111
dev_langs:
1212
- "CSharp"
1313
ms.assetid: 9595eb66-284c-4474-828f-8961a05ce989
14-
author: stevestein
15-
ms.author: sstein
14+
author: VanMSFT
15+
ms.author: vanto
1616
manager: craigg
1717
monikerRange: "=azuresqldb-current||>=sql-server-2016||=sqlallproducts-allversions||>=sql-server-linux-2017||=azuresqldb-mi-current"
1818
---

docs/relational-databases/security/encryption/configure-always-encrypted-keys-using-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@ ms.technology: security
99
ms.tgt_pltfrm: ""
1010
ms.topic: conceptual
1111
ms.assetid: 3bdf8629-738c-489f-959b-2f5afdaf7d61
12-
author: stevestein
13-
ms.author: sstein
12+
author: VanMSFT
13+
ms.author: vanto
1414
manager: craigg
1515
monikerRange: "=azuresqldb-current||>=sql-server-2016||=sqlallproducts-allversions||>=sql-server-linux-2017||=azuresqldb-mi-current"
1616
---

docs/relational-databases/security/encryption/configure-always-encrypted-using-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@ ms.technology: security
99
ms.tgt_pltfrm: ""
1010
ms.topic: conceptual
1111
ms.assetid: 12f2bde5-e100-41fa-b474-2d2332fc7650
12-
author: stevestein
13-
ms.author: sstein
12+
author: VanMSFT
13+
ms.author: vanto
1414
manager: craigg
1515
monikerRange: "=azuresqldb-current||>=sql-server-2016||=sqlallproducts-allversions||>=sql-server-linux-2017||=azuresqldb-mi-current"
1616
---

docs/relational-databases/security/encryption/configure-always-encrypted-using-sql-server-management-studio.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ f1_keywords:
1515
helpviewer_keywords:
1616
- "Always Encrypted, configure with SSMS"
1717
ms.assetid: 29816a41-f105-4414-8be1-070675d62e84
18-
author: stevestein
19-
ms.author: sstein
18+
author: VanMSFT
19+
ms.author: vanto
2020
manager: craigg
2121
monikerRange: "=azuresqldb-current||>=sql-server-2016||=sqlallproducts-allversions||>=sql-server-linux-2017||=azuresqldb-mi-current"
2222
---

docs/relational-databases/security/encryption/configure-column-encryption-using-powershell.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -10,16 +10,16 @@ ms.technology: security
1010
ms.tgt_pltfrm: ""
1111
ms.topic: conceptual
1212
ms.assetid: 074c012b-cf14-4230-bf0d-55e23d24f9c8
13-
author: stevestein
14-
ms.author: sstein
13+
author: VanMSFT
14+
ms.author: vanto
1515
manager: craigg
1616
monikerRange: "=azuresqldb-current||>=sql-server-2016||=sqlallproducts-allversions||>=sql-server-linux-2017||=azuresqldb-mi-current"
1717
---
1818
# Configure Column Encryption using PowerShell
1919
[!INCLUDE[appliesto-ss-asdb-xxxx-xxx-md](../../../includes/appliesto-ss-asdb-xxxx-xxx-md.md)]
2020

21-
This article provides the steps for setting the target Always Encrypted configuration for database columns using the [Set-SqlColumnEncryption](https://docs.microsoft.com/powershell/sqlserver/sqlserver/vlatest/set-sqlcolumnencryption) cmdlet (in the *SqlServer* PowerShell module). The **Set-SqlColumnEncryption** cmdlet modifies both the schema of the target database as well as the data stored in the selected columns. The data stored in a column can be encrypted, re-encrypted or decrypted, depending the specified target encryption settings for the columns and the current encryption configuration.
22-
For more information about Always Encrypted support in the SqlServer PowerShell module, please see [Configure Always Encrypted using PowerShell](../../../relational-databases/security/encryption/configure-always-encrypted-using-powershell.md).
21+
This article provides the steps for setting the target Always Encrypted configuration for database columns using the [Set-SqlColumnEncryption](https://docs.microsoft.com/powershell/sqlserver/sqlserver/vlatest/set-sqlcolumnencryption) cmdlet (in the *SqlServer* PowerShell module). The **Set-SqlColumnEncryption** cmdlet modifies both the schema of the target database as well as the data stored in the selected columns. The data stored in a column can be encrypted, re-encrypted, or decrypted, depending on the specified target encryption settings for the columns and the current encryption configuration.
22+
For more information about Always Encrypted support in the SqlServer PowerShell module, see [Configure Always Encrypted using PowerShell](../../../relational-databases/security/encryption/configure-always-encrypted-using-powershell.md).
2323

2424
## Prerequisites
2525

@@ -33,9 +33,9 @@ To apply the specified target encryption settings for the database, the **Set-Sq
3333

3434
The **Set-SqlColumnEncryption** cmdlet supports two approaches for setting up the target encryption configuration: online and offline.
3535

36-
With the offline approach, the target tables (and any tables related to the target tables, e.g. any tables a target table have foreign key relationships with) are unavailable to write transactions throughout the duration of the operation. The semantics of foreign key constraints (**CHECK** or **NOCHECK**) are always preserved when using the offline approach.
36+
With the offline approach, the target tables (and any tables related to the target tables, for example, any tables a target table have foreign key relationships with) are unavailable to write transactions throughout the duration of the operation. The semantics of foreign key constraints (**CHECK** or **NOCHECK**) are always preserved when using the offline approach.
3737

38-
With the online approach (requires the SqlServer PowerShell module version 21.x or later), the operation of copying and encrypting, decrypting or re-encrypting the data is performed incrementally. Applications can read and write data from and to the target tables throughout the data movement operation, except the very last iteration, the duration of which is limited by the **MaxDownTimeInSeconds** parameter (you can define). To detect and process the changes, applications can make while the data is being copied, the cmdlet enables [Change Tracking](../../track-changes/enable-and-disable-change-tracking-sql-server.md) in the target database. Because of that, the online approach is likely to consume more resources on the server side than the online approach. The operation may also take much more time with the online approach, especially if a write-heavy workload is running against the database. The online approach can be used to encrypt one table at a time and the table must have a primary key. By default, foreign key constraints are recreated with the **NOCHECK** option to minimize the impact on applications. You can enforce preserving the semantics of foreign key constraints by specifying the **KeepCheckForeignKeyConstraints** option.
38+
With the online approach (requires the SqlServer PowerShell module version 21.x or later), the operation of copying and encrypting, decrypting, or re-encrypting the data is performed incrementally. Applications can read and write data from and to the target tables throughout the data movement operation, except the very last iteration, the duration of which is limited by the **MaxDownTimeInSeconds** parameter (you can define). To detect and process the changes, applications can make while the data is being copied, the cmdlet enables [Change Tracking](../../track-changes/enable-and-disable-change-tracking-sql-server.md) in the target database. Because of that, the online approach is likely to consume more resources on the server side than the online approach. The operation may also take much more time with the online approach, especially if a write-heavy workload is running against the database. The online approach can be used to encrypt one table at a time and the table must have a primary key. By default, foreign key constraints are recreated with the **NOCHECK** option to minimize the impact on applications. You can enforce preserving the semantics of foreign key constraints by specifying the **KeepCheckForeignKeyConstraints** option.
3939

4040
Here are the guidelines for choosing between the offline and online approaches:
4141

@@ -57,7 +57,7 @@ Step 1. Start a PowerShell environment and import the SqlServer module. | [Impor
5757
Step 2. Connect to your server and database | [Connecting to a Database](../../../relational-databases/security/encryption/configure-always-encrypted-using-powershell.md#connectingtodatabase) | No | Yes
5858
Step 3. Authenticate to Azure, if your column master key (protecting the column encryption key, to be rotated), is stored in Azure Key Vault | [Add-SqlAzureAuthenticationContext](https://docs.microsoft.com/powershell/sqlserver/sqlserver/vlatest/add-sqlazureauthenticationcontext) | Yes | No
5959
Step 4. Construct an array of SqlColumnEncryptionSettings objects - one for each database column, you want to encrypt, re-encrypt, or decrypt. SqlColumnMasterKeySettings is an object that exists in memory (in PowerShell). It specifies the target encryption scheme for a column. | [New-SqlColumnEncryptionSettings](https://docs.microsoft.com/powershell/sqlserver/sqlserver/vlatest/new-sqlcolumnencryptionsettings) | No | No
60-
Step 5. Set the desired encryption configuration, specified in the array of SqlColumnMasterKeySettings objects, you created in the previous step. A column will be encrypted, re-encrypted or decrypted, depending on the specified target settings and the current encryption configuration of the column.| [Set-SqlColumnEncryption](https://docs.microsoft.com/powershell/sqlserver/sqlserver/vlatest/set-sqlcolumnencryption)<br><br>**Note:** This step may take a long time. Your applications will not be able to access the tables through the entire operation or a portion of it, depending on the approach (online vs. offline), you select. | Yes | Yes
60+
Step 5. Set the desired encryption configuration, specified in the array of SqlColumnMasterKeySettings objects, you created in the previous step. A column will be encrypted, re-encrypted, or decrypted, depending on the specified target settings and the current encryption configuration of the column.| [Set-SqlColumnEncryption](https://docs.microsoft.com/powershell/sqlserver/sqlserver/vlatest/set-sqlcolumnencryption)<br><br>**Note:** This step may take a long time. Your applications will not be able to access the tables through the entire operation or a portion of it, depending on the approach (online vs. offline), you select. | Yes | Yes
6161

6262
## Encrypt Columns using Offline Approach - Example
6363

@@ -111,7 +111,7 @@ Set-SqlColumnEncryption -InputObject $database -ColumnEncryptionSettings $ces -U
111111
```
112112
## Decrypt Columns - Example
113113

114-
The following example shows how decrypt all columns that are currently encrypted in a database.
114+
The following example shows how to decrypt all columns that are currently encrypted in a database.
115115

116116

117117
```

docs/relational-databases/security/encryption/create-and-store-column-master-keys-always-encrypted.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@ ms.tgt_pltfrm: ""
1111
ms.topic: conceptual
1212
ms.assetid: 856e8061-c604-4ce4-b89f-a11876dd6c88
1313
caps.latest.revision: 26
14-
author: stevestein
15-
ms.author: sstein
14+
author: VanMSFT
15+
ms.author: vanto
1616
manager: craigg
1717
monikerRange: "=azuresqldb-current||>=sql-server-2016||=sqlallproducts-allversions||>=sql-server-linux-2017||=azuresqldb-mi-current"
1818
---

docs/relational-databases/security/encryption/develop-using-always-encrypted-with-net-framework-data-provider.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@ ms.tgt_pltfrm: ""
1111
ms.topic: conceptual
1212
ms.assetid: 827e509e-3c4f-4820-aa37-cebf0f7bbf80
1313
caps.latest.revision: 11
14-
author: stevestein
15-
ms.author: sstein
14+
author: VanMSFT
15+
ms.author: vanto
1616
manager: craigg
1717
monikerRange: "=azuresqldb-current||>=sql-server-2016||=sqlallproducts-allversions||>=sql-server-linux-2017||=azuresqldb-mi-current"
1818
---

docs/relational-databases/security/encryption/overview-of-key-management-for-always-encrypted.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@ ms.tgt_pltfrm: ""
1111
ms.topic: conceptual
1212
ms.assetid: 07a305b1-4110-42f0-b7aa-28a4e32e912a
1313
caps.latest.revision: 32
14-
author: stevestein
15-
ms.author: sstein
14+
author: VanMSFT
15+
ms.author: vanto
1616
manager: craigg
1717
monikerRange: "=azuresqldb-current||>=sql-server-2016||=sqlallproducts-allversions||>=sql-server-linux-2017||=azuresqldb-mi-current"
1818
---

0 commit comments

Comments
 (0)