You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-sql/database-watcher-faq.yml
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ metadata:
5
5
description: Frequently asked questions about database watcher for Azure SQL
6
6
author: dimitri-furman
7
7
ms.author: dfurman
8
-
ms.date: 07/12/2024
8
+
ms.date: 09/05/2024
9
9
ms.reviewer: wiassaf
10
10
ms.service: azure-sql
11
11
ms.subservice: monitoring
@@ -18,7 +18,7 @@ summary: |
18
18
19
19
This article provides answers to frequently asked questions about database watcher for Azure SQL. It is intended for readers who have a general understanding of Azure SQL, and are looking for answers to specific, commonly asked questions about database watcher.
20
20
21
-
For an overview of database watcher, see [Monitor Azure SQL workloads with database watcher](database-watcher-overview.md).
21
+
For an overview of database watcher, see [Monitor Azure SQL workloads with database watcher (preview)](database-watcher-overview.md).
22
22
23
23
sections:
24
24
- name: General
@@ -101,7 +101,7 @@ sections:
101
101
questions:
102
102
- question: |
103
103
Which data services are supported as the data store for the SQL monitoring data?
104
-
answer: You can use a database on an [Azure Data Explorer cluster](/azure/data-explorer/data-explorer-overview), on a [free Azure Data Explorer cluster](/azure/data-explorer/start-for-free), or in [Real-Time Analytics](/fabric/real-time-analytics/overview) in Microsoft Fabric. To compare between these options, see [What is the difference between Real-Time Analytics and Azure Data Explorer?](/fabric/real-time-analytics/realtime-analytics-compare).
104
+
answer: You can use a database on an [Azure Data Explorer cluster](/azure/data-explorer/data-explorer-overview), on a [free Azure Data Explorer cluster](/azure/data-explorer/start-for-free), or in [Real-Time Analytics](/fabric/real-time-analytics/overview) in Microsoft Fabric. To compare between these options, see [What is the difference between Real-Time Analytics and Azure Data Explorer?](/fabric/real-time-analytics/realtime-analytics-compare)
105
105
106
106
- question: |
107
107
I already have an Azure Data Explorer cluster. Can I use it for my database watcher data store?
Azure Policy can enforce the creation of an Azure SQL Database or Azure SQL Managed Instance with [Microsoft Entra-only authentication](authentication-azure-ad-only-authentication.md) enabled during provisioning. With this policy in place, any attempts to create a [logical server in Azure](logical-servers.md) or managed instance will fail if it isn't created with Microsoft Entra-only authentication enabled.
20
20
@@ -53,14 +53,14 @@ For more information on custom roles, see [Azure custom roles](/azure/role-based
53
53
54
54
The Azure AD-only authentication policies can be managed by going to the [Azure portal](https://portal.azure.com), and searching for the **Policy** service. Under **Definitions**, search for *Azure Active Directory-only authentication*.
55
55
56
-
:::image type="content" source="media/authentication-azure-ad-only-authentication-policy/policy-azure-ad-only-authentication.png" alt-text="Screenshot of Azure Policy for Azure AD-only authentication":::
56
+
:::image type="content" source="media/authentication-azure-ad-only-authentication-policy/policy-azure-ad-only-authentication.png" alt-text="Screenshot of Azure Policy for Azure AD-only authentication." lightbox="media/authentication-azure-ad-only-authentication-policy/policy-azure-ad-only-authentication.png":::
57
57
58
-
For a guide, see [Using Azure Policy to enforce Azure AD-only authentication with Azure SQL](authentication-azure-ad-only-authentication-policy-how-to.md).
58
+
For a guide, see [Using Azure Policy to enforce Microsoft Entra-only authentication with Azure SQL](authentication-azure-ad-only-authentication-policy-how-to.md).
59
59
60
60
There are three effects for these policies:
61
61
62
62
-**Audit** - The default setting, and will only capture an audit report in the Azure Policy activity logs
63
-
-**Deny** - Prevents logical server or managed instance creation without [Microsoft Entra-only authentication](authentication-azure-ad-only-authentication.md) enabled
63
+
-**Deny** - Prevents logical server or managed instance creation without [Microsoft Entra-only authentication with Azure SQL](authentication-azure-ad-only-authentication.md) enabled
64
64
-**Disabled** - Will disable the policy, and won't restrict users from creating a logical server or managed instance without Microsoft Entra-only authentication enabled
65
65
66
66
If the Azure Policy for Azure AD-only authentication is set to **Deny**, creating a logical server or managed instance fails. The details of this failure are recorded in the **Activity log** of the resource group.
@@ -71,14 +71,14 @@ You can view the **Compliance** setting under the **Policy** service to see the
71
71
72
72
The Azure Policy can prevent a new logical server or managed instance from being created without having Microsoft Entra-only authentication enabled, but the feature can be changed after server or managed instance creation. If a user has disabled Microsoft Entra-only authentication after the server or managed instance was created, the compliance state will be `Non-compliant` if the Azure Policy is set to **Deny**.
73
73
74
-
:::image type="content" source="media/authentication-azure-ad-only-authentication-policy/check-compliance-policy-azure-ad-only-authentication.png" alt-text="Screenshot of Azure Policy Compliance menu for Azure AD-only authentication.":::
74
+
:::image type="content" source="media/authentication-azure-ad-only-authentication-policy/check-compliance-policy-azure-ad-only-authentication.png" alt-text="Screenshot of Azure Policy Compliance menu for Azure AD-only authentication." lightbox="media/authentication-azure-ad-only-authentication-policy/check-compliance-policy-azure-ad-only-authentication.png":::
75
75
76
76
## Limitations
77
77
78
78
- Azure Policy enforces Azure AD-only authentication during logical server or managed instance creation. Once the server is created, authorized Microsoft Entra users with special roles (for example, SQL Security Manager) can disable the Azure AD-only authentication feature. The Azure Policy allows it, but in this case, the server or managed instance will be listed in the compliance report as `Non-compliant` and the report will indicate the server or managed instance name.
79
-
- For more remarks, known issues, and permissions needed, see [Microsoft Entra-only authentication](authentication-azure-ad-only-authentication.md).
79
+
- For more remarks, known issues, and permissions needed, see [Microsoft Entra-only authentication with Azure SQL](authentication-azure-ad-only-authentication.md).
80
80
81
-
## Next steps
81
+
## Next step
82
82
83
83
> [!div class="nextstepaction"]
84
-
> [Using Azure Policy to enforce Azure AD-only authentication with Azure SQL](authentication-azure-ad-only-authentication-policy-how-to.md)
84
+
> [Using Azure Policy to enforce Microsoft Entra-only authentication with Azure SQL](authentication-azure-ad-only-authentication-policy-how-to.md)
Copy file name to clipboardExpand all lines: azure-sql/database/doc-changes-updates-release-notes-whats-new-archive.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,7 +67,7 @@ Return to [What's new in Azure SQL Database?](doc-changes-updates-release-notes-
67
67
| Changes | Details |
68
68
| --- | --- |
69
69
|**128 vCore preview**| It's now possible to provision your Azure SQL Database with up to 128 vCores in both the General Purpose, and Business Critical service tiers. For more information, review [resource limits](resource-limits-vcore-single-databases.md#general-purpose---provisioned-compute---gen5). |
70
-
|**Azure Synapse Link for SQL GA**| Azure Synapse Link for SQL, now generally available, enables near real-time analytics over operational data in SQL Server 2022 and Azure SQL Database. With a seamless integration between operational stores and Azure Synapse Analytics dedicated SQL pools, Azure Synapse Link for SQL enables you to run analytics, business intelligence and machine learning scenarios on your operational data with minimum impact on source databases with a new change feed technology. For more information, review [What is Azure Synapse Link for SQL?](/azure/synapse-analytics/synapse-link/sql-synapse-link-overview).|
70
+
|**Azure Synapse Link for SQL GA**| Azure Synapse Link for SQL, now generally available, enables near real-time analytics over operational data in SQL Server 2022 and Azure SQL Database. With a seamless integration between operational stores and Azure Synapse Analytics dedicated SQL pools, Azure Synapse Link for SQL enables you to run analytics, business intelligence and machine learning scenarios on your operational data with minimum impact on source databases with a new change feed technology. For more information, review [What is Azure Synapse Link for SQL?](/azure/synapse-analytics/synapse-link/sql-synapse-link-overview)|
71
71
|**Gen5 hardware rename**| The Gen5 hardware in the vCore purchasing model has been renamed to **standard-series (Gen5)**. |
72
72
|**Hyperscale premium-series and premium-series memory optimized hardware preview**| Premium-series and premium-series memory optimized hardware is [in preview for Hyperscale databases](service-tier-hyperscale.md#compute-resources). For more information, read the [Premium-series announcement blog post](https://aka.ms/AAiq28n). |
73
73
|**Invoke external REST endpoints preview**| It's now possible to call an HTTPS REST endpoint natively, using a new system stored procedure. This feature is currently in preview. For more information, review [sp_invoke_external_rest_endpoint](/sql/relational-databases/system-stored-procedures/sp-invoke-external-rest-endpoint-transact-sql). |
> *[SQL Server on Azure VMs](../virtual-machines/windows/doc-changes-updates-release-notes-whats-new.md?view=azuresql&preserve-view=true)
25
25
26
-
This article summarizes the documentation changes associated with new features and improvements in the recent releases of [Azure SQL Database](https://azure.microsoft.com/products/azure-sql/database/). For more information about Azure SQL Database, see [What is Azure SQL Database?](sql-database-paas-overview.md).
26
+
This article summarizes the documentation changes associated with new features and improvements in the recent releases of [Azure SQL Database](https://azure.microsoft.com/products/azure-sql/database/). For more information about Azure SQL Database, see [What is Azure SQL Database?](sql-database-paas-overview.md)
27
27
28
28
> [!TIP]
29
29
> For more announcements, discussion, and community content, see the [Azure SQL Database blog](https://techcommunity.microsoft.com/t5/azure-sql-blog/bg-p/AzureSQLBlog).
0 commit comments