Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit 86d19c6

Browse files
20250613 freshness pass
1 parent e9a7995 commit 86d19c6

71 files changed

Lines changed: 1430 additions & 1356 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

azure-sql/capacity-errors-troubleshoot.md

Lines changed: 15 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,25 @@
11
---
2-
title: Resolve capacity errors with Azure SQL resources
2+
title: Resolve Capacity Errors with Azure SQL Resources
33
description: Learn how to resolve possible capacity errors when attempting to deploy or scale Azure SQL Database or Azure SQL Managed Instance resources.
44
author: sachinpMSFT
55
ms.author: sachinp
66
ms.reviewer: mathoma
7-
ms.date: 09/03/2021
7+
ms.date: 06/13/2025
88
ms.service: azure-sql
99
ms.subservice: deployment-configuration
1010
ms.topic: how-to
11-
ms.custom: references_regions
11+
ms.custom:
12+
- references_regions
13+
monikerRange: "=azuresql || =azuresql-db || =azuresql-mi"
1214
---
1315

1416
# Resolve capacity errors with Azure SQL Database or Azure SQL Managed Instance
17+
1518
[!INCLUDE[appliesto-sqldb-sqlmi](includes/appliesto-sqldb-sqlmi.md)]
1619

1720
In this article, learn how to resolve capacity errors when deploying Azure SQL Database or Azure SQL Managed Instance resources.
1821

19-
## Exceeded quota
22+
## Exceeded quota
2023

2124
If you encounter any of the following errors when attempting to deploy your Azure SQL resource, [request to increase your quota](database/quota-increase-request.md):
2225

@@ -34,7 +37,7 @@ If you see the following errors, please [register your subscription with the SQL
3437
- `Provisioning is restricted in this region. Please choose a different region. For exceptions to this rule please open a support request with issue type of 'Service and subscription limits' `
3538
- `Location 'region name' is not accepting creation of new Windows Azure SQL Database servers for the subscription 'subscription id' at this time`
3639

37-
## Enable region
40+
## Enable region
3841

3942
Your subscription might not have access to create a server in the selected region if that region hasn't been enabled. To resolve this, file a [support request to enable a specific region](database/quota-increase-request.md#region) for your subscription.
4043

@@ -59,7 +62,7 @@ To register your subscription in the Azure portal, follow these steps:
5962
1. Enter **sql** in the filter to bring up the SQL-related extensions.
6063
1. Select **Register**, **Re-register**, or **Unregister** for the **Microsoft.Sql** provider, depending on your desired action.
6164

62-
![Modify the provider](./media/capacity-errors-troubleshoot/register-with-sql-rp.png)
65+
:::image type="content" source="media/capacity-errors-troubleshoot/register-with-sql-rp.png" alt-text="Screenshot from the Azure portal of the Resource Providers page, showing how to modify the provider." lightbox="media/capacity-errors-troubleshoot/register-with-sql-rp.png":::
6366

6467
# [Azure CLI](#tab/bash)
6568

@@ -81,20 +84,21 @@ Register-AzResourceProvider -ProviderNamespace Microsoft.Sql
8184

8285
---
8386

87+
After you submit your request, it will be reviewed. You'll be contacted with an answer based on the information you provided in the form.
88+
8489
## Additional provisioning issues
8590

8691
If you're still experiencing provisioning issues, please open a **Region** access request under the support topic of SQL Database and specify the DTU or vCores you want to consume on Azure SQL Database or Azure SQL Managed Instance.
8792

88-
## Azure Program regions
93+
## Azure Program regions
8994

9095
Azure Program offerings (Azure Pass, Imagine, Azure for Students, MPN, BizSpark, BizSpark Plus, Microsoft for Startups / Sponsorship Offers, Visual Studio Subscriptions / MSDN) have access to a limited set of regions.
9196

9297
If your subscription is part of an Azure Program offering, and you would like to request access to any of the following regions, consider using an alternate region instead:
9398

9499
_Australia Central, Australia Central 2, Australia SouthEast, Brazil SouthEast, Canada East, China East, China North, China North 2, France South, Germany North, Japan West, JIO India Central, JIO India West, Korea South, Norway West, South Africa West, South India, Switzerland West, UAE Central, UK West, US DoD Central, US DoD East, US Gov Arizona, US Gov Texas, West Central US, West India._
95100

96-
## Next steps
97-
98-
After you submit your request, it will be reviewed. You'll be contacted with an answer based on the information you provided in the form.
101+
## Next step
99102

100-
For more information about other Azure limits, see [Azure subscription and service limits, quotas, and constraints](/azure/azure-resource-manager/management/azure-subscription-service-limits).
103+
> [!div class="nextstepaction"]
104+
> [Azure subscription and service limits, quotas, and constraints](/azure/azure-resource-manager/management/azure-subscription-service-limits)

azure-sql/database/elastic-query-vertical-partitioning.md

Lines changed: 43 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -1,37 +1,42 @@
11
---
2-
title: Query across cloud databases with different schema
2+
title: Query Across Cloud Databases with Different Schema
33
description: how to set up cross-database queries over vertical partitions
4-
author: bgavrilovicMS
5-
ms.author: bgavrilovic
6-
ms.reviewer: wiassaf, mathoma
7-
ms.date: 12/15/2021
4+
author: WilliamDAssafMSFT
5+
ms.author: wiassaf
6+
ms.reviewer: bgavrilovic, mathoma
7+
ms.date: 06/13/2025
88
ms.service: azure-sql-database
99
ms.subservice: scale-out
1010
ms.topic: how-to
11-
ms.custom: sqldbrb=1
11+
ms.custom:
12+
- sqldbrb=1
13+
monikerRange: "=azuresql || =azuresql-db "
1214
---
1315
# Query across cloud databases with different schemas (preview)
16+
1417
[!INCLUDE[appliesto-sqldb](../includes/appliesto-sqldb.md)]
1518

16-
![Query across tables in different databases][1]
19+
:::image type="content" source="media/elastic-query-vertical-partitioning/verticalpartitioning.png" alt-text="Diagram of querying across tables in different databases.":::
1720

1821
Vertically partitioned databases use different sets of tables on different databases. That means that the schema is different on different databases. For instance, all tables for inventory are on one database while all accounting-related tables are on a second database.
1922

2023
## Prerequisites
2124

22-
* The user must possess ALTER ANY EXTERNAL DATA SOURCE permission. This permission is included with the ALTER DATABASE permission.
23-
* ALTER ANY EXTERNAL DATA SOURCE permissions are needed to refer to the underlying data source.
25+
- The user must possess ALTER ANY EXTERNAL DATA SOURCE permission. This permission is included with the ALTER DATABASE permission.
26+
- ALTER ANY EXTERNAL DATA SOURCE permissions are needed to refer to the underlying data source.
27+
28+
<a id="overview"></a>
2429

25-
## Overview
30+
## Get started with vertical partitioning
2631

2732
> [!NOTE]
2833
> Unlike with horizontal partitioning, these DDL statements do not depend on defining a data tier with a shard map through the elastic database client library.
2934
>
3035
31-
1. [CREATE MASTER KEY](/sql/t-sql/statements/create-master-key-transact-sql)
32-
2. [CREATE DATABASE SCOPED CREDENTIAL](/sql/t-sql/statements/create-database-scoped-credential-transact-sql)
33-
3. [CREATE EXTERNAL DATA SOURCE](/sql/t-sql/statements/create-external-data-source-transact-sql)
34-
4. [CREATE EXTERNAL TABLE](/sql/t-sql/statements/create-external-table-transact-sql)
36+
1. [CREATE MASTER KEY](/sql/t-sql/statements/create-master-key-transact-sql?view=azuresqldb-current&preserve-view=true)
37+
1. [CREATE DATABASE SCOPED CREDENTIAL](/sql/t-sql/statements/create-database-scoped-credential-transact-sql?view=azuresqldb-current&preserve-view=true)
38+
1. [CREATE EXTERNAL DATA SOURCE](/sql/t-sql/statements/create-external-data-source-transact-sql?view=azuresqldb-current&preserve-view=true)
39+
1. [CREATE EXTERNAL TABLE](/sql/t-sql/statements/create-external-table-transact-sql?view=azuresqldb-current&preserve-view=true)
3540

3641
## Create database scoped master key and credentials
3742

@@ -59,8 +64,9 @@ CREATE EXTERNAL DATA SOURCE <data_source_name> WITH
5964
CREDENTIAL = <credential_name>
6065
) [;]
6166
```
67+
6268
> [!IMPORTANT]
63-
> The TYPE parameter must be set to **RDBMS**.
69+
> The TYPE parameter must be set to `RDBMS`.
6470
6571
### Example
6672

@@ -127,16 +133,16 @@ select * from sys.external_tables;
127133

128134
Elastic query extends the existing external table syntax to define external tables that use external data sources of type RDBMS. An external table definition for vertical partitioning covers the following aspects:
129135

130-
* **Schema**: The external table DDL defines a schema that your queries can use. The schema provided in your external table definition needs to match the schema of the tables in the remote database where the actual data is stored.
131-
* **Remote database reference**: The external table DDL refers to an external data source. The external data source specifies the server name and database name of the remote database where the actual table data is stored.
136+
- **Schema**: The external table DDL defines a schema that your queries can use. The schema provided in your external table definition needs to match the schema of the tables in the remote database where the actual data is stored.
137+
- **Remote database reference**: The external table DDL refers to an external data source. The external data source specifies the server name and database name of the remote database where the actual table data is stored.
132138

133139
Using an external data source as outlined in the previous section, the syntax to create external tables is as follows:
134140

135-
The DATA_SOURCE clause defines the external data source (i.e. the remote database in vertical partitioning) that is used for the external table.
141+
The `DATA_SOURCE` clause defines the external data source (the remote database in vertical partitioning) that is used for the external table.
136142

137-
The SCHEMA_NAME and OBJECT_NAME clauses allow mapping the external table definition to a table in a different schema on the remote database, or to a table with a different name, respectively. This mapping is useful if you want to define an external table to a catalog view or DMV on your remote database - or any other situation where the remote table name is already taken locally.
143+
The `SCHEMA_NAME` and `OBJECT_NAME` clauses allow mapping the external table definition to a table in a different schema on the remote database, or to a table with a different name, respectively. This mapping is useful if you want to define an external table to a catalog view or DMV on your remote database - or any other situation where the remote table name is already taken locally.
138144

139-
The following DDL statement drops an existing external table definition from the local catalog. It does not impact the remote database.
145+
The following DDL statement drops an existing external table definition from the local catalog. It does not affect the remote database.
140146

141147
```sql
142148
DROP EXTERNAL TABLE [ [ schema_name ] . | schema_name. ] table_name[;]
@@ -168,23 +174,23 @@ The following query performs a three-way join between the two local tables for o
168174
WHERE c_id = 100
169175
```
170176

171-
## Stored procedure for remote T-SQL execution: sp\_execute_remote
177+
## Stored procedure for remote T-SQL execution: sp_execute_remote
172178

173-
Elastic query also introduces a stored procedure that provides direct access to the remote database. The stored procedure is called [sp\_execute \_remote](/sql/relational-databases/system-stored-procedures/sp-execute-remote-azure-sql-database) and can be used to execute remote stored procedures or T-SQL code on the remote database. It takes the following parameters:
179+
Elastic query also introduces a stored procedure that provides direct access to the remote database. The stored procedure is called [sp_execute_remote](/sql/relational-databases/system-stored-procedures/sp-execute-remote-azure-sql-database?view=azuresqldb-current&preserve-view=true) and can be used to execute remote stored procedures or T-SQL code on the remote database. `sp_execute_remote` takes the following parameters:
174180

175-
* Data source name (nvarchar): The name of the external data source of type RDBMS.
176-
* Query (nvarchar): The T-SQL query to be executed on the remote database.
177-
* Parameter declaration (nvarchar) - optional: String with data type definitions for the parameters used in the Query parameter (like sp_executesql).
178-
* Parameter value list - optional: Comma-separated list of parameter values (like sp_executesql).
181+
- Data source name (**nvarchar**): The name of the external data source of type RDBMS.
182+
- Query (**nvarchar**): The T-SQL query to be executed on the remote database.
183+
- Parameter declaration (**nvarchar**) - optional: String with data type definitions for the parameters used in the Query parameter (like `sp_executesql)`
184+
- Parameter value list - optional: Comma-separated list of parameter values (like `sp_executesql`)
179185

180-
The sp\_execute\_remote uses the external data source provided in the invocation parameters to execute the given T-SQL statement on the remote database. It uses the credential of the external data source to connect to the remote database.
186+
The `sp_execute_remote` uses the external data source provided in the invocation parameters to execute the given T-SQL statement on the remote database. It uses the credential of the external data source to connect to the remote database.
181187

182188
Example:
183189

184190
```sql
185191
EXEC sp_execute_remote
186192
N'MyExtSrc',
187-
N'select count(w_id) as foo from warehouse'
193+
N'select count(w_id) as foo from warehouse';
188194
```
189195

190196
## Connectivity for tools
@@ -193,19 +199,14 @@ You can use regular SQL Server connection strings to connect your BI and data in
193199

194200
## Best practices
195201

196-
* Ensure that the elastic query endpoint database has been given access to the remote database by enabling access for Azure Services in its Azure SQL Database firewall configuration. Also ensure that the credential provided in the external data source definition can successfully log into the remote database and has the permissions to access the remote table.
197-
* Elastic query works best for queries where most of the computation can be done on the remote databases. You typically get the best query performance with selective filter predicates that can be evaluated on the remote databases or joins that can be performed completely on the remote database. Other query patterns may need to load large amounts of data from the remote database and may perform poorly.
198-
199-
## Next steps
200-
201-
* For an overview of elastic query, see [Elastic query overview](elastic-query-overview.md).
202-
* For limitations of elastic query, see [Preview limitations](elastic-query-overview.md#preview-limitations)
203-
* For a vertical partitioning tutorial, see [Getting started with cross-database query (vertical partitioning)](elastic-query-getting-started-vertical.md).
204-
* For a horizontal partitioning (sharding) tutorial, see [Getting started with elastic query for horizontal partitioning (sharding)](elastic-query-getting-started.md).
205-
* For syntax and sample queries for horizontally partitioned data, see [Querying horizontally partitioned data)](elastic-query-horizontal-partitioning.md)
206-
* See [sp\_execute \_remote](/sql/relational-databases/system-stored-procedures/sp-execute-remote-azure-sql-database) for a stored procedure that executes a Transact-SQL statement on a single remote Azure SQL Database or set of databases serving as shards in a horizontal partitioning scheme.
202+
- Ensure that the elastic query endpoint database has been given access to the remote database by enabling access for Azure Services in its Azure SQL Database firewall configuration. Also ensure that the credential provided in the external data source definition can successfully log into the remote database and has the permissions to access the remote table.
203+
- Elastic query works best for queries where most of the computation can be done on the remote databases. You typically get the best query performance with selective filter predicates that can be evaluated on the remote databases or joins that can be performed completely on the remote database. Other query patterns might need to load large amounts of data from the remote database and can perform poorly.
207204

208-
<!--Image references-->
209-
[1]: ./media/elastic-query-vertical-partitioning/verticalpartitioning.png
205+
## Related content
210206

211-
<!--anchors-->
207+
- [Azure SQL Database elastic query overview (preview)](elastic-query-overview.md)
208+
- [Preview limitations](elastic-query-overview.md#preview-limitations)
209+
- [Get started with cross-database queries (vertical partitioning) (preview)](elastic-query-getting-started-vertical.md)
210+
- [Report across scaled-out cloud databases (preview)](elastic-query-getting-started.md)
211+
- [Reporting across scaled-out cloud databases (preview)](elastic-query-horizontal-partitioning.md)
212+
- [sp_execute_remote](/sql/relational-databases/system-stored-procedures/sp-execute-remote-azure-sql-database)

0 commit comments

Comments
 (0)