Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit ca955d2

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/sql-docs-pr into 20220502-release-dallas-conflict
2 parents 1ca9b88 + 65b6079 commit ca955d2

73 files changed

Lines changed: 4881 additions & 4685 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.azure-sql.json

Lines changed: 172 additions & 177 deletions
Large diffs are not rendered by default.

azure-sql/database/active-geo-replication-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ If your application requires a stable connection endpoint and automatic geo-fail
3636

3737
The following diagram illustrates a typical configuration of a geo-redundant cloud application using Active geo-replication.
3838

39-
![active geo-replication](./media/active-geo-replication-overview/geo-replication.png)
39+
![active geo-replication](./media/active-geo-replication-overview/geo-replication-updated.png)
4040

4141
If for any reason your primary database fails, you can initiate a geo-failover to any of your secondary databases. When a secondary is promoted to the primary role, all other secondaries are automatically linked to the new primary.
4242

@@ -197,7 +197,7 @@ To create a geo-secondary in a subscription different from the subscription of t
197197
10. After the geo-secondary is successfully created, the users, logins, and firewall rules created by this procedure can be removed.
198198

199199
> [!NOTE]
200-
> Cross-subscription geo-replication operations including setup and geo-failover are only supported using T-SQL commands.
200+
> Cross-subscription geo-replication operations including setup and geo-failover are only supported using REST API & T-SQL commands.
201201
>
202202
> Adding a geo-secondary using T-SQL is not supported when connecting to the primary server over a [private endpoint](private-endpoint-overview.md). If a private endpoint is configured but public network access is allowed, adding a geo-secondary is supported when connected to the primary server from a public IP address. Once a geo-secondary is added, public access can be [denied](connectivity-settings.md#deny-public-network-access).
203203
>

azure-sql/database/automated-backups-overview.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -494,7 +494,7 @@ Backup and restore operations for Hyperscale databases are fast regardless of da
494494

495495
### Hyperscale backup retention
496496

497-
Hyperscale supports short-term backup retention (STR) of 7 days by default; long-term retention (LTR) policies aren't currently supported.
497+
Default short-term backup retention (STR) for Hyperscale databases is 7 days; long-term retention (LTR) policies aren't currently supported.
498498

499499
> [!NOTE]
500500
> Short-term backup retention up to 35 days for Hyperscale databases is now in preview.
@@ -572,9 +572,6 @@ Backup storage redundancy for databases in Azure SQL Database can be configured
572572

573573
For Azure SQL Managed Instance, backup storage redundancy is set at the instance level, and it is applied for all belonging managed databases. It can be configured at the time of an instance creation or updated for existing instances; the backup storage redundancy change would trigger then a new full backup per database and the change will apply for all future backups. The default storage redundancy type is geo-redundancy (RA-GRS).
574574

575-
> [!NOTE]
576-
> Backup storage redundancy change for SQL Managed Instance is currently available only for the Public cloud via Azure Portal.
577-
578575
### Configure backup storage redundancy by using the Azure portal
579576

580577
#### [SQL Database](#tab/single-database)

azure-sql/database/connect-query-go.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,13 @@ ms.topic: quickstart
1111
author: dzsquared
1212
ms.author: drskwier
1313
ms.reviewer: kendralittle, mathoma
14-
ms.date: 04/14/2021
14+
ms.date: 05/05/2022
1515
monikerRange: "=azuresql||=azuresql-db||=azuresql-mi"
1616
---
1717
# Quickstart: Use Golang to query a database in Azure SQL Database or Azure SQL Managed Instance
1818
[!INCLUDE[appliesto-sqldb-sqlmi](../includes/appliesto-sqldb-sqlmi.md)]
1919

20-
In this quickstart, you'll use the [Golang](https://godoc.org/github.com/denisenkom/go-mssqldb) programming language to connect to a database in Azure SQL Database or Azure SQL Managed Instance. You'll then run Transact-SQL statements to query and modify data. [Golang](https://go.dev/) is an open-source programming language that makes it easy to build simple, reliable, and efficient software.
20+
In this quickstart, you'll use the Golang programming language to connect to a database in Azure SQL Database or Azure SQL Managed Instance with the [go-mssqldb]((https://github.com/microsoft/go-mssqldb). The sample queries and modifies data with explicit Transact-SQL statements. [Golang](https://go.dev/) is an open-source programming language that makes it easy to build simple, reliable, and efficient software.
2121

2222
## Prerequisites
2323

@@ -70,7 +70,7 @@ Get the connection information you need to connect to the database. You'll need
7070

7171
```bash
7272
cd SqlServerSample
73-
go get github.com/denisenkom/go-mssqldb
73+
go get github.com/microsoft/go-mssqldb
7474
```
7575

7676
## Create sample data
@@ -114,7 +114,7 @@ Get the connection information you need to connect to the database. You'll need
114114
package main
115115

116116
import (
117-
_ "github.com/denisenkom/go-mssqldb"
117+
_ "github.com/microsoft/go-mssqldb"
118118
"database/sql"
119119
"context"
120120
"log"
@@ -330,5 +330,5 @@ Get the connection information you need to connect to the database. You'll need
330330
## Next steps
331331

332332
- [Design your first database in Azure SQL Database](design-first-database-tutorial.md)
333-
- [Golang driver for SQL Server](https://github.com/denisenkom/go-mssqldb)
334-
- [Report issues or ask questions](https://github.com/denisenkom/go-mssqldb/issues)
333+
- [Golang driver for SQL Server](https://github.com/microsoft/go-mssqldb)
334+
- [Report issues or ask questions](https://github.com/microsoft/go-mssqldb/issues)

azure-sql/database/data-discovery-and-classification-overview.md

Lines changed: 49 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,8 @@ ms.topic: conceptual
1111
author: Madhumitatripathy
1212
ms.author: matripathy
1313
ms.reviewer: kendralittle, vanto, mathoma
14-
ms.date: 02/22/2022
14+
ms.date: 05/02/2022
1515
tags: azure-synapse
16-
monikerRange: "=azuresql||=azuresql-db||=azuresql-mi"
1716
---
1817
# Data Discovery & Classification
1918
[!INCLUDE[appliesto-sqldb-sqlmi-asa](../includes/appliesto-sqldb-sqlmi-asa.md)]
@@ -53,9 +52,17 @@ The classification includes two metadata attributes:
5352
- **Labels**: The main classification attributes, used to define the sensitivity level of the data stored in the column.
5453
- **Information types**: Attributes that provide more granular information about the type of data stored in the column.
5554

56-
### Define and customize your classification taxonomy
55+
### Information Protection policy
56+
57+
Azure SQL offers both SQL Information Protection policy and Microsoft Information Protection policy in data classification, and you can choose either of these two policies based on your requirement.
58+
59+
:::image type="content" source="./media/data-discovery-and-classification-overview/protection-policy-types.png" alt-text="Screenshot of Information Protection policy types." lightbox="./media/data-discovery-and-classification-overview/protection-policy-types.png":::
60+
61+
### SQL Information Protection policy
62+
63+
Data Discovery & Classification comes with a built-in set of sensitivity labels and information types with discovery logic which is native to the SQL logical server. You can continue using the protection labels available in the default policy file, or you can customize this taxonomy. You can define a set and ranking of classification constructs specifically for your environment.
5764

58-
Data Discovery & Classification comes with a built-in set of sensitivity labels and a built-in set of information types and discovery logic. You can customize this taxonomy and define a set and ranking of classification constructs specifically for your environment.
65+
### Define and customize your classification taxonomy
5966

6067
You define and customize of your classification taxonomy in one central place for your entire Azure organization. That location is in [Microsoft Defender for Cloud](/azure/security-center/security-center-introduction), as part of your security policy. Only someone with administrative rights on the organization's root management group can do this task.
6168

@@ -65,7 +72,7 @@ For more information, see [Customize the SQL information protection policy in Mi
6572

6673
After the organization-wide policy has been defined, you can continue classifying individual databases by using your customized policy.
6774

68-
### Classify your database
75+
### Classify database in SQL Information Protection policy mode
6976

7077
> [!NOTE]
7178
> The below example uses Azure SQL Database, but you should select the appropriate product that you want to configure Data Discovery & Classification.
@@ -105,13 +112,43 @@ After the organization-wide policy has been defined, you can continue classifyin
105112

106113
1. To complete your classification and persistently label (tag) the database columns with the new classification metadata, select **Save** in the **Classification** page.
107114

115+
### Microsoft Information Protection policy
116+
117+
Microsoft Information Protection (MIP) labels provide a simple and uniform way for users to classify sensitive data uniformly across different Microsoft applications. MIP sensitivity labels are created and managed in [Microsoft 365 compliance center](https://compliance.microsoft.com/). To learn how to create and publish MIP sensitive labels in Microsoft 365 compliance center, see the article, [Create and publish sensitivity labels](/microsoft-365/compliance/create-sensitivity-labels).
118+
119+
#### Prerequisites to switch to MIP policy
120+
121+
- The current user has tenant wide security admin permissions to apply policy at the tenant root management group level. For more information, see [Grant tenant-wide permissions to yourself](/azure/defender-for-cloud/tenant-wide-permissions-management#grant-tenant-wide-permissions-to-yourself).
122+
- Your tenant has an active Microsoft 365 subscription and you have labels published for the current user. For more information, see [Create and configure sensitivity labels and their policies](/microsoft-365/compliance/create-sensitivity-labels).
123+
124+
### Classify database in Microsoft Information Protection policy mode
125+
126+
1. Go to the [Azure portal](https://portal.azure.com).
127+
1. Navigate to your database in Azure SQL Database
128+
1. Go to **Data Discovery & Classification** under the **Security** heading in your database pane.
129+
1. To select **Microsoft Information Protection policy**, select the **Overview** tab, and select **Configure**.
130+
1. Select **Microsoft Information Protection policy** in the **Information Protection policy** options, and select **Save**.
131+
132+
:::image type="content" source="./media/data-discovery-and-classification-overview/select-microsoft-information-protection-policy.png" alt-text="Screenshot of selecting Microsoft Information Protection policy for Azure SQL Database." lightbox="./media/data-discovery-and-classification-overview/select-microsoft-information-protection-policy.png":::
133+
134+
1. If you go to the **Classification** tab, or select **Add classification**, you will now see M365 sensitivity labels appear in the **Sensitivity label** dropdown.
135+
136+
:::image type="content" source="./media/data-discovery-and-classification-overview/select-sensitivity-label.png" alt-text="Screenshot of Sensitivity label dropdown.":::
137+
138+
:::image type="content" source="./media/data-discovery-and-classification-overview/sensitivity-label-classification-tab.png" alt-text="Screenshot of Sensitivity label in the Classification tab." lightbox="./media/data-discovery-and-classification-overview/sensitivity-label-classification-tab.png":::
139+
140+
- Information type is `[n/a]` while you are in MIP policy mode and automatic data discovery & recommendations remain disabled.
141+
- A warning icon may appear against an already classified column if the column was classified using a different Information Protection policy than the currently active policy. For example, if the column was classified with a label using SQL Information Protection policy earlier and now you are in Microsoft Information Protection policy mode. You will see a warning icon against that specific column. This warning icon does not indicate any problem, but is used only for information purposes.
142+
143+
:::image type="content" source="./media/data-discovery-and-classification-overview/classification-warning.png" alt-text="Screenshot of warnings for classified columns because of different Information Protection policies." lightbox="./media/data-discovery-and-classification-overview/classification-warning.png":::
144+
108145
## <a id="audit-sensitive-data"></a>Audit access to sensitive data
109146

110-
An important aspect of the classification is the ability to monitor access to sensitive data. [Azure SQL Auditing](/azure/azure-sql/database/auditing-overview) has been enhanced to include a new field in the audit log called `data_sensitivity_information`. This field logs the sensitivity classifications (labels) of the data that was returned by a query. Here's an example:
147+
An important aspect of the classification is the ability to monitor access to sensitive data. [Azure SQL Auditing](../../azure-sql/database/auditing-overview.md) has been enhanced to include a new field in the audit log called `data_sensitivity_information`. This field logs the sensitivity classifications (labels) of the data that was returned by a query. Here's an example:
111148

112149
[![Audit log](./media/data-discovery-and-classification-overview/11_data_classification_audit_log.png)](./media/data-discovery-and-classification-overview/11_data_classification_audit_log.png#lightbox)
113150

114-
These are the activites that are actually auditable with sensitivity information:
151+
These are the activities that are actually auditable with sensitivity information:
115152
- ALTER TABLE ... DROP COLUMN
116153
- BULK INSERT
117154
- DELETE
@@ -129,7 +166,7 @@ These are the activites that are actually auditable with sensitivity information
129166
- DBCC SHOW_STATISTICS
130167
- sys.dm_db_stats_histogram
131168

132-
Use [sys.fn_get_audit_file](/sql/relational-databases/system-functions/sys-fn-get-audit-file-transact-sql) to returns information from an audit file stored in an Azure Storage account.
169+
Use [sys.fn_get_audit_file](/sql/relational-databases/system-functions/sys-fn-get-audit-file-transact-sql) to return information from an audit file stored in an Azure Storage account.
133170

134171
## <a id="permissions"></a>Permissions
135172

@@ -223,11 +260,11 @@ You can use the following SQL drivers to retrieve classification metadata:
223260

224261
## FAQ - Advanced classification capabilities
225262

226-
**Question**: Will [Microsoft Purview](/azure/purview/overview) replace SQL Data Discovery & Classification or will SQL Data Discovery & Classification be retired soon?
227-
**Answer**: We continue to support SQL Data Discovery & Classification and encourage you to adopt [Microsoft Purview](/azure/purview/overview) which has richer capabilities to drive advanced classification capabilities and data governance. If we decide to retire any service, feature, API or SKU, you will receive advance notice including a migration or transition path. Learn more about Microsoft Lifecycle policies here.
263+
**Question**: Will [Azure Purview](/azure/purview/overview) replace SQL Data Discovery & Classification or will SQL Data Discovery & Classification be retired soon?
264+
**Answer**: We continue to support SQL Data Discovery & Classification and encourage you to adopt [Azure Purview](/azure/purview/overview) which has richer capabilities to drive advanced classification capabilities and data governance. If we decide to retire any service, feature, API or SKU, you will receive advance notice including a migration or transition path. Learn more about Microsoft Lifecycle policies [here](/lifecycle/index).
228265

229266
## Next steps
230267

231-
- Consider configuring [Azure SQL Auditing](/azure/azure-sql/database/auditing-overview) for monitoring and auditing access to your classified sensitive data.
268+
- Consider configuring [Azure SQL Auditing](../../azure-sql/database/auditing-overview.md) for monitoring and auditing access to your classified sensitive data.
232269
- For a presentation that includes data Discovery & Classification, see [Discovering, classifying, labeling & protecting SQL data | Data Exposed](https://www.youtube.com/watch?v=itVi9bkJUNc).
233-
- To classify your Azure SQL Databases and Azure Synapse Analytics with Microsoft Purview labels using T-SQL commands, see [Classify your Azure SQL data using Microsoft Purview labels](/azure/sql-database/scripts/sql-database-import-purview-labels).
270+
- To classify your Azure SQL Databases and Azure Synapse Analytics with Azure Purview labels using T-SQL commands, see [Classify your Azure SQL data using Azure Purview labels](/azure/sql-database/scripts/sql-database-import-purview-labels).
34.6 KB
Loading
65 KB
Loading
85.1 KB
Loading
109 KB
Loading
111 KB
Loading

0 commit comments

Comments
 (0)