You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/linux/quickstart-install-connect-red-hat.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,13 +37,14 @@ For more information on supported platforms, see [Release notes for SQL Server 2
37
37
38
38
In this quickstart, you install [!INCLUDE [sssql22-md](../includes/sssql22-md.md)] on Red Hat Enterprise Linux (RHEL) 8.x or 9.x. Then you can connect with **sqlcmd** to create your first database and run queries.
39
39
40
+
If you would like to automate your installation using Ansible, see [Quickstart: Deploy SQL Server on Linux using an Ansible playbook](sql-server-linux-deploy-ansible.md).
41
+
40
42
For more information on supported platforms, see [Release notes for SQL Server 2022 on Linux](sql-server-linux-release-notes-2022.md).
41
43
42
44
::: moniker-end
43
45
44
46
> [!TIP]
45
-
> This tutorial requires user input and an internet connection. If you're interested in the [unattended](sql-server-linux-setup.md#unattended) or [offline](sql-server-linux-setup.md#offline) installation procedures, see [Installation guidance for SQL Server on Linux](sql-server-linux-setup.md).
46
-
If you choose to have a pre-installed [!INCLUDE [ssnoversion-md](../includes/ssnoversion-md.md)] VM on RHEL ready to run your production-based workload, follow the [best practices](/azure/azure-sql/virtual-machines/windows/performance-guidelines-best-practices-checklist) for creating the SQL Server VM.
47
+
> This tutorial requires user input and an internet connection. If you're interested in the [unattended](sql-server-linux-setup.md#unattended) or [offline](sql-server-linux-setup.md#offline) installation procedures, see [Installation guidance for SQL Server on Linux](sql-server-linux-setup.md). If you choose to have a preinstalled [!INCLUDE [ssnoversion-md](../includes/ssnoversion-md.md)] VM on RHEL ready to run your production-based workload, follow the [best practices](/azure/azure-sql/virtual-machines/windows/performance-guidelines-best-practices-checklist) for creating the SQL Server VM.
@@ -74,6 +75,8 @@ If you've previously installed a Community Technology Preview (CTP) or Release C
74
75
75
76
For other system requirements, see [System requirements for SQL Server on Linux](sql-server-linux-setup.md#system).
76
77
78
+
To ensure you configure your [!INCLUDE [ssnoversion-md](../includes/ssnoversion-md.md)] instance according to the recommended standards, see [Performance best practices and configuration guidelines for SQL Server on Linux](sql-server-linux-performance-best-practices.md).
Copy file name to clipboardExpand all lines: docs/relational-databases/security/encryption/always-encrypted-wizard-ssms-21.md
+26-6Lines changed: 26 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to configure Always Encrypted for database columns by usi
4
4
author: pietervanhove
5
5
ms.author: pivanho
6
6
ms.reviewer: vanto, maghan, randolphwest
7
-
ms.date: 11/12/2024
7
+
ms.date: 01/22/2025
8
8
ms.service: sql
9
9
ms.subservice: security
10
10
ms.topic: concept-article
@@ -52,9 +52,9 @@ To perform cryptographic operations using the wizard, you must have the `VIEW AN
52
52
53
53
You can launch the wizard at three different levels:
54
54
55
-
-You can encrypt multiple columns in different tables at a database level.
56
-
- At a table level, if you want ypt multiple columns in the same table.
57
-
- At a column level, if you want ypt one specific column.
55
+
-At a database level, if you want to encrypt multiple columns in different tables.
56
+
- At a table level, if you want to encrypt multiple columns in the same table.
57
+
- At a column level, if you want to encrypt one specific column.
58
58
59
59
1. Connect to your [!INCLUDE [ssNoVersion](../../../includes/ssnoversion-md.md)] with the Object Explorer component of [!INCLUDE [ssManStudioFull](../../../includes/ssmanstudiofull-md.md)].
60
60
@@ -99,17 +99,37 @@ When configuring a new column master key, you can either pick an existing key in
99
99
100
100
To use in-place encryption, select **Allow enclave computations** for a new column master key. Selecting this checkbox is allowed only if your database is configured with a secure enclave.
101
101
102
-
For more information about creating and storing column master keys in Windows Certificate Store, Azure Key Vault or other key stores, see [Create and store column master keys for Always Encrypted](../../../relational-databases/security/encryption/create-and-store-column-master-keys-always-encrypted.md) or [Manage keys for Always Encrypted with secure enclaves](../../../relational-databases/security/encryption/always-encrypted-enclaves-manage-keys.md).
102
+
For more information about creating and storing column master keys in Windows Certificate Store, Azure Key Vault, or other key stores, see [Create and store column master keys for Always Encrypted](../../../relational-databases/security/encryption/create-and-store-column-master-keys-always-encrypted.md) or [Manage keys for Always Encrypted with secure enclaves](../../../relational-databases/security/encryption/always-encrypted-enclaves-manage-keys.md).
103
103
104
104
> [!TIP]
105
-
> The wizard allows you to browse and create keys only in the Windows Certificate Store and Azure Key Vault. It also auto-generates the names of the new keys and the database metadata objects describing them. Suppose you need more control over how your keys are provisioned (and more choices for a key store containing your column master key). In that case, you can use the **New Column Master Key** and **New Column Encryption Key** dialogs to create the keys first, and then run the wizard and pick the keys you have created. See [Provision Column Master Keys with the New Column Master Key Dialog](configure-always-encrypted-keys-using-ssms.md#provision-column-master-keys-with-the-new-column-master-key-dialog) or [Provision enclave-enabled keys](always-encrypted-enclaves-provision-keys.md) and [Provision Column Encryption Keys with the New Column Encryption Key Dialog](configure-always-encrypted-keys-using-ssms.md#provision-column-encryption-keys-with-the-new-column-encryption-key-dialog).
105
+
> The wizard allows you to browse and create keys only in the Windows Certificate Store and Azure Key Vault. It also autogenerates the names of the new keys and the database metadata objects describing them. Suppose you need more control over how your keys are provisioned (and more choices for a key store containing your column master key). In that case, you can use the **New Column Master Key** and **New Column Encryption Key** dialogs to create the keys first, and then run the wizard and pick the keys you have created. See [Provision Column Master Keys with the New Column Master Key Dialog](configure-always-encrypted-keys-using-ssms.md#provision-column-master-keys-with-the-new-column-master-key-dialog) or [Provision enclave-enabled keys](always-encrypted-enclaves-provision-keys.md) and [Provision Column Encryption Keys with the New Column Encryption Key Dialog](configure-always-encrypted-keys-using-ssms.md#provision-column-encryption-keys-with-the-new-column-encryption-key-dialog).
106
106
107
107
## In-Place Encryption Settings page
108
108
109
109
If you have configured a secure enclave in your database and you're using enclave-enabled keys, this page allows you to specify the enclave attestation parameters required for in-place encryption. If you don't want to use in-place encryption, unselect **Use in-place encryption for eligible columns** to proceed with client-side encryption. We recommend leaving this checkbox enabled so that the wizard can use in-place encryption.
110
110
111
111
For more information about enclave attestation, see [Configure attestation for Always Encrypted using Azure Attestation](/azure/azure-sql/database/always-encrypted-enclaves-configure-attestation)
112
112
113
+
## Run Settings page
114
+
115
+
The wizard supports two approaches for setting up the target encryption configuration: online and offline.
116
+
117
+
With the offline approach, the target tables and any tables related to the target tables (for example, any tables a target table have foreign key relationships with) are unavailable to write transactions throughout the duration of the operation. The semantics of foreign key constraints (CHECK or NOCHECK) are always preserved when using the offline approach.
118
+
119
+
With the online approach, the operation of copying, encrypting, decrypting, or re-encrypting the data is performed incrementally. Applications can read and write data from and to the target tables throughout the data movement operation, except the last iteration, the duration of which is limited by the *Maximum downtime* parameter. To detect and process the changes applications can make while the data is being copied, the wizard enables Change Tracking in the target database. Because of that, the online approach is likely to consume more resources on the database side than the offline approach. The operation might also take more time with the online approach, especially if a write-heavy workload is running against the database. The online approach can be used to encrypt **one table at a time** and the table must have a primary key. By default, foreign key constraints are recreated with the NOCHECK option to minimize the impact on applications. You can enforce preserving the semantics of foreign key constraints by enabling the `Keep check foreign key constraints` option.
120
+
121
+
Here are the guidelines for choosing between the offline and online approaches:
122
+
123
+
Use the offline approach:
124
+
125
+
- To minimize the duration of the operation.
126
+
- To encrypt/decrypt/re-encrypt columns in multiple tables at the same time.
127
+
- If the target table doesn't have a primary key.
128
+
129
+
Use the online approach:
130
+
131
+
- To minimize the downtime/unavailability of the database to your applications.
JSON support was first introduced in [!INCLUDE [sssql16-md](../../includes/sssql16-md.md)], mostly in the form of JSON functions. The new native **json** type was introduced in 2024, first on Azure SQL platforms.
57
+
JSON function support was first introduced in [!INCLUDE [sssql16-md](../../includes/sssql16-md.md)]. The native **json** type was introduced in 2024 in Azure SQL Database and Azure SQL Managed Instance.
58
58
59
59
**json** is available under all database compatibility levels.
description: SET SHOWPLAN_XML returns detailed information about how the statements are going to be executed in the form of a well-defined XML document.
Causes [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)] not to execute [!INCLUDE[tsql](../../includes/tsql-md.md)] statements. Instead, [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)] returns detailed information about how the statements are going to be executed in the form of a well-defined XML document.
30
30
31
+
In Fabric Data Warehouse and SQL analytics endpoint, SET SHOWPLAN_XML is a preview feature.
0 commit comments