You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-sql/database/audit-write-storage-account-behind-vnet-firewall.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,6 +39,7 @@ For audit to write to a storage account behind a VNet or firewall, the following
39
39
> * The storage account must be on the same tenant and at the same location as the [logical SQL server](logical-servers.md) (it's OK to be on different subscriptions).
40
40
> * The Azure Storage account requires `Allow trusted Microsoft services to access this storage account`. Set this on the Storage Account **Firewalls and Virtual networks**.
41
41
> * You must have `Microsoft.Authorization/roleAssignments/write` permission on the selected storage account. For more information, see [Azure built-in roles](/azure/role-based-access-control/built-in-roles).
42
+
> ***User managed identity authentication** type for enabling auditing to storage behind firewall is not currently supported.
42
43
43
44
> [!NOTE]
44
45
> When Auditing to stoarge account is already enabled on a server / db, and if the target storage account is moved behind a firewall, we lose write access to
Copy file name to clipboardExpand all lines: azure-sql/database/auto-failover-group-configure-sql-db.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -107,6 +107,9 @@ Create your failover group and add your database to it using PowerShell.
107
107
Write-host "Successfully added the database to the failover group..."
108
108
```
109
109
110
+
> [!NOTE]
111
+
> It's possible to deploy your auto-failover group across subscriptions by using the `-PartnerSubscriptionId` parameter in Azure Powershell starting with [Az.SQL 3.11.0](https://www.powershellgallery.com/packages/Az.Sql/3.11.0). To learn more, review the following [Example](/powershell/module/az.sql/new-azsqldatabasefailovergroup#example-3).
Copy file name to clipboardExpand all lines: azure-sql/database/automated-backups-overview.md
+1-4Lines changed: 1 addition & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -211,15 +211,12 @@ If you delete a database, the system keeps backups in the same way that it would
211
211
212
212
For SQL Database, you can configure full LTR backups for up to 10 years in Azure Blob Storage. After the LTR policy is configured, full backups are automatically copied to a different storage container weekly.
213
213
214
-
To meet various compliance requirements, you can select different retention periods for weekly, monthly, and/or yearly full backups. The frequency depends on the policy. For example, setting `W=0, M=1` would create an LTR copy monthly. For more information about LTR, see [Long-term retention](long-term-retention-overview.md).
214
+
To meet various compliance requirements, you can select different retention periods for weekly, monthly, and/or yearly full backups. The frequency depends on the policy. For example, setting `W=0, M=1` would create an LTR copy monthly. For more information about LTR, see [Long-term retention](long-term-retention-overview.md). Databases in the Hyperscale service tier don't currently support long-term retention.
215
215
216
216
Updating the backup storage redundancy for an existing database applies the change only to subsequent backups taken in the future and not for existing backups. All existing LTR backups for the database will continue to reside in the existing storage blob. New backups will be replicated based on the configured backup storage redundancy.
217
217
218
218
Storage consumption depends on the selected frequency and retention periods of LTR backups. You can use the [LTR pricing calculator](https://azure.microsoft.com/pricing/calculator/?service=sql-database) to estimate the cost of LTR storage.
219
219
220
-
> [!NOTE]
221
-
> Long-term retention for Hyperscale databases is currently in preview.
222
-
223
220
## Backup storage costs
224
221
225
222
The price for backup storage varies and depends on your [purchasing model (DTU or vCore)](purchasing-models.md), chosen backup storage redundancy option, and region. Backup storage is charged based on gigabytes consumed per month, at the same rate for all backups.
Copy file name to clipboardExpand all lines: azure-sql/database/data-discovery-and-classification-overview.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: Data Discovery & Classification for Azure SQL Database, Azure SQL M
5
5
author: Madhumitatripathy
6
6
ms.author: matripathy
7
7
ms.reviewer: wiassaf, vanto, mathoma
8
-
ms.date: 05/02/2022
8
+
ms.date: 09/14/2022
9
9
ms.service: sql-db-mi
10
10
ms.subservice: security
11
11
ms.topic: conceptual
@@ -116,7 +116,8 @@ Microsoft Information Protection (MIP) labels provide a simple and uniform way f
116
116
117
117
#### Prerequisites to switch to MIP policy
118
118
119
-
- The current user has tenant wide security admin permissions to apply policy at the tenant root management group level. For more information, see [Grant tenant-wide permissions to yourself](/azure/defender-for-cloud/tenant-wide-permissions-management#grant-tenant-wide-permissions-to-yourself).
119
+
- The current user has tenant wide **Security Admin** permissions to apply policy at the tenant root management group level. For more information, see [Grant tenant-wide permissions to yourself](/azure/defender-for-cloud/tenant-wide-permissions-management#grant-tenant-wide-permissions-to-yourself).
120
+
:::image type="content" source="media/data-discovery-and-classification-overview/request-security-admin-permissions.png" alt-text="Screenshot of Azure portal request for tenant level Security Admin permissions.":::
120
121
- Your tenant has an active Microsoft 365 subscription and you have labels published for the current user. For more information, see [Create and configure sensitivity labels and their policies](/microsoft-365/compliance/create-sensitivity-labels).
121
122
122
123
### Classify database in Microsoft Information Protection policy mode
Copy file name to clipboardExpand all lines: azure-sql/database/dns-alias-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ Azure SQL Database has a Domain Name System (DNS) server. PowerShell and REST AP
18
18
A *DNS alias* can be used in place of the server name. Client programs can use the alias in their connection strings. The DNS alias provides a translation layer that can redirect your client programs to different servers. This layer spares you the difficulties of having to find and edit all the clients and their connection strings.
19
19
20
20
> [!NOTE]
21
-
> In Azure Synapse Analytics, the Azure SQL logical server DNS alias is only supported for dedicated SQL Pool (formerly DW). For dedicated SQL pools in Azure Synapse workspaces, the DNS alias is not currently supported.
21
+
> In Azure Synapse Analytics, the Azure SQL logical server DNS alias is only supported for dedicated SQL Pool (formerly DW). For dedicated SQL pools in Azure Synapse workspaces, the DNS alias is not currently supported.[What's the difference?](https://aka.ms/dedicatedSQLpooldiff)
22
22
23
23
Common uses for a DNS alias include the following cases:
24
24
@@ -114,4 +114,4 @@ Presently, a DNS alias has the following limitations:
114
114
115
115
## Next steps
116
116
117
-
-[PowerShell for DNS Alias to Azure SQL Database](dns-alias-powershell-create.md)
117
+
-[PowerShell for DNS Alias to Azure SQL Database](dns-alias-powershell-create.md)
Copy file name to clipboardExpand all lines: azure-sql/database/doc-changes-updates-release-notes-whats-new.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,8 +42,7 @@ The following table lists the features of Azure SQL Database that are currently
42
42
|[SQL Database emulator](local-dev-experience-sql-database-emulator.md)| The Azure SQL Database emulator provides the ability to locally validate database and query design together with client application code in a simple and frictionless model as part of the application development process. |
43
43
|[SQL Database Projects extension](/sql/azure-data-studio/extensions/sql-database-project-extension)| An extension to develop databases for Azure SQL Database with Azure Data Studio and VS Code. A SQL project is a local representation of SQL objects that comprise the schema for a single database, such as tables, stored procedures, or functions. |
44
44
|[SQL Insights](/azure/azure-monitor/insights/sql-insights-overview)| SQL Insights (preview) is a comprehensive solution for monitoring any product in the Azure SQL family. SQL Insights (preview) uses dynamic management views to expose the data you need to monitor health, diagnose problems, and tune performance.|
45
-
|[Azure SQL Database Hyperscale tier long-term retention](long-term-retention-overview.md)| Long-term retention (LTR) capability for Hyperscale databases is now in preview. |
46
-
45
+
|[UMI for auditing](auditing-overview.md)| Configure the storage account for your SQL auditing logs by using User Managed Identity (UMI). |
47
46
48
47
## General availability (GA)
49
48
@@ -73,13 +72,16 @@ Learn about significant changes to the Azure SQL Database documentation.
73
72
74
73
| Changes | Details |
75
74
| --- | --- |
76
-
|[Azure SQL Database Hyperscale tier long-term retention](long-term-retention-overview.md)| Long-term retention (LTR) capability for Hyperscale databases is now in preview. |
75
+
|**Cross-subscription failover group with Azure PowerShell**| It's now possible to deploy your auto-failover group for a single database across subscriptions by using Azure PowerShell. To learn more, review [Configure auto-failover group](auto-failover-group-configure-sql-db.md?view=azuresql&tabs=azure-powershell&pivots=azure-sql-single-db&preserve-view=true#create-failover-group). |
76
+
|**UMI support for auditing preview**| It's now possible to configure the storage account used for SQL auditing logs by using User Managed Identity (UMI). This feature is currently in preview. Review [auditing](auditing-overview.md) to learn more. |
77
+
77
78
78
79
### August 2022
79
80
80
81
| Changes | Details |
81
82
| --- | --- |
82
-
|**Zone redundant configuration for Hyperscale databases**| The zone redundant configuration feature utilizes [Azure Availability Zones](/azure/availability-zones/az-overview#availability-zones) to replicate databases across multiple physical locations within an Azure region. By selecting [zone redundancy](high-availability-sla.md#hyperscale-service-tier-zone-redundant-availability), you can make your Hyperscale databases resilient to a much larger set of failures, including catastrophic datacenter outages, without any changes to the application logic. This configuration option is now generally available. To learn more, review [Zone redundant configuration for Hyperscale databases](high-availability-sla.md#hyperscale-service-tier-zone-redundant-availability). |
83
+
|**Zone redundant configuration for Hyperscale databases GA**| The zone redundant configuration feature utilizes [Azure Availability Zones](/azure/availability-zones/az-overview#availability-zones) to replicate databases across multiple physical locations within an Azure region. By selecting [zone redundancy](high-availability-sla.md#hyperscale-service-tier-zone-redundant-availability), you can make your Hyperscale databases resilient to a much larger set of failures, including catastrophic datacenter outages, without any changes to the application logic. This configuration option is now generally available. To learn more, review [Zone redundant configuration for Hyperscale databases](high-availability-sla.md#hyperscale-service-tier-zone-redundant-availability). |
84
+
|**Query Store hints GA**| You can use query hints to optimize your query execution via the OPTION clause. This feature is now generally available for Azure SQL Database. To learn more, review [Query Store hints](/sql/relational-databases/performance/query-store-hints?view=azuresqldb-current&preserve-view=true). |
0 commit comments