Skip to content

Commit 634af40

Browse files
authored
Merge pull request #2 from MicrosoftDocs/release-2019-cu17
Release 2019 cu17
2 parents 6ce7a39 + cee2231 commit 634af40

586 files changed

Lines changed: 6057 additions & 4346 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59444,6 +59444,11 @@
5944459444
"source_path": "docs/ssms/scripting/transact-sql-debugger-quickwatch-dialog-box.md",
5944559445
"redirect_url": "/sql/ssms/scripting/transact-sql-debugger-information",
5944659446
"redirect_document_id": false
59447+
},
59448+
{
59449+
"source_path": "docs/tools/sqlpackage/troubleshooting-import-export-sqlpackage.md",
59450+
"redirect_url": "/sql/tools/sqlpackage/troubleshooting-issues-and-performance-with-sqlpackage",
59451+
"redirect_document_id": false
5944759452
}
5944859453
]
5944959454
}

ReadMe.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,14 +13,14 @@ For more information, see the [Code of Conduct FAQ](https://opensource.microsoft
1313

1414
# Microsoft SQL Server Technical Documentation
1515

16-
You've found the GitHub repository that houses the source for the SQL Server technical documentation published on [https://docs.microsoft.com](https://docs.microsoft.com).
16+
You've found the GitHub repository that houses the source for [SQL Server technical documentation](https://docs.microsoft.com/sql).
1717

1818
## Contribute to documentation
1919

2020
Anyone can submit changes to the SQL Server documentation. For more information, see [How to contribute to SQL Server Documentation](https://aka.ms/editsqldocs).
2121

2222
### Minor corrections
23-
Minor corrections or clarifications that you submit for documentation and code examples in this repo are covered by the [docs.microsoft.com - Terms of Use](https://docs.microsoft.com/legal/termsofuse).
23+
Minor corrections or clarifications that you submit for documentation and code examples in this repo are covered by the [Terms of Use](https://docs.microsoft.com/legal/termsofuse).
2424

2525
### Larger submissions
2626
If you submit a pull request with new content or significant changes to documentation or code examples and you are not an employee of Microsoft, we'll send a comment in GitHub asking you to submit an online Contribution License Agreement (CLA). We will need you to complete the online form before we can accept your pull request.

azure-sql/database/advance-notifications.md

Lines changed: 18 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Notifications can be configured so you can get texts, emails, Azure push notific
2525
> [!NOTE]
2626
> While [maintenance windows](maintenance-window.md) are generally available, advance notifications for maintenance windows are in public preview for Azure SQL Database and Azure SQL Managed Instance.
2727
28-
## Create an advance notification
28+
## Configure an advance notification
2929

3030
Advance notifications are available for Azure SQL databases that have their maintenance window configured.
3131

@@ -66,18 +66,18 @@ The following table shows the general-information notifications you may receive:
6666

6767
|Status|Description|
6868
|:---|:---|
69-
|**Planned Deployment**| Received 24 hours prior to the maintenance event. Maintenance is planned on DATE between 5pm - 8am (local time) for DB xyz.|
70-
|**In-Progress** | Maintenance for database *xyz* is starting.|
71-
|**Complete** | Maintenance of database *xyz* is complete. |
69+
|**Planned**| Received 24 hours prior to the maintenance event. Maintenance is planned on DATE between 5pm - 8am<sup>1</sup> (local time) in region *xyz*. |
70+
|**InProgress** | Maintenance for database(s) in region *xyz* is starting. |
71+
|**Complete** | Maintenance of database(s) in region *xyz* is complete. |
72+
73+
<sup>1</sup> Start and end time depend on the selected [maintenance window](maintenance-window.md).
7274

7375
The following table shows additional notifications that may be sent while maintenance is ongoing:
7476

7577
|Status|Description|
7678
|:---|:---|
77-
|**Extended** | Maintenance is in progress but didn't complete for database *xyz*. Maintenance will continue at the next maintenance window.|
78-
|**Canceled**| Maintenance for database *xyz* is canceled and will be rescheduled later. |
79-
|**Blocked**|There was a problem during maintenance for database *xyz*. We'll notify you when we resume.|
80-
|**Resumed**|The problem has been resolved and maintenance will continue at the next maintenance window.|
79+
|**Rescheduled** | 1) Maintenance is in progress but didn't complete inside maintenance window. 2) there was a problem during maintenance and it could not start. 3) Planned maintenance has started but couldn't progress to the end and will continue in next maintenance window. |
80+
|**Canceled**| Maintenance for database(s) in region *xyz* is canceled and will be rescheduled for later. |
8181

8282
## Permissions
8383

@@ -105,6 +105,16 @@ resources
105105
| project resource, status, resourceGroup, location, startTimeUtc, endTimeUtc, impactType
106106
```
107107

108+
In Azure Resource Graph (ARG) explorer you might find values for the status of deployment that are bit different than the ones displayed in the notification content.
109+
110+
|Status|Description|
111+
|:---|:---|
112+
|**Pending**| 1) Maintenance is planned on upcoming date. 2) Previously planned maintenance was rescheduled and is waiting to start in the next window. 3) Maintenance started but didn't complete in previous window and will continue in the next one. |
113+
|**InProgress** | Maintenance for resource *xyz* is starting or is in progress. |
114+
|**Completed** | Maintenance for resource *xyz* is complete. |
115+
|**NoUpdatesPending** | Previously planned maintenance for resource *xyz* is canceled and will be rescheduled for later. |
116+
|**RetryLater** | Planned maintenance for resource *xyz* has started but couldn't progress to the end and will continue in next maintenance window. |
117+
108118
For the full reference of the sample queries and how to use them across tools like PowerShell or Azure CLI, visit [Azure Resource Graph sample queries for Azure Service Health](/azure/service-health/resource-graph-samples).
109119

110120

azure-sql/database/audit-write-storage-account-behind-vnet-firewall.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,10 +37,16 @@ For audit to write to a storage account behind a VNet or firewall, the following
3737
> [!div class="checklist"]
3838
>
3939
> * A general-purpose v2 storage account. If you have a general-purpose v1 or blob storage account, [upgrade to a general-purpose v2 storage account](/azure/storage/common/storage-account-upgrade). For more information, see [Types of storage accounts](/azure/storage/common/storage-account-overview#types-of-storage-accounts).
40+
> * The premium storage with BlockBlobStorage is supported
4041
> * The storage account must be on the same tenant and at the same location as the [logical SQL server](logical-servers.md) (it's OK to be on different subscriptions).
4142
> * The Azure Storage account requires `Allow trusted Microsoft services to access this storage account`. Set this on the Storage Account **Firewalls and Virtual networks**.
4243
> * You must have `Microsoft.Authorization/roleAssignments/write` permission on the selected storage account. For more information, see [Azure built-in roles](/azure/role-based-access-control/built-in-roles).
4344
45+
> [!NOTE]
46+
> When Auditing to stoarge account is already enabled on a server / db, and if the target storage account is moved behind a firewall, we lose write access to
47+
the storage account and audit logs stop getting written to it.To make auditing work we have to resave the audit settings from portal.
48+
49+
4450
## Configure in Azure portal
4551

4652
Connect to [Azure portal](https://portal.azure.com) with your subscription. Navigate to the resource group and server.

azure-sql/database/auditing-overview.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,7 @@ You can use SQL Database auditing to:
4242
### Auditing limitations
4343

4444
- **Premium storage** with **BlockBlobStorage** is supported.
45+
- **User managed identity** authentication type for enabling auditing to **storage** is not yet supported.
4546
- **Hierarchical namespace** for all types of **standard storage account** and **premium storage account with BlockBlobStorage** is supported.
4647
- Enabling auditing on a paused **Azure Synapse** is not supported. To enable auditing, resume Azure Synapse.
4748
- Auditing for **Azure Synapse SQL pools** supports default audit action groups **only**.
@@ -201,7 +202,7 @@ If you chose to write audit logs to an Azure storage account, there are several
201202
- You can view specific dates by clicking **Filter** at the top of the **Audit records** page.
202203
- You can switch between audit records that were created by the *server audit policy* and the *database audit policy* by toggling **Audit Source**.
203204

204-
![Screenshot that shows the options for viewing the audit records.]( ./media/auditing-overview/8_auditing_get_started_blob_audit_records.png)
205+
![Screenshot that shows the options for viewing the audit records.](./media/auditing-overview/8_auditing_get_started_blob_audit_records.png)
205206

206207
- Use the system function **sys.fn_get_audit_file** (T-SQL) to return the audit log data in tabular format. For more information on using this function, see [sys.fn_get_audit_file](/sql/relational-databases/system-functions/sys-fn-get-audit-file-transact-sql).
207208

azure-sql/database/authentication-aad-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ When using Azure Active Directory with geo-replication, the Azure Active Directo
7979
> [!IMPORTANT]
8080
> Only follow these steps if you are provisioning an Azure SQL Managed Instance. This operation can only be executed by Global Administrator or a Privileged Role Administrator in Azure AD.
8181
>
82-
> In **public preview**, you can assign the **Directory Readers** role to a group in Azure AD. The group owners can then add the managed instance identity as a member of this group, which would allow you to provision an Azure AD admin for the SQL Managed Instance. For more information on this feature, see [Directory Readers role in Azure Active Directory for Azure SQL](authentication-aad-directory-readers-role.md).
82+
> You can assign the **Directory Readers** role to a group in Azure AD. The group owners can then add the managed instance identity as a member of this group, which would allow you to provision an Azure AD admin for the SQL Managed Instance. For more information on this feature, see [Directory Readers role in Azure Active Directory for Azure SQL](authentication-aad-directory-readers-role.md).
8383
8484
Your SQL Managed Instance needs permissions to read Azure AD to successfully accomplish tasks such as authentication of users through security group membership or creation of new users. For this to work, you need to grant the SQL Managed Instance permission to read Azure AD. You can do this using the Azure portal or PowerShell.
8585

0 commit comments

Comments
 (0)