You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ReadMe.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,14 +13,14 @@ For more information, see the [Code of Conduct FAQ](https://opensource.microsoft
13
13
14
14
# Microsoft SQL Server Technical Documentation
15
15
16
-
You've found the GitHub repository that houses the source for the SQL Server technical documentation published on [https://docs.microsoft.com](https://docs.microsoft.com).
16
+
You've found the GitHub repository that houses the source for [SQL Server technical documentation](https://docs.microsoft.com/sql).
17
17
18
18
## Contribute to documentation
19
19
20
20
Anyone can submit changes to the SQL Server documentation. For more information, see [How to contribute to SQL Server Documentation](https://aka.ms/editsqldocs).
21
21
22
22
### Minor corrections
23
-
Minor corrections or clarifications that you submit for documentation and code examples in this repo are covered by the [docs.microsoft.com - Terms of Use](https://docs.microsoft.com/legal/termsofuse).
23
+
Minor corrections or clarifications that you submit for documentation and code examples in this repo are covered by the [Terms of Use](https://docs.microsoft.com/legal/termsofuse).
24
24
25
25
### Larger submissions
26
26
If you submit a pull request with new content or significant changes to documentation or code examples and you are not an employee of Microsoft, we'll send a comment in GitHub asking you to submit an online Contribution License Agreement (CLA). We will need you to complete the online form before we can accept your pull request.
Copy file name to clipboardExpand all lines: azure-sql/database/advance-notifications.md
+18-8Lines changed: 18 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ Notifications can be configured so you can get texts, emails, Azure push notific
25
25
> [!NOTE]
26
26
> While [maintenance windows](maintenance-window.md) are generally available, advance notifications for maintenance windows are in public preview for Azure SQL Database and Azure SQL Managed Instance.
27
27
28
-
## Create an advance notification
28
+
## Configure an advance notification
29
29
30
30
Advance notifications are available for Azure SQL databases that have their maintenance window configured.
31
31
@@ -66,18 +66,18 @@ The following table shows the general-information notifications you may receive:
66
66
67
67
|Status|Description|
68
68
|:---|:---|
69
-
|**Planned Deployment**| Received 24 hours prior to the maintenance event. Maintenance is planned on DATE between 5pm - 8am (local time) for DB xyz.|
70
-
|**In-Progress**| Maintenance for database *xyz* is starting.|
71
-
|**Complete**| Maintenance of database *xyz* is complete. |
69
+
|**Planned**| Received 24 hours prior to the maintenance event. Maintenance is planned on DATE between 5pm - 8am<sup>1</sup> (local time) in region *xyz*. |
70
+
|**InProgress**| Maintenance for database(s) in region *xyz* is starting. |
71
+
|**Complete**| Maintenance of database(s) in region *xyz* is complete. |
72
+
73
+
<sup>1</sup> Start and end time depend on the selected [maintenance window](maintenance-window.md).
72
74
73
75
The following table shows additional notifications that may be sent while maintenance is ongoing:
74
76
75
77
|Status|Description|
76
78
|:---|:---|
77
-
|**Extended**| Maintenance is in progress but didn't complete for database *xyz*. Maintenance will continue at the next maintenance window.|
78
-
|**Canceled**| Maintenance for database *xyz* is canceled and will be rescheduled later. |
79
-
|**Blocked**|There was a problem during maintenance for database *xyz*. We'll notify you when we resume.|
80
-
|**Resumed**|The problem has been resolved and maintenance will continue at the next maintenance window.|
79
+
|**Rescheduled**| 1) Maintenance is in progress but didn't complete inside maintenance window. 2) there was a problem during maintenance and it could not start. 3) Planned maintenance has started but couldn't progress to the end and will continue in next maintenance window. |
80
+
|**Canceled**| Maintenance for database(s) in region *xyz* is canceled and will be rescheduled for later. |
In Azure Resource Graph (ARG) explorer you might find values for the status of deployment that are bit different than the ones displayed in the notification content.
109
+
110
+
|Status|Description|
111
+
|:---|:---|
112
+
|**Pending**| 1) Maintenance is planned on upcoming date. 2) Previously planned maintenance was rescheduled and is waiting to start in the next window. 3) Maintenance started but didn't complete in previous window and will continue in the next one. |
113
+
|**InProgress**| Maintenance for resource *xyz* is starting or is in progress. |
114
+
|**Completed**| Maintenance for resource *xyz* is complete. |
115
+
|**NoUpdatesPending**| Previously planned maintenance for resource *xyz* is canceled and will be rescheduled for later. |
116
+
|**RetryLater**| Planned maintenance for resource *xyz* has started but couldn't progress to the end and will continue in next maintenance window. |
117
+
108
118
For the full reference of the sample queries and how to use them across tools like PowerShell or Azure CLI, visit [Azure Resource Graph sample queries for Azure Service Health](/azure/service-health/resource-graph-samples).
Copy file name to clipboardExpand all lines: azure-sql/database/audit-write-storage-account-behind-vnet-firewall.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,10 +37,16 @@ For audit to write to a storage account behind a VNet or firewall, the following
37
37
> [!div class="checklist"]
38
38
>
39
39
> * A general-purpose v2 storage account. If you have a general-purpose v1 or blob storage account, [upgrade to a general-purpose v2 storage account](/azure/storage/common/storage-account-upgrade). For more information, see [Types of storage accounts](/azure/storage/common/storage-account-overview#types-of-storage-accounts).
40
+
> * The premium storage with BlockBlobStorage is supported
40
41
> * The storage account must be on the same tenant and at the same location as the [logical SQL server](logical-servers.md) (it's OK to be on different subscriptions).
41
42
> * The Azure Storage account requires `Allow trusted Microsoft services to access this storage account`. Set this on the Storage Account **Firewalls and Virtual networks**.
42
43
> * You must have `Microsoft.Authorization/roleAssignments/write` permission on the selected storage account. For more information, see [Azure built-in roles](/azure/role-based-access-control/built-in-roles).
43
44
45
+
> [!NOTE]
46
+
> When Auditing to stoarge account is already enabled on a server / db, and if the target storage account is moved behind a firewall, we lose write access to
47
+
the storage account and audit logs stop getting written to it.To make auditing work we have to resave the audit settings from portal.
48
+
49
+
44
50
## Configure in Azure portal
45
51
46
52
Connect to [Azure portal](https://portal.azure.com) with your subscription. Navigate to the resource group and server.
Copy file name to clipboardExpand all lines: azure-sql/database/auditing-overview.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,6 +42,7 @@ You can use SQL Database auditing to:
42
42
### Auditing limitations
43
43
44
44
-**Premium storage** with **BlockBlobStorage** is supported.
45
+
-**User managed identity** authentication type for enabling auditing to **storage** is not yet supported.
45
46
-**Hierarchical namespace** for all types of **standard storage account** and **premium storage account with BlockBlobStorage** is supported.
46
47
- Enabling auditing on a paused **Azure Synapse** is not supported. To enable auditing, resume Azure Synapse.
47
48
- Auditing for **Azure Synapse SQL pools** supports default audit action groups **only**.
@@ -201,7 +202,7 @@ If you chose to write audit logs to an Azure storage account, there are several
201
202
- You can view specific dates by clicking **Filter** at the top of the **Audit records** page.
202
203
- You can switch between audit records that were created by the *server audit policy* and the *database audit policy* by toggling **Audit Source**.
203
204
204
-

205
+

205
206
206
207
- Use the system function **sys.fn_get_audit_file** (T-SQL) to return the audit log data in tabular format. For more information on using this function, see [sys.fn_get_audit_file](/sql/relational-databases/system-functions/sys-fn-get-audit-file-transact-sql).
Copy file name to clipboardExpand all lines: azure-sql/database/authentication-aad-configure.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,7 +79,7 @@ When using Azure Active Directory with geo-replication, the Azure Active Directo
79
79
> [!IMPORTANT]
80
80
> Only follow these steps if you are provisioning an Azure SQL Managed Instance. This operation can only be executed by Global Administrator or a Privileged Role Administrator in Azure AD.
81
81
>
82
-
> In **public preview**, you can assign the **Directory Readers** role to a group in Azure AD. The group owners can then add the managed instance identity as a member of this group, which would allow you to provision an Azure AD admin for the SQL Managed Instance. For more information on this feature, see [Directory Readers role in Azure Active Directory for Azure SQL](authentication-aad-directory-readers-role.md).
82
+
> You can assign the **Directory Readers** role to a group in Azure AD. The group owners can then add the managed instance identity as a member of this group, which would allow you to provision an Azure AD admin for the SQL Managed Instance. For more information on this feature, see [Directory Readers role in Azure Active Directory for Azure SQL](authentication-aad-directory-readers-role.md).
83
83
84
84
Your SQL Managed Instance needs permissions to read Azure AD to successfully accomplish tasks such as authentication of users through security group membership or creation of new users. For this to work, you need to grant the SQL Managed Instance permission to read Azure AD. You can do this using the Azure portal or PowerShell.
0 commit comments