Skip to content

Commit 6ed618d

Browse files
committed
Merge branch 'f1' of https://github.com/nilabjaball/ssma8.24 into f1
2 parents beadcfa + 722a2b9 commit 6ed618d

347 files changed

Lines changed: 16551 additions & 14732 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.azure-sql.json

Lines changed: 172 additions & 177 deletions
Large diffs are not rendered by default.

azure-sql/azure-hybrid-benefit.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,9 @@ Changing to Azure Hybrid Benefit does not require any downtime.
2222

2323
## Overview
2424

25-
![vcore pricing structure](./media/azure-hybrid-benefit/pricing.png)
25+
:::image type="complex" source="media/azure-hybrid-benefit/pricing.png" alt-text="Diagram of vCore pricing structure for SQL Database.":::
26+
Diagram of vCore pricing structure for SQL Database. 'License Included' pricing is made up of base compute and SQL license components. Azure Hybrid Benefit pricing is made up of base compute and software assurance components.
27+
:::image-end:::
2628

2729
With Azure Hybrid Benefit, you pay only for the underlying Azure infrastructure by using your existing SQL Server license for the SQL Server database engine itself (Base Compute pricing). If you do not use Azure Hybrid Benefit, you pay for both the underlying infrastructure and the SQL Server license (License-Included pricing).
2830

azure-sql/database/active-geo-replication-configure-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ ms.service: sql-database
66
ms.subservice: high-availability
77
ms.custom: sqldbrb=1, devx-track-azurecli
88
ms.topic: tutorial
9-
author: emlisa
10-
ms.author: emlisa
9+
author: rajeshsetlem
10+
ms.author: rsetlem
1111
ms.reviewer: kendralittle, mathoma
1212
ms.date: 08/20/2021
1313
---

azure-sql/database/active-geo-replication-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ ms.service: sql-database
55
ms.subservice: high-availability
66
ms.custom: sqldbrb=1
77
ms.topic: conceptual
8-
author: emlisa
9-
ms.author: emlisa
8+
author: rajeshsetlem
9+
ms.author: rsetlem
1010
ms.reviewer: kendralittle, mathoma
1111
ms.date: 4/14/2022
1212
---
@@ -36,7 +36,7 @@ If your application requires a stable connection endpoint and automatic geo-fail
3636

3737
The following diagram illustrates a typical configuration of a geo-redundant cloud application using Active geo-replication.
3838

39-
![active geo-replication](./media/active-geo-replication-overview/geo-replication.png)
39+
![active geo-replication](./media/active-geo-replication-overview/geo-replication-updated.png)
4040

4141
If for any reason your primary database fails, you can initiate a geo-failover to any of your secondary databases. When a secondary is promoted to the primary role, all other secondaries are automatically linked to the new primary.
4242

@@ -197,7 +197,7 @@ To create a geo-secondary in a subscription different from the subscription of t
197197
10. After the geo-secondary is successfully created, the users, logins, and firewall rules created by this procedure can be removed.
198198

199199
> [!NOTE]
200-
> Cross-subscription geo-replication operations including setup and geo-failover are only supported using T-SQL commands.
200+
> Cross-subscription geo-replication operations including setup and geo-failover are only supported using REST API & T-SQL commands.
201201
>
202202
> Adding a geo-secondary using T-SQL is not supported when connecting to the primary server over a [private endpoint](private-endpoint-overview.md). If a private endpoint is configured but public network access is allowed, adding a geo-secondary is supported when connected to the primary server from a public IP address. Once a geo-secondary is added, public access can be [denied](connectivity-settings.md#deny-public-network-access).
203203
>

azure-sql/database/active-geo-replication-security-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@ ms.subservice: high-availability
77
ms.custom: sqldbrb=1
88
ms.devlang:
99
ms.topic: how-to
10-
author: emlisa
11-
ms.author: emlisa
10+
author: rajeshsetlem
11+
ms.author: rsetlem
1212
ms.reviewer: kendralittle, mathoma, vanto
1313
ms.date: 12/18/2018
1414
---

azure-sql/database/auto-failover-group-sql-db.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ ms.service: sql-database
66
ms.subservice: high-availability
77
ms.custom: sql-db-mi-split
88
ms.topic: conceptual
9-
author: emlisa
10-
ms.author: emlisa
9+
author: rajeshsetlem
10+
ms.author: rsetlem
1111
ms.reviewer: kendralittle, mathoma
1212
ms.date: 03/01/2022
1313
---

azure-sql/database/automated-backups-overview.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -494,7 +494,7 @@ Backup and restore operations for Hyperscale databases are fast regardless of da
494494

495495
### Hyperscale backup retention
496496

497-
Hyperscale supports short-term backup retention (STR) of 7 days by default; long-term retention (LTR) policies aren't currently supported.
497+
Default short-term backup retention (STR) for Hyperscale databases is 7 days; long-term retention (LTR) policies aren't currently supported.
498498

499499
> [!NOTE]
500500
> Short-term backup retention up to 35 days for Hyperscale databases is now in preview.
@@ -538,7 +538,7 @@ To view backup and data storage metrics in the Azure portal, follow these steps:
538538
Backup storage consumption for a Hyperscale database depends on the retention period, choice of region, backup storage redundancy and workload type. Consider some of the following tuning techniques to reduce your backup storage consumption for a Hyperscale database:
539539

540540
- Reduce the [backup retention period](#change-the-short-term-retention-policy-using-the-azure-portal) to the minimum possible for your needs.
541-
- Avoid doing large write-operations, such as index maintenance, more frequently than you need to. For index maintenance recommendations, see [Optimize index maintenance to improve query performance and reduce resource consumption](/sql/relational-databases/indexes/reorganize-and-rebuild-indexes.md).
541+
- Avoid doing large write-operations, such as index maintenance, more frequently than you need to. For index maintenance recommendations, see [Optimize index maintenance to improve query performance and reduce resource consumption](/sql/relational-databases/indexes/reorganize-and-rebuild-indexes).
542542
- For large data-load operations, consider using data compression when appropriate.
543543
- Use the `tempdb` database instead of permanent tables in your application logic to store temporary results and/or transient data.
544544
- Use locally-redundant or zone-redundant backup storage when geo-restore capability is unnecessary (for example: dev/test environments).
@@ -572,9 +572,6 @@ Backup storage redundancy for databases in Azure SQL Database can be configured
572572

573573
For Azure SQL Managed Instance, backup storage redundancy is set at the instance level, and it is applied for all belonging managed databases. It can be configured at the time of an instance creation or updated for existing instances; the backup storage redundancy change would trigger then a new full backup per database and the change will apply for all future backups. The default storage redundancy type is geo-redundancy (RA-GRS).
574574

575-
> [!NOTE]
576-
> Backup storage redundancy change for SQL Managed Instance is currently available only for the Public cloud via Azure Portal.
577-
578575
### Configure backup storage redundancy by using the Azure portal
579576

580577
#### [SQL Database](#tab/single-database)

azure-sql/database/business-continuity-high-availability-disaster-recover-hadr-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,8 +9,8 @@ ms.subservice: high-availability
99
ms.custom: sqldbrb=2
1010
ms.devlang:
1111
ms.topic: conceptual
12-
author: emlisa
13-
ms.author: emlisa
12+
author: rajeshsetlem
13+
ms.author: rsetlem
1414
ms.reviewer: kendralittle, mathoma
1515
ms.date: 10/18/2021
1616
monikerRange: "=azuresql||=azuresql-db||=azuresql-mi"

azure-sql/database/connect-github-actions-sql-db.md

Lines changed: 121 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: sql-database
77
ms.subservice: connect
88
ms.topic: quickstart
99
ms.author: jukullam
10-
ms.date: 05/05/2021
10+
ms.date: 05/10/2022
1111
ms.custom: github-actions-azure, mode-other
1212
ms.reviewer: kendralittle, mathoma
1313
---
@@ -18,7 +18,7 @@ Get started with [GitHub Actions](https://docs.github.com/en/actions) by using a
1818

1919
## Prerequisites
2020

21-
You will need:
21+
You will need:
2222
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
2323
- A GitHub repository with a dacpac package (`Database.dacpac`). If you don't have a GitHub account, [sign up for free](https://github.com/join).
2424
- An Azure SQL Database.
@@ -33,11 +33,13 @@ The file has two sections:
3333

3434
|Section |Tasks |
3535
|---------|---------|
36-
|**Authentication** | 1. Define a service principal. <br /> 2. Create a GitHub secret. |
36+
|**Authentication** | 1.1. Generate deployment credentials. |
3737
|**Deploy** | 1. Deploy the database. |
3838

3939
## Generate deployment credentials
4040

41+
# [Service principal](#tab/userlevel)
42+
4143
You can create a [service principal](/azure/active-directory/develop/app-objects-and-service-principals) with the [az ad sp create-for-rbac](/cli/azure/ad/sp#az-ad-sp-create-for-rbac) command in the [Azure CLI](/cli/azure/). Run this command with [Azure Cloud Shell](https://shell.azure.com/) in the Azure portal or by selecting the **Try it** button.
4244

4345
Replace the placeholders `server-name` with the name of your SQL server hosted on Azure. Replace the `subscription-id` and `resource-group` with the subscription ID and resource group connected to your SQL server.
@@ -63,6 +65,27 @@ The output is a JSON object with the role assignment credentials that provide ac
6365
> [!IMPORTANT]
6466
> It is always a good practice to grant minimum access. The scope in the previous example is limited to the specific server and not the entire resource group.
6567
68+
# [OpenID Connect](#tab/openid)
69+
70+
You need to provide your application's **Client ID**, **Tenant ID**, and **Subscription ID** to the login action. These values can either be provided directly in the workflow or can be stored in GitHub secrets and referenced in your workflow. Saving the values as GitHub secrets is the more secure option.
71+
72+
1. Open your GitHub repository and go to **Settings**.
73+
74+
1. Select **Settings > Secrets > New secret**.
75+
76+
1. Create secrets for `AZURE_CLIENT_ID`, `AZURE_TENANT_ID`, and `AZURE_SUBSCRIPTION_ID`. Use these values from your Active Directory application for your GitHub secrets:
77+
78+
|GitHub Secret | Active Directory Application |
79+
|---------|---------|
80+
|AZURE_CLIENT_ID | Application (client) ID |
81+
|AZURE_TENANT_ID | Directory (tenant) ID |
82+
|AZURE_SUBSCRIPTION_ID | Subscription ID |
83+
84+
1. Save each secret by selecting **Add secret**.
85+
86+
---
87+
88+
6689
## Copy the SQL connection string
6790

6891
In the Azure portal, go to your Azure SQL Database and open **Settings** > **Connection strings**. Copy the **ADO.NET** connection string. Replace the placeholder values for `your_database` and `your_password`. The connection string will look similar to this output.
@@ -75,6 +98,8 @@ You'll use the connection string as a GitHub secret.
7598

7699
## Configure the GitHub secrets
77100

101+
# [Service principal](#tab/userlevel)
102+
78103
1. In [GitHub](https://github.com/), browse your repository.
79104

80105
1. Select **Settings > Secrets > New secret**.
@@ -93,6 +118,25 @@ You'll use the connection string as a GitHub secret.
93118
94119
1. Paste the connection string value into the secret's value field. Give the secret the name `AZURE_SQL_CONNECTION_STRING`.
95120

121+
# [OpenID Connect](#tab/openid)
122+
123+
You need to provide your application's **Client ID**, **Tenant ID**, and **Subscription ID** to the login action. These values can either be provided directly in the workflow or can be stored in GitHub secrets and referenced in your workflow. Saving the values as GitHub secrets is the more secure option.
124+
125+
1. Open your GitHub repository and go to **Settings**.
126+
127+
1. Select **Settings > Secrets > New secret**.
128+
129+
1. Create secrets for `AZURE_CLIENT_ID`, `AZURE_TENANT_ID`, and `AZURE_SUBSCRIPTION_ID`. Use these values from your Active Directory application for your GitHub secrets:
130+
131+
|GitHub Secret | Active Directory Application |
132+
|---------|---------|
133+
|AZURE_CLIENT_ID | Application (client) ID |
134+
|AZURE_TENANT_ID | Directory (tenant) ID |
135+
|AZURE_SUBSCRIPTION_ID | Subscription ID |
136+
137+
1. Save each secret by selecting **Add secret**.
138+
139+
---
96140

97141
## Add your workflow
98142

@@ -107,21 +151,23 @@ You'll use the connection string as a GitHub secret.
107151
108152
on:
109153
push:
110-
branches: [ master ]
154+
branches: [ main ]
111155
pull_request:
112-
branches: [ master ]
156+
branches: [ main ]
113157
```
114158

115-
1. Rename your workflow `SQL for GitHub Actions` and add the checkout and login actions. These actions will checkout your site code and authenticate with Azure using the `AZURE_CREDENTIALS` GitHub secret you created earlier.
159+
1. Rename your workflow `SQL for GitHub Actions` and add the checkout and login actions. These actions will check out your site code and authenticate with Azure using the `AZURE_CREDENTIALS` GitHub secret you created earlier.
160+
161+
# [Service principal](#tab/userlevel)
116162

117163
```yaml
118164
name: SQL for GitHub Actions
119165
120166
on:
121167
push:
122-
branches: [ master ]
168+
branches: [ main ]
123169
pull_request:
124-
branches: [ master ]
170+
branches: [ main ]
125171
126172
jobs:
127173
build:
@@ -133,6 +179,31 @@ You'll use the connection string as a GitHub secret.
133179
creds: ${{ secrets.AZURE_CREDENTIALS }}
134180
```
135181

182+
# [OpenID Connect](#tab/openid)
183+
184+
```yaml
185+
name: SQL for GitHub Actions
186+
187+
on:
188+
push:
189+
branches: [ main ]
190+
pull_request:
191+
branches: [ main ]
192+
193+
jobs:
194+
build:
195+
runs-on: windows-latest
196+
steps:
197+
- uses: actions/checkout@v1
198+
- uses: azure/login@v1
199+
with:
200+
client-id: ${{ secrets.AZURE_CLIENT_ID }}
201+
tenant-id: ${{ secrets.AZURE_TENANT_ID }}
202+
subscription-id: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
203+
```
204+
205+
---
206+
136207
1. Use the Azure SQL Deploy action to connect to your SQL instance. Replace `SQL_SERVER_NAME` with the name of your server. You should have a dacpac package (`Database.dacpac`) at the root level of your repository.
137208

138209
```yaml
@@ -141,18 +212,20 @@ You'll use the connection string as a GitHub secret.
141212
server-name: SQL_SERVER_NAME
142213
connection-string: ${{ secrets.AZURE_SQL_CONNECTION_STRING }}
143214
dacpac-package: './Database.dacpac'
144-
```
215+
```
145216

146-
1. Complete your workflow by adding an action to logout of Azure. Here is the completed workflow. The file will appear in the `.github/workflows` folder of your repository.
217+
1. Complete your workflow by adding an action to logout of Azure. Here's the completed workflow. The file will appear in the `.github/workflows` folder of your repository.
218+
219+
# [Service principal](#tab/userlevel)
147220

148221
```yaml
149222
name: SQL for GitHub Actions
150223
151224
on:
152225
push:
153-
branches: [ master ]
226+
branches: [ main ]
154227
pull_request:
155-
branches: [ master ]
228+
branches: [ main ]
156229
157230
158231
jobs:
@@ -176,6 +249,42 @@ You'll use the connection string as a GitHub secret.
176249
az logout
177250
```
178251

252+
# [OpenID Connect](#tab/openid)
253+
254+
```yaml
255+
name: SQL for GitHub Actions
256+
257+
on:
258+
push:
259+
branches: [ main ]
260+
pull_request:
261+
branches: [ main ]
262+
263+
264+
jobs:
265+
build:
266+
runs-on: windows-latest
267+
steps:
268+
- uses: actions/checkout@v1
269+
- uses: azure/login@v1
270+
with:
271+
client-id: ${{ secrets.AZURE_CLIENT_ID }}
272+
tenant-id: ${{ secrets.AZURE_TENANT_ID }}
273+
subscription-id: ${{ secrets.AZURE_SUBSCRIPTION_ID }}
274+
- uses: azure/sql-action@v1
275+
with:
276+
server-name: SQL_SERVER_NAME
277+
connection-string: ${{ secrets.AZURE_SQL_CONNECTION_STRING }}
278+
dacpac-package: './Database.dacpac'
279+
280+
# Azure logout
281+
- name: logout
282+
run: |
283+
az logout
284+
```
285+
286+
---
287+
179288
## Review your deployment
180289

181290
1. Go to **Actions** for your GitHub repository.

azure-sql/database/connect-query-go.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,13 +11,13 @@ ms.topic: quickstart
1111
author: dzsquared
1212
ms.author: drskwier
1313
ms.reviewer: kendralittle, mathoma
14-
ms.date: 04/14/2021
14+
ms.date: 05/05/2022
1515
monikerRange: "=azuresql||=azuresql-db||=azuresql-mi"
1616
---
1717
# Quickstart: Use Golang to query a database in Azure SQL Database or Azure SQL Managed Instance
1818
[!INCLUDE[appliesto-sqldb-sqlmi](../includes/appliesto-sqldb-sqlmi.md)]
1919

20-
In this quickstart, you'll use the [Golang](https://godoc.org/github.com/denisenkom/go-mssqldb) programming language to connect to a database in Azure SQL Database or Azure SQL Managed Instance. You'll then run Transact-SQL statements to query and modify data. [Golang](https://go.dev/) is an open-source programming language that makes it easy to build simple, reliable, and efficient software.
20+
In this quickstart, you'll use the Golang programming language to connect to a database in Azure SQL Database or Azure SQL Managed Instance with the [go-mssqldb]((https://github.com/microsoft/go-mssqldb). The sample queries and modifies data with explicit Transact-SQL statements. [Golang](https://go.dev/) is an open-source programming language that makes it easy to build simple, reliable, and efficient software.
2121

2222
## Prerequisites
2323

@@ -70,7 +70,7 @@ Get the connection information you need to connect to the database. You'll need
7070

7171
```bash
7272
cd SqlServerSample
73-
go get github.com/denisenkom/go-mssqldb
73+
go get github.com/microsoft/go-mssqldb
7474
```
7575

7676
## Create sample data
@@ -114,7 +114,7 @@ Get the connection information you need to connect to the database. You'll need
114114
package main
115115

116116
import (
117-
_ "github.com/denisenkom/go-mssqldb"
117+
_ "github.com/microsoft/go-mssqldb"
118118
"database/sql"
119119
"context"
120120
"log"
@@ -330,5 +330,5 @@ Get the connection information you need to connect to the database. You'll need
330330
## Next steps
331331

332332
- [Design your first database in Azure SQL Database](design-first-database-tutorial.md)
333-
- [Golang driver for SQL Server](https://github.com/denisenkom/go-mssqldb)
334-
- [Report issues or ask questions](https://github.com/denisenkom/go-mssqldb/issues)
333+
- [Golang driver for SQL Server](https://github.com/microsoft/go-mssqldb)
334+
- [Report issues or ask questions](https://github.com/microsoft/go-mssqldb/issues)

0 commit comments

Comments
 (0)