Skip to content

Commit 708ed6d

Browse files
authored
Merge pull request #4 from MicrosoftDocs/master
Sync with master
2 parents 1a44a66 + 116d92f commit 708ed6d

13 files changed

Lines changed: 68 additions & 21 deletions

azure-sql/database/automated-backups-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ Backup storage consumption up to the maximum data size for a database is not cha
116116

117117
## Backup retention
118118

119-
For all new, restored, and copied databases, Azure SQL Database and Azure SQL Managed Instance retain sufficient backups to allow PITR within the last 7 days by default. With the exception of Hyperscale databases, you can [change backup retention period](#change-the-pitr-backup-retention-period) per each active database in the 1-35 day range. As described in [Backup storage consumption](#backup-storage-consumption), backups stored to enable PITR may be older than the retention period. For Azure SQL Managed Instance only, it is possible to set the PITR backup retention rate once a database has been deleted in the 0-35 days range.
119+
For all new, restored, and copied databases, Azure SQL Database and Azure SQL Managed Instance retain sufficient backups to allow PITR within the last 7 days by default. With the exception of Hyperscale and Basic tier databases, you can [change backup retention period](#change-the-pitr-backup-retention-period) per each active database in the 1-35 day range. As described in [Backup storage consumption](#backup-storage-consumption), backups stored to enable PITR may be older than the retention period. For Azure SQL Managed Instance only, it is possible to set the PITR backup retention rate once a database has been deleted in the 0-35 days range.
120120

121121
If you delete a database, the system keeps backups in the same way it would for an online database with its specific retention period. You cannot change backup retention period for a deleted database.
122122

azure-sql/database/data-discovery-and-classification-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Data Discovery & Classification is built into Azure SQL Database, Azure SQL Mana
2222
Your most sensitive data might include business, financial, healthcare, or personal information. Discovering and classifying this data can play a pivotal role in your organization's information-protection approach. It can serve as infrastructure for:
2323

2424
- Helping to meet standards for data privacy and requirements for regulatory compliance.
25-
- Various security scenarios, such as monitoring (auditing) and alerting on anomalous access to sensitive data.
25+
- Various security scenarios, such as monitoring (auditing) access to sensitive data.
2626
- Controlling access to and hardening the security of databases that contain highly sensitive data.
2727

2828
> [!NOTE]
@@ -181,4 +181,4 @@ You can use the REST API to programmatically manage classifications and recommen
181181
## <a id="next-steps"></a>Next steps
182182

183183
- Consider configuring [Azure SQL Auditing](../../azure-sql/database/auditing-overview.md) for monitoring and auditing access to your classified sensitive data.
184-
- For a presentation that includes data Discovery & Classification, see [Discovering, classifying, labeling & protecting SQL data | Data Exposed](https://www.youtube.com/watch?v=itVi9bkJUNc).
184+
- For a presentation that includes data Discovery & Classification, see [Discovering, classifying, labeling & protecting SQL data | Data Exposed](https://www.youtube.com/watch?v=itVi9bkJUNc).

azure-sql/database/database-copy.md

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -129,6 +129,46 @@ CREATE DATABASE Database2 AS COPY OF server1.Database1;
129129

130130
You can use the steps in the [Copy a SQL Database to a different server](#copy-to-a-different-server) section to copy your database to a server in a different subscription using T-SQL. Make sure you use a login that has the same name and password as the database owner of the source database. Additionally, the login must be a member of the `dbmanager` role or a server administrator, on both source and target servers.
131131

132+
```sql
133+
Step# 1
134+
Create login and user in the master database of the source server.
135+
136+
CREATE LOGIN loginname WITH PASSWORD = 'xxxxxxxxx'
137+
GO
138+
CREATE USER [loginname] FOR LOGIN [loginname] WITH DEFAULT_SCHEMA=[dbo]
139+
GO
140+
141+
Step# 2
142+
Create the user in the source database and grant dbowner permission to the database.
143+
144+
CREATE USER [loginname] FOR LOGIN [loginname] WITH DEFAULT_SCHEMA=[dbo]
145+
GO
146+
exec sp_addrolemember 'db_owner','loginname'
147+
GO
148+
149+
Step# 3
150+
Capture the SID of the user “loginname” from master database
151+
152+
SELECT [sid] FROM sysusers WHERE [name] = 'loginname'
153+
154+
Step# 4
155+
Connect to Destination server.
156+
Create login and user in the master database, same as of the source server.
157+
158+
CREATE LOGIN loginname WITH PASSWORD = 'xxxxxxxxx', SID = [SID of loginname login on source server]
159+
GO
160+
CREATE USER [loginname] FOR LOGIN [loginname] WITH DEFAULT_SCHEMA=[dbo]
161+
GO
162+
exec sp_addrolemember 'dbmanager','loginname'
163+
GO
164+
165+
Step# 5
166+
Execute the copy of database script from the destination server using the credentials created
167+
168+
CREATE DATABASE new_database_name
169+
AS COPY OF source_server_name.source_database_name
170+
```
171+
132172
> [!NOTE]
133173
> The [Azure portal](https://portal.azure.com), PowerShell, and the Azure CLI do not support database copy to a different subscription.
134174

azure-sql/database/database-export.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ author: stevestein
99
ms.custom: sqldbrb=2
1010
ms.author: sstein
1111
ms.reviewer:
12-
ms.date: 07/16/2019
12+
ms.date: 01/11/2021
1313
ms.topic: how-to
1414
---
1515
# Export to a BACPAC file - Azure SQL Database and Azure SQL Managed Instance
@@ -24,6 +24,7 @@ When you need to export a database for archiving or for moving to another platfo
2424
- If you are exporting to blob storage, the maximum size of a BACPAC file is 200 GB. To archive a larger BACPAC file, export to local storage.
2525
- Exporting a BACPAC file to Azure premium storage using the methods discussed in this article is not supported.
2626
- Storage behind a firewall is currently not supported.
27+
- Storage file name or the input value for StorageURI should be less than 128 characters long and cannot end with '.' and cannot contain special characters like a space character or '<,>,*,%,&,:,\,/,?'.
2728
- If the export operation exceeds 20 hours, it may be canceled. To increase performance during export, you can:
2829

2930
- Temporarily increase your compute size.
@@ -106,4 +107,4 @@ $exportStatus
106107
- To learn about exporting a BACPAC from a SQL Server database, see [Export a Data-tier Application](/sql/relational-databases/data-tier-applications/export-a-data-tier-application)
107108
- To learn about using the Data Migration Service to migrate a database, see [Migrate from SQL Server to Azure SQL Database offline using DMS](../../dms/tutorial-sql-server-to-azure-sql.md).
108109
- If you are exporting from SQL Server as a prelude to migration to Azure SQL Database, see [Migrate a SQL Server database to Azure SQL Database](migrate-to-database-from-sql-server.md).
109-
- To learn how to manage and share storage keys and shared access signatures securely, see [Azure Storage Security Guide](../../storage/blobs/security-recommendations.md).
110+
- To learn how to manage and share storage keys and shared access signatures securely, see [Azure Storage Security Guide](../../storage/blobs/security-recommendations.md).

azure-sql/database/dynamic-data-masking-configure-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ ms.date: 04/28/2020
1818
This article shows you how to implement [dynamic data masking](dynamic-data-masking-overview.md) with the Azure portal. You can also implement dynamic data masking using [Azure SQL Database cmdlets](/powershell/module/az.sql/) or the [REST API](/rest/api/sql/).
1919

2020
> [!NOTE]
21-
> This feature cannot be set using portal for Azure Synapse (use PowerShell or REST API) or SQL Managed Instance. For more information, see [Dynamic Data Masking](/sql/relational-databases/security/dynamic-data-masking).
21+
> This feature cannot be set using portal for SQL Managed Instance (use PowerShell or REST API). For more information, see [Dynamic Data Masking](/sql/relational-databases/security/dynamic-data-masking).
2222
2323
## Set up dynamic data masking for your database using the Azure portal
2424

@@ -54,4 +54,4 @@ This article shows you how to implement [dynamic data masking](dynamic-data-mask
5454
## Next steps
5555

5656
- For an overview of dynamic data masking, see [dynamic data masking](dynamic-data-masking-overview.md).
57-
- You can also implement dynamic data masking using [Azure SQL Database cmdlets](/powershell/module/az.sql/) or the [REST API](/rest/api/sql/).
57+
- You can also implement dynamic data masking using [Azure SQL Database cmdlets](/powershell/module/az.sql/) or the [REST API](/rest/api/sql/).

azure-sql/database/elastic-query-getting-started-vertical.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,6 +71,7 @@ INSERT INTO [dbo].[CustomerInformation] ([CustomerID], [CustomerName], [Company]
7171
SECRET = '<password>';
7272
```
7373
74+
The "master_key_password" is a strong password of your choosing used to encrypt the connection credentials.
7475
The "username" and "password" should be the username and password used to log in into the Customers database.
7576
Authentication using Azure Active Directory with elastic queries is not currently supported.
7677
@@ -123,4 +124,4 @@ For pricing information, see [SQL Database Pricing](https://azure.microsoft.com/
123124
* For syntax and sample queries for vertically partitioned data, see [Querying vertically partitioned data)](elastic-query-vertical-partitioning.md)
124125
* For a horizontal partitioning (sharding) tutorial, see [Getting started with elastic query for horizontal partitioning (sharding)](elastic-query-getting-started.md).
125126
* For syntax and sample queries for horizontally partitioned data, see [Querying horizontally partitioned data)](elastic-query-horizontal-partitioning.md)
126-
* See [sp\_execute \_remote](/sql/relational-databases/system-stored-procedures/sp-execute-remote-azure-sql-database) for a stored procedure that executes a Transact-SQL statement on a single remote Azure SQL Database or set of databases serving as shards in a horizontal partitioning scheme.
127+
* See [sp\_execute \_remote](/sql/relational-databases/system-stored-procedures/sp-execute-remote-azure-sql-database) for a stored procedure that executes a Transact-SQL statement on a single remote Azure SQL Database or set of databases serving as shards in a horizontal partitioning scheme.

azure-sql/database/elastic-scale-introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ You can easily scale out databases in Azure SQL Database using the **Elastic Dat
1717

1818
* [Elastic Database client library](elastic-database-client-library.md): The client library is a feature that allows you to create and maintain sharded databases. See [Get started with Elastic Database tools](elastic-scale-get-started.md).
1919
* [Elastic Database split-merge tool](elastic-scale-overview-split-and-merge.md): moves data between sharded databases. This tool is useful for moving data from a multi-tenant database to a single-tenant database (or vice-versa). See [Elastic database Split-Merge tool tutorial](elastic-scale-configure-deploy-split-and-merge.md).
20-
* [Elastic Database jobs](elastic-jobs-overview.md): Use jobs to manage large numbers of databases in Azure SQL Database. Easily perform administrative operations such as schema changes, credentials management, reference data updates, performance data collection, or tenant (customer) telemetry collection using jobs.
20+
* [Elastic Database jobs](elastic-jobs-overview.md) (preview): Use jobs to manage large numbers of databases in Azure SQL Database. Easily perform administrative operations such as schema changes, credentials management, reference data updates, performance data collection, or tenant (customer) telemetry collection using jobs.
2121
* [Elastic Database query](elastic-query-overview.md) (preview): Enables you to run a Transact-SQL query that spans multiple databases. This enables connection to reporting tools such as Excel, Power BI, Tableau, etc.
2222
* [Elastic transactions](elastic-transactions-overview.md): This feature allows you to run transactions that span several databases. Elastic database transactions are available for .NET applications using ADO .NET and integrate with the familiar programming experience using the [System.Transaction classes](/dotnet/api/system.transactions).
2323

@@ -97,4 +97,4 @@ To see the specifics of the elastic pool, see [Price and performance considerati
9797
[1]:./media/elastic-scale-introduction/tools.png
9898
[2]:./media/elastic-scale-introduction/h_versus_vert.png
9999
[3]:./media/elastic-scale-introduction/overview.png
100-
[4]:./media/elastic-scale-introduction/single_v_multi_tenant.png
100+
[4]:./media/elastic-scale-introduction/single_v_multi_tenant.png

azure-sql/database/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure SQL Database
33
description: Lists Azure Policy built-in policy definitions for Azure SQL Database and SQL Managed Instance. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 11/20/2020
4+
ms.date: 01/08/2021
55
ms.topic: reference
66
author: stevestein
77
ms.author: sstein

azure-sql/database/quota-increase-request.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,7 @@ If your subscription needs access in a particular region, select the **Region ac
104104

105105
![Request region access](./media/quota-increase-request/quota-request.png)
106106

107+
<!--
107108
### <a id="mseries"></a> Enable M-series access to a region
108109
109110
To enable M-series hardware for a subscription and region, a support request must be opened.
@@ -114,6 +115,7 @@ To enable M-series hardware for a subscription and region, a support request mus
114115
115116
116117
![Request M-series region access](./media/quota-increase-request/quota-m-series.png)
118+
-->
117119

118120
## <a id="sqlmiquota"></a> SQL Managed Instance quota type
119121

azure-sql/database/security-controls-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Azure Policy Regulatory Compliance controls for Azure SQL Database
33
description: Lists Azure Policy Regulatory Compliance controls available for Azure SQL Database and SQL Managed Instance. These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
4-
ms.date: 11/20/2020
4+
ms.date: 01/08/2021
55
ms.topic: sample
66
author: stevestein
77
ms.author: sstein

0 commit comments

Comments
 (0)