Skip to content

Commit 79cb2fb

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/sql-docs-pr into 240501-avs-esu
2 parents cca765a + 060a315 commit 79cb2fb

28 files changed

Lines changed: 83 additions & 73 deletions

azure-sql/database/auditing-setup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Azure SQL Database and Azure Synapse Analytics Audit can store 4000 characters o
3131
The following section describes the Auditing configuration using the Azure portal.
3232

3333
> [!NOTE]
34-
> Enabling auditing on a paused dedicated SQL pool is not possible. To enable auditing, unpause the dedicated SQL pool. For more information, see [Dedicated SQL pool](/azure/synapse-analytics/sql/best-practices-dedicated-sql-pool).
34+
> You can't enable auditing on a paused dedicated SQL pool. To enable auditing, [resume the dedicated SQL pool](/azure/synapse-analytics/sql-data-warehouse/pause-and-resume-compute-portal).
3535
>
3636
> When Auditing is configured to a Log Analytics workspace or to an Event Hubs destination in the Azure portal or PowerShell cmdlet, a [Diagnostic Setting](/azure/azure-monitor/essentials/diagnostic-settings) is created with `SQLSecurityAuditEvents` category enabled.
3737

azure-sql/database/network-access-controls-overview.md

Lines changed: 43 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -5,58 +5,62 @@ description: Overview of how to manage and control network access for Azure SQL
55
author: rohitnayakmsft
66
ms.author: rohitna
77
ms.reviewer: wiassaf, vanto, mathoma
8-
ms.date: 03/07/2023
8+
ms.date: 05/01/2024
99
ms.service: sql-database
1010
ms.subservice: security
1111
ms.topic: conceptual
1212
ms.custom: sqldbrb=3
1313
---
1414

1515
# Azure SQL Database and Azure Synapse Analytics network access controls
16-
[!INCLUDE[appliesto-sqldb-asa](../includes/appliesto-sqldb-asa-formerly-sqldw.md)]
16+
17+
[!INCLUDE[appliesto-sqldb-asa](../includes/appliesto-sqldb-asa-formerly-sqldw.md)]
1718

1819
When you create a logical server from the [Azure portal](single-database-create-quickstart.md) for Azure SQL Database and Azure Synapse Analytics, the result is a public endpoint in the format, *yourservername.database.windows.net*.
1920

20-
You can use the following network access controls to selectively allow access to a database via the public endpoint:
21+
You can use the following network access controls to selectively allow access to a database via **the public endpoint**:
22+
23+
- **IP based firewall rules**: Use this feature to explicitly allow connections from a specific IP address. For example, from on-premises machines or a range of IP addresses by specifying the start and end IP address.
2124

22-
- Allow Azure services and resources to access this server: When enabled, other resources within the Azure boundary, for example an Azure Virtual Machine, can access SQL Database
23-
- IP firewall rules: Use this feature to explicitly allow connections from a specific IP address, for example from on-premises machines
25+
- **Allow Azure services and resources to access this server**: When enabled, other resources within the Azure boundary can access SQL Database. For example, an Azure Virtual Machine can access the SQL Database resources.
2426

25-
You can also allow private access to the database from [virtual networks](/azure/virtual-network/virtual-networks-overview) via:
27+
You can also allow **private access** to the database from [virtual networks](/azure/virtual-network/virtual-networks-overview) via:
2628

27-
- Virtual network firewall rules: Use this feature to allow traffic from a specific virtual network within the Azure boundary
28-
- Private Link: Use this feature to create a private endpoint for [logical server in Azure](logical-servers.md) within a specific virtual network
29+
- **Virtual network firewall rules**: Use this feature to allow traffic from a specific virtual network within the Azure boundary.
30+
31+
- **Private Link**: Use this feature to create a private endpoint for the [logical server in Azure](logical-servers.md) within a specific virtual network.
2932

3033
> [!IMPORTANT]
3134
> This article does *not* apply to **SQL Managed Instance**. For more information about the networking configuration, see [connecting to Azure SQL Managed Instance](../managed-instance/connect-application-instance.md) .
3235
33-
See the below video for a high-level explanation of these access controls and what they do:
36+
## IP firewall rules
3437

35-
> [!VIDEO https://learn.microsoft.com/shows/Data-Exposed/Data-Exposed--SQL-Database-Connectivity-Explained/player?WT.mc_id=dataexposed-c9-niner]
38+
IP based firewall is a feature of the logical server in Azure that prevents all access to your server until you explicitly [add IP addresses](firewall-create-server-level-portal-quickstart.md) for the client machines.
3639

3740
## Allow Azure services
3841

39-
By default during creation of a new logical server [from the Azure portal](single-database-create-quickstart.md), **Allow Azure services and resources to access this server** is unchecked and not enabled. This setting appears when connectivity is allowed using public service endpoint.
42+
By default, during creation of a new logical server [from the Azure portal](single-database-create-quickstart.md), **Allow Azure services and resources to access this server** is unchecked and not enabled. This setting appears when connectivity is allowed via public endpoint.
4043

41-
You can also change this setting via the **Networking** setting after the logical server is created as follows:
44+
You can also change this setting via the **Networking** setting after the logical server is created as follows:
4245

4346
![Screenshot of manage server firewall][2]
4447

45-
When **Allow Azure services and resources to access this server** is enabled, your server allows communications from all resources inside the Azure boundary, that may or may not be part of your subscription.
48+
When **Allow Azure services and resources to access this server** is enabled, your server allows communications from all resources inside the Azure boundary, **regardless of whether they are part of your subscription**. In many cases, enabling the setting is more permissive than what most customers want. You might want to uncheck this setting and replace it with more restrictive IP firewall rules or use one the options for private access.
4649

47-
In many cases, enabling the setting is more permissive than what most customers want. You may want to uncheck this setting and replace it with more restrictive IP firewall rules or virtual network firewall rules.
50+
> [!IMPORTANT]
51+
> Checking *Allow Azure services and resources to access this server* adds an IP based firewall rule with start and end IP address of 0.0.0.0
4852
4953
However, doing so affects the following features that run on virtual machines in Azure that aren't part of your virtual network and hence connect to the database via an Azure IP address:
5054

5155
### Import Export Service
5256

53-
Import Export Service doesn't work when **Allow Azure services and resources to access this server** is not enabled. However you can work around the problem [by manually running SqlPackage from an Azure VM or performing the export](./database-import-export-azure-services-off.md) directly in your code by using the DACFx API.
57+
Import Export Service doesn't work when **Allow Azure services and resources to access this server** isn't enabled. However you can work around the problem [by manually running SqlPackage from an Azure VM or performing the export](./database-import-export-azure-services-off.md) directly in your code by using the DACFx API.
5458

5559
### Data Sync
5660

57-
To use the Data sync feature with **Allow Azure services and resources to access this server** not enabled, you need to create individual firewall rule entries to [add IP addresses](firewall-create-server-level-portal-quickstart.md) from the **Sql service tag** for the region hosting the **Hub** database. Add these server-level firewall rules to the servers hosting both **Hub** and **Member** databases (which may be in different regions)
61+
To use the Data sync feature with **Allow Azure services and resources to access this server** not enabled, you need to create individual firewall rule entries to [add IP addresses](firewall-create-server-level-portal-quickstart.md) from the **Sql service tag** for the region hosting the **Hub** database. Add these server-level firewall rules to the servers hosting both **Hub** and **Member** databases (which might be in different regions).
5862

59-
Use the following PowerShell script to generate IP addresses corresponding to the SQL service tag for West US region
63+
Use the following PowerShell script to generate IP addresses corresponding to the SQL service tag for West US region.
6064

6165
```powershell
6266
PS C:\> $serviceTags = Get-AzNetworkServiceTag -Location eastus2
@@ -75,7 +79,7 @@ PS C:\> $sql.Properties.AddressPrefixes
7579
> [!TIP]
7680
> Get-AzNetworkServiceTag returns the global range for SQL Service Tag despite specifying the Location parameter. Be sure to filter it to the region that hosts the Hub database used by your sync group
7781
78-
Note that the output of the PowerShell script is in Classless Inter-Domain Routing (CIDR) notation. This needs to be converted to a format of Start and End IP address using [Get-IPrangeStartEnd.ps1](https://www.sqltechnet.com/2020/12/powershell-set-azure-sql-firewall-for.html) like this:
82+
The output of the PowerShell script is in Classless Inter-Domain Routing (CIDR) notation. This needs to be converted to a format of Start and End IP address using [Get-IPrangeStartEnd.ps1](https://www.sqltechnet.com/2020/12/powershell-set-azure-sql-firewall-for.html) like this:
7983

8084
```powershell
8185
PS C:\> Get-IPrangeStartEnd -ip 52.229.17.93 -cidr 26
@@ -84,7 +88,7 @@ start end
8488
52.229.17.64 52.229.17.127
8589
```
8690

87-
You can use this additional PowerShell script to convert all the IP addresses from CIDR to Start and End IP address format.
91+
You can use the following PowerShell script to convert all the IP addresses from CIDR to Start and End IP address format.
8892

8993
```powershell
9094
PS C:\>foreach( $i in $sql.Properties.AddressPrefixes) {$ip,$cidr= $i.split('/') ; Get-IPrangeStartEnd -ip $ip -cidr $cidr;}
@@ -97,50 +101,43 @@ start end
97101

98102
You can now add these as distinct firewall rules and then disable the setting **Allow Azure services and resources to access this server**.
99103

100-
## IP firewall rules
101-
102-
Ip based firewall is a feature of the logical server in Azure that prevents all access to your server until you explicitly [add IP addresses](firewall-create-server-level-portal-quickstart.md) of the client machines.
104+
## Sql Service Tag
103105

104-
## Virtual network firewall rules
106+
[Service tags](/azure/virtual-network/service-tags-overview) can be used in security rules and routes from clients to SQL Database. Service tags can be used in network security groups, Azure Firewall, and user-defined routes by specifying them in the source or destination field of a security rule.
107+
The **Sql** service tag consists of all IP addresses that are being used by SQL Database. The tag is further segmented by regions. For example **Sql.WestUS** lists all the IP addresses used by SQL Database in West US.
105108

106-
In addition to IP rules, the server firewall allows you to define *virtual network rules*. To learn more, see [Virtual network service endpoints and rules for Azure SQL Database](vnet-service-endpoint-rule-overview.md).
109+
The **Sql** service tag consists of IP addresses that are required to establish connectivity to SQL Database as documented in [Gateway IP addresses](connectivity-architecture.md#gateway-ip-addresses). Additionally, a service tag will also be associated with any outbound traffic from SQL Database used in features such as:
107110

108-
### Azure Networking terminology
111+
- [Auditing](auditing-overview.md)
112+
- [Vulnerability assessment](/azure/defender-for-cloud/sql-azure-vulnerability-assessment-overview)
113+
- [Import/Export service](database-import-export-azure-services-off.md)
114+
- [OPENROWSET](/sql/t-sql/functions/openrowset-transact-sql)
115+
- [Bulk Insert](/sql/t-sql/statements/bulk-insert-transact-sql)
116+
- [sp_invoke_external_rest_endpoint](/sql/relational-databases/system-stored-procedures/sp-invoke-external-rest-endpoint-transact-sql)
117+
- [Ledger](/sql/relational-databases/security/ledger/ledger-digest-management)
118+
- [Azure SQL transparent data encryption with customer-managed key](transparent-data-encryption-byok-configure.md)
109119

110-
Be aware of the following Azure Networking terms as you explore Virtual network firewall rules
120+
## SqlManagement Service Tag
111121

112-
**Virtual network:** You can have virtual networks associated with your Azure subscription
122+
SqlManagement service tag is used for control plane operations against SQL Database.
113123

114-
**Subnet:** A virtual network contains **subnets**. Any Azure virtual machines (VMs) that you have are assigned to subnets. One subnet can contain multiple VMs or other compute nodes. Compute nodes that are outside of your virtual network can't access your virtual network unless you configure your security to allow access.
115-
116-
**Virtual network service endpoint:** A [Virtual network service endpoint](/azure/virtual-network/virtual-network-service-endpoints-overview) is a subnet whose property values include one or more formal Azure service type names. In this article we're interested in the type name of **Microsoft.Sql**, which refers to the Azure service named SQL Database.
117-
118-
**Virtual network rule:** A virtual network rule for your server is a subnet that is listed in the access control list (ACL) of your server. To be in the ACL for your database in SQL Database, the subnet must contain the **Microsoft.Sql** type name. A virtual network rule tells your server to accept communications from every node that is on the subnet.
119-
120-
## IP vs. Virtual network firewall rules
121-
122-
The Azure SQL Database firewall allows you to specify IP address ranges from which communications are accepted into SQL Database. This approach is fine for stable IP addresses that are outside the Azure private network. However, virtual machines (VMs) within the Azure private network are configured with *dynamic* IP addresses. Dynamic IP addresses can change when your VM is restarted and in turn invalidate the IP-based firewall rule. It would be folly to specify a dynamic IP address in a firewall rule, in a production environment.
123-
124-
You can work around this limitation by obtaining a *static* IP address for your VM. For details, see [Create a virtual machine with a static public IP address using the Azure portal](/azure/virtual-network/ip-services/virtual-network-deploy-static-pip-arm-portal). However, the static IP approach can become difficult to manage, and it's costly when done at scale.
125-
126-
Virtual network rules are easier alternative to establish and to manage access from a specific subnet that contains your VMs.
124+
## Virtual network firewall rules
127125

128-
> [!NOTE]
129-
> You cannot yet have SQL Database on a subnet. If your server was a node on a subnet in your virtual network, all nodes within the virtual network could communicate with your SQL Database. In this case, your VMs could communicate with SQL Database without needing any virtual network rules or IP rules.
126+
[Virtual network firewall rules](vnet-service-endpoint-rule-overview.md) are easier alternatives to establish and manage access from a specific subnet that contains your VMs.
130127

131128
## Private Link
132129

133-
Private Link allows you to connect to a server via a **private endpoint**. A private endpoint is a private IP address within a specific [virtual network](/azure/virtual-network/virtual-networks-overview) and Subnet.
130+
Private Link allows you to connect to a server via a **private endpoint**. A [private endpoint](private-endpoint-overview.md) is a private IP address within a specific [virtual network](/azure/virtual-network/virtual-networks-overview) and subnet.
134131

135-
## Next steps
132+
## Related content
136133

137134
- For a quickstart on creating a server-level IP firewall rule, see [Create a database in SQL Database](single-database-create-quickstart.md).
138135

139136
- For a quickstart on creating a server-level virtual network firewall rule, see [Virtual Network service endpoints and rules for Azure SQL Database](vnet-service-endpoint-rule-overview.md).
140137

141-
- For help with connecting to a database in SQL Database from open source or third-party applications, see [Client quickstart code samples to SQL Database](/previous-versions/azure/ee336282(v=azure.100)).
138+
- For help with connecting to a database in SQL Database from open source or partner applications, see [Client quickstart code samples to SQL Database](/previous-versions/azure/ee336282(v=azure.100)).
142139

143-
- For information on additional ports that you may need to open, see the **SQL Database: Outside vs inside** section of [Ports beyond 1433 for ADO.NET 4.5 and SQL Database](adonet-v12-develop-direct-route-ports.md)
140+
- For information on other ports that you might need to open, see the **SQL Database: Outside vs inside** section of [Ports beyond 1433 for ADO.NET 4.5 and SQL Database](adonet-v12-develop-direct-route-ports.md)
144141

145142
- For an overview of Azure SQL Database Connectivity, see [Azure SQL Connectivity Architecture](connectivity-architecture.md)
146143

azure-sql/database/sql-insights-enable.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ Each type of SQL offers methods for your monitoring virtual machine to securely
138138

139139
SQL Insights supports accessing your Azure SQL Database via its public endpoint as well as from its virtual network.
140140

141-
For access via the public endpoint, you would add a rule under the **Firewall settings** page and the [IP firewall settings](./network-access-controls-overview.md#ip-firewall-rules) section. For specifying access from a virtual network, you can set [virtual network firewall rules](./network-access-controls-overview.md#virtual-network-firewall-rules) and set the [service tags required by the Azure Monitor agent](/azure/azure-monitor/agents/azure-monitor-agent-overview#networking). [This article](./network-access-controls-overview.md#ip-vs-virtual-network-firewall-rules) describes the differences between these two types of firewall rules.
141+
For access via the public endpoint, you would add a rule under the **Firewall settings** page and the [IP firewall settings](./network-access-controls-overview.md#ip-firewall-rules) section in the Azure portal. For specifying access from a virtual network, you can set [virtual network firewall rules](./network-access-controls-overview.md#virtual-network-firewall-rules) and set the [service tags required by the Azure Monitor agent](/azure/azure-monitor/agents/azure-monitor-agent-overview#networking).
142142

143143
:::image type="content" source="media/sql-insights-enable/set-server-firewall.png" alt-text="Screenshot of an Azure SQL Database page in the Azure portal. The Set server firewall button is highlighted." lightbox="media/sql-insights-enable/set-server-firewall.png":::
144144

docs/includes/ssrb-applies-to-ssdt-yes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: maggiesMSFT
33
ms.author: maggies
44
ms.reviewer: randolphwest
5-
ms.date: 01/12/2023
5+
ms.date: 05/01/2024
66
ms.service: reporting-services
77
ms.topic: include
88
---

docs/includes/ssrs-appliesto-2008r2-and-later.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: maggiesMSFT
33
ms.author: maggies
44
ms.reviewer: randolphwest
5-
ms.date: 01/12/2023
5+
ms.date: 05/01/2024
66
ms.service: reporting-services
77
ms.topic: include
88
---

docs/includes/ssrs-appliesto-2016.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: maggiesMSFT
33
ms.author: maggies
44
ms.reviewer: randolphwest
5-
ms.date: 01/12/2023
5+
ms.date: 05/01/2024
66
ms.service: reporting-services
77
ms.topic: include
88
---

docs/includes/ssrs-appliesto-2017-and-later-enterprise.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: maggiesMSFT
33
ms.author: maggies
44
ms.reviewer: randolphwest
5-
ms.date: 01/12/2023
5+
ms.date: 05/01/2024
66
ms.service: reporting-services
77
ms.topic: include
88
---

docs/includes/ssrs-appliesto-2017-and-later.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: maggiesMSFT
33
ms.author: maggies
44
ms.reviewer: randolphwest
5-
ms.date: 01/12/2023
5+
ms.date: 05/01/2024
66
ms.service: reporting-services
77
ms.topic: include
88
---

docs/includes/ssrs-appliesto-2017.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: maggiesMSFT
33
ms.author: maggies
44
ms.reviewer: randolphwest
5-
ms.date: 01/12/2023
5+
ms.date: 05/01/2024
66
ms.service: reporting-services
77
ms.topic: include
88
---

docs/includes/ssrs-appliesto-2019-and-later.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: maggiesMSFT
33
ms.author: maggies
44
ms.reviewer: randolphwest
5-
ms.date: 01/12/2023
5+
ms.date: 05/01/2024
66
ms.service: reporting-services
77
ms.topic: include
88
---

0 commit comments

Comments
 (0)