You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/sql-server/azure-arc/assess.md
+1-41Lines changed: 1 addition & 41 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,47 +32,7 @@ This article provides instructions for using best practices assessment on an ins
32
32
33
33
## Prerequisites
34
34
35
-
- Your Windows-based SQL Server instance is connected to Azure. Follow the instructions at [Automatically connect SQL Server machines to Azure Arc](automatically-connect.md).
36
-
37
-
> [!NOTE]
38
-
> Best practices assessment is currently limited to SQL Server running on Windows machines. The assessment doesn't apply to SQL on Linux machines currently.
39
-
40
-
- If the server hosts a single SQL Server instance: Make sure that the version of Azure Extension for SQL Server (`WindowsAgent.SqlServer`) is "**1.1.2202.47**" or later.
41
-
42
-
- If the server hosts multiple instances of SQL Server: Make sure that the version of Azure Extension for SQL Server (`WindowsAgent.SqlServer`) is greater than "**1.1.2231.59".**
43
-
44
-
> [!TIP]
45
-
> To check the version and update to update to the latest, review [Upgrade extension](/azure/azure-arc/servers/manage-vm-extensions-portal#upgrade-extensions).
46
-
47
-
- If the server hosts a named instance of SQL Server, [SQL Server browser service](../../tools/configuration-manager/sql-server-browser-service.md) must be running.
48
-
49
-
-[A Log Analytics workspace](/azure/azure-monitor/logs/quick-create-workspace?tabs=azure-portal) must be in the same subscription as your SQL Server enabled by Azure Arc resource.
50
-
51
-
- The user configuring SQL best practices assessment (BPA) must have the following permissions.
52
-
53
-
- Log Analytics Contributor role on resource group or subscription of the Log Analytics workspace.
54
-
- Azure Connected Machine Resource Administrator role on the resource group or subscription of the Arc-enabled SQL Server.
55
-
- Monitoring Contributor role on the Resource group or subscription of Log Analytics Workspace & Resource group or subscription of Arc Machine.
56
-
- Users assigned to built-in roles such as Contributor or Owner have sufficient permissions. For more information, review [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal) for more information.
57
-
58
-
- The minimum permissions required to access or read the assessment report are:
59
-
60
-
- Reader role on the resource group or subscription of the Arc-enabled SQL Server resource.
-[Monitoring reader](/azure/role-based-access-control/built-in-roles#monitoring-reader) on resource group/subscription of Log Analytics workspace.
63
-
- The SQL Server built-in login **NT AUTHORITY\SYSTEM** must be the member of SQL Server **sysadmin** server role for all the SQL Server instances running on the machine.
64
-
- If your firewall or proxy server restricts outbound connectivity, make sure they allow to Azure Arc over TCP port 443 for these URLs.
- Your SQL Server instance must have the [TCP/IP protocol enabled](../../database-engine/configure-windows/enable-or-disable-a-server-network-protocol.md).
72
-
73
-
- SQL BPA uses Azure Monitor Agent (AMA) to collect and analyze data from your SQL servers. If you have AMA installed on your SQL servers before enabling BPA, BPA uses the same AMA agent and proxy settings. You don't need to do anything else. However, if you don't have AMA installed on your SQL servers, BPA installs it for you. BPA will not set up proxy settings for AMA automatically. You need to re-deploy AMA with the proxy settings that you want. Review [AMA Network Settings and Proxy Configuration](/azure/azure-monitor/agents/azure-monitor-agent-data-collection-endpoint?tabs=ArmPolicy#proxy-configuration) for more information on AMA network and proxy settings.
74
-
75
-
- If you use *Configure Arc-enabled Servers with SQL Server extension installed to enable or disable SQL best practices assessment* Azure policy to enable assessment at [scale](#enable-best-practices-assessment-at-scale-using-azure-policy), you need to create an Azure Policy assignment. Your subscription requires the Resource Policy Contributor role assignment for the scope that you're targeting. The scope may be either subscription or resource group. Further, if you are going to create a new user assigned managed identity, you need the User Access Administrator role assignment in the subscription.
- Your Windows-based SQL Server instance is connected to Azure. Follow the instructions at [Automatically connect SQL Server machines to Azure Arc](../automatically-connect.md).
9
+
10
+
> [!NOTE]
11
+
> Best practices assessment is currently limited to SQL Server running on Windows machines. The assessment doesn't apply to SQL on Linux machines currently.
12
+
13
+
- If the server hosts a single SQL Server instance: Make sure that the version of Azure Extension for SQL Server (`WindowsAgent.SqlServer`) is "**1.1.2202.47**" or later.
14
+
15
+
- If the server hosts multiple instances of SQL Server: Make sure that the version of Azure Extension for SQL Server (`WindowsAgent.SqlServer`) is greater than "**1.1.2231.59".**
16
+
17
+
> [!TIP]
18
+
> To check the version and update to update to the latest, review [Upgrade extension](/azure/azure-arc/servers/manage-vm-extensions-portal#upgrade-extensions).
19
+
20
+
- If the server hosts a named instance of SQL Server, [SQL Server browser service](../../../tools/configuration-manager/sql-server-browser-service.md) must be running.
21
+
22
+
-[A Log Analytics workspace](/azure/azure-monitor/logs/quick-create-workspace?tabs=azure-portal) must be in the same subscription as your SQL Server enabled by Azure Arc resource.
23
+
24
+
- The user configuring SQL best practices assessment (BPA) must have the following permissions.
25
+
26
+
- Log Analytics Contributor role on resource group or subscription of the Log Analytics workspace.
27
+
- Azure Connected Machine Resource Administrator role on the resource group or subscription of the Arc-enabled SQL Server.
28
+
- Monitoring Contributor role on the Resource group or subscription of Log Analytics Workspace & Resource group or subscription of Arc Machine.
29
+
- Users assigned to built-in roles such as Contributor or Owner have sufficient permissions. For more information, review [Assign Azure roles using the Azure portal](/azure/role-based-access-control/role-assignments-portal) for more information.
30
+
31
+
- The minimum permissions required to access or read the assessment report are:
32
+
33
+
- Reader role on the resource group or subscription of the Arc-enabled SQL Server resource.
-[Monitoring reader](/azure/role-based-access-control/built-in-roles#monitoring-reader) on resource group/subscription of Log Analytics workspace.
36
+
- The SQL Server built-in login **NT AUTHORITY\SYSTEM** must be the member of SQL Server **sysadmin** server role for all the SQL Server instances running on the machine.
37
+
- If your firewall or proxy server restricts outbound connectivity, make sure they allow to Azure Arc over TCP port 443 for these URLs.
- Your SQL Server instance must have the [TCP/IP protocol enabled](../../../database-engine/configure-windows/enable-or-disable-a-server-network-protocol.md).
45
+
46
+
- SQL BPA uses Azure Monitor Agent (AMA) to collect and analyze data from your SQL servers. If you have AMA installed on your SQL servers before enabling BPA, BPA uses the same AMA agent and proxy settings. You don't need to do anything else. However, if you don't have AMA installed on your SQL servers, BPA installs it for you. BPA will not set up proxy settings for AMA automatically. You need to re-deploy AMA with the proxy settings that you want. Review [AMA Network Settings and Proxy Configuration](/azure/azure-monitor/agents/azure-monitor-agent-data-collection-endpoint?tabs=ArmPolicy#proxy-configuration) for more information on AMA network and proxy settings.
47
+
48
+
- If you use *Configure Arc-enabled Servers with SQL Server extension installed to enable or disable SQL best practices assessment* Azure policy to enable assessment at [scale](../assess.md#enable-best-practices-assessment-at-scale-using-azure-policy), you need to create an Azure Policy assignment. Your subscription requires the Resource Policy Contributor role assignment for the scope that you're targeting. The scope may be either subscription or resource group. Further, if you are going to create a new user assigned managed identity, you need the User Access Administrator role assignment in the subscription.
0 commit comments