You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-sql/database-watcher-faq.yml
+6-2Lines changed: 6 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ metadata:
5
5
description: Frequently asked questions about database watcher for Azure SQL
6
6
author: lcwright
7
7
ms.author: lancewright
8
-
ms.date: 05/04/2025
8
+
ms.date: 09/29/2025
9
9
ms.reviewer: wiassaf, dfurman
10
10
ms.service: azure-sql
11
11
ms.subservice: monitoring
@@ -64,7 +64,7 @@ sections:
64
64
65
65
- question: |
66
66
Does it support cross-subscription and cross-tenant monitoring?
67
-
answer: The watcher and the SQL targets it monitors can be in different subscriptions within the same Microsoft Entra ID tenant. Similarly, if the watcher is using a database on an Azure Data Explorer cluster as its data store, the cluster must be in any subscription within the same tenant as the watcher. If you want to monitor SQL targets in multiple tenants using a single data store, create a watcher in each tenant, and use a database in either [Real-Time Analytics](/fabric/real-time-analytics/overview) or on a [free Azure Data Explorer cluster](/azure/data-explorer/start-for-free) as the data store for all watchers. For more information, see [Monitor large estates](database-watcher-manage.md#monitor-large-estates).
67
+
answer: The watcher and the SQL target it monitors can be in different subscriptions within the same Microsoft Entra ID tenant. Similarly, if the watcher is using a database on an Azure Data Explorer cluster as its data store, the cluster must be in any subscription within the same tenant as the watcher. If you want to monitor SQL targets in multiple tenants using a single data store, create a watcher in each tenant, and use a database in either [Real-Time Analytics](/fabric/real-time-analytics/overview) or on a [free Azure Data Explorer cluster](/azure/data-explorer/start-for-free) as the data store for all watchers. For more information, see [Monitor large estates](database-watcher-manage.md#monitor-large-estates).
68
68
69
69
- name: Watcher
70
70
questions:
@@ -110,6 +110,10 @@ sections:
110
110
Can I export SQL monitoring data from Azure Data Explorer?
111
111
answer: Yes. For example, you can [export](/azure/data-explorer/kusto/management/data-export) data to Azure storage, a data lake, or a SQL Server or an Azure SQL database.
112
112
113
+
- question: |
114
+
What happens to the collected SQL monitoring data when I delete a SQL target?
115
+
answer: The data for the deleted SQL targets is retained in the data store according to the [retention policy](database-watcher-manage.md#manage-data-retention) for the database or table, and can be accessed via the dashboards and queries for historical purposes. For more information about deleting collected data from the data store before the retention period expires, see [Delete data](/kusto/concepts/delete-data). The summary page of the watcher uses the data in the data store, and shows recently deleted SQL targets for up to 72 hours.
This article provides and overview of the active geo-replication feature for [Azure SQL Database](sql-database-paas-overview.md), which lets you continuously replicate data from a primary database to a readable secondary database. The readable secondary database might be in the same Azure region as the primary, or, more commonly, in a different region. This kind of readable secondary database is also known as a geo-secondary or geo-replica.
19
+
This article provides an overview of the active geo-replication feature for [Azure SQL Database](sql-database-paas-overview.md), which lets you continuously replicate data from a primary database to a readable secondary database. The readable secondary database might be in the same Azure region as the primary, or, more commonly, in a different region. This kind of readable secondary database is also known as a geo-secondary or geo-replica.
20
20
21
21
Active geo-replication is configured per database. To fail over a group of databases, or if your application requires a stable connection endpoint, consider [Failover groups](failover-group-sql-db.md) instead.
This article teaches you how to identify deadlocks, use deadlock graphs and Query Store to identify the queries in the deadlock, and plan and test changes to prevent deadlocks from reoccurring. This article applies to Azure SQL Database and Fabric SQL database, which shares many features of Azure SQL Database.
22
+
This article teaches you how to identify deadlocks, use deadlock graphs and Query Store to identify the queries in the deadlock, and plan and test changes to prevent deadlocks from reoccurring. This article applies to Azure SQL Database and SQL database in Fabric, which shares many features of Azure SQL Database.
23
23
24
24
This article focuses on identifying and analyzing deadlocks due to lock contention. Learn more about other types of deadlocks in [resources that can deadlock](/sql/relational-databases/sql-server-deadlocks-guide#deadlock_resources).
25
25
@@ -118,7 +118,7 @@ Learn more about each of these approaches in the [Prevent a deadlock from reoccu
118
118
119
119
In this article, we use the `AdventureWorksLT` sample database to set up alerts for deadlocks, cause an example deadlock, analyze the deadlock graph for the example deadlock, and test changes to prevent the deadlock from reoccurring.
120
120
121
-
We use the [SQL Server Management Studio](/sql/ssms/download-sql-server-management-studio-ssms) (SSMS) client in this article, as it contains functionality to display deadlock graphs in an interactive visual mode. You can use other clients such as [Azure Data Studio](/azure-data-studio/download-azure-data-studio) to follow along with the examples, but you might only be able to view deadlock graphs as XML.
121
+
We use the [SQL Server Management Studio](/sql/ssms/download-sql-server-management-studio-ssms) (SSMS) client in this article, as it contains functionality to display deadlock graphs in an interactive visual mode. You can use other clients such as [Azure Data Studio](/azure-data-studio/download-azure-data-studio), the [MSSQL extension for Visual Studio Code](/sql/tools/visual-studio-code-extensions/mssql/mssql-extension-visual-studio-code), [sqlcmd](/sql/tools/sqlcmd/sqlcmd-utility), or your favorite T-SQL querying tool to follow along with the examples, but you might only be able to view deadlock graphs as XML.
122
122
123
123
### Create the AdventureWorksLT database
124
124
@@ -128,13 +128,13 @@ For detailed instructions on how to create `AdventureWorksLT` with the Azure por
128
128
129
129
### Set up deadlock alerts in the Azure portal
130
130
131
-
To set up alerts for deadlock events, follow the steps in the article [Create alerts for Azure SQL Database and Azure Synapse Analytics using the Azure portal](alerts-create.md).
131
+
To set up alerts for deadlock events, follow the steps in the article [Create alerts for Azure SQL Database using the Azure portal](alerts-create.md).
132
132
133
133
Select **Deadlocks** as the signal name for the alert. Configure the **Action group** to notify you using the method of your choice, such as the **Email/SMS/Push/Voice** action type.
134
134
135
135
## Collect deadlock graphs in Azure SQL Database with Extended Events
136
136
137
-
Deadlock graphs are a rich source of information regarding the processes and locks involved in a deadlock. To collect deadlock graphs with Extended Events (XEvents) in Azure SQL Database, capture the `sqlserver.database_xml_deadlock_report` event.
137
+
Deadlock graphs are a rich source of information regarding the processes and locks involved in a deadlock. To collect deadlock graphs with Extended Events (XEvents) in Azure SQL Database and SQL database in Fabric, capture the `sqlserver.database_xml_deadlock_report` event.
138
138
139
139
You can collect deadlock graphs with XEvents using either the [ring buffer target](xevent-code-ring-buffer.md) or an [event file target](xevent-code-event-file.md). Considerations for selecting the appropriate target type are summarized in the following table:
140
140
@@ -184,7 +184,7 @@ To create an XEvents session that writes to an event file target, we:
184
184
To configure an Azure Storage container, first create or select an existing Azure Storage account, then create the container. Generate a Shared Access Signature (SAS) token for the container. This section describes completing this process in the Azure portal.
185
185
186
186
> [!NOTE]
187
-
> If you wish to create and configure the Azure Storage blob container with PowerShell, see [Event File target code for extended events in Azure SQL Database](xevent-code-event-file.md). Alternately, you might find it convenient to [Use Azure Storage Explorer](#use-azure-storage-explorer) to create and configure the Azure Storage blob container instead of using the Azure portal.
187
+
> If you wish to create and configure the Azure Storage blob container with PowerShell, see [Event File target code for extended events in Azure SQL Database and SQL database in Fabric](xevent-code-event-file.md). Alternately, you might find it convenient to [Use Azure Storage Explorer](#use-azure-storage-explorer) to create and configure the Azure Storage blob container instead of using the Azure portal.
188
188
189
189
#### Create or select an Azure Storage account
190
190
@@ -228,7 +228,7 @@ From the container page in the Azure portal:
228
228
229
229
### Create a database scoped credential
230
230
231
-
Connect to your database in Azure SQL Database with SSMS to run the following steps.
231
+
Connect to your database with SSMS to run the following steps.
232
232
233
233
To create a database scoped credential, you must first create a [database master key](/sql/t-sql/statements/create-master-key-transact-sql) (DMK) in the database if one doesn't exist.
234
234
@@ -688,7 +688,7 @@ Resources are represented by rectangles in the visual representation of the dead
688
688
:::image type="content" source="media/analyze-prevent-deadlocks/deadlock-graph-resource-list.png" alt-text="Screenshot of a deadlock graph, displayed visually in SSMS. Rectangles show the resources that are involved in the deadlock." lightbox="media/analyze-prevent-deadlocks/deadlock-graph-resource-list.png":::
689
689
690
690
> [!NOTE]
691
-
> Database names are represented as GUIDs (**uniqueidentifier**) in deadlock graphs for databases in Azure SQL Database. This is the `physical_database_name` for the database listed in the [sys.databases](/sql/relational-databases/system-catalog-views/sys-databases-transact-sql) and [sys.dm_user_db_resource_governance](/sql/relational-databases/system-dynamic-management-views/sys-dm-user-db-resource-governor-azure-sql-database) dynamic management views.
691
+
> Database names are represented as GUIDs (**uniqueidentifier**) in deadlock graphs for databases in Azure SQL Database and SQL database in Fabric. This is the `physical_database_name` for the database listed in the [sys.databases](/sql/relational-databases/system-catalog-views/sys-databases-transact-sql) and [sys.dm_user_db_resource_governance](/sql/relational-databases/system-dynamic-management-views/sys-dm-user-db-resource-governor-azure-sql-database) dynamic management views.
Copy file name to clipboardExpand all lines: azure-sql/database/automated-backups-overview.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: Learn how Azure SQL Database automatically backs up all databases a
5
5
author: WilliamDAssafMSFT
6
6
ms.author: wiassaf
7
7
ms.reviewer: mathoma, danil, dinethi
8
-
ms.date: 03/03/2025
8
+
ms.date: 09/25/2025
9
9
ms.service: azure-sql-database
10
10
ms.subservice: backup-restore
11
11
ms.topic: conceptual
@@ -144,7 +144,7 @@ For information on recovery times, see [RTO and RPO](business-continuity-high-av
144
144
|**Types of SQL backup**| Full, differential, log. | Most recent geo-replicated copies of PITR backups. | Only the full backups. |
145
145
|**Retention**| 7 days by default, configurable between 1 and 35 days (except Basic databases, which are configurable between 1 and 7 days). | Enabled by default, same as source.<sup>2</sup>| Not enabled by default. Retention is up to 10 years. |
146
146
|**Azure Storage**| Geo-redundant by default. You can optionally configure zone-redundant or locally redundant storage. | Available when PITR backup storage redundancy is set to geo-redundant. Not available when PITR backup storage is zone-redundant or locally redundant. | Geo-redundant by default. You can configure zone-redundant or locally redundant storage. |
147
-
|**Configure backups as [immutable](/azure/storage/blobs/immutable-storage-overview)**| Not supported | Not supported |Not supported|
147
+
|**Configure backups as [immutable](/azure/storage/blobs/immutable-storage-overview)**| Not supported | Not supported |[Supported](backup-immutability.md) (in Preview)|
148
148
|**Restoring a new database in the same region**| Supported | Supported | Supported |
149
149
|**Restoring a new database in another region**| Not supported | Supported in any Azure region | Supported in any Azure region |
150
150
|**Restoring a new database in another subscription**| Not supported | Not supported<sup>3</sup> | Not supported<sup>3</sup> |
In this article, learn how to configure **legal hold backup immutability** for long-term retention (LTR) backups in Azure SQL Database.
19
+
20
+
[Backup immutability for long-term retention backups](backup-immutability.md) is available in two modes: time-based immutability and legal hold immutability.
21
+
22
+
Once locked with legal hold backup immutability, backups can't be deleted or modified until legal hold backup immutability is manually removed.
23
+
24
+
## Prerequisites
25
+
26
+
1. An active Azure subscription.
27
+
1. An existing Azure SQL Database.
28
+
1. Existing long-term retention (LTR) backups.
29
+
30
+
## Permissions
31
+
32
+
You need to be a member of the Subscription Contributor role or higher permissions for the logical server of the Azure SQL Database to configure backup immutability for LTR backups and delete LTR backups.
33
+
34
+
For permissions to view, managed, and delete LTR backups, see [Manage Azure SQL Database long-term backup retention](long-term-backup-retention-configure.md#permissions).
35
+
36
+
## Enable legal hold immutability for existing LTR backups
37
+
38
+
You can enable legal hold immutability on any existing backups. These backups are protected from any edits or deletes until the legal hold is explicitly removed.
39
+
40
+
> [!IMPORTANT]
41
+
> Legal hold backup immutability can apply only to existing backups. To make future backups automatically immutable, instead use [time-based immutability](backup-immutability-time-based.md).
42
+
43
+
#### [Azure portal](#tab/azure-portal)
44
+
45
+
**To enable legal hold backup immutability from the Azure portal:**
46
+
47
+
1. Navigate to your Azure SQL Database logical server.
48
+
1. Under **Data management**, navigate to the **Backups** tab.
49
+
1. For the desised database, under **Available LTR Backups**, select **Manage**.
50
+
1. Select one or more available backups.
51
+
1. Select **Enable Legal Hold** to enable legal hold immutability.
52
+
53
+
:::image type="content" source="media/backup-immutability-legal-hold/enable-legal-hold.png" alt-text="Screenshot from the Azure portal showing how to enable Legal Hold backup immutability on a backup." lightbox="media/backup-immutability-legal-hold/enable-legal-hold.png":::
54
+
55
+
#### [PowerShell](#tab/azure-powershell)
56
+
57
+
**To enable legal hold backup immutability with PowerShell:**
58
+
59
+
```powershell
60
+
Set-AzSqlDatabaseLongTermRetentionBackupLegalHold
61
+
-Location southeastasia
62
+
-ServerName myAzureSQL
63
+
-DatabaseName mysqldb
64
+
-BackupName 'myLTRbackup-1-24'
65
+
```
66
+
67
+
---
68
+
69
+
## Remove legal hold immutability
70
+
71
+
Legal hold immutability on specific backups can be disabled as follows:
72
+
73
+
#### [Azure portal](#tab/azure-portal)
74
+
75
+
**To remove legal hold immutability from a backup from the Azure portal:**
76
+
77
+
1. Navigate to your Azure SQL Database logical server.
78
+
1. Under **Data management**, navigate to the **Backups** tab.
79
+
1. Go to the **Manage** section under **Available LTR Backups**.
80
+
1. Select one or more backups.
81
+
1. Select **Disable Legal Hold** to remove legal hold immutability.
82
+
83
+
#### [PowerShell](#tab/azure-powershell)
84
+
85
+
**To remove legal hold immutability from a backup with PowerShell:**
0 commit comments