You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/sql-server/azure-arc/connect-at-scale.md
+57-5Lines changed: 57 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,20 +16,20 @@ This article describes how to connect multiple instances of SQL Server to Azure
16
16
17
17
## Connecting at-scale using Azure policy
18
18
19
-
You can automatically register the SQL Server instances on multiple machines using a built-in Azure policy _Configure SQL Server extension on Azure Arc enabled servers_. This policy is disabled by default. If you assign this policy to a scope of your choice, it will install the SQL Server extension (*WindowsAgent.SqlServer*) on all Azure Arc connected servers in the specified scope. Once installed, the extension will register the SQL Server instances on the machine with Azure. After that, the extension will run continuously to detect changes of the SQL Server configuration and synchronize them with Azure. For example, if a new SQL Server instance is installed on the machine, the extension automatically registers it with Azure. See [Azure Policy documentation](/azure/governance/policy) for instructions how to assign an Azure policy using Azure portal or an API of your choice.
19
+
You can automatically connect the SQL Server instances on multiple machines using a built-in Azure policy _Configure SQL Server extension on Azure Arc enabled servers_. This policy is disabled by default. If you assign this policy to a scope of your choice, it will install the SQL Server extension (*WindowsAgent.SqlServer*) on all Azure Arc connected servers in the specified scope. Once installed, the extension will connect the SQL Server instances on the machine with Azure. After that, the extension will run continuously to detect changes of the SQL Server configuration and synchronize them with Azure. For example, if a new SQL Server instance is installed on the machine, the extension automatically connect it to Azure. See [Azure Policy documentation](/azure/governance/policy) for instructions how to assign an Azure policy using Azure portal or an API of your choice.
20
20
21
21
> [!IMPORTANT]
22
22
> The __SQL Server - Azure Arc__ resources for the SQL Server instances will be created in the same region and the resource group as the corresponding __Machine - Azure Arc__ resource. Because the SQL Serve extension synchronizes with Azure once an hour, it may take up to one hour before these resources are created.
23
23
24
24
## Connecting multiple SQL Server instances using script
25
25
26
-
You can connect multiple SQL Server instances installed on multiple Windows or Linux machines to Azure Arc using the same [script your generated for a single machine](connect.md). The script will connect and register each machine and the installed SQL Server instances on it to Azure Arc. For the best experience, we recommend using an Azure Active Directory [service principal](/azure/active-directory/develop/app-objects-and-service-principals). A service principal is a special limited management identity that is granted only the minimum permission necessary to connect machines to Azure and to create the Azure resources for Azure Arc-enabled servers. This is safer than using a higher privileged account like a Tenant Administrator, and follows our access control security best practices.
26
+
You can connect multiple SQL Server instances installed on multiple Windows or Linux machines to Azure Arc using the same [script your generated for a single machine](connect.md). The script will connect and connect each machine and the installed SQL Server instances on it to Azure Arc. For the best experience, we recommend using an Azure Active Directory [service principal](/azure/active-directory/develop/app-objects-and-service-principals). A service principal is a special limited management identity that is granted only the minimum permission necessary to connect machines to Azure and to create the Azure resources for Azure Arc-enabled servers. This is safer than using a higher privileged account like a Tenant Administrator, and follows our access control security best practices.
27
27
28
-
You can connect multiple SQL Server instances installed on multiple Windows or Linux machines to Azure Arc using the same [script your generated for a single machine](connect.md). The script connects and registers each machine and the installed SQL Server instances to Azure Arc.
28
+
You can connect multiple SQL Server instances installed on multiple Windows or Linux machines to Azure Arc using the same [script your generated for a single machine](connect.md). The script connects each machine and the installed SQL Server instances to Azure.
29
29
30
30
### Use Azure Active Directory service principal
31
31
32
-
For the best experience, use an Azure Active Directory [service principal](/azure/active-directory/develop/app-objects-and-service-principals). A service principal is a special limited management identity that is granted only the minimum permission necessary to connect machines to Azure and to create the Azure resources for Azure Arc enabled server and Azure Arc enabled SQL Server. The service principal is safer than using a higher privileged account like a Tenant Administrator, and follows access control security best practices.
32
+
For the best experience, use an Azure Active Directory [service principal](/azure/active-directory/develop/app-objects-and-service-principals). A service principal is a special limited management identity that is granted only the minimum permission necessary to connect machines and SQL Server instances to Azure. The service principal is safer than using a higher privileged account like a Tenant Administrator, and follows access control security best practices.
33
33
34
34
The installation methods to install and configure the Connected Machine agent requires that the automated method you use has administrator permissions on the machines. On Linux, use the root account. Windows, use a member of the Local Administrators group.
35
35
@@ -134,10 +134,62 @@ Each target machine must have the [Azure CLI installed](/cli/azure/install-azure
134
134
135
135
## Validate successful onboarding
136
136
137
-
After you register SQL Server instances with Azure Arc enabled SQL Server, go to the [Azure portal](https://aka.ms/azureportal) and view the newly created Azure Arc resources. You will see a new __Machine - Azure Arc__ for each connected machine and a new __SQL Server - Azure Arc__ resource for each connected SQL Server instance.
137
+
After you connected the SQL Server instances to Azure, go to the [Azure portal](https://aka.ms/azureportal) and view the newly created Azure Arc resources. You should see a new __Machine - Azure Arc__ for each connected machine and a new __SQL Server - Azure Arc__ resource for each connected SQL Server instance within approximately 1 minute. If these resource are not created means, something wrong happened with the extension installation and activation process. See [Troubleshoot SQL Server extension](./connect-at-scale.md#troubleshoot-sql-server-extension) for the troubleshooting options.
The failure to create the __SQL Server - Azure Arc__ resource could be caused by several issues.
150
+
151
+
### Extension installation failed
152
+
153
+
Go to the connected server and check the deployer log. You should see the below messages.
154
+
155
+
`[07/14/2021 18:56:45 UTC] [INFO] Status of service 'SqlServerExtension' before attempting start: Stopped`
156
+
`[07/14/2021 18:56:45 UTC] [INFO] Status of service 'SqlServerExtension' after attempting start: Stopped`
157
+
158
+
If you cannot see it means the extension did not install properly. Try the following steps.
159
+
160
+
1. Check event logs to see if anything preventing installation. Try installing SqlServerExtension.msi from the following folder `C:\Packages\Plugins\Microsoft.AzureData.WindowsAgent.SqlServer{version}`. The installation UI may provide the error details.
161
+
162
+
2. Close services app, server manager and retry one of the [connection methods](./connect.md) to install the extension, and see if that helps.
163
+
164
+
### Extension installed but did not start
165
+
166
+
Check the log files for any application errors.
167
+
168
+
### The extension SQL Server is not present on the machine
169
+
170
+
Check if SQL server installed.
171
+
172
+
### Machine - Azure Arc ARM resource was manually deleted
173
+
174
+
Check the extension log for the following record:
175
+
`[7/14/2021 9:36:18 PM UTC] [ERROR] [UploadServiceProvider] [ExtensionHandlerStatusQueryError] ArcSqlInstancesRequest request is null, not sending data to RP.`
176
+
177
+
This means the machine is no longer recognized as a connected server. [Onboard the server to Azure Arc](/azure/azure-arc/servers/onboard-portal) and retry one of the [connection methods](./connect.md) to install the extension.
178
+
179
+
### Server managed identity has insufficient permissions
180
+
181
+
Check the extension log for the following record:
182
+
`[7/14/2021 5:16:14 PM UTC] [INFO] [UploadServiceProvider] [ExtensionHandlerArcUploadServicesNotifications] [AzureUpload] Arc post request failed with error: Forbidden message: {"ErrorDescription":{"ErrorCode":6,"Message":"The user has no access to the provided Azure resource."},"ResponseUrl":null}`
183
+
184
+
Make sure the machine's managed identity has been assigned the _Azure Connected SQL Server Onboarding_ role. See [Initiate the connection from Azure](./connect.md#initiate-the-connection-from-azure) for the role assignment instructions.
185
+
186
+
### The user did not migrate the __SQL Server - Azure Arc__ resource to the new resource provider
187
+
188
+
Check the extension log for the following record:
189
+
`[7/14/2021 5:35:04 PM UTC] [INFO] [UploadServiceProvider] [ExtensionHandlerArcUploadServicesNotifications] [AzureUpload] Arc for Sql Server upload response status: InternalServerError.`
190
+
191
+
Make sure to migrate the __SQL Server - Azure Arc__ resource to `Microsoft.AzureArcData` following [these steps](.\release-notes.md##breaking-change-1).
192
+
141
193
## Next steps
142
194
143
195
- Learn how to manage your machine using [Azure Policy](/azure/governance/policy/overview), for such things as VM [guest configuration](/azure/governance/policy/concepts/guest-configuration), verifying the machine is reporting to the expected Log Analytics workspace, enable monitoring with [Azure Monitor with VMs](/azure/azure-monitor/insights/vminsights-enable-policy), and much more.
Copy file name to clipboardExpand all lines: docs/sql-server/azure-arc/overview.md
+3-7Lines changed: 3 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,13 +11,9 @@ ms.prod: sql
11
11
ms.custom: references_regions
12
12
---
13
13
14
-
# Azure Arcenabled SQL Server
14
+
# SQL Server on Azure Arc-enabled servers
15
15
16
-
You can manage your instances of SQL Server from Azure with Azure Arc enabled SQL Server.
17
-
18
-
19
-
20
-
Azure Arc enabled SQL Server is part of the [Azure Arc enabled servers](/azure/azure-arc/servers/overview). It extends Azure services to SQL Server instances hosted outside of Azure; in your datacenter, on the edge, or in a multi-cloud environment.
16
+
You can manage the SQL Server instances from Azure. __SQL Server on Azure Arc-enabled servers__ is part of the [Azure Arc enabled servers](/azure/azure-arc/servers/overview). It extends Azure services to SQL Server instances hosted outside of Azure; in your datacenter, on the edge, or in a multi-cloud environment.
21
17
22
18
To enable Azure services, register a running SQL Server instance with Azure Arc using the Azure portal and a registration script. The registration will install a SQL Arc extension to the [Connected Machine agent](/azure/azure-arc/servers/agent-overview), which in turn will a __SQL Server – Azure Arc__ resource representing each SQL Server instance installed on that machine. The properties of this resource reflect a subset of the SQL Server configuration settings.
23
19
@@ -27,7 +23,7 @@ The SQL Server instance can be installed in a virtual or physical machine runnin
27
23
28
24
The Connected Machine agent communicates outbound securely to Azure Arc over TCP port 443. If the machine connects through a firewall or an HTTP proxy server to communicate over the Internet, review the [network configuration requirements for the Connected Machine agent](/azure/azure-arc/servers/agent-overview#prerequisites).
29
25
30
-
Azure Arcenabled SQL Server supports a set of solutions that require the Microsoft Monitoring Agent (MMA) server extension to be installed and connected to an Azure Log analytics workspace for data collection and reporting. These solutions include Advanced data security using Azure Security Center and Azure Sentinel, and SQL Environment health checks using On-demand SQL Assessment feature.
26
+
__SQL Server on Azure Arc-enabled servers__ supports a set of solutions that require the Microsoft Monitoring Agent (MMA) server extension to be installed and connected to an Azure Log analytics workspace for data collection and reporting. These solutions include Advanced data security using Azure Security Center and Azure Sentinel, and SQL Environment health checks using On-demand SQL Assessment feature.
31
27
32
28
The following diagram illustrates the architecture of Azure Arc enable SQL Server.
0 commit comments