You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-sql/database/sql-database-vulnerability-assessment-storage.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,7 +67,7 @@ Since Azure SQL Managed Instance isn't a trusted Microsoft Service and has a dif
67
67
To support VA scans on Azure SQL Managed Instances that **have the November 2022 feature wave installed**, follow the below steps:
68
68
69
69
1. Under the Azure SQL Managed Instance's **Overview** page, note the value under **Virtual network / subnet**.
70
-
70
+
71
71
1. Head to the **Networking** page in the storage account where SQL VA is configured to store the scan results.
72
72
73
73
1. Under the **Firewalls and virtual networks** tab, under **Public network access** select **Enabled from selected virtual networks and IP addresses**.
@@ -76,7 +76,6 @@ To support VA scans on Azure SQL Managed Instances that **have the November 2022
76
76
77
77
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/storage-networking-post-nov-22-wave.png" alt-text="Screenshot of storage account networking settings for Nov22 feature wave (and up)." lightbox="media/sql-database-vulnerability-assessment-storage/storage-networking-post-nov-22-wave.png":::
78
78
79
-
80
79
To support VA scans on Azure SQL Managed Instances that **do not have the November 2022 feature wave installed**, follow the below steps:
81
80
82
81
1. In the **SQL managed instance** pane, under the **Overview** heading, click the **Virtual network/subnet** link. This takes you to the **Virtual network** pane.
@@ -87,6 +86,11 @@ To support VA scans on Azure SQL Managed Instances that **do not have the Novemb
87
86
88
87
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/mi-add-subnet.png" alt-text="Screenshot shows a list of subnets and the add subnet option." lightbox="media/sql-database-vulnerability-assessment-storage/mi-add-subnet.png" :::
89
88
89
+
1. Traffic from the instance in the default managed instance subnet to Azure Resource Manager must be routed through the internet. Therefore, a route with the next hop being the internet and the destination tag being the appropriate UDR tag for the Azure Resource Manager address range must be assigned to the subnet where the managed instance is located.
90
+
This route will be added automatically in new deployments, but needs to be added again if it was removed.
91
+
92
+
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/managed-instance-post-nov-22-required-routing-settings.png" alt-text="Screenshot that shows the required route for the November 22 feature wave and later." lightbox="media/sql-database-vulnerability-assessment-storage/managed-instance-post-nov-22-required-routing-settings.png":::
93
+
90
94
1. The new subnet should have the following configurations:
91
95
92
96
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/mi-add-subnet-details.png" alt-text="Screenshot shows a subnet called VA and its settings.":::
Copy file name to clipboardExpand all lines: docs/includes/big-data-clusters-master-instance-ha-endpoint-requirement.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,6 @@ ms.service: sql
6
6
ms.topic: include
7
7
---
8
8
9
-
Certain operations, including configuring server (instance level) settings, or manually adding a database to an availability group, require a connection to the SQL Server Instance. Operations like `sp_configure`, `RESTORE DATABASE`, or any DDL command in a database belonging to an availability group require a connection to the SQL Server instance. By default, a big data cluster does not include an endpoint that enables a connection to the instance. You must expose this endpoint manually.
9
+
Certain operations, including configuring server (instance level) settings, or manually adding a database to an availability group, require a connection to the SQL Server instance. Operations like `sp_configure`, `RESTORE DATABASE`, or any DDL command in a database belonging to an availability group require a connection to the SQL Server instance. By default, a big data cluster does not include an endpoint that enables a connection to the instance. You must expose this endpoint manually.
10
10
11
11
For instructions, see [Connect to databases on the primary replica](../big-data-cluster/deployment-high-availability.md#instance-connect).
Copy file name to clipboardExpand all lines: docs/relational-databases/backup-restore/back-up-database-backup-options-page.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,7 +38,7 @@ f1_keywords:
38
38
For information about backup sets, see [Media Sets, Media Families, and Backup Sets (SQL Server)](../../relational-databases/backup-restore/media-sets-media-families-and-backup-sets-sql-server.md).
39
39
40
40
**Description**
41
-
Enter a description of the backup set. The description value is available in the `description` column of [`backupset` (Transact-SQL)](/sql/relational-databases/system-tables/backupset-transact-sql).
41
+
Enter a description of the backup set. The description value is available in the `description` column of [`backupset` (Transact-SQL)](../system-tables/backupset-transact-sql.md).
42
42
43
43
**Backup set will expire**
44
44
Choose one of the following expiration options. This option is disabled if **URL** is chosen as the backup destination.
0 commit comments