Skip to content

Commit d52d020

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/sql-docs-pr into 20221209-faq
2 parents 72656f1 + c610905 commit d52d020

979 files changed

Lines changed: 6419 additions & 5715 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 54 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -42600,7 +42600,7 @@
4260042600
"redirect_url": "/sql/relational-databases/performance/performance-center-for-sql-server-database-engine-and-azure-sql-database",
4260142601
"redirect_document_id": false
4260242602
},
42603-
{
42603+
{
4260442604
"source_path": "docs/advanced-analytics/r/sql-server-r-services.md",
4260542605
"redirect_url": "/sql/machine-learning/r/sql-server-r-services",
4260642606
"redirect_document_id": true
@@ -43096,14 +43096,14 @@
4309643096
"redirect_document_id": true
4309743097
},
4309843098
{
43099-
"source_path": "docs/database-engine/install-windows/are-you-upgrading-from-sql-server-2005.md",
43100-
"redirect_url": "/sql/sql-server/end-of-support/sql-server-end-of-support-overview",
43101-
"redirect_document_id": false
43099+
"source_path": "docs/database-engine/install-windows/are-you-upgrading-from-sql-server-2005.md",
43100+
"redirect_url": "/sql/sql-server/end-of-support/sql-server-end-of-support-overview",
43101+
"redirect_document_id": false
4310243102
},
4310343103
{
43104-
"source_path": "docs/lp/sql-server/load-move-data.md",
43105-
"redirect_url": "/sql/sql-server/migrate/",
43106-
"redirect_document_id": true
43104+
"source_path": "docs/lp/sql-server/load-move-data.md",
43105+
"redirect_url": "/sql/sql-server/migrate/",
43106+
"redirect_document_id": true
4310743107
},
4310843108
{
4310943109
"source_path": "docs/2014/2014-toc/books-online-for-sql-server-2014.md",
@@ -43784,12 +43784,12 @@
4378443784
"source_path": "docs/linux/sql-server-linux-shared-disk-cluster-red-hat-7-troubleshoot.md",
4378543785
"redirect_url": "/sql/linux/sql-server-linux-shared-disk-cluster-red-hat-7-operate",
4378643786
"redirect_document_id": true
43787-
},
43787+
},
4378843788
{
4378943789
"source_path": "docs/lp/sql-server/install-sql-and-services.md",
4379043790
"redirect_url": "/sql/sql-server/",
4379143791
"redirect_document_id": false
43792-
},
43792+
},
4379343793
{
4379443794
"source_path": "docs/lp/sql-server/business-continuity.md",
4379543795
"redirect_url": "/sql/sql-server/",
@@ -59156,14 +59156,14 @@
5915659156
"redirect_document_id": false
5915759157
},
5915859158
{
59159-
"source_path": "docs/azure-data-studio/tutorial-create-extension.md",
59160-
"redirect_url": "/sql/azure-data-studio/extensions/keymap-extension",
59161-
"redirect_document_id": false
59159+
"source_path": "docs/azure-data-studio/tutorial-create-extension.md",
59160+
"redirect_url": "/sql/azure-data-studio/extensions/keymap-extension",
59161+
"redirect_document_id": false
5916259162
},
5916359163
{
59164-
"source_path": "docs/linux/sql-server-linux-configure-docker.md",
59165-
"redirect_url": "/sql/linux/sql-server-linux-docker-container-deployment",
59166-
"redirect_document_id": true
59164+
"source_path": "docs/linux/sql-server-linux-configure-docker.md",
59165+
"redirect_url": "/sql/linux/sql-server-linux-docker-container-deployment",
59166+
"redirect_document_id": true
5916759167
},
5916859168
{
5916959169
"source_path": "docs/azure-data-studio/azure-sql-managed-instance-extension.md",
@@ -59529,6 +59529,45 @@
5952959529
"source_path": "docs/relational-databases/system-tables/cdc-change-feed-settings.md",
5953059530
"redirect_url": "/sql/relational-databases/system-tables/changefeed-change-feed-settings",
5953159531
"redirect_document_id": false
59532+
},
59533+
{
59534+
"source_path": "docs/relational-databases/errors-events/mssqlserver-neg2-database-engine-error.md",
59535+
"redirect_url": "/troubleshoot/sql/connect/timeout-expired-error",
59536+
"redirect_document_id": false
59537+
},
59538+
{
59539+
"source_path": "docs/relational-databases/errors-events/mssqlserver-1-database-engine-error.md",
59540+
"redirect_url": "/troubleshoot/sql/connect/network-related-or-instance-specific-error-occurred-while-establishing-connection",
59541+
"redirect_document_id": false
59542+
},
59543+
{
59544+
"source_path": "docs/relational-databases/errors-events/mssqlserver-2-database-engine-error.md",
59545+
"redirect_url": "/troubleshoot/sql/connect/network-related-or-instance-specific-error-occurred-while-establishing-connection",
59546+
"redirect_document_id": false
59547+
},
59548+
{
59549+
"source_path": "docs/relational-databases/errors-events/mssqlserver-53-database-engine-error.md",
59550+
"redirect_url": "/troubleshoot/sql/connect/network-related-or-instance-specific-error-occurred-while-establishing-connection",
59551+
},
59552+
{
59553+
"source_path": "azure-sql/database/sql-vulnerability-assessment.md",
59554+
"redirect_url": "/defender-for-cloud/sql-azure-vulnerability-assessment-overview",
59555+
"redirect_document_id": false
59556+
},
59557+
{
59558+
"source_path": "docs/database-engine/configure-windows/enable-encrypted-connections-to-the-database-engine.md",
59559+
"redirect_url": "/sql/database-engine/configure-windows/configure-sql-server-encryption",
59560+
"redirect_document_id": false
59561+
},
59562+
{
59563+
"source_path": "docs/relational-databases/performance/parameter-sensitivity-plan-optimization.md",
59564+
"redirect_url": "/sql/relational-databases/performance/parameter-sensitive-plan-optimization",
59565+
"redirect_document_id": false
59566+
},
59567+
{
59568+
"source_path": "docs/ssma/db2/working-with-ssma-for-oracle-console-db2tosql.md",
59569+
"redirect_url": "/sql/ssma/db2/working-with-ssma-for-db2-console-db2tosql",
59570+
"redirect_document_id": false
5953259571
}
5953359572
]
5953459573
}

azure-sql/database/active-geo-replication-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -167,7 +167,7 @@ To create a geo-secondary in a subscription different from the subscription of t
167167
alter role db_owner add member geodrsetup;
168168
```
169169

170-
7. In the master database on the **secondary** server, create the same login as on the primary server, using the same name, password, and SID. Replace the hexadecimal SID value in the sample command below with the one obtained in Step 4.
170+
7. In the `master` database on the **secondary** server, create the same login as on the primary server, using the same name, password, and SID. Replace the hexadecimal SID value in the sample command below with the one obtained in Step 4.
171171

172172
```sql
173173
create login geodrsetup with password = 'ComplexPassword01', sid=0x010600000000006400000000000000001C98F52B95D9C84BBBA8578FACE37C3E;
@@ -180,7 +180,7 @@ To create a geo-secondary in a subscription different from the subscription of t
180180
alter role dbmanager add member geodrsetup;
181181
```
182182

183-
9. Connect to the master database on the **primary** server using the new `geodrsetup` login, and initiate geo-secondary creation on the secondary server. Adjust database name and secondary server name as needed. Once the command is executed, you can monitor geo-secondary creation by querying the [sys.dm_geo_replication_link_status](/sql/relational-databases/system-dynamic-management-views/sys-dm-geo-replication-link-status-azure-sql-database) view in the **primary** database, and the [sys.dm_operation_status](/sql/relational-databases/system-dynamic-management-views/sys-dm-operation-status-azure-sql-database) view in the master database on the **primary** server. The time needed to create a geo-secondary depends on the primary database size.
183+
9. Connect to the `master` database on the **primary** server using the new `geodrsetup` login, and initiate geo-secondary creation on the secondary server. Adjust database name and secondary server name as needed. Once the command is executed, you can monitor geo-secondary creation by querying the [sys.dm_geo_replication_link_status](/sql/relational-databases/system-dynamic-management-views/sys-dm-geo-replication-link-status-azure-sql-database) view in the **primary** database, and the [sys.dm_operation_status](/sql/relational-databases/system-dynamic-management-views/sys-dm-operation-status-azure-sql-database) view in the `master` database on the **primary** server. The time needed to create a geo-secondary depends on the primary database size.
184184

185185
```sql
186186
alter database [dbrep] add secondary on server [servername];

azure-sql/database/active-geo-replication-security-configure.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -17,20 +17,20 @@ This article describes the authentication requirements to configure and control
1717

1818
## Disaster recovery with contained users
1919

20-
Unlike traditional users, which must be mapped to logins in the master database, a contained user is managed completely by the database itself. This has two benefits. In the disaster recovery scenario, the users can continue to connect to the new primary database or the database recovered using geo-restore without any additional configuration, because the database manages the users. There are also potential scalability and performance benefits from this configuration from a login perspective. For more information, see [Contained Database Users - Making Your Database Portable](/sql/relational-databases/security/contained-database-users-making-your-database-portable).
20+
Unlike traditional users, which must be mapped to logins in the `master` database, a contained user is managed completely by the database itself. This has two benefits. In the disaster recovery scenario, the users can continue to connect to the new primary database or the database recovered using geo-restore without any additional configuration, because the database manages the users. There are also potential scalability and performance benefits from this configuration from a login perspective. For more information, see [Contained Database Users - Making Your Database Portable](/sql/relational-databases/security/contained-database-users-making-your-database-portable).
2121

22-
The main trade-off is that managing the disaster recovery process at scale is more challenging. When you have multiple databases that use the same login, maintaining the credentials using contained users in multiple databases may negate the benefits of contained users. For example, the password rotation policy requires that changes be made consistently in multiple databases rather than changing the password for the login once in the master database. For this reason, if you have multiple databases that use the same user name and password, using contained users is not recommended.
22+
The main trade-off is that managing the disaster recovery process at scale is more challenging. When you have multiple databases that use the same login, maintaining the credentials using contained users in multiple databases may negate the benefits of contained users. For example, the password rotation policy requires that changes be made consistently in multiple databases rather than changing the password for the login once in the `master` database. For this reason, if you have multiple databases that use the same user name and password, using contained users is not recommended.
2323

2424
## How to configure logins and users
2525

26-
If you are using logins and users (rather than contained users), you must take extra steps to ensure that the same logins exist in the master database. The following sections outline the steps involved and additional considerations.
26+
If you are using logins and users (rather than contained users), you must take extra steps to ensure that the same logins exist in the `master` database. The following sections outline the steps involved and additional considerations.
2727

2828
>[!NOTE]
2929
> It is also possible to use Azure Active Directory (AAD) logins to manage your databases. For more information, see [Azure SQL logins and users](./logins-create-manage.md).
3030
3131
### Set up user access to a secondary or recovered database
3232

33-
In order for the secondary database to be usable as a read-only secondary database, and to ensure proper access to the new primary database or the database recovered using geo-restore, the master database of the target server must have the appropriate security configuration in place before the recovery.
33+
In order for the secondary database to be usable as a read-only secondary database, and to ensure proper access to the new primary database or the database recovered using geo-restore, the `master` database of the target server must have the appropriate security configuration in place before the recovery.
3434

3535
The specific permissions for each step are described later in this topic.
3636

@@ -43,7 +43,7 @@ Setting up logins on the target server involves three steps outlined below:
4343

4444
#### 1. Determine logins with access to the primary database
4545

46-
The first step of the process is to determine which logins must be duplicated on the target server. This is accomplished with a pair of SELECT statements, one in the logical master database on the source server and one in the primary database itself.
46+
The first step of the process is to determine which logins must be duplicated on the target server. This is accomplished with a pair of SELECT statements, one in the logical `master` database on the source server and one in the primary database itself.
4747

4848
Only the server admin or a member of the **LoginManager** server role can determine the logins on the source server with the following SELECT statement.
4949

azure-sql/database/always-encrypted-enclaves-getting-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -361,7 +361,7 @@ In this step, you'll encrypt the data stored in the **SSN** and **Salary** colum
361361
1. Open a new SSMS instance and connect to your database **with** Always Encrypted enabled for the database connection.
362362
1. Start a new instance of SSMS.
363363
2. In the **Connect to Server** dialog, specify the fully qualified name of your server (for example, *myserver135.database.windows.net*), and enter the administrator user name and the password you specified when you created the server.
364-
3. Select **Options >>** and select the **Connection Properties** tab. Make sure to select the **ContosoHR** database (not the default, master database).
364+
3. Select **Options >>** and select the **Connection Properties** tab. Make sure to select the **ContosoHR** database (not the default, `master` database).
365365
4. Select the **Always Encrypted** tab.
366366
5. Select the **Enable Always Encrypted (column encryption)** checkbox.
367367
6. Select **Enable secure enclaves**. (This step applies to SSMS 19 or later.)

azure-sql/database/arm-templates-content-guide.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,6 @@ The following table includes links to Azure Resource Manager templates for Azure
2626
| [Server](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.sql/sql-logical-server) | This Azure Resource Manager template creates a server for Azure SQL Database. |
2727
| [Elastic pool](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.sql/sql-elastic-pool-create) | This template allows you to deploy an elastic pool and to assign databases to it. |
2828
| [Failover groups](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.sql/sql-with-failover-group) | This template creates two servers, a single database, and a failover group in Azure SQL Database.|
29-
| [Threat Detection](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.sql/sql-threat-detection-db-policy-multiple-databases) | This template allows you to deploy a server and a set of databases with Threat Detection enabled, with an email address for alerts for each database. Threat Detection is part of the SQL Advanced Threat Protection (ATP) offering and provides a layer of security that responds to potential threats over servers and databases.|
3029
| [Auditing to Azure Blob storage](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.sql/sql-auditing-server-policy-to-blob-storage) | This template allows you to deploy a server with auditing enabled to write audit logs to a Blob storage. Auditing for Azure SQL Database tracks database events and writes them to an audit log that can be placed in your Azure storage account, OMS workspace, or Event Hubs.|
3130
| [Auditing to Azure Event Hub](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.sql/sql-auditing-server-policy-to-eventhub) | This template allows you to deploy a server with auditing enabled to write audit logs to an existing event hub. In order to send audit events to Event Hubs, set auditing settings with `Enabled` `State`, and set `IsAzureMonitorTargetEnabled` as `true`. Also, configure Diagnostic Settings with the `SQLSecurityAuditEvents` log category on the `master` database (for server-level auditing). Auditing tracks database events and writes them to an audit log that can be placed in your Azure storage account, OMS workspace, or Event Hubs.|
3231
| [Azure Web App with SQL Database](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.web/web-app-sql-database) | This sample creates a free Azure web app and a database in Azure SQL Database at the "Basic" service level.|

azure-sql/database/auditing-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ An auditing policy can be defined for a specific database or as a default [serve
8484

8585
## <a id="setup-auditing"></a>Set up auditing for your server
8686

87-
The default auditing policy includes all actions and the following set of action groups, which will audit all the queries and stored procedures executed against the database, as well as successful and failed logins:
87+
The default auditing policy includes the following set of action groups, which will audit all the queries and stored procedures executed against the database, as well as successful and failed logins:
8888

8989
- BATCH_COMPLETED_GROUP
9090
- SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP

0 commit comments

Comments
 (0)