Skip to content

Commit f03c04b

Browse files
Merge branch 'MicrosoftDocs:main' into main
2 parents ee61064 + 5a8d85b commit f03c04b

330 files changed

Lines changed: 1801 additions & 1590 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

azure-sql/database/connectivity-architecture.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.topic: conceptual
1313
author: rohitnayakmsft
1414
ms.author: rohitna
1515
ms.reviewer: wiassaf, mathoma, vanto
16-
ms.date: 03/18/2022
16+
ms.date: 07/13/2022
1717
---
1818
# Azure SQL Database and Azure Synapse Analytics connectivity architecture
1919
[!INCLUDE[appliesto-sqldb-asa](../includes/appliesto-sqldb-asa.md)]
@@ -41,9 +41,9 @@ Servers in SQL Database and Azure Synapse support the following three options fo
4141
- **Redirect (recommended):** Clients establish connections directly to the node hosting the database, leading to reduced latency and improved throughput. For connections to use this mode, clients need to:
4242
- Allow outbound communication from the client to all Azure SQL IP addresses in the region on ports in the range of 11000 to 11999. Use the Service Tags for SQL to make this easier to manage.
4343
- Allow outbound communication from the client to Azure SQL Database gateway IP addresses on port 1433.
44-
44+
- When using the Redirect connection policy, refer to the [Azure IP Ranges and Service Tags – Public Cloud](https://www.microsoft.com/download/details.aspx?id=56519) for a list of your region's IP addresses to allow.
4545
- **Proxy:** In this mode, all connections are proxied via the Azure SQL Database gateways, leading to increased latency and reduced throughput. For connections to use this mode, clients need to allow outbound communication from the client to Azure SQL Database gateway IP addresses on port 1433.
46-
46+
- When using the Proxy connection policy, refer to the [Gateway IP addresses](#gateway-ip-addresses) list later in this article for your region's IP addresses to allow.
4747
- **Default:** This is the connection policy in effect on all servers after creation unless you explicitly alter the connection policy to either `Proxy` or `Redirect`. The default policy is`Redirect` for all client connections originating inside of Azure (for example, from an Azure Virtual Machine) and `Proxy`for all client connections originating outside (for example, connections from your local workstation).
4848

4949
We highly recommend the `Redirect` connection policy over the `Proxy` connection policy for the lowest latency and highest throughput. However, you will need to meet the additional requirements for allowing network traffic as outlined above. If the client is an Azure Virtual Machine, you can accomplish this using Network Security Groups (NSG) with [service tags](/azure/virtual-network/network-security-groups-overview#service-tags). If the client is connecting from a workstation on-premises then you may need to work with your network admin to allow network traffic through your corporate firewall.

azure-sql/database/connectivity-settings.md

Lines changed: 68 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: how-to
1010
author: rohitnayakmsft
1111
ms.author: rohitna
1212
ms.reviewer: wiassaf, mathoma, vanto
13-
ms.date: 08/03/2021
13+
ms.date: 07/14/2022
1414
ms.custom:
1515
- "devx-track-azurepowershell"
1616
- "devx-track-azurecli"
@@ -23,21 +23,20 @@ ms.devlang:
2323

2424
This article introduces settings that control connectivity to the server for Azure SQL Database and [dedicated SQL pool (formerly SQL DW)](/azure/synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is) in Azure Synapse Analytics. These settings apply to all SQL Database and dedicated SQL pool (formerly SQL DW) databases associated with the server.
2525

26-
> [!IMPORTANT]
27-
> This article doesn't apply to Azure SQL Managed Instance. This article also does not apply to dedicated SQL pools in Azure Synapse Analytics workspaces. See [Azure Synapse Analytics IP firewall rules](/azure/synapse-analytics/security/synapse-workspace-ip-firewall) for guidance on how to configure IP firewall rules for Azure Synapse Analytics with workspaces.
2826

29-
The connectivity settings are accessible from the **Firewalls and virtual networks** screen as shown in the following screenshot:
27+
You can change these settings from the networking tab of your [logical server](logical-servers.md):
3028

31-
:::image type="content" source="media/single-database-create-quickstart/manage-connectivity-settings.png" alt-text="Screenshot of the Firewalls and virtual networks settings in Azure portal for SQL server":::
29+
:::image type="content" source="media/connectivity-settings/manage-connectivity-settings.png" alt-text="Screenshot of the Firewalls and virtual networks settings in Azure portal for SQL server.":::
30+
31+
> [!IMPORTANT]
32+
> This article doesn't apply to Azure SQL Managed Instance. This article also does not apply to dedicated SQL pools in Azure Synapse Analytics workspaces. See [Azure Synapse Analytics IP firewall rules](/azure/synapse-analytics/security/synapse-workspace-ip-firewall) for guidance on how to configure IP firewall rules for Azure Synapse Analytics with workspaces.
3233
33-
> [!NOTE]
34-
> These settings take effect immediately after they're applied. Your customers might experience connection loss if they don't meet the requirements for each setting.
3534

3635
## Deny public network access
3736

38-
The default for this setting is **No** so that customers can connect by using either public endpoints (with IP-based server- level firewall rules or with virtual-network firewall rules) or private endpoints (by using Azure Private Link), as outlined in the [network access overview](network-access-controls-overview.md).
37+
The default for the **Connectivity method** setting is **No access** so that customers can connect by using either public endpoints (with IP-based server- level firewall rules or with virtual-network firewall rules) or private endpoints (by using Azure Private Link), as outlined in the [network access overview](network-access-controls-overview.md).
3938

40-
When **Deny public network access** is set to **Yes**, only connections via private endpoints are allowed. All connections via public endpoints will be denied with an error message similar to:
39+
When **Connectivity method** is set to **No access**, only connections via private endpoints are allowed. All connections via public endpoints will be denied with an error message similar to:
4140

4241
```output
4342
Error 47073
@@ -46,16 +45,37 @@ The public network interface on this server is not accessible.
4645
To connect to this server, use the Private Endpoint from inside your virtual network.
4746
```
4847

49-
When **Deny public network access** is set to **Yes**, any attempts to add, remove or edit any firewall rules will be denied with an error message similar to:
48+
When **Connectivity method** is set to **No access**, any attempts to add, remove or edit any firewall rules will be denied with an error message similar to:
5049

5150
```output
5251
Error 42101
5352
Unable to create or modify firewall rules when public network interface for the server is disabled.
5453
To manage server or database level firewall rules, please enable the public network interface.
5554
```
56-
Ensure that **Deny public network access** is set to **No** to be able to add, remove or edit any firewall rules for Azure Sql
5755

58-
## Change public network access via PowerShell
56+
Ensure that **Connectivity method** is set to **Public endpoint** or **Private endpoint** to be able to add, remove or edit any firewall rules for Azure SQL Database and Azure Synapse Analytics.
57+
58+
## Change public network access
59+
60+
It's possible to change the public network access via the Azure portal, Azure PowerShell, and the Azure CLI.
61+
62+
### [Portal](#tab/azure-portal)
63+
64+
To enable public network access for the logical server hosting your databases, go to the **Networking page** in the [Azure portal](https://portal.azure.com), choose the **Public access** tab, and then set the **Public network access** to **Select networks**.
65+
66+
67+
From this page, you can add a virtual network rule, as well as configure firewall rules for your public endpoint.
68+
69+
Choose the **Private access** tab to configure a [private endpoint](private-endpoint-overview.md).
70+
71+
72+
> [!NOTE]
73+
> These settings take effect immediately after they're applied. Your customers might experience connection loss if they don't meet the requirements for each setting.
74+
75+
### [PowerShell](#tab/azure-powershell)
76+
77+
It's possible to change public network access by using Azure PowerShell.
78+
5979

6080
> [!IMPORTANT]
6181
> Azure SQL Database still supports the PowerShell Azure Resource Manager module, but all future development is for the Az.Sql module. For these cmdlets, see [AzureRM.Sql](/powershell/module/AzureRM.Sql/). The arguments for the commands in the Az module and in the AzureRm modules are substantially identical. The following script requires the [Azure PowerShell module](/powershell/azure/install-az-ps).
@@ -72,13 +92,13 @@ $SecureString = ConvertTo-SecureString "password" -AsPlainText -Force
7292
Set-AzSqlServer -ServerName sql-server-name -ResourceGroupName sql-server-group -SqlAdministratorPassword $SecureString -PublicNetworkAccess "Disabled"
7393
```
7494

75-
## Change public network access via CLI
95+
### [Azure CLI](#tab/azure-cli)
96+
97+
It's possible to change the public network settings by using the Azure CLI.
7698

7799
> [!IMPORTANT]
78100
> All scripts in this section require the [Azure CLI](/cli/azure/install-azure-cli).
79101
80-
### Azure CLI in a Bash shell
81-
82102
The following CLI script shows how to change the **Public Network Access** setting in a Bash shell:
83103

84104
```azurecli-interactive
@@ -90,9 +110,11 @@ az sql server show -n sql-server-name -g sql-server-group --query "publicNetwork
90110
az sql server update -n sql-server-name -g sql-server-group --set publicNetworkAccess="Disabled"
91111
```
92112

113+
---
114+
93115
## Minimal TLS version
94116

95-
The minimal [Transport Layer Security (TLS)](https://support.microsoft.com/help/3135244/tls-1-2-support-for-microsoft-sql-server) version setting allows customers to choose which version of TLS their SQL database uses.
117+
The minimal [Transport Layer Security (TLS)](https://support.microsoft.com/help/3135244/tls-1-2-support-for-microsoft-sql-server) version setting allows customers to choose which version of TLS their SQL database uses. It's possible to change the minimum TLS version by using the Azure portal, Azure PowerShell, and the Azure CLI.
96118

97119
Currently, we support TLS 1.0, 1.1, and 1.2. Setting a minimal TLS version ensures that newer TLS versions are supported. For example, choosing a TLS version 1.1 means only connections with TLS 1.1 and 1.2 are accepted, and connections with TLS 1.0 are rejected. After you test to confirm that your applications support it, we recommend setting the minimal TLS version to 1.2. This version includes fixes for vulnerabilities in previous versions and is the highest version of TLS that's supported in Azure SQL Database.
98120

@@ -110,11 +132,15 @@ Error 47072
110132
Login failed with invalid TLS version
111133
```
112134

113-
## Set the minimal TLS version in Azure portal
135+
### [Portal](#tab/azure-portal)
114136

115-
In the [Azure portal](https://portal.azure.com), go to your **SQL server** resource. Under the **Security** settings, select **Firewalls and virtual networks**. Select the **Minimum TLS Version** desired for all SQL Databases associated with the server, and select **Save**.
137+
In the [Azure portal](https://portal.azure.com), go to your **SQL server** resource. Under the **Security** settings, select **Networking** and then choose the **Connectivity** tab. Select the **Minimum TLS Version** desired for all databases associated with the server, and select **Save**.
116138

117-
## Set the minimal TLS version via PowerShell
139+
:::image type="content" source="media/connectivity-settings/minimal-tls-version.png" alt-text="Screenshot of the Connectivity tab of the Networking settings for your logical server, minimal TLS version drop-down selected." lightbox="media/connectivity-settings/minimal-tls-version.png":::
140+
141+
### [PowerShell](#tab/azure-powershell)
142+
143+
It's possible to change the minimum TLS version by using Azure PowerShell.
118144

119145
> [!IMPORTANT]
120146
> Azure SQL Database still supports the PowerShell Azure Resource Manager module, but all future development is for the Az.Sql module. For these cmdlets, see [AzureRM.Sql](/powershell/module/AzureRM.Sql/). The arguments for the commands in the Az module and in the AzureRm modules are substantially identical. The following script requires the [Azure PowerShell module](/powershell/azure/install-az-ps).
@@ -131,12 +157,13 @@ $SecureString = ConvertTo-SecureString "password" -AsPlainText -Force
131157
Set-AzSqlServer -ServerName sql-server-name -ResourceGroupName sql-server-group -SqlAdministratorPassword $SecureString -MinimalTlsVersion "1.2"
132158
```
133159

134-
## Set the minimal TLS version via the Azure CLI
160+
### [Azure CLI](#tab/azure-cli)
161+
162+
It's possible to change the minimum TLS settings by using the Azure CLI.
135163

136164
> [!IMPORTANT]
137165
> All scripts in this section require the [Azure CLI](/cli/azure/install-azure-cli).
138166
139-
### Azure CLI in a Bash shell
140167

141168
The following CLI script shows how to change the **Minimal TLS Version** setting in a Bash shell:
142169

@@ -148,11 +175,25 @@ az sql server show -n sql-server-name -g sql-server-group --query "minimalTlsVer
148175
az sql server update -n sql-server-name -g sql-server-group --set minimalTlsVersion="1.2"
149176
```
150177

178+
---
179+
151180
## Change the connection policy
152181

153182
[Connection policy](connectivity-architecture.md#connection-policy) determines how customers connect to Azure SQL Database.
154183

155-
## Change the connection policy via PowerShell
184+
It's possible to change the connection policy by using the Azure portal, Azure PowerShell, and the Azure CLI.
185+
186+
### [Portal](#tab/azure-portal)
187+
188+
It's possible to change your connection policy for your logical server by using the Azure portal.
189+
190+
In the [Azure portal](https://portal.azure.com), go to your **SQL server** resource. Under the **Security** settings, select **Networking** and then choose the **Connectivity** tab. Choose the desired connection policy, and select **Save**.
191+
192+
:::image type="content" source="media/connectivity-settings/change-connection-policy.png" alt-text="Screenshot of the Connectivity tab of the Networking page, Connection policy selected.":::
193+
194+
### [PowerShell](#tab/azure-powershell)
195+
196+
It's possible to change the connection policy for your logical server by using Azure PowerShell.
156197

157198
> [!IMPORTANT]
158199
> Azure SQL Database still supports the PowerShell Azure Resource Manager module, but all future development is for the Az.Sql module. For these cmdlets, see [AzureRM.Sql](/powershell/module/AzureRM.Sql/). The arguments for the commands in the Az module and in the AzureRm modules are substantially identical. The following script requires the [Azure PowerShell module](/powershell/azure/install-az-ps).
@@ -173,7 +214,9 @@ $id="$sqlserverid/connectionPolicies/Default"
173214
Set-AzResource -ResourceId $id -Properties @{"connectionType" = "Proxy"} -f
174215
```
175216

176-
## Change the connection policy via the Azure CLI
217+
### [Azure CLI](#tab/azure-cli)
218+
219+
It's possible to change the connection policy for your logical server by using the Azure CLI.
177220

178221
> [!IMPORTANT]
179222
> All scripts in this section require the [Azure CLI](/cli/azure/install-azure-cli).
@@ -211,6 +254,8 @@ az resource show --ids %sqlserverid%
211254
az resource update --ids %sqlserverid% --set properties.connectionType=Proxy
212255
```
213256

257+
---
258+
214259
## Next steps
215260

216261
- For an overview of how connectivity works in Azure SQL Database, refer to [Connectivity architecture](connectivity-architecture.md).

azure-sql/database/disaster-recovery-guidance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -108,10 +108,10 @@ For more information about database alert rules, see [Receive Alert Notification
108108

109109
### Enable auditing
110110

111-
If auditing is required to access your database, you need to enable Auditing after the database recovery. For more information, see [Database auditing](/azure/azure-sql/database/auditing-overview).
111+
If auditing is required to access your database, you need to enable Auditing after the database recovery. For more information, see [Database auditing](./auditing-overview.md).
112112

113113
## Next steps
114114

115115
- To learn about Azure SQL Database automated backups, see [SQL Database automated backups](automated-backups-overview.md)
116116
- To learn about business continuity design and recovery scenarios, see [Continuity scenarios](business-continuity-high-availability-disaster-recover-hadr-overview.md)
117-
- To learn about using automated backups for recovery, see [restore a database from the service-initiated backups](recovery-using-backups.md)
117+
- To learn about using automated backups for recovery, see [restore a database from the service-initiated backups](recovery-using-backups.md)

azure-sql/database/dns-alias-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ Presently, a DNS alias has the following limitations:
106106
- _Table auditing is not supported:_ You cannot use a DNS alias on a server that has *table auditing* enabled on a database.
107107
- Table auditing is deprecated.
108108
- We recommend that you move to [Blob Auditing](auditing-overview.md).
109-
- We recommend that you move to [Blob Auditing](/azure/azure-sql/database/auditing-overview).
109+
- We recommend that you move to [Blob Auditing](./auditing-overview.md).
110110
- DNS alias is subject to [naming restrictions](/azure/azure-resource-manager/management/resource-name-rules).
111111

112112
## Related resources
@@ -117,4 +117,4 @@ Presently, a DNS alias has the following limitations:
117117

118118
## Next steps
119119

120-
- [PowerShell for DNS Alias to Azure SQL Database](dns-alias-powershell-create.md)
120+
- [PowerShell for DNS Alias to Azure SQL Database](dns-alias-powershell-create.md)

azure-sql/database/doc-changes-updates-release-notes-whats-new.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -123,10 +123,10 @@ Learn about significant changes to the Azure SQL Database documentation.
123123
| **Azure AD-only authentication** | It's now possible to restrict authentication to your Azure SQL Database to Azure Active Directory users only. This feature is currently in preview. To learn more, see [Azure AD-only authentication](authentication-azure-ad-only-authentication.md). |
124124
| **Query store hints** | It's now possible to use query hints to optimize your query execution via the OPTION clause. This feature is currently in preview. To learn more, see [Query store hints](/sql/relational-databases/performance/query-store-hints?view=azuresqldb-current&preserve-view=true). |
125125
| **Change data capture** | Using change data capture (CDC) with Azure SQL Database is now in preview. To learn more, see [Change data capture](/sql/relational-databases/track-changes/about-change-data-capture-sql-server). |
126-
| **SQL Database ledger** | SQL Database ledger is in preview, and introduces the ability to cryptographically attest to other parties, such as auditors or other business parties, that your data hasn't been tampered with. To learn more, see [Ledger](ledger-overview.md). |
126+
| **SQL Database ledger** | SQL Database ledger is in preview, and introduces the ability to cryptographically attest to other parties, such as auditors or other business parties, that your data hasn't been tampered with. To learn more, see [Ledger](/sql/relational-databases/security/ledger/ledger-overview). |
127127
| **Maintenance window** | The maintenance window feature allows you to configure a maintenance schedule for your Azure SQL Database, currently in preview. To learn more, see [maintenance window](maintenance-window.md).|
128128
| **SQL insights** | SQL insights is a comprehensive solution for monitoring any product in the Azure SQL family. SQL insights uses dynamic management views to expose the data you need to monitor health, diagnose problems, and tune performance. To learn more, see [SQL insights](/azure/azure-monitor/insights/sql-insights-overview). |
129129

130130
## Contribute to content
131131

132-
To contribute to the Azure SQL documentation, see the [Docs contributor guide](/contribute/).
132+
To contribute to the Azure SQL documentation, see the [Docs contributor guide](/contribute/).

0 commit comments

Comments
 (0)