You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-sql/database/connect-github-actions-sql-db.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.custom: github-actions-azure
13
13
14
14
# Use GitHub Actions to connect to Azure SQL Database
15
15
16
-
Get started with [GitHub Actions](https://docs.github.com/en/free-pro-team@latest/actions) by using a workflow to deploy database updates to [Azure SQL Database](../azure-sql-iaas-vs-paas-what-is-overview.md).
16
+
Get started with [GitHub Actions](https://docs.github.com/en/actions) by using a workflow to deploy database updates to [Azure SQL Database](../azure-sql-iaas-vs-paas-what-is-overview.md).
@@ -60,7 +60,7 @@ If you are connecting from outside Azure, your connections have a connection pol
60
60

61
61
62
62
> [!IMPORTANT]
63
-
> Additionally open TCP ports 1434 and 14000-14999 to enable [Connecting with DAC](/sql/database-engine/configure-windows/diagnostic-connection-for-database-administrators?view=sql-server-2017#connecting-with-dac)
63
+
> Additionally open TCP ports 1434 and 14000-14999 to enable [Connecting with DAC](/sql/database-engine/configure-windows/diagnostic-connection-for-database-administrators#connecting-with-dac)
64
64
65
65
## Gateway IP addresses
66
66
@@ -77,7 +77,7 @@ Details of how traffic shall be migrated to new Gateways in specific regions are
77
77
| Brazil South | 104.41.11.5, 191.233.200.14, 191.234.144.16, 191.234.152.3 |
78
78
| Canada Central | 40.85.224.249, 52.246.152.0, 20.38.144.1 |
79
79
| Canada East | 40.86.226.166, 52.242.30.154, 40.69.105.9 , 40.69.105.10 |
80
-
| Central US | 13.67.215.62, 52.182.137.15, 23.99.160.139, 104.208.16.96, 104.208.21.1 |
80
+
| Central US | 13.67.215.62, 52.182.137.15, 23.99.160.139, 104.208.16.96, 104.208.21.1, 13.89.169.20|
81
81
| China East | 139.219.130.35 |
82
82
| China East 2 | 40.73.82.1 |
83
83
| China North | 139.219.15.17 |
@@ -121,4 +121,4 @@ Details of how traffic shall be migrated to new Gateways in specific regions are
121
121
122
122
- For information on how to change the Azure SQL Database connection policy for a server, see [conn-policy](/cli/azure/sql/server/conn-policy).
123
123
- For information about Azure SQL Database connection behavior for clients that use ADO.NET 4.5 or a later version, see [Ports beyond 1433 for ADO.NET 4.5](adonet-v12-develop-direct-route-ports.md).
124
-
- For general application development overview information, see [SQL Database Application Development Overview](develop-overview.md).
124
+
- For general application development overview information, see [SQL Database Application Development Overview](develop-overview.md).
Dynamic data masking helps prevent unauthorized access to sensitive data by enabling customers to designate how much of the sensitive data to reveal with minimal impact on the application layer. It’s a policy-based security feature that hides the sensitive data in the result set of a query over designated database fields, while the data in the database is not changed.
22
22
23
-
For example, a service representative at a call center may identify callers by several digits of their credit card number, but those data items should not be fully exposed to the service representative. A masking rule can be defined that masks all but the last four digits of any credit card number in the result set of any query. As another example, an appropriate data mask can be defined to protect personal data, so that a developer can query production environments for troubleshooting purposes without violating compliance regulations.
23
+
For example, a service representative at a call center might identify a caller by confirming several characters of their email address, but the complete email address shouldn't be revealed to the service representative. A masking rule can be defined that masks all the email address in the result set of any query. As another example, an appropriate data mask can be defined to protect personal data, so that a developer can query production environments for troubleshooting purposes without violating compliance regulations.
24
24
25
25
## Dynamic data masking basics
26
26
27
27
You set up a dynamic data masking policy in the Azure portal by selecting the **Dynamic Data Masking** blade under **Security** in your SQL Database configuration pane. This feature cannot be set using portal for SQL Managed Instance (use PowerShell or REST API). For more information, see [Dynamic Data Masking](/sql/relational-databases/security/dynamic-data-masking).
28
28
29
-
### Dynamic data masking permissions
30
-
31
-
Dynamic data masking can be configured by the Azure SQL Database admin, server admin, or [SQL Security Manager](../../role-based-access-control/built-in-roles.md#sql-security-manager) roles.
32
-
33
29
### Dynamic data masking policy
34
30
35
31
***SQL users excluded from masking** - A set of SQL users or Azure AD identities that get unmasked data in the SQL query results. Users with administrator privileges are always excluded from masking, and see the original data without any mask.
@@ -77,3 +73,11 @@ You can use the REST API to programmatically manage data masking policy and rule
77
73
78
74
-[Create Or Update](/rest/api/sql/datamaskingrules/createorupdate): Creates or updates a database data masking rule.
79
75
-[List By Database](/rest/api/sql/datamaskingrules/listbydatabase): Gets a list of database data masking rules.
76
+
77
+
## Permissions
78
+
79
+
Dynamic data masking can be configured by the Azure SQL Database admin, server admin, or the role-based access control (RBAC) [SQL Security Manager](../../role-based-access-control/built-in-roles.md#sql-security-manager) role.
80
+
81
+
## Next steps
82
+
83
+
[Dynamic Data Masking](/sql/relational-databases/security/dynamic-data-masking)
Copy file name to clipboardExpand all lines: azure-sql/database/elastic-scale-get-started.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,13 +79,15 @@ To download and run the sample, follow these steps:
79
79
80
80
1. Download the [Elastic DB Tools for Azure SQL - Getting Started sample](https://github.com/Azure/elastic-db-tools). Unzip the sample to a location that you choose.
81
81
82
-
2. To create a project, open the *ElasticScaleStarterKit.sln* solution from the *C#* directory.
82
+
2. To create a project, open the *ElasticDatabaseTools.sln* solution from the *elastic-db-tools-master* directory.
83
83
84
-
3.In the solution for the sample project, open the *app.config* file. Then follow the instructions in the file to add your server name and your sign-in information (username and password).
84
+
3.Set the *ElasticScaleStarterKit* project as the Startup Project.
85
85
86
-
4.Build and run the application. When you are prompted, enable Visual Studio to restore the NuGet packages of the solution. This action downloads the latest version of the elastic database client library from NuGet.
86
+
4.In the *ElasticScaleStarterKit* project, open the *App.config* file. Then follow the instructions in the file to add your server name and your sign-in information (username and password).
87
87
88
-
5. To learn more about the client library capabilities, experiment with the various options. Note the steps that the application takes in the console output, and feel free to explore the code behind the scenes.
88
+
5. Build and run the application. When you are prompted, enable Visual Studio to restore the NuGet packages of the solution. This action downloads the latest version of the elastic database client library from NuGet.
89
+
90
+
6. To learn more about the client library capabilities, experiment with the various options. Note the steps that the application takes in the console output, and feel free to explore the code behind the scenes.
Copy file name to clipboardExpand all lines: azure-sql/database/policy-reference.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Built-in policy definitions for Azure SQL Database
3
3
description: Lists Azure Policy built-in policy definitions for Azure SQL Database and SQL Managed Instance. These built-in policy definitions provide common approaches to managing your Azure resources.
Copy file name to clipboardExpand all lines: azure-sql/database/recovery-using-backups.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,8 +47,8 @@ For a single subscription, there are limitations on the number of concurrent res
47
47
48
48
|**Deployment option**|**Max # of concurrent requests being processed**|**Max # of concurrent requests being submitted**|
49
49
| :--- | --: | --: |
50
-
|**Single database (per subscription)**|10|60|
51
-
|**Elastic pool (per pool)**|4|200|
50
+
|**Single database (per subscription)**|30|100|
51
+
|**Elastic pool (per pool)**|4|2000|
52
52
53
53
54
54
There isn't a built-in method to restore the entire server. For an example of how to accomplish this task, see [Azure SQL Database: Full server recovery](https://gallery.technet.microsoft.com/Azure-SQL-Database-Full-82941666).
@@ -256,4 +256,4 @@ Automatic backups protect your databases from user and application errors, accid
- To learn about faster recovery options, see [Active geo-replication](active-geo-replication-overview.md) or [Auto-failover groups](auto-failover-group-overview.md).
259
+
- To learn about faster recovery options, see [Active geo-replication](active-geo-replication-overview.md) or [Auto-failover groups](auto-failover-group-overview.md).
Copy file name to clipboardExpand all lines: azure-sql/database/security-controls-policy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Azure Policy Regulatory Compliance controls for Azure SQL Database
3
3
description: Lists Azure Policy Regulatory Compliance controls available for Azure SQL Database and SQL Managed Instance. These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
Copy file name to clipboardExpand all lines: azure-sql/database/sql-data-sync-sql-server-configure.md
-4Lines changed: 0 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -173,10 +173,6 @@ After the new sync group members are created and deployed, **Configure sync grou
173
173
174
174
## FAQ
175
175
176
-
**How frequently can Data Sync synchronize my data?**
177
-
178
-
The minimal duration between synchronizations is five minutes.
179
-
180
176
**Does SQL Data Sync fully create tables?**
181
177
182
178
If sync schema tables are missing in the destination database, SQL Data Sync creates them with the columns you selected. However, this doesn't result in a full-fidelity schema for the following reasons:
1. Under **Settings**, select **Subnets**. Click **Subnet** in the new pane to add a subnet, and delegate it to *Microsoft.sql\managedInstance*. For more information, see [Manage subnets](../../virtual-network/virtual-network-manage-subnet.md).
46
+
1. Under **Settings**, select **Subnets**. Click **Subnet** in the new pane to add a subnet, and delegate it to *Microsoft.Sql\managedInstance*. For more information, see [Manage subnets](../../virtual-network/virtual-network-manage-subnet.md).
47
47
48
48
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/mi-subnets.png" alt-text="Screenshot shows a subnet that has been delegated Microsoft.sql\managedInstance.":::
0 commit comments