Skip to content

Commit f5bf6ac

Browse files
committed
Resolved conflicts
2 parents 671d612 + d3da407 commit f5bf6ac

19 files changed

Lines changed: 130 additions & 38 deletions

azure-sql/database/connect-github-actions-sql-db.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.custom: github-actions-azure
1313

1414
# Use GitHub Actions to connect to Azure SQL Database
1515

16-
Get started with [GitHub Actions](https://docs.github.com/en/free-pro-team@latest/actions) by using a workflow to deploy database updates to [Azure SQL Database](../azure-sql-iaas-vs-paas-what-is-overview.md).
16+
Get started with [GitHub Actions](https://docs.github.com/en/actions) by using a workflow to deploy database updates to [Azure SQL Database](../azure-sql-iaas-vs-paas-what-is-overview.md).
1717

1818
## Prerequisites
1919

azure-sql/database/connectivity-architecture.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.topic: conceptual
1111
author: rohitnayakmsft
1212
ms.author: rohitna
1313
ms.reviewer: sstein, vanto
14-
ms.date: 06/26/2020
14+
ms.date: 01/25/2021
1515
---
1616
# Azure SQL Database and Azure Synapse Analytics connectivity architecture
1717
[!INCLUDE[appliesto-sqldb-asa](../includes/appliesto-sqldb-asa.md)]
@@ -60,7 +60,7 @@ If you are connecting from outside Azure, your connections have a connection pol
6060
![Diagram that shows how the TCP session is established via the Azure SQL Database gateway and all subsequent packets flow via the gateway.](./media/connectivity-architecture/connectivity-onprem.png)
6161

6262
> [!IMPORTANT]
63-
> Additionally open TCP ports 1434 and 14000-14999 to enable [Connecting with DAC](/sql/database-engine/configure-windows/diagnostic-connection-for-database-administrators?view=sql-server-2017#connecting-with-dac)
63+
> Additionally open TCP ports 1434 and 14000-14999 to enable [Connecting with DAC](/sql/database-engine/configure-windows/diagnostic-connection-for-database-administrators#connecting-with-dac)
6464
6565
## Gateway IP addresses
6666

@@ -77,7 +77,7 @@ Details of how traffic shall be migrated to new Gateways in specific regions are
7777
| Brazil South | 104.41.11.5, 191.233.200.14, 191.234.144.16, 191.234.152.3 |
7878
| Canada Central | 40.85.224.249, 52.246.152.0, 20.38.144.1 |
7979
| Canada East | 40.86.226.166, 52.242.30.154, 40.69.105.9 , 40.69.105.10 |
80-
| Central US | 13.67.215.62, 52.182.137.15, 23.99.160.139, 104.208.16.96, 104.208.21.1 |
80+
| Central US | 13.67.215.62, 52.182.137.15, 23.99.160.139, 104.208.16.96, 104.208.21.1, 13.89.169.20 |
8181
| China East | 139.219.130.35 |
8282
| China East 2 | 40.73.82.1 |
8383
| China North | 139.219.15.17 |
@@ -121,4 +121,4 @@ Details of how traffic shall be migrated to new Gateways in specific regions are
121121

122122
- For information on how to change the Azure SQL Database connection policy for a server, see [conn-policy](/cli/azure/sql/server/conn-policy).
123123
- For information about Azure SQL Database connection behavior for clients that use ADO.NET 4.5 or a later version, see [Ports beyond 1433 for ADO.NET 4.5](adonet-v12-develop-direct-route-ports.md).
124-
- For general application development overview information, see [SQL Database Application Development Overview](develop-overview.md).
124+
- For general application development overview information, see [SQL Database Application Development Overview](develop-overview.md).

azure-sql/database/dynamic-data-masking-overview.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: conceptual
1010
author: DavidTrigano
1111
ms.author: datrigan
1212
ms.reviewer: vanto
13-
ms.date: 08/04/2020
13+
ms.date: 01/25/2021
1414
tags: azure-synpase
1515
---
1616
# Dynamic data masking
@@ -20,16 +20,12 @@ Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse Analytics supp
2020

2121
Dynamic data masking helps prevent unauthorized access to sensitive data by enabling customers to designate how much of the sensitive data to reveal with minimal impact on the application layer. It’s a policy-based security feature that hides the sensitive data in the result set of a query over designated database fields, while the data in the database is not changed.
2222

23-
For example, a service representative at a call center may identify callers by several digits of their credit card number, but those data items should not be fully exposed to the service representative. A masking rule can be defined that masks all but the last four digits of any credit card number in the result set of any query. As another example, an appropriate data mask can be defined to protect personal data, so that a developer can query production environments for troubleshooting purposes without violating compliance regulations.
23+
For example, a service representative at a call center might identify a caller by confirming several characters of their email address, but the complete email address shouldn't be revealed to the service representative. A masking rule can be defined that masks all the email address in the result set of any query. As another example, an appropriate data mask can be defined to protect personal data, so that a developer can query production environments for troubleshooting purposes without violating compliance regulations.
2424

2525
## Dynamic data masking basics
2626

2727
You set up a dynamic data masking policy in the Azure portal by selecting the **Dynamic Data Masking** blade under **Security** in your SQL Database configuration pane. This feature cannot be set using portal for SQL Managed Instance (use PowerShell or REST API). For more information, see [Dynamic Data Masking](/sql/relational-databases/security/dynamic-data-masking).
2828

29-
### Dynamic data masking permissions
30-
31-
Dynamic data masking can be configured by the Azure SQL Database admin, server admin, or [SQL Security Manager](../../role-based-access-control/built-in-roles.md#sql-security-manager) roles.
32-
3329
### Dynamic data masking policy
3430

3531
* **SQL users excluded from masking** - A set of SQL users or Azure AD identities that get unmasked data in the SQL query results. Users with administrator privileges are always excluded from masking, and see the original data without any mask.
@@ -77,3 +73,11 @@ You can use the REST API to programmatically manage data masking policy and rule
7773

7874
- [Create Or Update](/rest/api/sql/datamaskingrules/createorupdate): Creates or updates a database data masking rule.
7975
- [List By Database](/rest/api/sql/datamaskingrules/listbydatabase): Gets a list of database data masking rules.
76+
77+
## Permissions
78+
79+
Dynamic data masking can be configured by the Azure SQL Database admin, server admin, or the role-based access control (RBAC) [SQL Security Manager](../../role-based-access-control/built-in-roles.md#sql-security-manager) role.
80+
81+
## Next steps
82+
83+
[Dynamic Data Masking](/sql/relational-databases/security/dynamic-data-masking)

azure-sql/database/elastic-scale-get-started.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -79,13 +79,15 @@ To download and run the sample, follow these steps:
7979

8080
1. Download the [Elastic DB Tools for Azure SQL - Getting Started sample](https://github.com/Azure/elastic-db-tools). Unzip the sample to a location that you choose.
8181

82-
2. To create a project, open the *ElasticScaleStarterKit.sln* solution from the *C#* directory.
82+
2. To create a project, open the *ElasticDatabaseTools.sln* solution from the *elastic-db-tools-master* directory.
8383

84-
3. In the solution for the sample project, open the *app.config* file. Then follow the instructions in the file to add your server name and your sign-in information (username and password).
84+
3. Set the *ElasticScaleStarterKit* project as the Startup Project.
8585

86-
4. Build and run the application. When you are prompted, enable Visual Studio to restore the NuGet packages of the solution. This action downloads the latest version of the elastic database client library from NuGet.
86+
4. In the *ElasticScaleStarterKit* project, open the *App.config* file. Then follow the instructions in the file to add your server name and your sign-in information (username and password).
8787

88-
5. To learn more about the client library capabilities, experiment with the various options. Note the steps that the application takes in the console output, and feel free to explore the code behind the scenes.
88+
5. Build and run the application. When you are prompted, enable Visual Studio to restore the NuGet packages of the solution. This action downloads the latest version of the elastic database client library from NuGet.
89+
90+
6. To learn more about the client library capabilities, experiment with the various options. Note the steps that the application takes in the console output, and feel free to explore the code behind the scenes.
8991

9092
![Progress][4]
9193

azure-sql/database/gateway-migration.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,13 @@ Customers will be notified via email and in the Azure portal well in advance of
2121
## Status updates
2222

2323
# [In progress](#tab/in-progress-ip)
24+
## February 2021
25+
New SQL Gateways are being added to the following regions:
26+
27+
- Central US : 13.89.169.20
28+
29+
These SQL Gateways shall start accepting customer traffic on 28 February 2021.
30+
2431
## January 2021
2532
New SQL Gateways are being added to the following regions:
2633

@@ -35,7 +42,7 @@ New SQL Gateways are being added to the following regions:
3542
- Korea Central : 52.231.17.22 ,52.231.17.23
3643
- India West : 104.211.144.4
3744

38-
These SQL Gateways shall start accepting customer traffic on 31 January 2021
45+
These SQL Gateways shall start accepting customer traffic on 31 January 2021.
3946

4047
# [Completed](#tab/completed-ip)
4148
The following gateway migrations are complete:

azure-sql/database/policy-reference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Built-in policy definitions for Azure SQL Database
33
description: Lists Azure Policy built-in policy definitions for Azure SQL Database and SQL Managed Instance. These built-in policy definitions provide common approaches to managing your Azure resources.
4-
ms.date: 01/21/2021
4+
ms.date: 01/25/2021
55
ms.topic: reference
66
author: stevestein
77
ms.author: sstein

azure-sql/database/recovery-using-backups.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -47,8 +47,8 @@ For a single subscription, there are limitations on the number of concurrent res
4747

4848
| **Deployment option** | **Max # of concurrent requests being processed** | **Max # of concurrent requests being submitted** |
4949
| :--- | --: | --: |
50-
|**Single database (per subscription)**|10|60|
51-
|**Elastic pool (per pool)**|4|200|
50+
|**Single database (per subscription)**|30|100|
51+
|**Elastic pool (per pool)**|4|2000|
5252

5353

5454
There isn't a built-in method to restore the entire server. For an example of how to accomplish this task, see [Azure SQL Database: Full server recovery](https://gallery.technet.microsoft.com/Azure-SQL-Database-Full-82941666).
@@ -256,4 +256,4 @@ Automatic backups protect your databases from user and application errors, accid
256256
- [Business continuity overview](business-continuity-high-availability-disaster-recover-hadr-overview.md)
257257
- [SQL Database automated backups](automated-backups-overview.md)
258258
- [Long-term retention](long-term-retention-overview.md)
259-
- To learn about faster recovery options, see [Active geo-replication](active-geo-replication-overview.md) or [Auto-failover groups](auto-failover-group-overview.md).
259+
- To learn about faster recovery options, see [Active geo-replication](active-geo-replication-overview.md) or [Auto-failover groups](auto-failover-group-overview.md).

azure-sql/database/security-controls-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Azure Policy Regulatory Compliance controls for Azure SQL Database
33
description: Lists Azure Policy Regulatory Compliance controls available for Azure SQL Database and SQL Managed Instance. These built-in policy definitions provide common approaches to managing the compliance of your Azure resources.
4-
ms.date: 01/21/2021
4+
ms.date: 01/25/2021
55
ms.topic: sample
66
author: stevestein
77
ms.author: sstein

azure-sql/database/sql-data-sync-sql-server-configure.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -173,10 +173,6 @@ After the new sync group members are created and deployed, **Configure sync grou
173173

174174
## FAQ
175175

176-
**How frequently can Data Sync synchronize my data?**
177-
178-
The minimal duration between synchronizations is five minutes.
179-
180176
**Does SQL Data Sync fully create tables?**
181177

182178
If sync schema tables are missing in the destination database, SQL Data Sync creates them with the columns you selected. However, this doesn't result in a full-fidelity schema for the following reasons:

azure-sql/database/sql-database-vulnerability-assessment-storage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ To support VA scans on Managed Instances, follow the below steps:
4343

4444
:::image type="content" source="../managed-instance/media/public-endpoint-configure/mi-overview.png" alt-text="mi-overview2":::
4545

46-
1. Under **Settings**, select **Subnets**. Click **Subnet** in the new pane to add a subnet, and delegate it to *Microsoft.sql\managedInstance*. For more information, see [Manage subnets](../../virtual-network/virtual-network-manage-subnet.md).
46+
1. Under **Settings**, select **Subnets**. Click **Subnet** in the new pane to add a subnet, and delegate it to *Microsoft.Sql\managedInstance*. For more information, see [Manage subnets](../../virtual-network/virtual-network-manage-subnet.md).
4747

4848
:::image type="content" source="media/sql-database-vulnerability-assessment-storage/mi-subnets.png" alt-text="Screenshot shows a subnet that has been delegated Microsoft.sql\managedInstance.":::
4949

0 commit comments

Comments
 (0)