Skip to content

Commit f664af4

Browse files
committed
Merge branch 'main' into release-2022-cu02
2 parents dbd15fa + aaefd75 commit f664af4

6 files changed

Lines changed: 270 additions & 264 deletions

File tree

azure-sql/database/network-access-controls-overview.md

Lines changed: 9 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Overview of how to manage and control network access for Azure SQL
55
author: rohitnayakmsft
66
ms.author: rohitna
77
ms.reviewer: wiassaf, vanto, mathoma
8-
ms.date: 07/18/2022
8+
ms.date: 03/07/2023
99
ms.service: sql-database
1010
ms.subservice: security
1111
ms.topic: conceptual
@@ -20,7 +20,7 @@ When you create a logical server from the [Azure portal](single-database-create-
2020

2121
You can use the following network access controls to selectively allow access to a database via the public endpoint:
2222

23-
- Allow Azure Services: When set to ON, other resources within the Azure boundary, for example an Azure Virtual Machine, can access SQL Database
23+
- Allow Azure services and resources to access this server: When enabled, other resources within the Azure boundary, for example an Azure Virtual Machine, can access SQL Database
2424
- IP firewall rules: Use this feature to explicitly allow connections from a specific IP address, for example from on-premises machines
2525

2626
You can also allow private access to the database from [virtual networks](/azure/virtual-network/virtual-networks-overview) via:
@@ -37,26 +37,25 @@ See the below video for a high-level explanation of these access controls and wh
3737
3838
## Allow Azure services
3939

40-
By default during creation of a new logical server [from the Azure portal](single-database-create-quickstart.md), this setting is set to **OFF**. This setting appears when connectivity is allowed using public service endpoint.
40+
By default during creation of a new logical server [from the Azure portal](single-database-create-quickstart.md), **Allow Azure services and resources to access this server** is unchecked and not enabled. This setting appears when connectivity is allowed using public service endpoint.
4141

4242
You can also change this setting via the **Networking** setting after the logical server is created as follows:
4343

4444
![Screenshot of manage server firewall][2]
4545

46-
When set to **ON**, your server allows communications from all resources inside the Azure boundary, that may or may not be part of your subscription.
46+
When **Allow Azure services and resources to access this server** is enabled, your server allows communications from all resources inside the Azure boundary, that may or may not be part of your subscription.
4747

48-
In many cases, the **ON** setting is more permissive than what most customers want. You may want to set this setting to **OFF** and replace it with more restrictive IP firewall rules or virtual network firewall rules.
48+
In many cases, enabling the setting is more permissive than what most customers want. You may want to uncheck this setting and replace it with more restrictive IP firewall rules or virtual network firewall rules.
4949

5050
However, doing so affects the following features that run on virtual machines in Azure that aren't part of your virtual network and hence connect to the database via an Azure IP address:
5151

5252
### Import Export Service
5353

54-
Import Export Service doesn't work when **Allow access to Azure services** is set to **OFF**. However you can work around the problem [by manually running SqlPackage from an Azure VM or performing the export](./database-import-export-azure-services-off.md) directly in your code by using the DACFx API.
54+
Import Export Service doesn't work when **Allow Azure services and resources to access this server** is not enabled. However you can work around the problem [by manually running SqlPackage from an Azure VM or performing the export](./database-import-export-azure-services-off.md) directly in your code by using the DACFx API.
5555

5656
### Data Sync
5757

58-
To use the Data sync feature with **Allow access to Azure services** set to **OFF**, you need to create individual firewall rule entries to [add IP addresses](firewall-create-server-level-portal-quickstart.md) from the **Sql service tag** for the region hosting the **Hub** database.
59-
Add these server-level firewall rules to the servers hosting both **Hub** and **Member** databases (which may be in different regions)
58+
To use the Data sync feature with **Allow Azure services and resources to access this server** not enabled, you need to create individual firewall rule entries to [add IP addresses](firewall-create-server-level-portal-quickstart.md) from the **Sql service tag** for the region hosting the **Hub** database. Add these server-level firewall rules to the servers hosting both **Hub** and **Member** databases (which may be in different regions)
6059

6160
Use the following PowerShell script to generate IP addresses corresponding to the SQL service tag for West US region
6261

@@ -97,16 +96,15 @@ start end
9796
13.86.216.192 13.86.216.223
9897
```
9998

100-
You can now add these as distinct firewall rules and then set **Allow Azure services to access server** to OFF.
99+
You can now add these as distinct firewall rules and then disable the setting **Allow Azure services and resources to access this server**.
101100

102101
## IP firewall rules
103102

104103
Ip based firewall is a feature of the logical server in Azure that prevents all access to your server until you explicitly [add IP addresses](firewall-create-server-level-portal-quickstart.md) of the client machines.
105104

106105
## Virtual network firewall rules
107106

108-
In addition to IP rules, the server firewall allows you to define *virtual network rules*.
109-
To learn more, see [Virtual network service endpoints and rules for Azure SQL Database](vnet-service-endpoint-rule-overview.md) or watch this video:
107+
In addition to IP rules, the server firewall allows you to define *virtual network rules*. To learn more, see [Virtual network service endpoints and rules for Azure SQL Database](vnet-service-endpoint-rule-overview.md) or watch this video:
110108

111109
> [!VIDEO https://learn.microsoft.com/shows/Data-Exposed/Data-Exposed--Demo--Vnet-Firewall-Rules-for-SQL-Database/player?WT.mc_id=dataexposed-c9-niner]
112110

azure-sql/virtual-machines/windows/availability-group-azure-portal-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,9 +51,9 @@ To configure an Always On availability group by using the Azure portal, you must
5151

5252
- The following account permissions:
5353

54-
- A domain admin user account that has **Create Computer Object** permissions in the domain. This user will create the cluster and availability group, and will install SQL Server.
54+
- A domain user account that has **Create Computer Object** permissions in the domain. This user will create the cluster and availability group, and will install SQL Server.
5555

56-
For example, a domain admin account (`account@domain.com`) typically has sufficient permission. This account should also be part of the local administrator group on each VM to create the cluster.
56+
For example, a domain user account (`account@domain.com`) typically has sufficient permission. This account should also be part of the local administrator group on each VM to create the cluster.
5757

5858
- A domain SQL Server service account to control SQL Server. This should be the same account for every SQL Server VM that you want to add to the availability group.
5959

-1.96 KB
Loading

docs/big-data-cluster/deployment-upgrade.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,12 @@ titleSuffix: SQL Server Big Data Clusters
44
description: Learn how to upgrade SQL Server Big Data Clusters to a new release.
55
author: HugoMSFT
66
ms.author: hudequei
7-
ms.reviewer: wiassaf
8-
ms.date: 09/21/2021
7+
ms.reviewer: wiassaf, randolphwest
8+
ms.date: 03/07/2023
99
ms.service: sql
1010
ms.subservice: big-data-cluster
1111
ms.topic: conceptual
1212
---
13-
1413
# How to upgrade [!INCLUDE[big-data-clusters-2019](../includes/ssbigdataclusters-ss-nover.md)]
1514

1615
[!INCLUDE[SQL Server 2019](../includes/applies-to-version/sqlserver2019.md)]
@@ -22,14 +21,14 @@ The upgrade path depends on the current version of SQL Server Big Data Cluster.
2221
- [Upgrade from supported release](#upgrade-from-supported-release)
2322
- [Update a BDC deployment from CTP or release candidate](#update-a-bdc-deployment-from-ctp-or-release-candidate)
2423

25-
>[!NOTE]
26-
>The oldest currently supported release of Big Data Clusters is SQL Server 2019 CU8.
24+
> [!NOTE]
25+
> The oldest currently supported release of Big Data Clusters is SQL Server 2019 CU8.
2726
2827
## Upgrade release notes
2928

3029
Before you proceed, check the [upgrade release notes for known issues](release-notes-big-data-cluster.md#known-issues).
3130

32-
> [!WARNING]
31+
> [!WARNING]
3332
> The parameter ```imagePullPolicy``` was required to be set as ```"Always"``` in the deployment profile control.json file when the cluster was initially deployed. This parameter can't be changed after deployment.
3433
> In the case that it is set with a different value, unexpected results may happen during the upgrade process and a cluster redeployment will be required.
3534
@@ -51,22 +50,22 @@ This section explains how to upgrade a SQL Server BDC from a supported release (
5150
```
5251
azdata bdc hdfs cp --from-path <path> --to-path <path>
5352
```
54-
55-
For example:
53+
54+
For example:
5655

5756
```
5857
azdata bdc hdfs cp --from-path hdfs://user/hive/warehouse/%%D --to-path ./%%D
5958
```
6059

6160
1. Update [!INCLUDE [azure-data-cli-azdata](../includes/azure-data-cli-azdata.md)].
6261

63-
Follow the instructions for installing [!INCLUDE [azure-data-cli-azdata](../includes/azure-data-cli-azdata.md)].
62+
Follow the instructions for installing [!INCLUDE [azure-data-cli-azdata](../includes/azure-data-cli-azdata.md)].
6463
- [Windows installer](../azdata/install/deploy-install-azdata-installer.md)
6564
- [Linux with apt](../azdata/install/deploy-install-azdata-linux-package.md)
6665
- [Linux with yum](../azdata/install/deploy-install-azdata-yum.md)
6766
- [Linux with zypper](../azdata/install/deploy-install-azdata-zypper.md)
6867

69-
>[!NOTE]
68+
> [!NOTE]
7069
>If [!INCLUDE [azure-data-cli-azdata](../includes/azure-data-cli-azdata.md)] was installed with `pip` you need to manually remove it before installing with the Windows installer or the Linux package manager.
7170
7271
1. Update the Big Data Cluster.
@@ -75,17 +74,17 @@ This section explains how to upgrade a SQL Server BDC from a supported release (
7574
azdata bdc upgrade -n <clusterName> -t <imageTag> -r <containerRegistry>/<containerRepository>
7675
```
7776

78-
For example, the following script uses `2019-CU6-ubuntu-16.04` image tag:
77+
For example, the following script uses `2019-CU19-ubuntu-20.04` image tag:
7978

8079
```
81-
azdata bdc upgrade -n bdc -t 2019-CU6-ubuntu-16.04 -r mcr.microsoft.com/mssql/bdc
80+
azdata bdc upgrade -n bdc -t 2019-CU19-ubuntu-20.04 -r mcr.microsoft.com/mssql/bdc
8281
```
8382

84-
>[!NOTE]
85-
>The latest image tags are available at [SQL Server 2019 Big Data Clusters release notes](release-notes-big-data-cluster.md).
83+
> [!NOTE]
84+
> The latest image tags are available at [SQL Server 2019 Big Data Clusters release notes](release-notes-big-data-cluster.md).
8685
87-
>[!IMPORTANT]
88-
>If you use a private repository to pre-pull the images for deploying or upgrading BDC, ensure that the current build images as well as >the target build images are in the private repository. This enables successful rollback, if necessary. Also, if you changed the >credentials of the private repository since the original deployment, update the corresponding environment variables DOCKER_PASSWORD and >DOCKER_USERNAME. Upgrading using different private repositories for current and target builds is not supported.
86+
> [!IMPORTANT]
87+
> If you use a private repository to pre-pull the images for deploying or upgrading BDC, ensure that the current build images as well as >the target build images are in the private repository. This enables successful rollback, if necessary. Also, if you changed the >credentials of the private repository since the original deployment, update the corresponding environment variables DOCKER_PASSWORD and >DOCKER_USERNAME. Upgrading using different private repositories for current and target builds is not supported.
8988
9089
### Increase the timeout for the upgrade
9190

@@ -105,12 +104,13 @@ A timeout can occur if certain components are not upgraded in the allocated time
105104
To increase the timeouts for an upgrade, use **--controller-timeout** and **--component-timeout** parameters to specify higher values when you issue the upgrade. This option is only available starting with SQL Server 2019 CU2 release. For example:
106105

107106
```bash
108-
azdata bdc upgrade -t 2019-CU6-ubuntu-16.04 --controller-timeout=40 --component-timeout=40 --stability-threshold=3
107+
azdata bdc upgrade -t 2019-CU19-ubuntu-20.04 --controller-timeout=40 --component-timeout=40 --stability-threshold=3
109108
```
109+
110110
**--controller-timeout** designates the number of minutes to wait for the controller or controller db to finish upgrading.
111111
**--component-timeout** designates the amount of time that each subsequent phase of the upgrade has to complete.
112112

113-
To increase the timeouts for an upgrade before the SQL Server 2019 CU2 release, edit the upgrade config map. To edit the upgrade config map:
113+
To increase the timeouts for an upgrade before the SQL Server 2019 CU19 release, edit the upgrade config map. To edit the upgrade config map:
114114

115115
Run the following command:
116116

@@ -142,10 +142,10 @@ There is no in place upgrade for big data clusters deployed before SQL Server 20
142142
azdata bdc delete --name <old-cluster-name>
143143
```
144144

145-
> [!Important]
145+
> [!IMPORTANT]
146146
> Use the version of [!INCLUDE [azure-data-cli-azdata](../includes/azure-data-cli-azdata.md)] that matches your cluster. Do not delete an older cluster with the newer version of [!INCLUDE [azure-data-cli-azdata](../includes/azure-data-cli-azdata.md)].
147147
148-
> [!Note]
148+
> [!NOTE]
149149
> Issuing a `azdata bdc delete` command will result in all objects created within the namespace identified with the big data cluster name to be deleted, but not the namespace itself. Namespace can be reused for subsequent deployments as long as it is empty and no other applications were created within.
150150
151151
1. Uninstall the old version of [!INCLUDE [azure-data-cli-azdata](../includes/azure-data-cli-azdata.md)].
@@ -168,7 +168,7 @@ There is no in place upgrade for big data clusters deployed before SQL Server 20
168168
pip3 install -r https://aka.ms/azdata --user
169169
```
170170

171-
> [!IMPORTANT]
171+
> [!IMPORTANT]
172172
> For each release, the path to the `n-1` version of [!INCLUDE [azure-data-cli-azdata](../includes/azure-data-cli-azdata.md)] changes. Even if you previously installed [!INCLUDE [azure-data-cli-azdata](../includes/azure-data-cli-azdata.md)], you must reinstall from the latest path before creating the new cluster.
173173
174174
### <a id="azdataversion"></a> Verify the azdata version

0 commit comments

Comments
 (0)