You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-sql/database/network-access-controls-overview.md
+9-11Lines changed: 9 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: Overview of how to manage and control network access for Azure SQL
5
5
author: rohitnayakmsft
6
6
ms.author: rohitna
7
7
ms.reviewer: wiassaf, vanto, mathoma
8
-
ms.date: 07/18/2022
8
+
ms.date: 03/07/2023
9
9
ms.service: sql-database
10
10
ms.subservice: security
11
11
ms.topic: conceptual
@@ -20,7 +20,7 @@ When you create a logical server from the [Azure portal](single-database-create-
20
20
21
21
You can use the following network access controls to selectively allow access to a database via the public endpoint:
22
22
23
-
- Allow Azure Services: When set to ON, other resources within the Azure boundary, for example an Azure Virtual Machine, can access SQL Database
23
+
- Allow Azure services and resources to access this server: When enabled, other resources within the Azure boundary, for example an Azure Virtual Machine, can access SQL Database
24
24
- IP firewall rules: Use this feature to explicitly allow connections from a specific IP address, for example from on-premises machines
25
25
26
26
You can also allow private access to the database from [virtual networks](/azure/virtual-network/virtual-networks-overview) via:
@@ -37,26 +37,25 @@ See the below video for a high-level explanation of these access controls and wh
37
37
38
38
## Allow Azure services
39
39
40
-
By default during creation of a new logical server [from the Azure portal](single-database-create-quickstart.md), this setting is set to **OFF**. This setting appears when connectivity is allowed using public service endpoint.
40
+
By default during creation of a new logical server [from the Azure portal](single-database-create-quickstart.md), **Allow Azure services and resources to access this server** is unchecked and not enabled. This setting appears when connectivity is allowed using public service endpoint.
41
41
42
42
You can also change this setting via the **Networking** setting after the logical server is created as follows:
43
43
44
44
![Screenshot of manage server firewall][2]
45
45
46
-
When set to **ON**, your server allows communications from all resources inside the Azure boundary, that may or may not be part of your subscription.
46
+
When **Allow Azure services and resources to access this server** is enabled, your server allows communications from all resources inside the Azure boundary, that may or may not be part of your subscription.
47
47
48
-
In many cases, the **ON**setting is more permissive than what most customers want. You may want to set this setting to **OFF** and replace it with more restrictive IP firewall rules or virtual network firewall rules.
48
+
In many cases, enabling the setting is more permissive than what most customers want. You may want to uncheck this setting and replace it with more restrictive IP firewall rules or virtual network firewall rules.
49
49
50
50
However, doing so affects the following features that run on virtual machines in Azure that aren't part of your virtual network and hence connect to the database via an Azure IP address:
51
51
52
52
### Import Export Service
53
53
54
-
Import Export Service doesn't work when **Allow access to Azure services** is set to **OFF**. However you can work around the problem [by manually running SqlPackage from an Azure VM or performing the export](./database-import-export-azure-services-off.md) directly in your code by using the DACFx API.
54
+
Import Export Service doesn't work when **Allow Azure services and resources to access this server** is not enabled. However you can work around the problem [by manually running SqlPackage from an Azure VM or performing the export](./database-import-export-azure-services-off.md) directly in your code by using the DACFx API.
55
55
56
56
### Data Sync
57
57
58
-
To use the Data sync feature with **Allow access to Azure services** set to **OFF**, you need to create individual firewall rule entries to [add IP addresses](firewall-create-server-level-portal-quickstart.md) from the **Sql service tag** for the region hosting the **Hub** database.
59
-
Add these server-level firewall rules to the servers hosting both **Hub** and **Member** databases (which may be in different regions)
58
+
To use the Data sync feature with **Allow Azure services and resources to access this server** not enabled, you need to create individual firewall rule entries to [add IP addresses](firewall-create-server-level-portal-quickstart.md) from the **Sql service tag** for the region hosting the **Hub** database. Add these server-level firewall rules to the servers hosting both **Hub** and **Member** databases (which may be in different regions)
60
59
61
60
Use the following PowerShell script to generate IP addresses corresponding to the SQL service tag for West US region
62
61
@@ -97,16 +96,15 @@ start end
97
96
13.86.216.192 13.86.216.223
98
97
```
99
98
100
-
You can now add these as distinct firewall rules and then set **Allow Azure services to access server** to OFF.
99
+
You can now add these as distinct firewall rules and then disable the setting **Allow Azure services and resources to access this server**.
101
100
102
101
## IP firewall rules
103
102
104
103
Ip based firewall is a feature of the logical server in Azure that prevents all access to your server until you explicitly [add IP addresses](firewall-create-server-level-portal-quickstart.md) of the client machines.
105
104
106
105
## Virtual network firewall rules
107
106
108
-
In addition to IP rules, the server firewall allows you to define *virtual network rules*.
109
-
To learn more, see [Virtual network service endpoints and rules for Azure SQL Database](vnet-service-endpoint-rule-overview.md) or watch this video:
107
+
In addition to IP rules, the server firewall allows you to define *virtual network rules*. To learn more, see [Virtual network service endpoints and rules for Azure SQL Database](vnet-service-endpoint-rule-overview.md) or watch this video:
Copy file name to clipboardExpand all lines: azure-sql/virtual-machines/windows/availability-group-azure-portal-configure.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,9 +51,9 @@ To configure an Always On availability group by using the Azure portal, you must
51
51
52
52
- The following account permissions:
53
53
54
-
- A domain admin user account that has **Create Computer Object** permissions in the domain. This user will create the cluster and availability group, and will install SQL Server.
54
+
- A domain user account that has **Create Computer Object** permissions in the domain. This user will create the cluster and availability group, and will install SQL Server.
55
55
56
-
For example, a domain admin account (`account@domain.com`) typically has sufficient permission. This account should also be part of the local administrator group on each VM to create the cluster.
56
+
For example, a domain user account (`account@domain.com`) typically has sufficient permission. This account should also be part of the local administrator group on each VM to create the cluster.
57
57
58
58
- A domain SQL Server service account to control SQL Server. This should be the same account for every SQL Server VM that you want to add to the availability group.
Copy file name to clipboardExpand all lines: docs/big-data-cluster/deployment-upgrade.md
+21-21Lines changed: 21 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,13 +4,12 @@ titleSuffix: SQL Server Big Data Clusters
4
4
description: Learn how to upgrade SQL Server Big Data Clusters to a new release.
5
5
author: HugoMSFT
6
6
ms.author: hudequei
7
-
ms.reviewer: wiassaf
8
-
ms.date: 09/21/2021
7
+
ms.reviewer: wiassaf, randolphwest
8
+
ms.date: 03/07/2023
9
9
ms.service: sql
10
10
ms.subservice: big-data-cluster
11
11
ms.topic: conceptual
12
12
---
13
-
14
13
# How to upgrade [!INCLUDE[big-data-clusters-2019](../includes/ssbigdataclusters-ss-nover.md)]
15
14
16
15
[!INCLUDE[SQL Server 2019](../includes/applies-to-version/sqlserver2019.md)]
@@ -22,14 +21,14 @@ The upgrade path depends on the current version of SQL Server Big Data Cluster.
22
21
-[Upgrade from supported release](#upgrade-from-supported-release)
23
22
-[Update a BDC deployment from CTP or release candidate](#update-a-bdc-deployment-from-ctp-or-release-candidate)
24
23
25
-
>[!NOTE]
26
-
>The oldest currently supported release of Big Data Clusters is SQL Server 2019 CU8.
24
+
>[!NOTE]
25
+
>The oldest currently supported release of Big Data Clusters is SQL Server 2019 CU8.
27
26
28
27
## Upgrade release notes
29
28
30
29
Before you proceed, check the [upgrade release notes for known issues](release-notes-big-data-cluster.md#known-issues).
31
30
32
-
> [!WARNING]
31
+
> [!WARNING]
33
32
> The parameter ```imagePullPolicy``` was required to be set as ```"Always"``` in the deployment profile control.json file when the cluster was initially deployed. This parameter can't be changed after deployment.
34
33
> In the case that it is set with a different value, unexpected results may happen during the upgrade process and a cluster redeployment will be required.
35
34
@@ -51,22 +50,22 @@ This section explains how to upgrade a SQL Server BDC from a supported release (
-[Linux with apt](../azdata/install/deploy-install-azdata-linux-package.md)
66
65
-[Linux with yum](../azdata/install/deploy-install-azdata-yum.md)
67
66
-[Linux with zypper](../azdata/install/deploy-install-azdata-zypper.md)
68
67
69
-
>[!NOTE]
68
+
>[!NOTE]
70
69
>If [!INCLUDE [azure-data-cli-azdata](../includes/azure-data-cli-azdata.md)] was installed with `pip` you need to manually remove it before installing with the Windows installer or the Linux package manager.
71
70
72
71
1. Update the Big Data Cluster.
@@ -75,17 +74,17 @@ This section explains how to upgrade a SQL Server BDC from a supported release (
>The latest image tags are available at [SQL Server 2019 Big Data Clusters release notes](release-notes-big-data-cluster.md).
83
+
>[!NOTE]
84
+
>The latest image tags are available at [SQL Server 2019 Big Data Clusters release notes](release-notes-big-data-cluster.md).
86
85
87
-
>[!IMPORTANT]
88
-
>If you use a private repository to pre-pull the images for deploying or upgrading BDC, ensure that the current build images as well as >the target build images are in the private repository. This enables successful rollback, if necessary. Also, if you changed the >credentials of the private repository since the original deployment, update the corresponding environment variables DOCKER_PASSWORD and >DOCKER_USERNAME. Upgrading using different private repositories for current and target builds is not supported.
86
+
>[!IMPORTANT]
87
+
>If you use a private repository to pre-pull the images for deploying or upgrading BDC, ensure that the current build images as well as >the target build images are in the private repository. This enables successful rollback, if necessary. Also, if you changed the >credentials of the private repository since the original deployment, update the corresponding environment variables DOCKER_PASSWORD and >DOCKER_USERNAME. Upgrading using different private repositories for current and target builds is not supported.
89
88
90
89
### Increase the timeout for the upgrade
91
90
@@ -105,12 +104,13 @@ A timeout can occur if certain components are not upgraded in the allocated time
105
104
To increase the timeouts for an upgrade, use **--controller-timeout** and **--component-timeout** parameters to specify higher values when you issue the upgrade. This option is only available starting with SQL Server 2019 CU2 release. For example:
**--controller-timeout** designates the number of minutes to wait for the controller or controller db to finish upgrading.
111
111
**--component-timeout** designates the amount of time that each subsequent phase of the upgrade has to complete.
112
112
113
-
To increase the timeouts for an upgrade before the SQL Server 2019 CU2 release, edit the upgrade config map. To edit the upgrade config map:
113
+
To increase the timeouts for an upgrade before the SQL Server 2019 CU19 release, edit the upgrade config map. To edit the upgrade config map:
114
114
115
115
Run the following command:
116
116
@@ -142,10 +142,10 @@ There is no in place upgrade for big data clusters deployed before SQL Server 20
142
142
azdata bdc delete --name <old-cluster-name>
143
143
```
144
144
145
-
> [!Important]
145
+
> [!IMPORTANT]
146
146
> Use the version of [!INCLUDE [azure-data-cli-azdata](../includes/azure-data-cli-azdata.md)] that matches your cluster. Do not delete an older cluster with the newer version of [!INCLUDE [azure-data-cli-azdata](../includes/azure-data-cli-azdata.md)].
147
147
148
-
> [!Note]
148
+
> [!NOTE]
149
149
> Issuing a `azdata bdc delete` command will result in all objects created within the namespace identified with the big data cluster name to be deleted, but not the namespace itself. Namespace can be reused for subsequent deployments as long as it is empty and no other applications were created within.
150
150
151
151
1. Uninstall the old version of [!INCLUDE [azure-data-cli-azdata](../includes/azure-data-cli-azdata.md)].
@@ -168,7 +168,7 @@ There is no in place upgrade for big data clusters deployed before SQL Server 20
168
168
pip3 install -r https://aka.ms/azdata --user
169
169
```
170
170
171
-
> [!IMPORTANT]
171
+
> [!IMPORTANT]
172
172
> For each release, the path to the `n-1` version of [!INCLUDE [azure-data-cli-azdata](../includes/azure-data-cli-azdata.md)] changes. Even if you previously installed [!INCLUDE [azure-data-cli-azdata](../includes/azure-data-cli-azdata.md)], you must reinstall from the latest path before creating the new cluster.
173
173
174
174
### <aid="azdataversion"></a> Verify the azdata version
0 commit comments