Skip to content

Commit 0279477

Browse files
committed
added enrollment note
1 parent efa18e9 commit 0279477

File tree

3 files changed

+16
-17
lines changed

3 files changed

+16
-17
lines changed

articles/sql-database/sql-database-long-term-backup-retention-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ author: anosov1960
1111
ms.author: sashan
1212
ms.reviewer: mathoma, carlrab
1313
manager: craigg
14-
ms.date: 08/21/2019
14+
ms.date: 04/14/2020
1515
---
1616

1717
# Manage Azure SQL Database long-term backup retention

articles/sql-database/sql-database-managed-instance-long-term-backup-retention-configure.md

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -11,16 +11,15 @@ author: anosov1960
1111
ms.author: sashan
1212
ms.reviewer: mathoma, carlrab
1313
manager: craigg
14-
ms.date: 08/21/2019
14+
ms.date: 04/14/2020
1515
---
1616
# Manage Azure SQL Database managed instance long-term backup retention (PowerShell)
1717

1818
In Azure SQL Database managed instance, you can configure a [long-term backup retention](sql-database-long-term-retention.md#managed-instance-support) policy (LTR) as a limited public preview feature. This allows you to to automatically retain database backups in separate Azure Blob storage containers for up to 10 years. You can then recover a database using these backups using PowerShell.
1919

20-
[!INCLUDE [updated-for-az](../../includes/updated-for-az.md)]
20+
> [!IMPORTANT]
21+
> LTR for managed instances is currently in limited preview and available for EA and CSP subscriptions on a case by case basis. To request enrollment, please create an Azure support ticket under the support topic **Backup, Restore, and Business Continuity/Long-term backup retention**.
2122
22-
> [!IMPORTANT]
23-
> The PowerShell Azure Resource Manager module is still supported by Azure SQL Database managed instance, but all future development is for the Az.Sql module. For these cmdlets, see [AzureRM.Sql](https://docs.microsoft.com/powershell/module/AzureRM.Sql/). The arguments for the commands in the Az module and in the AzureRm modules are substantially identical.
2423

2524
The following sections show you how to use PowerShell to configure the long-term backup retention, view backups in Azure SQL storage, and restore from a backup in Azure SQL storage.
2625

@@ -29,7 +28,7 @@ The following sections show you how to use PowerShell to configure the long-term
2928
For **Get-AzSqlInstanceDatabaseLongTermRetentionBackup** and **Restore-AzSqlInstanceDatabase**, you will need to have one of the following roles:
3029

3130
- Subscription Owner role or
32-
- SQL Server Contributor role or
31+
- SManaged Instance Contributor role or
3332
- Custom role with the following permissions:
3433

3534
```Microsoft.Sql/locations/longTermRetentionManagedInstanceBackups/read```
@@ -44,9 +43,9 @@ For **Remove-AzSqlInstanceDatabaseLongTermRetentionBackup**, you will need to ha
4443
```Microsoft.Sql/locations/longTermRetentionManagedInstances/longTermRetentionDatabases/longTermRetentionManagedInstanceBackups/delete```
4544

4645
> [!NOTE]
47-
> The SQL Server Contributor role does not have permission to delete LTR backups.
46+
> The SManaged Instance Contributor role does not have permission to delete LTR backups.
4847
49-
RBAC permissions could be granted in either *subscription* or *resource group* scope. However, to access LTR backups that belong to a dropped server, the permission must be granted in the *subscription* scope of that server.
48+
RBAC permissions could be granted in either *subscription* or *resource group* scope. However, to access LTR backups that belong to a dropped instance, the permission must be granted in the *subscription* scope of that instance.
5049

5150
```Microsoft.Sql/locations/longTermRetentionManagedInstances/longTermRetentionDatabases/longTermRetentionManagedInstanceBackups/delete```
5251

@@ -76,7 +75,7 @@ Set-AzSqlInstanceDatabaseBackupLongTermRetentionPolicy -InstanceName $instanceNa
7675

7776
## View LTR policies
7877

79-
This example shows how to list the LTR policies within a server
78+
This example shows how to list the LTR policies within an instance
8079

8180
```powershell
8281
# gets the current version of LTR policy for the database
@@ -96,7 +95,7 @@ Set-AzSqlInstanceDatabaseBackupLongTermRetentionPolicy -InstanceName $instanceNa
9695

9796
## View LTR backups
9897

99-
This example shows how to list the LTR backups within a server.
98+
This example shows how to list the LTR backups within an instance.
10099

101100
```powershell
102101
# get the list of all LTR backups in a specific Azure region
@@ -128,21 +127,21 @@ Remove-AzSqlInstanceDatabaseLongTermRetentionBackup -ResourceId $ltrBackup.Resou
128127
```
129128

130129
> [!IMPORTANT]
131-
> Deleting LTR backup is non-reversible. To delete an LTR backup after the server has been deleted you must have Subscription scope permission. You can set up notifications about each delete in Azure Monitor by filtering for operation 'Deletes a long term retention backup'. The activity log contains information on who and when made the request. See [Create activity log alerts](../azure-monitor/platform/alerts-activity-log.md) for detailed instructions.
130+
> Deleting LTR backup is non-reversible. To delete an LTR backup after the instance has been deleted you must have Subscription scope permission. You can set up notifications about each delete in Azure Monitor by filtering for operation 'Deletes a long term retention backup'. The activity log contains information on who and when made the request. See [Create activity log alerts](../azure-monitor/platform/alerts-activity-log.md) for detailed instructions.
132131
133132
## Restore from LTR backups
134133

135134
This example shows how to restore from an LTR backup. Note, this interface did not change but the resource id parameter now requires the LTR backup resource id.
136135

137136
```powershell
138-
# restore a specific LTR backup as an P1 database on the server $serverName of the resource group $resourceGroup
137+
# restore a specific LTR backup as an P1 database on the instance $instanceName of the resource group $resourceGroup
139138
Restore-AzSqlInstanceDatabase -FromLongTermRetentionBackup -ResourceId $ltrBackup.ResourceId `
140139
-TargetInstanceName $instanceName -TargetResourceGroupName $resourceGroup -TargetInstanceDatabaseName $dbName
141140
142141
```
143142

144143
> [!IMPORTANT]
145-
> To restore from an LTR backup after the server has been deleted, you must have permissions scoped to the server's subscription and that subscription must be active. You must also omit the optional -ResourceGroupName parameter.
144+
> To restore from an LTR backup after the instance has been deleted, you must have permissions scoped to the subscription of the instance and that subscription must be active. You must also omit the optional -ResourceGroupName parameter.
146145
147146
> [!NOTE]
148147
> From here, you can connect to the restored database using SQL Server Management Studio to perform needed tasks, such as to extract a bit of data from the restored database to copy into the existing database or to delete the existing database and rename the restored database to the existing database name. See [point in time restore](sql-database-recovery-using-backups.md#point-in-time-restore).

articles/sql-database/sql-database-release-notes.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: sql-database
77
ms.subservice: service
88
ms.devlang:
99
ms.topic: conceptual
10-
ms.date: 04/09/2020
10+
ms.date: 04/14/2020
1111
ms.author: sstein
1212
---
1313
# SQL Database release notes
@@ -43,7 +43,7 @@ This article lists SQL Database features that are currently in public preview. F
4343
| <a href="https://aka.ms/managed-instance-aadlogins">Instance-level Azure AD server principals (logins)</a> | Create server-level logins using <a href="https://docs.microsoft.com/sql/t-sql/statements/create-login-transact-sql?view=azuresqldb-mi-current">CREATE LOGIN FROM EXTERNAL PROVIDER</a> statement. |
4444
| [Transactional Replication](sql-database-managed-instance-transactional-replication.md) | Replicate the changes from your tables into other databases placed on Managed Instances, Single Databases, or SQL Server instances, or update your tables when some rows are changed in other Managed Instances or SQL Server instance. For information, see [Configure replication in an Azure SQL Database managed instance database](replication-with-sql-database-managed-instance.md). |
4545
| Threat detection |For information, see [Configure threat detection in Azure SQL Database managed instance](sql-database-managed-instance-threat-detection.md).|
46-
46+
| Long-term backup retention | For information, see [Configure long-term back up retention](sql-database-managed-instance-long-term-backup-retention-configure.md). |
4747
---
4848

4949
## Managed instance - new features and known issues
@@ -110,7 +110,7 @@ If failover group spans across instances in different Azure subscriptions or res
110110

111111
### SQL Agent roles need explicit EXECUTE permissions for non-sysadmin logins
112112

113-
If non-sysadmin logins are added to any of [SQL Agent fixed database roles](https://docs.microsoft.com/sql/ssms/agent/sql-server-agent-fixed-database-roles), there exists an issue in which explicit EXECUTE permissions need to be granted to the master stored procedures for these logins to work. If this issue is encountered, the error message The EXECUTE permission was denied on the object <object_name> (Microsoft SQL Server, Error: 229) will be shown.
113+
If non-sysadmin logins are added to any of [SQL Agent fixed database roles](https://docs.microsoft.com/sql/ssms/agent/sql-server-agent-fixed-database-roles), there exists an issue in which explicit EXECUTE permissions need to be granted to the master stored procedures for these logins to work. If this issue is encountered, the error message "The EXECUTE permission was denied on the object <object_name> (Microsoft SQL Server, Error: 229)" will be shown.
114114

115115
**Workaround**: Once you add logins to either of SQL Agent fixed database roles: SQLAgentUserRole, SQLAgentReaderRole or SQLAgentOperatorRole, for each of the logins added to these roles execute the below T-SQL script to explicitly grant EXECUTE permissions to the stored procedures listed.
116116

@@ -163,7 +163,7 @@ Cross-database Service Broker dialogs will stop delivering the messages to the s
163163
### Impersonification of Azure AD login types is not supported
164164

165165
Impersonation using `EXECUTE AS USER` or `EXECUTE AS LOGIN` of following AAD principals is not supported:
166-
- Aliased AAD users. The following error is returned in this case `15517`.
166+
- Aliased AAD users. The following error is returned in this case `15517`.
167167
- AAD logins and users based on AAD applications or service principals. The following errors are returned in this case `15517` and `15406`.
168168

169169
### @query parameter not supported in sp_send_db_mail

0 commit comments

Comments
 (0)