You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In Azure SQL Database managed instance, you can configure a [long-term backup retention](sql-database-long-term-retention.md#managed-instance-support) policy (LTR) as a limited public preview feature. This allows you to to automatically retain database backups in separate Azure Blob storage containers for up to 10 years. You can then recover a database using these backups using PowerShell.
> LTR for managed instances is currently in limited preview and available for EA and CSP subscriptions on a case by case basis. To request enrollment, please create an Azure support ticket under the support topic **Backup, Restore, and Business Continuity/Long-term backup retention**.
21
22
22
-
> [!IMPORTANT]
23
-
> The PowerShell Azure Resource Manager module is still supported by Azure SQL Database managed instance, but all future development is for the Az.Sql module. For these cmdlets, see [AzureRM.Sql](https://docs.microsoft.com/powershell/module/AzureRM.Sql/). The arguments for the commands in the Az module and in the AzureRm modules are substantially identical.
24
23
25
24
The following sections show you how to use PowerShell to configure the long-term backup retention, view backups in Azure SQL storage, and restore from a backup in Azure SQL storage.
26
25
@@ -29,7 +28,7 @@ The following sections show you how to use PowerShell to configure the long-term
29
28
For **Get-AzSqlInstanceDatabaseLongTermRetentionBackup** and **Restore-AzSqlInstanceDatabase**, you will need to have one of the following roles:
> The SQL Server Contributor role does not have permission to delete LTR backups.
46
+
> The SManaged Instance Contributor role does not have permission to delete LTR backups.
48
47
49
-
RBAC permissions could be granted in either *subscription* or *resource group* scope. However, to access LTR backups that belong to a dropped server, the permission must be granted in the *subscription* scope of that server.
48
+
RBAC permissions could be granted in either *subscription* or *resource group* scope. However, to access LTR backups that belong to a dropped instance, the permission must be granted in the *subscription* scope of that instance.
> Deleting LTR backup is non-reversible. To delete an LTR backup after the server has been deleted you must have Subscription scope permission. You can set up notifications about each delete in Azure Monitor by filtering for operation 'Deletes a long term retention backup'. The activity log contains information on who and when made the request. See [Create activity log alerts](../azure-monitor/platform/alerts-activity-log.md) for detailed instructions.
130
+
> Deleting LTR backup is non-reversible. To delete an LTR backup after the instance has been deleted you must have Subscription scope permission. You can set up notifications about each delete in Azure Monitor by filtering for operation 'Deletes a long term retention backup'. The activity log contains information on who and when made the request. See [Create activity log alerts](../azure-monitor/platform/alerts-activity-log.md) for detailed instructions.
132
131
133
132
## Restore from LTR backups
134
133
135
134
This example shows how to restore from an LTR backup. Note, this interface did not change but the resource id parameter now requires the LTR backup resource id.
136
135
137
136
```powershell
138
-
# restore a specific LTR backup as an P1 database on the server $serverName of the resource group $resourceGroup
137
+
# restore a specific LTR backup as an P1 database on the instance $instanceName of the resource group $resourceGroup
> To restore from an LTR backup after the server has been deleted, you must have permissions scoped to the server's subscription and that subscription must be active. You must also omit the optional -ResourceGroupName parameter.
144
+
> To restore from an LTR backup after the instance has been deleted, you must have permissions scoped to the subscription of the instance and that subscription must be active. You must also omit the optional -ResourceGroupName parameter.
146
145
147
146
> [!NOTE]
148
147
> From here, you can connect to the restored database using SQL Server Management Studio to perform needed tasks, such as to extract a bit of data from the restored database to copy into the existing database or to delete the existing database and rename the restored database to the existing database name. See [point in time restore](sql-database-recovery-using-backups.md#point-in-time-restore).
Copy file name to clipboardExpand all lines: articles/sql-database/sql-database-release-notes.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.service: sql-database
7
7
ms.subservice: service
8
8
ms.devlang:
9
9
ms.topic: conceptual
10
-
ms.date: 04/09/2020
10
+
ms.date: 04/14/2020
11
11
ms.author: sstein
12
12
---
13
13
# SQL Database release notes
@@ -43,7 +43,7 @@ This article lists SQL Database features that are currently in public preview. F
43
43
| <ahref="https://aka.ms/managed-instance-aadlogins">Instance-level Azure AD server principals (logins)</a> | Create server-level logins using <ahref="https://docs.microsoft.com/sql/t-sql/statements/create-login-transact-sql?view=azuresqldb-mi-current">CREATE LOGIN FROM EXTERNAL PROVIDER</a> statement. |
44
44
|[Transactional Replication](sql-database-managed-instance-transactional-replication.md)| Replicate the changes from your tables into other databases placed on Managed Instances, Single Databases, or SQL Server instances, or update your tables when some rows are changed in other Managed Instances or SQL Server instance. For information, see [Configure replication in an Azure SQL Database managed instance database](replication-with-sql-database-managed-instance.md). |
45
45
| Threat detection |For information, see [Configure threat detection in Azure SQL Database managed instance](sql-database-managed-instance-threat-detection.md).|
46
-
46
+
| Long-term backup retention | For information, see [Configure long-term back up retention](sql-database-managed-instance-long-term-backup-retention-configure.md). |
47
47
---
48
48
49
49
## Managed instance - new features and known issues
@@ -110,7 +110,7 @@ If failover group spans across instances in different Azure subscriptions or res
110
110
111
111
### SQL Agent roles need explicit EXECUTE permissions for non-sysadmin logins
112
112
113
-
If non-sysadmin logins are added to any of [SQL Agent fixed database roles](https://docs.microsoft.com/sql/ssms/agent/sql-server-agent-fixed-database-roles), there exists an issue in which explicit EXECUTE permissions need to be granted to the master stored procedures for these logins to work. If this issue is encountered, the error message “The EXECUTE permission was denied on the object <object_name> (Microsoft SQL Server, Error: 229)” will be shown.
113
+
If non-sysadmin logins are added to any of [SQL Agent fixed database roles](https://docs.microsoft.com/sql/ssms/agent/sql-server-agent-fixed-database-roles), there exists an issue in which explicit EXECUTE permissions need to be granted to the master stored procedures for these logins to work. If this issue is encountered, the error message "The EXECUTE permission was denied on the object <object_name> (Microsoft SQL Server, Error: 229)" will be shown.
114
114
115
115
**Workaround**: Once you add logins to either of SQL Agent fixed database roles: SQLAgentUserRole, SQLAgentReaderRole or SQLAgentOperatorRole, for each of the logins added to these roles execute the below T-SQL script to explicitly grant EXECUTE permissions to the stored procedures listed.
116
116
@@ -163,7 +163,7 @@ Cross-database Service Broker dialogs will stop delivering the messages to the s
163
163
### Impersonification of Azure AD login types is not supported
164
164
165
165
Impersonation using `EXECUTE AS USER` or `EXECUTE AS LOGIN` of following AAD principals is not supported:
166
-
-Aliased AAD users. The following error is returned in this case `15517`.
166
+
-Aliased AAD users. The following error is returned in this case `15517`.
167
167
- AAD logins and users based on AAD applications or service principals. The following errors are returned in this case `15517` and `15406`.
168
168
169
169
### @query parameter not supported in sp_send_db_mail
0 commit comments