You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-arc/data/adding-exporters-and-pipelines.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -71,6 +71,8 @@ The following properties are currently configurable during the Public Preview:
71
71
72
72
The Telemetry Router supports logs and metrics pipelines. These pipelines are exposed in the custom resource specification of the Arc telemetry router and available for modification.
73
73
74
+
You can't remove the last pipeline from the telemetry router. If you apply a yaml file that removes the last pipeline, the service rejects the update.
> If you scale down from 2 replicas to 1 replica, you may run into a conflict with the pre-configured `--readable--secondaries` setting. You can first edit the `--readable--secondaries` before scaling down the replicas.
79
78
80
79
81
80
## Configure Server options
82
81
83
-
You can configure server configuration settings for Azure Arc-enabled SQL managed instance after creation time. This article describes how to configure settings like enabling or disabling mssql Agent, enable specific trace flags for troubleshooting scenarios.
82
+
You can configure certain server configuration settings for Azure Arc-enabled SQL managed instance either during or after creation time. This article describes how to configure settings like enabling "Ad Hoc Distributed Queries" or "backup compression default" etc.
83
+
84
+
Currently the following server options can be configured:
85
+
- Ad Hoc Distributed Queries
86
+
- Default Trace Enabled
87
+
- Database Mail XPs
88
+
- Backup compression default
89
+
- Cost threshold for parallelism
90
+
- Optimize for ad hoc workloads
91
+
92
+
> [!Note]
93
+
> - Currently these options can only be specified via YAML file, either during Arc SQL MI creation or post deployment.
94
+
> - The Arc SQL MI image tag has to be at least version v1.19.x or above
95
+
96
+
Add the following to your YAML file during deployment to configure any of these options.
97
+
98
+
```yml
99
+
spec:
100
+
serverConfigurations:
101
+
- name: "Ad Hoc Distributed Queries"
102
+
value: 1
103
+
- name: "Default Trace Enabled"
104
+
value: 0
105
+
- name: "Database Mail XPs"
106
+
value: 1
107
+
- name: "backup compression default"
108
+
value: 1
109
+
- name: "cost threshold for parallelism"
110
+
value: 50
111
+
- name: "optimize for ad hoc workloads"
112
+
value: 1
113
+
```
114
+
115
+
If you already have an existing Arc SQL MI, you can run `kubectl edit sqlmi <sqlminame> -n <namespace>` and add the above options into the spec.
116
+
117
+
118
+
Sample Arc SQL MI YAML file:
119
+
120
+
```yml
121
+
apiVersion: sql.arcdata.microsoft.com/v13
122
+
kind: SqlManagedInstance
123
+
metadata:
124
+
name: sql1
125
+
annotations:
126
+
exampleannotation1: exampleannotationvalue1
127
+
exampleannotation2: exampleannotationvalue2
128
+
labels:
129
+
examplelabel1: examplelabelvalue1
130
+
examplelabel2: examplelabelvalue2
131
+
spec:
132
+
dev: true #options: [true, false]
133
+
licenseType: LicenseIncluded #options: [LicenseIncluded, BasePrice]. BasePrice is used for Azure Hybrid Benefits.
This article describes how to enable and disable transparent data encryption (TDE) at-rest on an Azure Arc-enabled SQL Managed Instance. In this article, the term *managed instance* refers to a deployment of Azure Arc-enabled SQL Managed Instance and enabling/disabling TDE will apply to all databases running on a managed instance.
18
18
19
-
Enabling service-managed transparent data encryption will require the managed instance to use a service-managed database master key as well as the service-managed server certificate. These credentials will be automatically created when service-managed transparent data encryption is enabled. For more info on TDE, please refer to [Transparent data encryption](/sql/relational-databases/security/encryption/transparent-data-encryption).
20
-
19
+
For more info on TDE, please refer to [Transparent data encryption](/sql/relational-databases/security/encryption/transparent-data-encryption).
21
20
22
21
Turning on the TDE feature does the following:
23
22
@@ -35,24 +34,48 @@ Before you proceed with this article, you must have an Azure Arc-enabled SQL Man
35
34
36
35
## Limitations
37
36
38
-
The following limitations must be considered when deploying Service-Managed TDE:
37
+
The following limitations apply when you enable automatic TDE:
39
38
40
39
- Only General Purpose Tier is supported.
41
-
- Failover Groups are not supported.
40
+
- Failover groups aren't supported.
42
41
43
42
## Turn on transparent data encryption on the managed instance
44
-
### Prerequisites
45
43
46
-
Turning on TDE on the managed instance will result in the following operations taking place:
44
+
When TDE is enabled on Arc-enabled SQL Managed Instance, the data service automatically does the following tasks:
45
+
46
+
1. Adds the service-managed database master key in the `master` database.
47
+
2. Adds the service-managed certificate protector.
48
+
3. Adds the associated Database Encryption Keys (DEK) on all databases on the managed instance.
49
+
4. Enables encryption on all databases on the managed instance.
50
+
51
+
You can set Azure Arc-enabled SQL Managed Instance TDE in one of two modes:
52
+
53
+
- Service-managed
54
+
- Customer-managed
55
+
56
+
In service-managed mode, transparent data encryption requires the managed instance to use a service-managed database master key as well as the service-managed server certificate. These credentials are automatically created when service-managed transparent data encryption is enabled.
57
+
58
+
In customer-managed mode, transparent data encryption uses a service-managed database master key and uses keys you provide for the server certificate. To configure customer-managed mode:
47
59
48
-
1. Adding the service-managed database master key in the `master` database.
49
-
2. Adding the service-managed certificate protector.
50
-
3. Adding the associated Database Encryption Keys (DEK) on all databases on the managed instance.
51
-
4. Enabling encryption on all databases on the managed instance.
60
+
1. Create a certificate.
61
+
1. Store the certificate as a secret in the same Kubernetes namespace as the instance.
62
+
63
+
> [!NOTE]
64
+
> If you need to change from one mode to the other, you must disable TDE from the current mode before you apply the new mode. For details, see [Turn off transparent data encryption on the managed instance](#turn-off-transparent-data-encryption-on-the-managed-instance).
65
+
>
66
+
> For example, if the service is encrypted using service-managed mode, go to `Disabled` mode before you enable customer-managed mode.
0 commit comments