You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-sql/managed-instance/doc-changes-updates-known-issues.md
+40-40Lines changed: 40 additions & 40 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,10 +25,10 @@ This article lists the currently known issues with [Azure SQL Managed Instance](
25
25
|[Misleading error message on Azure portal suggesting recreation of the Service Principal](#misleading-error-message-on-azure-portal-suggesting-recreation-of-the-service-principal)|Sep 2021|||
26
26
|[Changing the connection type does not affect connections through the failover group endpoint](#changing-the-connection-type-does-not-affect-connections-through-the-failover-group-endpoint)|Jan 2021|Has Workaround||
27
27
|[Procedure sp_send_dbmail may transiently fail when @query parameter is used](#procedure-sp_send_dbmail-may-transiently-fail-when--parameter-is-used)|Jan 2021|Has Workaround||
28
-
|[Distributed transactions can be executed after removing Managed Instance from Server Trust Group](#distributed-transactions-can-be-executed-after-removing-managed-instance-from-server-trust-group)|Oct 2020|Has Workaround||
29
-
|[Distributed transactions cannot be executed after Managed Instance scaling operation](#distributed-transactions-cannot-be-executed-after-managed-instance-scaling-operation)|Oct 2020|Has Workaround||
28
+
|[Distributed transactions can be executed after removing managed instance from Server Trust Group](#distributed-transactions-can-be-executed-after-removing-managed-instance-from-server-trust-group)|Oct 2020|Has Workaround||
29
+
|[Distributed transactions cannot be executed after managed instance scaling operation](#distributed-transactions-cannot-be-executed-after-managed-instance-scaling-operation)|Oct 2020|Has Workaround||
30
30
|[Cannot create SQL Managed Instance with the same name as logical server previously deleted](#cannot-create-sql-managed-instance-with-the-same-name-as-logical-server-previously-deleted)|Aug 2020|Has Workaround||
31
-
|[BULK INSERT](/sql/t-sql/statements/bulk-insert-transact-sql)/[OPENROWSET](/sql/t-sql/functions/openrowset-transact-sql) in Azure SQL and `BACKUP`/`RESTORE` statement in Managed Instance cannot use Azure AD Manage Identity to authenticate to Azure storage|Sep 2020|Has Workaround||
31
+
|[BULK INSERT](/sql/t-sql/statements/bulk-insert-transact-sql)/[OPENROWSET](/sql/t-sql/functions/openrowset-transact-sql) in Azure SQL and `BACKUP`/`RESTORE` statement in SQL Managed Instance cannot use Azure AD Manage Identity to authenticate to Azure storage|Sep 2020|Has Workaround||
32
32
|[Service Principal cannot access Azure AD and AKV](#service-principal-cannot-access-azure-ad-and-akv)|Aug 2020|Has Workaround||
33
33
|[Restoring manual backup without CHECKSUM might fail](#restoring-manual-backup-without-checksum-might-fail)|May 2020|Resolved|June 2020|
34
34
|[Agent becomes unresponsive upon modifying, disabling, or enabling existing jobs](#agent-becomes-unresponsive-upon-modifying-disabling-or-enabling-existing-jobs)|May 2020|Resolved|June 2020|
@@ -116,22 +116,22 @@ BEGIN
116
116
END
117
117
```
118
118
119
-
### Distributed transactions can be executed after removing Managed Instance from Server Trust Group
119
+
### Distributed transactions can be executed after removing managed instance from Server Trust Group
120
120
121
-
[Server Trust Groups](../managed-instance/server-trust-group-overview.md) are used to establish trust between Managed Instances that is prerequisite for executing [distributed transactions](../database/elastic-transactions-overview.md). After removing Managed Instance from Server Trust Group or deleting the group, you still might be able to execute distributed transactions. There is a workaround you can apply to be sure that distributed transactions are disabled and that is [user-initiated manual failover](../managed-instance/user-initiated-failover.md) on Managed Instance.
121
+
[Server Trust Groups](../managed-instance/server-trust-group-overview.md) are used to establish trust between managed instances that is prerequisite for executing [distributed transactions](../database/elastic-transactions-overview.md). After removing managed instance from Server Trust Group or deleting the group, you still might be able to execute distributed transactions. There is a workaround you can apply to be sure that distributed transactions are disabled and that is [user-initiated manual failover](../managed-instance/user-initiated-failover.md) on managed instance.
122
122
123
-
### Distributed transactions cannot be executed after Managed Instance scaling operation
123
+
### Distributed transactions cannot be executed after managed instance scaling operation
124
124
125
-
Managed Instance scaling operations that include changing service tier or number of vCores will reset Server Trust Group settings on the backend and disable running [distributed transactions](../database/elastic-transactions-overview.md). As a workaround, delete and create new [Server Trust Group](../managed-instance/server-trust-group-overview.md) on Azure portal.
125
+
SQL Managed Instance scaling operations that include changing service tier or number of vCores will reset Server Trust Group settings on the backend and disable running [distributed transactions](../database/elastic-transactions-overview.md). As a workaround, delete and create new [Server Trust Group](../managed-instance/server-trust-group-overview.md) on Azure portal.
126
126
127
127
### Cannot create SQL Managed Instance with the same name as logical server previously deleted
128
128
129
-
After [logical server](../database/logical-servers.md)is deleted, there is a threshold period of 7 days before the name is released from the records. In that period, SQL Managed Instance with the same name cannot be created. As a workaround you would need to use different name for the SQL Managed Instance or create a support ticket for releasing a logical server name.
130
-
After [logical server](./logical-servers.md) is deleted, there is a threshold period of 7 days before the name is released from the records. In that period, SQL Managed Instance with the same name cannot be created. As a workaround you would need to use different name for the SQL Managed Instance or create a support ticket for releasing a logical server name.
129
+
A DNS record of `<name>.database.windows.com` is created when you create a [logical server in Azure](../database/logical-servers.md)for Azure SQL Database, and when you create a SQL Managed Instance. The DNS record must be unique. As such, if you create a logical server for SQL Database and then delete it, there is a threshold period of 7 days before the name is released from the records. In that period, a SQL Managed Instance cannot be created with the same name as the deleted logical server. As a workaround, use a different name for the SQL Managed Instance, or create a support ticket to release the logical server name.
130
+
131
131
132
132
### BULK INSERT and BACKUP/RESTORE statements should use SAS Key to access Azure storage
133
133
134
-
Currently, it is not supported to use `DATABASE SCOPED CREDENTIAL` syntax with Managed Identity to authenticate to Azure storage. Microsoft recommends using a [shared access signature](../../storage/common/storage-sas-overview.md) for the [database scoped credential](/sql/t-sql/statements/create-credential-transact-sql#d-creating-a-credential-using-a-sas-token), when accessing Azure storage for bulk insert, `BACKUP` and `RESTORE` statements, or the `OPENROWSET` function. For example:
134
+
Currently, the `DATABASE SCOPED CREDENTIAL` syntax is not supported with Managed Identity to authenticate to Azure Storage. Microsoft recommends using a [shared access signature](../../storage/common/storage-sas-overview.md) for the [database scoped credential](/sql/t-sql/statements/create-credential-transact-sql#d-creating-a-credential-using-a-sas-token), when accessing Azure Storage for bulk insert, `BACKUP` and `RESTORE` statements, or the `OPENROWSET` function. For example:
135
135
136
136
```sql
137
137
CREATEDATABASESCOPED CREDENTIAL sas_cred WITH IDENTITY ='SHARED ACCESS SIGNATURE',
@@ -279,6 +279,36 @@ using (var scope = new TransactionScope())
279
279
280
280
CLR modules in SQL Managed Instance and linked servers or distributed queries that reference a current instance sometimes can't resolve the IP of a local instance. This error is a transient issue.
281
281
282
+
### Transaction scope on two databases within the same instance isn't supported
283
+
284
+
**(Resolved in March 2020)** The `TransactionScope` class in .NET doesn't work if two queries are sent to two databases within the same instance under the same transaction scope:
285
+
286
+
```csharp
287
+
using (varscope=newTransactionScope())
288
+
{
289
+
using (varconn1=newSqlConnection("Server=quickstartbmi.neu15011648751ff.database.windows.net;Database=b;User ID=myuser;Password=mypassword;Encrypt=true"))
290
+
{
291
+
conn1.Open();
292
+
SqlCommandcmd1=conn1.CreateCommand();
293
+
cmd1.CommandText=string.Format("insert into T1 values(1)");
294
+
cmd1.ExecuteNonQuery();
295
+
}
296
+
297
+
using (varconn2=newSqlConnection("Server=quickstartbmi.neu15011648751ff.database.windows.net;Database=b;User ID=myuser;Password=mypassword;Encrypt=true"))
298
+
{
299
+
conn2.Open();
300
+
varcmd2=conn2.CreateCommand();
301
+
cmd2.CommandText=string.Format("insert into b.dbo.T2 values(2)"); cmd2.ExecuteNonQuery();
302
+
}
303
+
304
+
scope.Complete();
305
+
}
306
+
307
+
```
308
+
309
+
**Workaround (not needed since March 2020)**: Use [SqlConnection.ChangeDatabase(String)](/dotnet/api/system.data.sqlclient.sqlconnection.changedatabase) to use another database in a connection context instead of using two connections.
310
+
311
+
282
312
## No resolution
283
313
284
314
### Misleading error message on Azure portal suggesting recreation of the Service Principal
@@ -316,36 +346,6 @@ The `tempdb` database is always split into 12 data files, and the file structure
316
346
317
347
Error logs that are available in SQL Managed Instance aren't persisted, and their size isn't included in the maximum storage limit. Error logs might be automatically erased if failover occurs. There might be gaps in the error log history because SQL Managed Instance was moved several times on several virtual machines.
318
348
319
-
### Transaction scope on two databases within the same instance isn't supported
320
-
321
-
**(Resolved in March 2020)** The `TransactionScope` class in .NET doesn't work if two queries are sent to two databases within the same instance under the same transaction scope:
322
-
323
-
```csharp
324
-
using (varscope=newTransactionScope())
325
-
{
326
-
using (varconn1=newSqlConnection("Server=quickstartbmi.neu15011648751ff.database.windows.net;Database=b;User ID=myuser;Password=mypassword;Encrypt=true"))
327
-
{
328
-
conn1.Open();
329
-
SqlCommandcmd1=conn1.CreateCommand();
330
-
cmd1.CommandText=string.Format("insert into T1 values(1)");
331
-
cmd1.ExecuteNonQuery();
332
-
}
333
-
334
-
using (varconn2=newSqlConnection("Server=quickstartbmi.neu15011648751ff.database.windows.net;Database=b;User ID=myuser;Password=mypassword;Encrypt=true"))
335
-
{
336
-
conn2.Open();
337
-
varcmd2=conn2.CreateCommand();
338
-
cmd2.CommandText=string.Format("insert into b.dbo.T2 values(2)"); cmd2.ExecuteNonQuery();
339
-
}
340
-
341
-
scope.Complete();
342
-
}
343
-
344
-
```
345
-
346
-
**Workaround (not needed since March 2020)**: Use [SqlConnection.ChangeDatabase(String)](/dotnet/api/system.data.sqlclient.sqlconnection.changedatabase) to use another database in a connection context instead of using two connections.
347
-
348
-
349
349
## Contribute to content
350
350
351
351
To contribute to the Azure SQL documentation, see the [Docs contributor guide](/contribute/).
Copy file name to clipboardExpand all lines: articles/azure-sql/managed-instance/restore-sample-database-quickstart.md
+18-18Lines changed: 18 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,69 +45,69 @@ In SSMS, follow these steps to restore the Wide World Importers database to SQL
45
45
1. Open SSMS and connect to your managed instance.
46
46
2. In **Object Explorer**, right-click the databases of your managed instance and select **Restore Database** to open the restore wizard.
47
47
48
-

48
+
:::image type="content" source="./media/restore-sample-database-quickstart/restore-wizard-start.png" alt-text="Screenshot that shows opening the restore wizard.":::
49
49
50
50
3. In the new restore wizard, select the ellipsis (**...**) to select the source of the backup file to use.
51
51
52
-

52
+
:::image type="content" source="./media/restore-sample-database-quickstart/new-restore-wizard.png" alt-text="Screenshot that shows opening a new restore wizard window.":::
53
53
54
54
4. In **Select backup devices**, select **Add**. In **Backup media type**, **URL** is the only option because it is the only source type supported. Select **OK**.
55
55
56
-

56
+
:::image type="content" source="./media/restore-sample-database-quickstart/restore-wizard-select-device.png" alt-text="Screenshot that shows selecting the device.":::
57
57
58
58
5. In **Select a Backup File Location**, you can choose from three options to provide information about backup files are located:
59
59
- Select a pre-registered storage container from the dropdown.
60
60
- Enter a new storage container and a shared access signature. (A new SQL credential will be registered for you.)
61
61
- Select **Add** to browse more storage containers from your Azure subscription.
62
62
63
-

63
+
:::image type="content" source="./media/restore-sample-database-quickstart/restore-wizard-backup-file-location.png" alt-text="Screenshot that shows selecting the backup file location.":::
64
64
65
65
Complete the next steps if you select the **Add** button. If you use a different method to provide the backup file location, go to step 12.
66
66
6. In **Connect to a Microsoft Subscription**, select **Sign in** to sign in to your Azure subscription:
67
67
68
-

68
+
:::image type="content" source="./media/restore-sample-database-quickstart/restore-wizard-connect-subscription-sign-in.png" alt-text="Screenshot that shows Azure subscription sign-in.":::
69
69
70
70
7. Sign in to your Microsoft Account to initiate the session in Azure:
71
71
72
-

72
+
:::image type="content" source="./media/restore-sample-database-quickstart/restore-wizard-sign-in-session.png" alt-text="Screenshot that shows signing in to the Azure session.":::
73
73
74
74
8. Select the subscription where the storage account with the backup files is located:
75
75
76
-

76
+
:::image type="content" source="./media/restore-sample-database-quickstart/restore-wizard-select-subscription.png" alt-text="Screenshot that shows selecting the subscription.":::
77
77
78
78
9. Select the storage account where the backup files are located:
79
79
80
-

80
+
:::image type="content" source="./media/restore-sample-database-quickstart/restore-wizard-select-storage-account.png" alt-text="Screenshot that shows the storage account.":::
81
81
82
82
10. Select the blob container where the backup files are located:
11. Specify the expiration date of the shared access policy and select **Create Credential**. A shared access signature with the correct permissions is created. Select **OK**.
87
87
88
-

88
+
:::image type="content" source="./media/restore-sample-database-quickstart/restore-wizard-generate-shared-access-signature.png" alt-text="Screenshot that shows generating the shared access signature.":::
89
89
90
90
12. In the left pane, expand the folder structure to show the folder where the backup files are located. Select all the backup files that are related to the backup set to be restored, and then select **OK**:
91
91
92
-

92
+
:::image type="content" source="./media/restore-sample-database-quickstart/restore-wizard-backup-file-selection.png" alt-text="Screenshot that shows the backup file selection.":::
93
93
94
94
SSMS validates the backup set. The process takes up to a few seconds depending on the size of the backup set.
95
95
96
96
13. If the backup is validated, specify the destination database name or leave the database name of the backup set, and then select **OK**:
97
97
98
-

98
+
:::image type="content" source="./media/restore-sample-database-quickstart/restore-wizard-start-restore.png" alt-text="Screenshot that shows starting the restore.":::
99
99
100
100
The restore starts. The duration depends on the size of the backup set.
101
101
102
-

102
+
:::image type="content" source="./media/restore-sample-database-quickstart/restore-wizard-running-restore.png" alt-text="Screenshot that shows running the restore.":::
103
103
104
104
14. When the restore finishes, a dialog shows that it was successful. Select **OK**.
105
105
106
-

106
+
:::image type="content" source="./media/restore-sample-database-quickstart/restore-wizard-finish-restore.png" alt-text="Screenshot that shows the finished restore.":::
107
107
108
108
15. Check the restored database in Object Explorer:
109
109
110
-

110
+
:::image type="content" source="./media/restore-sample-database-quickstart/restore-wizard-restored-database.png" alt-text="Screenshot that shows the restored database.":::
111
111
112
112
113
113
## Restore from a backup file using T-SQL
@@ -127,7 +127,7 @@ In SQL Server Management Studio, follow these steps to restore the Wide World Im
4. To check your credential, run the following script, which uses a [container](https://azure.microsoft.com/services/container-instances/) URL to get a backup file list.
133
133
@@ -136,7 +136,7 @@ In SQL Server Management Studio, follow these steps to restore the Wide World Im

148
+
:::image type="content" source="./media/restore-sample-database-quickstart/restore.png" alt-text="Screenshot shows the script running in Object Explorer with a success message.":::
149
149
150
150
6. Run the following script to track the status of your restore.
0 commit comments