Skip to content

Commit 5f68b60

Browse files
committed
fixing broken links
1 parent d22a900 commit 5f68b60

File tree

6 files changed

+7
-7
lines changed

6 files changed

+7
-7
lines changed

articles/azure-sql/database/alerts-insights-configure-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ You can configure an alert to do the following when it triggers:
3434

3535
You can configure and get information about alert rules using
3636

37-
* [Azure portal](../monitoring-and-diagnostics/insights-alerts-portal.md)
37+
* [Azure portal](../../azure-monitor/platform/alerts-classic-portal.md)
3838
* [PowerShell](../../azure-monitor/platform/alerts-classic-portal.md)
3939
* [command-line interface (CLI)](../../azure-monitor/platform/alerts-classic-portal.md)
4040
* [Azure Monitor REST API](https://msdn.microsoft.com/library/azure/dn931945.aspx)

articles/azure-sql/database/how-to-content-reference-guide.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,8 +41,8 @@ In this article you can find a content reference of various guides, scripts, and
4141
- [Configure transactional replication](../../sql-database/replication-to-sql-database.md) to replicate your date between databases.
4242
- [Configure threat detection](../../sql-database/sql-database-threat-detection.md) to let Azure SQL Database identify suspicious activities such as SQL Injection or access from suspicious locations.
4343
- [Configure dynamic data masking](dynamic-data-masking-configure-portal.md) to protect your sensitive data.
44-
- [Configure backup retention](long-term-backup-retention-configure.md) for a database to keep your backups on Azure Blob Storage. As an alternative there is [Configure backup retention using Azure vault (deprecated)](sql-database-long-term-backup-retention-configure-vault.md) approach.
45-
- [Configure geo-replication](sql-database-geo-replication-portal.md) to keep a replica of your database in another region.
44+
- [Configure backup retention](long-term-backup-retention-configure.md) for a database to keep your backups on Azure Blob Storage.
45+
- [Configure geo-replication](active-geo-replication-overview.md) to keep a replica of your database in another region.
4646
- [Configure security for geo-replicas](../../sql-database/sql-database-geo-replication-security-config.md).
4747

4848
## Monitor and tune your database

articles/azure-sql/database/manage-data-after-migrating-to-database.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ The traditional windows authentication is not supported. Azure Active Directory
104104
|Prefer not to use Azure Active Directory (AD) in Azure|Use [SQL authentication](../../sql-database/sql-database-security-overview.md)|
105105
|Used AD on SQL Server on-premises|[Federate AD with Azure AD](../../active-directory/hybrid/whatis-hybrid-identity.md), and use Azure AD authentication. With this, you can use Single Sign-On.|
106106
|Need to enforce multi-factor authentication (MFA)|Require MFA as a policy through [Microsoft Conditional Access](../../sql-database/sql-database-conditional-access.md), and use [Azure AD Universal authentication with MFA support](../../sql-database/sql-database-ssms-mfa-authentication.md).|
107-
|Have guest accounts from Microsoft accounts (live.com, outlook.com) or other domains (gmail.com)|Use [Azure AD Universal authentication](../../sql-database/sql-database-ssms-mfa-authentication.md) in SQL Database/Data Warehouse, which leverages [Azure AD B2B Collaboration](../active-directory/active-directory-b2b-what-is-azure-ad-b2b.md).|
107+
|Have guest accounts from Microsoft accounts (live.com, outlook.com) or other domains (gmail.com)|Use [Azure AD Universal authentication](../../sql-database/sql-database-ssms-mfa-authentication.md) in SQL Database/Data Warehouse, which leverages [Azure AD B2B Collaboration](../../active-directory/b2b/what-is-b2b.md).|
108108
|Are logged in to Windows using your Azure AD credentials from a federated domain|Use [Azure AD integrated authentication](../../sql-database/sql-database-aad-authentication-configure.md).|
109109
|Are logged in to Windows using credentials from a domain not federated with Azure|Use [Azure AD integrated authentication](../../sql-database/sql-database-aad-authentication-configure.md).|
110110
|Have middle-tier services which need to connect to SQL Database or SQL Data Warehouse|Use [Azure AD integrated authentication](../../sql-database/sql-database-aad-authentication-configure.md).|
@@ -134,7 +134,7 @@ Service endpoints (SE) allow you to expose your critical Azure resources only to
134134

135135
#### Reserved IPs
136136

137-
Another option is to provision [reserved IPs](../virtual-network/virtual-networks-reserved-public-ip.md) for your VMs, and add those specific VM IP addresses in the server firewall settings. By assigning reserved IPs, you save the trouble of having to update the firewall rules with changing IP addresses.
137+
Another option is to provision [reserved IPs](/previous-versions/azure/virtual-network/virtual-networks-reserved-public-ip) for your VMs, and add those specific VM IP addresses in the server firewall settings. By assigning reserved IPs, you save the trouble of having to update the firewall rules with changing IP addresses.
138138

139139
### What port do I connect to SQL Database on
140140

@@ -324,7 +324,7 @@ SQL Database uses some smart techniques that allow it to handle certain classes
324324
You have several ways to achieve this:
325325

326326
- **[Data Sync](../../sql-database/sql-database-sync-data.md)** – This feature helps you synchronize data bi-directionally between multiple on-premises SQL Server databases and SQL Database. To sync with on-premises SQL Server databases, you need to install and configure sync agent on a local computer and open the outbound TCP port 1433.
327-
- **[Transaction Replication](https://azure.microsoft.com/blog/transactional-replication-to-azure-sql-database-is-now-generally-available/)** – With transaction replication you can synchronize your data from on-premises to Azure SQL Database with the on-premises being the publisher and the Azure SQL Database being the subscriber. For now, only this setup is supported. For more information on how to migrate your data from on-premises to Azure SQL with minimal downtime, see: [Use Transaction Replication](sql-database-single-database-migrate.md#method-2-use-transactional-replication)
327+
- **[Transaction Replication](https://azure.microsoft.com/blog/transactional-replication-to-azure-sql-database-is-now-generally-available/)** – With transaction replication you can synchronize your data from on-premises to Azure SQL Database with the on-premises being the publisher and the Azure SQL Database being the subscriber. For now, only this setup is supported. For more information on how to migrate your data from on-premises to Azure SQL with minimal downtime, see: [Use Transaction Replication](../../sql-database/sql-database-single-database-migrate.md#method-2-use-transactional-replication)
328328

329329
## Next steps
330330

67.7 KB
Loading

articles/azure-sql/database/tutorial-geo-distributed-application-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ To complete the tutorial, make sure you've installed the following items:
4747
> [!IMPORTANT]
4848
> Be sure to set up firewall rules to use the public IP address of the computer on which you're performing the steps in this tutorial. Database-level firewall rules will replicate automatically to the secondary server.
4949
>
50-
> For information see [Create a database-level firewall rule](/sql/relational-databases/system-stored-procedures/sp-set-database-firewall-rule-azure-sql-database) or to determine the IP address used for the server-level firewall rule for your computer see [Create a server-level firewall](sql-database-server-level-firewall-rule.md).
50+
> For information see [Create a database-level firewall rule](/sql/relational-databases/system-stored-procedures/sp-set-database-firewall-rule-azure-sql-database) or to determine the IP address used for the server-level firewall rule for your computer see [Create a server-level firewall](../../sql-database/sql-database-server-level-firewall-rule.md).
5151
5252
## Create a failover group
5353

0 commit comments

Comments
 (0)