You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This article walks through the basic considerations that a developer should be aware of when writing code to connect to your database in Azure. This article applies to Azure SQL Database, and Azure SQL Managed Instance
17
+
This article walks through the basic considerations that a developer should be aware of when writing code to connect to your database in Azure. This article applies to Azure SQL Database, and Azure SQL Managed Instance.
18
18
19
19
## Language and platform
20
20
@@ -24,7 +24,7 @@ You can leverage open-source tools like [cheetah](https://github.com/wunderlist/
24
24
25
25
## Authentication
26
26
27
-
Access to Azure SQL Database is protected with logins and firewalls. Azure SQL Database supports both SQL Server and [Azure Active Directory (AAD) authentication](authentication-aad-overview.md) users and logins. AAD logins are available only in SQL Managed Instance.
27
+
Access to Azure SQL Database is protected with logins and firewalls. Azure SQL Database supports both SQL Server and [Azure Active Directory authentication](authentication-aad-overview.md) users and logins. Azure Active Directory logins are available only in SQL Managed Instance.
28
28
29
29
Learn more about [managing database access and login](logins-create-manage.md).
30
30
@@ -40,7 +40,7 @@ Avoid long-running transactions because any infrastructure or connection failure
40
40
41
41
Azure SQL Database is a cloud service where you might expect transient errors that happen in the underlying infrastructure or in the communication between cloud entities. Although Azure SQL Database is resilient on the transitive infrastructure failures, these failures might affect your connectivity. When a transient error occurs while connecting to SQL Database, your code should [retry the call](troubleshoot-common-connectivity-issues.md). We recommend that retry logic use backoff logic, so that it does not overwhelm the SQL database with multiple clients retrying simultaneously. Retry logic depends on the [error messages for SQL Database client programs](troubleshoot-common-errors-issues.md).
42
42
43
-
For more information about how to prepare for planned maintenance events on your Azure SQL database, see [planning for Azure maintenance events in Azure SQL Database](planned-maintenance.md).
43
+
For more information about how to prepare for planned maintenance events on your Azure SQL Database, see [planning for Azure maintenance events in Azure SQL Database](planned-maintenance.md).
Copy file name to clipboardExpand all lines: articles/azure-sql/database/vnet-service-endpoint-rule-overview.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,7 +58,7 @@ The roles of Network Admin and Database Admin have more capabilities than are ne
58
58
You have the option of using [role-based access control (RBAC)][rbac-what-is-813s] in Azure to create a single custom role that has only the necessary subset of capabilities. The custom role could be used instead of involving either the Network Admin or the Database Admin. The surface area of your security exposure is lower if you add a user to a custom role, versus adding the user to the other two major administrator roles.
59
59
60
60
> [!NOTE]
61
-
> In some cases the Azure SQL database and the VNet-subnet are in different subscriptions. In these cases you must ensure the following configurations:
61
+
> In some cases the database in Azure SQL Database and the VNet-subnet are in different subscriptions. In these cases you must ensure the following configurations:
62
62
>
63
63
> - Both subscriptions must be in the same Azure Active Directory tenant.
64
64
> - The user has the required permissions to initiate operations, such as enabling service endpoints and adding a VNet-subnet to the given Server.
@@ -68,7 +68,7 @@ You have the option of using [role-based access control (RBAC)][rbac-what-is-813
68
68
69
69
For Azure SQL Database, the virtual network rules feature has the following limitations:
70
70
71
-
- In the firewall for your Azure SQL database, each virtual network rule references a subnet. All these referenced subnets must be hosted in the same geographic region that hosts the Azure SQL database.
71
+
- In the firewall for your database in Azure SQL Database, each virtual network rule references a subnet. All these referenced subnets must be hosted in the same geographic region that hosts the Azure SQL database.
72
72
73
73
- Each server can have up to 128 ACL entries for any given virtual network.
74
74
@@ -176,7 +176,7 @@ Blob auditing pushes audit logs to your own storage account. If this storage acc
176
176
177
177
## Adding a VNet Firewall rule to your server without turning On VNet Service Endpoints
178
178
179
-
Long ago, before this feature was enhanced, you were required to turn VNet service endpoints On before you could implement a live VNet rule in the Firewall. The endpoints related a given VNet-subnet to an Azure SQL database. But now as of January 2018, you can circumvent this requirement by setting the **IgnoreMissingVNetServiceEndpoint** flag.
179
+
Long ago, before this feature was enhanced, you were required to turn VNet service endpoints On before you could implement a live VNet rule in the Firewall. The endpoints related a given VNet-subnet to a database inAzure SQL Database. But now as of January 2018, you can circumvent this requirement by setting the **IgnoreMissingVNetServiceEndpoint** flag.
180
180
181
181
Merely setting a Firewall rule does not help secure the server. You must also turn VNet service endpoints On for the security to take effect. When you turn service endpoints On, your VNet-subnet experiences downtime until it completes the transition from Off to On. This is especially true in the context of large VNets. You can use the **IgnoreMissingVNetServiceEndpoint** flag to reduce or eliminate the downtime during transition.
182
182
@@ -206,7 +206,7 @@ Connection error 40914 relates to *virtual network rules*, as specified on the F
206
206
207
207
## Portal can create a virtual network rule
208
208
209
-
This section illustrates how you can use the [Azure portal][http-azure-portal-link-ref-477t] to create a *virtual network rule* in your Azure SQL database. The rule tells your database to accept communication from a particular subnet that has been tagged as being a *Virtual Network service endpoint*.
209
+
This section illustrates how you can use the [Azure portal][http-azure-portal-link-ref-477t] to create a *virtual network rule* in your database in Azure SQL Database. The rule tells your database to accept communication from a particular subnet that has been tagged as being a *Virtual Network service endpoint*.
210
210
211
211
> [!NOTE]
212
212
> If you intend to add a service endpoint to the VNet firewall rules of your server, first ensure that service endpoints are turned On for the subnet.
Copy file name to clipboardExpand all lines: articles/azure-sql/database/xevent-code-event-file.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -237,7 +237,7 @@ The script starts with commands to clean up after a possible previous run, and i
237
237
The PowerShell script printed a few named values when it ended. You must edit the Transact-SQL script to use those values. Find **TODO** in the Transact-SQL script to locate the edit points.
238
238
239
239
1. Open SQL Server Management Studio (ssms.exe).
240
-
2. Connect to your Azure SQL database.
240
+
2. Connect to your database in Azure SQL Database.
241
241
3. Click to open a new query pane.
242
242
4. Paste the following Transact-SQL script into the query pane.
243
243
5. Find every **TODO** in the script and make the appropriate edits.
0 commit comments