Skip to content

Commit 8695e79

Browse files
authored
Merge pull request #232408 from MicrosoftDocs/release-postgresql-single-server-deprecate
Release postgresql single server deprecate--Scheduled release at 3pm of 3/29
2 parents 8ab7c2e + 53190eb commit 8695e79

File tree

115 files changed

+746
-219
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

115 files changed

+746
-219
lines changed
Lines changed: 77 additions & 77 deletions
Original file line numberDiff line numberDiff line change
@@ -1,77 +1,77 @@
1-
---
2-
title: Rotate SQL Managed Instance service-managed credentials (preview)
3-
description: Rotate SQL Managed Instance service-managed credentials (preview)
4-
services: azure-arc
5-
ms.service: azure-arc
6-
ms.subservice: azure-arc-data
7-
author: MikeRayMSFT
8-
ms.author: mikeray
9-
ms.reviewer: mikeray
10-
ms.date: 03/06/2023
11-
ms.topic: how-to
12-
---
13-
# Rotate Azure Arc-enabled SQL Managed Instance service-managed credentials (preview)
14-
15-
This article describes how to rotate service-managed credentials for Azure Arc-enabled SQL Managed Instance. Arc data services generates various service-managed credentials like certificates and SQL logins used for Monitoring, Backup/Restore, High Availability etc. These credentials are considered custom resource credentials managed by Azure Arc data services.
16-
17-
Service-managed credential rotation is a user-triggered operation that you initiate during a security issue or when periodic rotation is required for compliance.
18-
19-
## Limitations
20-
21-
Consider the following limitations when you rotate a managed instance service-managed credentials:
22-
23-
- SQL Server failover groups aren't supported.
24-
- Automatically pre-scheduled rotation isn't supported.
25-
- The service-managed DPAPI symmetric keys, keytab, active directory accounts, and service-managed TDE credentials aren't included in this credential rotation.
26-
- SQL Managed Instance Business Critical tier isn't supported.
27-
- This feature should not be used in production currently. There is a known limitation where _rollback_ cannot be triggered unless credential rotation is completed successfully and the SQLMI is in "Ready" state.
28-
29-
## General Purpose tier
30-
31-
During a SQL Managed Instance service-managed credential rotation, the managed instance Kubernetes pod is terminated and reprovisioned when new credentials are generated. This process causes a short amount of downtime as the new managed instance pod is created. To handle the interruption, build resiliency into your application such as connection retry logic, to ensure minimal disruption. Read [Overview of the reliability pillar](/azure/architecture/framework/resiliency/overview) for more information on how to architect resiliency and [retry guidance for Azure Services](/azure/architecture/best-practices/retry-service-specific#sql-database-using-adonet).
32-
33-
## Prerequisites:
34-
35-
Before you proceed with this article, you must have an Azure Arc-enabled SQL Managed Instance resource created.
36-
37-
- [An Azure Arc-enabled SQL Managed Instance created](./create-sql-managed-instance.md)
38-
39-
## How to rotate service-managed credentials in a managed instance
40-
41-
Service-managed credentials are associated with a generation within the managed instance. To rotate all service-managed credentials for a managed instance, the generation must be increased by 1.
42-
43-
Run the following commands to get current service-managed credentials generation from spec and generate the new generation of service-managed credentials. This action triggers a service-managed credential rotation.
44-
45-
```console
46-
rotateCredentialGeneration=$(($(kubectl get sqlmi <sqlmi-name> -o jsonpath='{.spec.update.managedCredentialsGeneration}' -n <namespace>) + 1)) 
47-
```
48-
49-
50-
```console
51-
kubectl patch sqlmi <sqlmi-name> --namespace <namespace> --type merge --patch '{ "spec": { "update": { "managedCredentialsGeneration": '$rotateCredentialGeneration'} } }' 
52-
```
53-
---
54-
55-
The `managedCredentialsGeneration` identifies the target generation for the service-managed credentials. The rest of the features like configuration and the kubernetes topology remain the same.
56-
57-
## How to roll back service-managed credentials in a managed instance
58-
59-
> [!NOTE]
60-
> Rollback is required when credential rotation failed for any reasons. Rollback to previous credentials generation is supported only once to n-1 where n is current generation.
61-
62-
Run the following two commands to get current service-managed credentials generation from spec and rollback to the previous generation of service-managed credentials:
63-
64-
```console
65-
rotateCredentialGeneration=$(($(kubectl get sqlmi <sqlmi-name> -o jsonpath='{.spec.update.managedCredentialsGeneration}' -n <namespace>) - 1)) 
66-
```
67-
68-
```console
69-
kubectl patch sqlmi <sqlmi-name> --namespace <namespace> --type merge --patch '{ "spec": { "update": { "managedCredentialsGeneration": '$rotateCredentialGeneration'} } }' 
70-
```
71-
72-
Triggering rollback is the same as triggering a rotation of service-managed credentials except that the target generation is previous generation and doesn't generate a new generation or credentials.
73-
74-
## Next steps
75-
76-
- [View the SQL managed instance dashboards](azure-data-studio-dashboards.md#view-the-sql-managed-instance-dashboards)
77-
- [View SQL Managed Instance in the Azure portal](view-arc-data-services-inventory-in-azure-portal.md)
1+
---
2+
title: Rotate SQL Managed Instance service-managed credentials (preview)
3+
description: Rotate SQL Managed Instance service-managed credentials (preview)
4+
services: azure-arc
5+
ms.service: azure-arc
6+
ms.subservice: azure-arc-data
7+
author: MikeRayMSFT
8+
ms.author: mikeray
9+
ms.reviewer: mikeray
10+
ms.date: 03/06/2023
11+
ms.topic: how-to
12+
---
13+
# Rotate Azure Arc-enabled SQL Managed Instance service-managed credentials (preview)
14+
15+
This article describes how to rotate service-managed credentials for Azure Arc-enabled SQL Managed Instance. Arc data services generates various service-managed credentials like certificates and SQL logins used for Monitoring, Backup/Restore, High Availability etc. These credentials are considered custom resource credentials managed by Azure Arc data services.
16+
17+
Service-managed credential rotation is a user-triggered operation that you initiate during a security issue or when periodic rotation is required for compliance.
18+
19+
## Limitations
20+
21+
Consider the following limitations when you rotate a managed instance service-managed credentials:
22+
23+
- SQL Server failover groups aren't supported.
24+
- Automatically pre-scheduled rotation isn't supported.
25+
- The service-managed DPAPI symmetric keys, keytab, active directory accounts, and service-managed TDE credentials aren't included in this credential rotation.
26+
- SQL Managed Instance Business Critical tier isn't supported.
27+
- This feature should not be used in production currently. There is a known limitation where _rollback_ cannot be triggered unless credential rotation is completed successfully and the SQLMI is in "Ready" state.
28+
29+
## General Purpose tier
30+
31+
During a SQL Managed Instance service-managed credential rotation, the managed instance Kubernetes pod is terminated and reprovisioned when new credentials are generated. This process causes a short amount of downtime as the new managed instance pod is created. To handle the interruption, build resiliency into your application such as connection retry logic, to ensure minimal disruption. Read [Overview of the reliability pillar](/azure/architecture/framework/resiliency/overview) for more information on how to architect resiliency and [retry guidance for Azure Services](/azure/architecture/best-practices/retry-service-specific#sql-database-using-adonet).
32+
33+
## Prerequisites:
34+
35+
Before you proceed with this article, you must have an Azure Arc-enabled SQL Managed Instance resource created.
36+
37+
- [An Azure Arc-enabled SQL Managed Instance created](./create-sql-managed-instance.md)
38+
39+
## How to rotate service-managed credentials in a managed instance
40+
41+
Service-managed credentials are associated with a generation within the managed instance. To rotate all service-managed credentials for a managed instance, the generation must be increased by 1.
42+
43+
Run the following commands to get current service-managed credentials generation from spec and generate the new generation of service-managed credentials. This action triggers a service-managed credential rotation.
44+
45+
```console
46+
rotateCredentialGeneration=$(($(kubectl get sqlmi <sqlmi-name> -o jsonpath='{.spec.update.managedCredentialsGeneration}' -n <namespace>) + 1)) 
47+
```
48+
49+
50+
```console
51+
kubectl patch sqlmi <sqlmi-name> --namespace <namespace> --type merge --patch '{ "spec": { "update": { "managedCredentialsGeneration": '$rotateCredentialGeneration'} } }' 
52+
```
53+
---
54+
55+
The `managedCredentialsGeneration` identifies the target generation for the service-managed credentials. The rest of the features like configuration and the kubernetes topology remain the same.
56+
57+
## How to roll back service-managed credentials in a managed instance
58+
59+
> [!NOTE]
60+
> Rollback is required when credential rotation failed for any reasons. Rollback to previous credentials generation is supported only once to n-1 where n is current generation.
61+
62+
Run the following two commands to get current service-managed credentials generation from spec and rollback to the previous generation of service-managed credentials:
63+
64+
```console
65+
rotateCredentialGeneration=$(($(kubectl get sqlmi <sqlmi-name> -o jsonpath='{.spec.update.managedCredentialsGeneration}' -n <namespace>) - 1)) 
66+
```
67+
68+
```console
69+
kubectl patch sqlmi <sqlmi-name> --namespace <namespace> --type merge --patch '{ "spec": { "update": { "managedCredentialsGeneration": '$rotateCredentialGeneration'} } }' 
70+
```
71+
72+
Triggering rollback is the same as triggering a rotation of service-managed credentials except that the target generation is previous generation and doesn't generate a new generation or credentials.
73+
74+
## Next steps
75+
76+
- [View the SQL managed instance dashboards](azure-data-studio-dashboards.md#view-the-sql-managed-instance-dashboards)
77+
- [View SQL Managed Instance in the Azure portal](view-arc-data-services-inventory-in-azure-portal.md)

articles/postgresql/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,10 +44,12 @@
4444
href: single-server/concepts-known-issues-limitations.md
4545
displayName: issues, limitations, postgresql
4646
- name: Single Server
47-
expanded: true
47+
expanded: false
4848
items:
4949
- name: Single Server documentation
5050
href: single-server/index.yml
51+
- name: What's happening to Single Server?
52+
href: single-server/whats-happening-to-postgresql-single-server.md
5153
- name: Overview
5254
href: single-server/overview-single-server.md
5355
- name: Quickstarts

articles/postgresql/flexible-server/overview-postgres-choose-server-options.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ ms.date: 03/27/2023
1414

1515
[!INCLUDE [applies-to-postgresql-flexible-server](../includes/applies-to-postgresql-flexible-server.md)]
1616

17+
[!INCLUDE [azure-database-for-postgresql-single-server-deprecation](../includes/azure-database-for-postgresql-single-server-deprecation.md)]
18+
1719
With Azure, your PostgreSQL Server workloads can run in a hosted virtual machine infrastructure as a service (IaaS) or as a hosted platform as a service (PaaS). PaaS has multiple deployment options, each with multiple service tiers. When you choose between IaaS and PaaS, you must decide if you want to manage your database, apply patches, and make backups, or if you want to delegate these operations to Azure.
1820

1921
When making your decision, consider the following option in PaaS or alternatively running on Azure VMs (IaaS)
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
---
2+
title: Deprecate Azure Database for PostgreSQL - Single Server
3+
ms.service: postgresql
4+
ms.topic: include
5+
author: markingmyname
6+
ms.author: maghan
7+
ms.date: 03/15/2023
8+
---
9+
10+
> [!IMPORTANT]
11+
> Azure Database for PostgreSQL - Single Server is on the retirement path. We strongly recommend for you to upgrade to Azure Database for PostgreSQL - Flexible Server. For more information about migrating to Azure Database for PostgreSQL - Flexible Server, see [What's happening to Azure Database for PostgreSQL Single Server](../single-server/whats-happening-to-PostgreSQL-single-server.md)?

0 commit comments

Comments
 (0)