Skip to content

Commit 8b4ae2a

Browse files
committed
fixing things
1 parent e645cea commit 8b4ae2a

14 files changed

+14
-14
lines changed

articles/azure-sql/database/scripts/add-database-to-failover-group-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ If you choose to install and use the PowerShell locally, this tutorial requires
2424

2525
## Sample scripts
2626

27-
[!code-powershell-interactive[main](../../../../powershell_scripts/sql-database/failover-groups/add-single-db-to-failover-group-az-ps.ps1 "Add single database to a failover group")]
27+
[!code-powershell-interactive[main](../../../powershell_scripts/sql-database/failover-groups/add-single-db-to-failover-group-az-ps.ps1 "Add single database to a failover group")]
2828

2929
## Clean up deployment
3030

articles/azure-sql/managed-instance/connect-vm-instance-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ The easiest way to create a client virtual machine with all necessary tools is t
7878
| **Location** | The location for the resource group | This value is populated based on the resource group selected. |
7979
| **Virtual machine name** | Any valid name | For valid names, see [Naming rules and restrictions](/azure/architecture/best-practices/resource-naming).|
8080
|**Admin Username**|Any valid username|For valid names, see [Naming rules and restrictions](/azure/architecture/best-practices/resource-naming). Don't use "serveradmin" as that is a reserved server-level role.<br>You use this username any time you [connect to the VM](#connect-to-virtual-machine).|
81-
|**Password**|Any valid password|The password must be at least 12 characters long and meet the [defined complexity requirements](../virtual-machines/windows/faq.md#what-are-the-password-requirements-when-creating-a-vm).<br>You use this password any time you [connect to the VM](#connect-to-virtual-machine).|
81+
|**Password**|Any valid password|The password must be at least 12 characters long and meet the [defined complexity requirements](../../virtual-machines/windows/faq.md#what-are-the-password-requirements-when-creating-a-vm).<br>You use this password any time you [connect to the VM](#connect-to-virtual-machine).|
8282
| **Virtual Machine Size** | Any valid size | The default in this template of **Standard_B2s** is sufficient for this quickstart. |
8383
| **Location**|[resourceGroup().location].| Don't change this value. |
8484
| **Virtual Network Name**|The virtual network in which you created the SQL Managed Instance.|

articles/azure-sql/managed-instance/how-to-content-reference-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ In this article you can find a content reference to various guides, scripts, and
7878

7979
## Develop applications
8080

81-
- [Connectivity](sql-database-libraries.md)
81+
- [Connectivity](../database/connect-query-content-reference-guide.md#libraries)
8282
- [Use Spark Connector](../../cosmos-db/spark-connector.md)
8383
- [Authenticate app](../database/application-authentication-get-client-id-keys.md)
8484
- [Use batching for better performance](../../sql-database/sql-database-use-batching-to-improve-performance.md)
223 KB
Loading
21.8 KB
Loading

articles/azure-sql/managed-instance/point-to-site-p2s-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.date: 03/13/2019
1515
---
1616
# Quickstart: Configure a point-to-site connection to Azure SQL Managed Instance from on-premises
1717

18-
This quickstart demonstrates how to connect to Azure SQL Managed Instance using [SQL Server Management Studio](https://docs.microsoft.com/sql/ssms/sql-server-management-studio-ssms) (SSMS) from an on-premises client computer over a point-to-site connection. For information about point-to-site connections, see [About Point-to-Site VPN](../vpn-gateway/point-to-site-about.md)
18+
This quickstart demonstrates how to connect to Azure SQL Managed Instance using [SQL Server Management Studio](https://docs.microsoft.com/sql/ssms/sql-server-management-studio-ssms) (SSMS) from an on-premises client computer over a point-to-site connection. For information about point-to-site connections, see [About Point-to-Site VPN](../../vpn-gateway/point-to-site-about.md)
1919

2020
## Prerequisites
2121

articles/azure-sql/managed-instance/scripts/create-configure-managed-instance-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ If you choose to install and use the PowerShell locally, this tutorial requires
2626

2727
## Sample script
2828

29-
[!code-powershell-interactive[main](../../../powershell_scripts/sql-database/managed-instance/create-and-configure-managed-instance.ps1 "Create managed instance")]
29+
[!code-powershell-interactive[main](../../../../powershell_scripts/sql-database/managed-instance/create-and-configure-managed-instance.ps1 "Create managed instance")]
3030

3131
## Clean up deployment
3232

articles/azure-sql/managed-instance/scripts/transparent-data-encryption-byok-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ If you are running PowerShell locally, you also need to run `Connect-AzAccount`
3333

3434
## Sample scripts
3535

36-
[!code-powershell-interactive[main](../../../powershell_scripts/sql-database/transparent-data-encryption/setup-tde-byok-sqlmi.ps1 "Set up BYOK TDE for SQL Managed Instance")]
36+
[!code-powershell-interactive[main](../../../../powershell_scripts/sql-database/transparent-data-encryption/setup-tde-byok-sqlmi.ps1 "Set up BYOK TDE for SQL Managed Instance")]
3737

3838
## Next steps
3939

articles/azure-sql/managed-instance/sql-managed-instance-paas-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ SQL Managed Instance combines the best features that are available both in Azure
3535
3636
| **PaaS benefits** | **Business continuity** |
3737
| --- | --- |
38-
|No hardware purchasing and management <br>No management overhead for managing underlying infrastructure <br>Quick provisioning and service scaling <br>Automated patching and version upgrade <br>Integration with other PaaS data services |99.99% uptime SLA <br>Built in [high-availability](../database/high-availability-sla.md) <br>Data protected with [automated backups](../database/automated-backups-overview.md) <br>Customer configurable backup retention period <br>User-initiated [backups](https://docs.microsoft.com/sql/t-sql/statements/backup-transact-sql?view=azuresqldb-mi-current) <br>[Point in time database restore](../azure-sql/database/recovery-using-backups.md#point-in-time-restore) capability |
38+
|No hardware purchasing and management <br>No management overhead for managing underlying infrastructure <br>Quick provisioning and service scaling <br>Automated patching and version upgrade <br>Integration with other PaaS data services |99.99% uptime SLA <br>Built in [high-availability](../database/high-availability-sla.md) <br>Data protected with [automated backups](../database/automated-backups-overview.md) <br>Customer configurable backup retention period <br>User-initiated [backups](https://docs.microsoft.com/sql/t-sql/statements/backup-transact-sql?view=azuresqldb-mi-current) <br>[Point in time database restore](../database/recovery-using-backups.md#point-in-time-restore) capability |
3939
|**Security and compliance** | **Management**|
4040
|Isolated environment ([VNet integration](connectivity-architecture-overview.md), single tenant service, dedicated compute and storage) <br>[Transparent data encryption (TDE)](https://docs.microsoft.com/sql/relational-databases/security/encryption/transparent-data-encryption-azure-sql)<br>[Azure AD authentication](../database/aad-authentication-overview.md), single sign-on support <br> <a href="/sql/t-sql/statements/create-login-transact-sql?view=azuresqldb-mi-current">Azure AD server principals (logins)</a> <br>Adheres to compliance standards same as Azure SQL Database <br>[SQL auditing](auditing-configure.md) <br>[Advanced Threat Protection](../../sql-database/sql-database-managed-instance-threat-detection.md) |Azure Resource Manager API for automating service provisioning and scaling <br>Azure portal functionality for manual service provisioning and scaling <br>Data Migration Service
4141

@@ -308,7 +308,7 @@ Some key differences:
308308
- Specifying full physical paths is unsupported so all corresponding scenarios have to be supported differently: RESTORE DB does not support WITH MOVE, CREATE DB doesn't allow physical paths, BULK INSERT works with Azure Blobs only, etc.
309309
- SQL Managed Instance supports [Azure AD authentication](../database/aad-authentication-overview.md) as cloud alternative to Windows authentication.
310310
- SQL Managed Instance automatically manages XTP filegroup and files for databases containing In-Memory OLTP objects
311-
- SQL Managed Instance supports SQL Server Integration Services (SSIS) and can host SSIS catalog (SSISDB) that stores SSIS packages, but they are executed on a managed Azure-SSIS Integration Runtime (IR) in Azure Data Factory (ADF), see [Create Azure-SSIS IR in ADF](https://docs.microsoft.com/azure/data-factory/create-azure-ssis-integration-runtime). To compare the SSIS features, see [Compare SQL Database to SQL Managed Instance](../data-factory/create-azure-ssis-integration-runtime.md#comparison-of-a-azure-sql-database-elastic-pool-and-sql-managed-instance).
311+
- SQL Managed Instance supports SQL Server Integration Services (SSIS) and can host SSIS catalog (SSISDB) that stores SSIS packages, but they are executed on a managed Azure-SSIS Integration Runtime (IR) in Azure Data Factory (ADF), see [Create Azure-SSIS IR in ADF](https://docs.microsoft.com/azure/data-factory/create-azure-ssis-integration-runtime). To compare the SSIS features, see [Compare SQL Database to SQL Managed Instance](../../data-factory/create-azure-ssis-integration-runtime.md#comparison-of-a-azure-sql-database-elastic-pool-and-sql-managed-instance).
312312

313313
### Administration features
314314

articles/azure-sql/managed-instance/tutorial-add-instance-failover-group.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1102,7 +1102,7 @@ This portion of the tutorial uses the following PowerShell cmdlet:
11021102
## Full script
11031103

11041104
# [PowerShell](#tab/azure-powershell)
1105-
[!code-powershell-interactive[main](../../powershell_scripts/sql-database/failover-groups/add-managed-instance-to-failover-group-az-ps.ps1 "Add SQL Managed Instance to a failover group")]
1105+
[!code-powershell-interactive[main](../../../../powershell_scripts/sql-database/failover-groups/add-managed-instance-to-failover-group-az-ps.ps1 "Add SQL Managed Instance to a failover group")]
11061106

11071107
This script uses the following commands. Each command in the table links to command specific documentation.
11081108

0 commit comments

Comments
 (0)