You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
PUT https://management.azure.com/subscriptions/<subscriptionID>/resourceGroups/<resourcegroup>/providers/Microsoft.Sql/servers/<sqldatabaseserver>?api-version=2015-05-01-preview
2. Open [Azure portal](https://portal.azure.com). Navigate to your storage account. Locate **Access Control (IAM)**, and click **Add role assignment**. Assign **Storage Blob Data Contributor** RBAC role to your Azure SQL Server hosting your Azure SQL database that you registered with Azure Active Directory (AAD) as in the previous step.
@@ -115,13 +115,13 @@ To configure SQL Audit to write events to a storage account behind a VNet or Fir
115
115
116
116
3. Configure [Azure SQL server's blob auditing policy](/rest/api/sql/server%20auditing%20settings/createorupdate), without specifying a *storageAccountAccessKey*:
117
117
118
-
Sample Request
118
+
Sample request
119
119
120
120
```html
121
121
PUT https://management.azure.com/subscriptions/<subscription ID>/resourceGroups/<resource group>/providers/Microsoft.Sql/servers/<azure sql database server>?api-version=2017-03-01-preview
122
122
```
123
123
124
-
Request Body
124
+
Request body
125
125
126
126
```json
127
127
{
@@ -135,5 +135,5 @@ To configure SQL Audit to write events to a storage account behind a VNet or Fir
135
135
## Next steps
136
136
137
137
- [Use PowerShell to create a virtual network service endpoint, and then a virtual network rule for Azure SQL Database.](sql-database-vnet-service-endpoint-rule-powershell.md)
138
-
- [Virtual Network Rules: Operations](/api/sql/virtualnetworkrules) with REST APIs
138
+
- [Virtual Network Rules: Operations with REST APIs](/rest/api/sql/virtualnetworkrules)
139
139
- [Use virtual network service endpoints and rules for database servers](sql-database-vnet-service-endpoint-rule-overview.md)
0 commit comments