Skip to content

Commit b4ec0d4

Browse files
authored
Merge pull request #116711 from CarlRabeler/SQLMI_lower_case
casing for SQL MI
2 parents 96197db + f30603c commit b4ec0d4

File tree

65 files changed

+345
-343
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

65 files changed

+345
-343
lines changed

articles/azure-monitor/insights/azure-sql.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -38,9 +38,9 @@ Azure SQL Analytics is a cloud only monitoring solution supporting streaming of
3838

3939
## Azure SQL Analytics options
4040

41-
The below table outlines supported options for two versions of the Azure SQL Analytics dashboard, one for single and pooled databases and elastic pools, and the other one for managed instances and instance databases.
41+
The below table outlines supported options for two versions of the Azure SQL Analytics dashboard, one for Azure SQL Database, and the other one for Azure SQL Managed Instance databases.
4242

43-
| Azure SQL Analytics option | Description | Single and pooled database and elastic pools support | Managed instances and instances database support |
43+
| Azure SQL Analytics option | Description | SQL Database support | SQL Managed Instance support |
4444
| --- | ------- | ----- | ----- |
4545
| Resource by type | Perspective that counts all the resources monitored. | Yes | Yes |
4646
| Insights | Provides hierarchical drill-down into Intelligent Insights into performance. | Yes | Yes |
@@ -69,21 +69,21 @@ When you add Azure SQL Analytics to your workspace, the Azure SQL Analytics tile
6969

7070
![Azure SQL Analytics summary tile](./media/azure-sql/azure-sql-sol-tile-01.png)
7171

72-
Once loaded, the tile shows the number of single and pooled databases, elastic pools, managed instances, and managed instance databases from which Azure SQL Analytics is receiving diagnostics telemetry.
72+
Once loaded, the tile shows the number of databases and elastic pools in SQL Database and managed instances and instance databases in SQL Managed Instance from which Azure SQL Analytics is receiving diagnostics telemetry.
7373

7474
![Azure SQL Analytics tile](./media/azure-sql/azure-sql-sol-tile-02.png)
7575

76-
Azure SQL Analytics provides two separate views -- one for monitoring single databases and pooled databases and elastic pools, and the other view for monitoring managed instances and instance databases.
76+
Azure SQL Analytics provides two separate views -- one for monitoring SQL Database, and the other view for monitoring SQL Managed Instance.
7777

78-
To view Azure SQL Analytics monitoring dashboard for single and pooled databases and elastic pools, click on the upper part of the tile. To view Azure SQL Analytics monitoring dashboard for managed instances and instance databases, click on the lower part of the tile.
78+
To view Azure SQL Analytics monitoring dashboard for SQL Database, click on the upper part of the tile. To view Azure SQL Analytics monitoring dashboard for SQL Managed Instance, click on the lower part of the tile.
7979

8080
### Viewing Azure SQL Analytics data
8181

8282
The dashboard includes the overview of all databases that are monitored through different perspectives. For different perspectives to work, you must enable proper metrics or logs on your SQL resources to be streamed to Log Analytics workspace.
8383

8484
If some metrics or logs are not streamed into Azure Monitor, the tiles in Azure SQL Analytics are not populated with monitoring information.
8585

86-
### Single and pooled databases and elastic pools view
86+
### SQL Database view
8787

8888
Once the Azure SQL Analytics tile for the database is selected, the monitoring dashboard is shown.
8989

@@ -95,15 +95,15 @@ Selecting any of the tiles, opens a drill-down report into the specific perspect
9595

9696
Each perspective in this view provides summaries at the subscription, server, elastic pool, and database levels. In addition, each perspective shows a perspective specific to the report on the right. Selecting subscription, server, pool, or database from the list continues the drill-down.
9797

98-
### Managed instance and instances databases view
98+
### SQL Managed Instance view
9999

100100
Once the Azure SQL Analytics tile for the databases is selected, the monitoring dashboard is shown.
101101

102102
![Azure SQL Analytics Overview](./media/azure-sql/azure-sql-sol-overview-mi.png)
103103

104104
Selecting any of the tiles, opens a drill-down report into the specific perspective. Once the perspective is selected, the drill-down report is opened.
105105

106-
Selecting the managed instance view, shows details on the managed instance utilization, databases it contains, and telemetry on the queries executed across the instance.
106+
Selecting the SQL Managed Instance view, shows details on the managed instance utilization, databases it contains, and telemetry on the queries executed across the instance.
107107

108108
![Azure SQL Analytics Timeouts](./media/azure-sql/azure-sql-sol-metrics-mi.png)
109109

@@ -175,7 +175,7 @@ Automated alerting in Azure SQL Analytics is based on writing a Log Analytics qu
175175

176176
You can easily [create alerts](../platform/alerts-metric.md) with the data coming from Azure SQL Database resources. Here are some useful [log queries](../log-query/log-query-overview.md) that you can use with a log alert:
177177

178-
#### High CPU on Azure SQL Database
178+
#### High CPU
179179

180180
```
181181
AzureMetrics
@@ -191,7 +191,7 @@ AzureMetrics
191191
> - Pre-requirement of setting up this alert is that monitored databases stream basic metrics to Azure SQL Analytics.
192192
> - Replace the MetricName value cpu_percent with dtu_consumption_percent to obtain high DTU results instead.
193193
194-
#### High CPU on Azure SQL Database elastic pools
194+
#### High CPU on elastic pools
195195

196196
```
197197
AzureMetrics
@@ -207,7 +207,7 @@ AzureMetrics
207207
> - Pre-requirement of setting up this alert is that monitored databases stream Basic metrics to Azure SQL Analytics.
208208
> - Replace the MetricName value cpu_percent with dtu_consumption_percent to obtain high DTU results instead.
209209
210-
#### Azure SQL Database storage in average above 95% in the last 1 hr
210+
#### Storage in average above 95% in the last 1 hr
211211

212212
```
213213
let time_range = 1h;
@@ -251,9 +251,9 @@ AzureDiagnostics
251251
| distinct rootCauseAnalysis_s
252252
```
253253

254-
### Creating alerts for managed instances
254+
### Creating alerts for SQL Managed Instance
255255

256-
#### Managed instance storage is above 90%
256+
#### Storage is above 90%
257257

258258
```
259259
let storage_percentage_threshold = 90;
@@ -269,7 +269,7 @@ AzureDiagnostics
269269
> - Pre-requirement of setting up this alert is that monitored the managed instance has the streaming of ResourceUsageStats log enabled to Azure SQL Analytics.
270270
> - This query requires an alert rule to be set up to fire off an alert when there exist results (> 0 results) from the query, denoting that the condition exists on the managed instance. The output is storage percentage consumption on the managed instance.
271271
272-
#### Managed instance CPU average consumption is above 95% in the last 1 hr
272+
#### CPU average consumption is above 95% in the last 1 hr
273273

274274
```
275275
let cpu_percentage_threshold = 95;

articles/azure-sql/database/auto-failover-group-configure.md

Lines changed: 31 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -336,19 +336,19 @@ Fail over to the secondary server:
336336
> [!IMPORTANT]
337337
> If you need to delete the secondary database, remove it from the failover group before deleting it. Deleting a secondary database before it is removed from the failover group can cause unpredictable behavior.
338338
339-
## Managed instance in SQL Managed Instance
339+
## SQL Managed Instance
340340

341-
Create a failover group between two managed instances in Azure SQL Managed Instance using the Azure portal or PowerShell.
341+
Create a failover group between two managed instances in SQL Managed Instance using the Azure portal or PowerShell.
342342

343-
You will either need to configure [ExpressRoute](../../expressroute/expressroute-howto-circuit-portal-resource-manager.md) or to create a gateway for the virtual network of each SQL Managed Instance, connect the two gateways, and then create the failover group.
343+
You will either need to configure [ExpressRoute](../../expressroute/expressroute-howto-circuit-portal-resource-manager.md) or to create a gateway for the virtual network of each managed instance, connect the two gateways, and then create the failover group.
344344

345345
### Prerequisites
346346

347347
Consider the following prerequisites:
348348

349-
- The secondary SQL Managed Instance must be empty.
349+
- The secondary managed instance must be empty.
350350
- The subnet range for the secondary virtual network must not overlap the subnet range of the primary virtual network.
351-
- The collation and timezone of the secondary SQL Managed Instance must match that of the primary SQL Managed Instance.
351+
- The collation and timezone of the secondary managed instance must match that of the primary managed instance.
352352
- When connecting the two gateways, the **Shared Key** should be the same for both connections.
353353

354354
### Create primary virtual network gateway
@@ -359,29 +359,29 @@ If you have not configured [ExpressRoute](../../expressroute/expressroute-howto-
359359

360360
Create the primary virtual network gateway using the Azure portal.
361361

362-
1. In the [Azure portal](https://portal.azure.com), go to your resource group and select the **Virtual network** resource for your primary SQL Managed Instance.
362+
1. In the [Azure portal](https://portal.azure.com), go to your resource group and select the **Virtual network** resource for your primary managed instance.
363363
1. Select **Subnets** under **Settings** and then select to add a new **Gateway subnet**. Leave the default values.
364364

365-
![Add gateway for primary SQL Managed Instance](./media/auto-failover-group-configure/add-subnet-gateway-primary-vnet.png)
365+
![Add gateway for primary managed instance](./media/auto-failover-group-configure/add-subnet-gateway-primary-vnet.png)
366366

367367
1. Once the subnet gateway is created, select **Create a resource** from the left navigation pane and then type `Virtual network gateway` in the search box. Select the **Virtual network gateway** resource published by **Microsoft**.
368368

369369
![Create a new virtual network gateway](./media/auto-failover-group-configure/create-virtual-network-gateway.png)
370370

371-
1. Fill out the required fields to configure the gateway your primary SQL Managed Instance.
371+
1. Fill out the required fields to configure the gateway your primary managed instance.
372372

373-
The following table shows the values necessary for the gateway for the primary SQL Managed Instance:
373+
The following table shows the values necessary for the gateway for the primary managed instance:
374374

375375
| **Field** | Value |
376376
| --- | --- |
377-
| **Subscription** | The subscription where your primary SQL Managed Instance is. |
377+
| **Subscription** | The subscription where your primary managed instance is. |
378378
| **Name** | The name for your virtual network gateway. |
379-
| **Region** | The region where your primary SQL Managed Instance is. |
379+
| **Region** | The region where your primary managed instance is. |
380380
| **Gateway type** | Select **VPN**. |
381381
| **VPN Type** | Select **Route-based** |
382382
| **SKU**| Leave default of `VpnGw1`. |
383-
| **Location**| The location where your secondary SQL Managed Instance and secondary virtual network is. |
384-
| **Virtual network**| Select the virtual network for your secondary SQL Managed Instance. |
383+
| **Location**| The location where your secondary managed instance and secondary virtual network is. |
384+
| **Virtual network**| Select the virtual network for your secondary managed instance. |
385385
| **Public IP address**| Select **Create new**. |
386386
| **Public IP address name**| Enter a name for your IP address. |
387387
|   |   |
@@ -430,19 +430,19 @@ Create the secondary virtual network gateway using the Azure portal or PowerShel
430430

431431
# [Portal](#tab/azure-portal)
432432

433-
Repeat the steps in the previous section to create the virtual network subnet and gateway for the secondary SQL Managed Instance. Fill out the required fields to configure the gateway for your secondary SQL Managed Instance.
433+
Repeat the steps in the previous section to create the virtual network subnet and gateway for the secondary managed instance. Fill out the required fields to configure the gateway for your secondary managed instance.
434434

435-
The following table shows the values necessary for the gateway for the secondary SQL Managed Instance:
435+
The following table shows the values necessary for the gateway for the secondary managed instance:
436436

437437
| **Field** | Value |
438438
| --- | --- |
439-
| **Subscription** | The subscription where your secondary SQL Managed Instance is. |
439+
| **Subscription** | The subscription where your secondary managed instance is. |
440440
| **Name** | The name for your virtual network gateway, such as `secondary-mi-gateway`. |
441-
| **Region** | The region where your secondary SQL Managed Instance is. |
441+
| **Region** | The region where your secondary managed instance is. |
442442
| **Gateway type** | Select **VPN**. |
443443
| **VPN Type** | Select **Route-based** |
444444
| **SKU**| Leave default of `VpnGw1`. |
445-
| **Location**| The location where your secondary SQL Managed Instance and secondary virtual network is. |
445+
| **Location**| The location where your secondary managed instance and secondary virtual network is. |
446446
| **Virtual network**| Select the virtual network that was created in section 2, such as `vnet-sql-mi-secondary`. |
447447
| **Public IP address**| Select **Create new**. |
448448
| **Public IP address name**| Enter a name for your IP address, such as `secondary-gateway-IP`. |
@@ -501,8 +501,8 @@ Create connections between the two gateways using the Azure portal.
501501
1. On the **Basics** tab, select the following values and then select **OK**.
502502
1. Select `VNet-to-VNet` for the **Connection type**.
503503
1. Select your subscription from the drop-down.
504-
1. Select the resource group for your SQL Managed Instance in the drop-down.
505-
1. Select the location of your primary SQL Managed Instance from the drop-down.
504+
1. Select the resource group for your managed instance in the drop-down.
505+
1. Select the location of your primary managed instance from the drop-down.
506506
1. On the **Settings** tab, select or enter the following values and then select **OK**:
507507
1. Choose the primary network gateway for the **First virtual network gateway**, such as `Primary-Gateway`.
508508
1. Choose the secondary network gateway for the **Second virtual network gateway**, such as `Secondary-Gateway`.
@@ -547,27 +547,27 @@ Create connections between the two gateways using PowerShell.
547547

548548
### Create the failover group
549549

550-
Create the failover group for your SQL Managed Instances using the Azure portal or PowerShell.
550+
Create the failover group for your managed instances using the Azure portal or PowerShell.
551551

552552
# [Portal](#tab/azure-portal)
553553

554-
Create the failover group for your SQL Managed Instances using Azure portal.
554+
Create the failover group for your managed instances using Azure portal.
555555

556556
1. Select **Azure SQL** in the left-hand menu of the [Azure portal](https://portal.azure.com). If **Azure SQL** is not in the list, select **All services**, then type Azure SQL in the search box. (Optional) Select the star next to **Azure SQL** to favorite it and add it as an item in the left-hand navigation.
557-
1. Select the primary SQL Managed Instance you want to add to the failover group.
557+
1. Select the primary managed instance you want to add to the failover group.
558558
1. Under **Settings**, navigate to **Instance Failover Groups** and then choose to **Add group** to open the **Instance Failover Group** page.
559559

560560
![Add a failover group](./media/auto-failover-group-configure/add-failover-group.png)
561561

562-
1. On the **Instance Failover Group** page, type the name of your failover group and then choose the secondary SQL Managed Instance from the drop-down. Select **Create** to create your failover group.
562+
1. On the **Instance Failover Group** page, type the name of your failover group and then choose the secondary managed instance from the drop-down. Select **Create** to create your failover group.
563563

564564
![Create failover group](./media/auto-failover-group-configure/create-failover-group.png)
565565

566566
1. Once failover group deployment is complete, you will be taken back to the **Failover group** page.
567567

568568
# [PowerShell](#tab/azure-powershell)
569569

570-
Create the failover group for your SQL Managed Instances using PowerShell.
570+
Create the failover group for your managed instances using PowerShell.
571571

572572
```powershell-interactive
573573
$primaryResourceGroupName = "<Primary-Resource-Group>"
@@ -596,17 +596,17 @@ Test failover of your failover group using the Azure portal or PowerShell.
596596

597597
Test failover of your failover group using the Azure portal.
598598

599-
1. Navigate to your _secondary_ SQL Managed Instance within the [Azure portal](https://portal.azure.com) and select **Instance Failover Groups** under settings.
600-
1. Review which SQL Managed Instance is the primary, and which SQL Managed Instance is the secondary.
599+
1. Navigate to your _secondary_ managed instance within the [Azure portal](https://portal.azure.com) and select **Instance Failover Groups** under settings.
600+
1. Review which managed instance is the primary, and which managed instance is the secondary.
601601
1. Select **Failover** and then select **Yes** on the warning about TDS sessions being disconnected.
602602

603603
![Fail over the failover group](./media/auto-failover-group-configure/failover-mi-failover-group.png)
604604

605605
1. Review which manged instance is the primary and which instance is the secondary. If failover succeeded, the two instances should have switched roles.
606606

607-
![SQL Managed Instances have switched roles after failover](./media/auto-failover-group-configure/mi-switched-after-failover.png)
607+
![Managed instances have switched roles after failover](./media/auto-failover-group-configure/mi-switched-after-failover.png)
608608

609-
1. Go to the new _secondary_ SQL Managed Instance and select **Failover** once again to fail the primary instance back to the primary role.
609+
1. Go to the new _secondary_ managed instance and select **Failover** once again to fail the primary instance back to the primary role.
610610

611611
# [PowerShell](#tab/azure-powershell)
612612

@@ -625,7 +625,7 @@ Test failover of your failover group using PowerShell.
625625
Get-AzSqlDatabaseInstanceFailoverGroup -ResourceGroupName $primaryResourceGroupName `
626626
-Location $secondaryLocation -Name $failoverGroupName
627627
628-
# Failover the primary SQL Managed Instance to the secondary role
628+
# Failover the primary managed instance to the secondary role
629629
Write-host "Failing primary over to the secondary location"
630630
Get-AzSqlDatabaseInstanceFailoverGroup -ResourceGroupName $secondaryResourceGroupName `
631631
-Location $secondaryLocation -Name $failoverGroupName | Switch-AzSqlDatabaseInstanceFailoverGroup
@@ -635,7 +635,7 @@ Test failover of your failover group using PowerShell.
635635
Get-AzSqlDatabaseInstanceFailoverGroup -ResourceGroupName $primaryResourceGroupName `
636636
-Location $secondaryLocation -Name $failoverGroupName
637637
638-
# Fail primary SQL Managed Instance back to primary role
638+
# Fail primary managed instance back to primary role
639639
Write-host "Failing primary back to primary role"
640640
Get-AzSqlDatabaseInstanceFailoverGroup -ResourceGroupName $primaryResourceGroupName `
641641
-Location $primaryLocation -Name $failoverGroupName | Switch-AzSqlDatabaseInstanceFailoverGroup

0 commit comments

Comments
 (0)