You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/insights/azure-sql.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,9 +38,9 @@ Azure SQL Analytics is a cloud only monitoring solution supporting streaming of
38
38
39
39
## Azure SQL Analytics options
40
40
41
-
The below table outlines supported options for two versions of the Azure SQL Analytics dashboard, one for single and pooled databases and elastic pools, and the other one for managed instances and instance databases.
41
+
The below table outlines supported options for two versions of the Azure SQL Analytics dashboard, one for Azure SQL Database, and the other one for Azure SQL Managed Instance databases.
42
42
43
-
| Azure SQL Analytics option | Description |Single and pooled database and elastic pools support | Managed instances and instances database support |
43
+
| Azure SQL Analytics option | Description |SQL Database support |SQL Managed Instance support |
44
44
| --- | ------- | ----- | ----- |
45
45
| Resource by type | Perspective that counts all the resources monitored. | Yes | Yes |
46
46
| Insights | Provides hierarchical drill-down into Intelligent Insights into performance. | Yes | Yes |
@@ -69,21 +69,21 @@ When you add Azure SQL Analytics to your workspace, the Azure SQL Analytics tile
Once loaded, the tile shows the number of single and pooled databases, elastic pools, managed instances, and managed instance databases from which Azure SQL Analytics is receiving diagnostics telemetry.
72
+
Once loaded, the tile shows the number of databases and elastic pools in SQL Database and managed instances and instance databases in SQL Managed Instance from which Azure SQL Analytics is receiving diagnostics telemetry.
Azure SQL Analytics provides two separate views -- one for monitoring single databases and pooled databases and elastic pools, and the other view for monitoring managed instances and instance databases.
76
+
Azure SQL Analytics provides two separate views -- one for monitoring SQL Database, and the other view for monitoring SQL Managed Instance.
77
77
78
-
To view Azure SQL Analytics monitoring dashboard for single and pooled databases and elastic pools, click on the upper part of the tile. To view Azure SQL Analytics monitoring dashboard for managed instances and instance databases, click on the lower part of the tile.
78
+
To view Azure SQL Analytics monitoring dashboard for SQL Database, click on the upper part of the tile. To view Azure SQL Analytics monitoring dashboard for SQL Managed Instance, click on the lower part of the tile.
79
79
80
80
### Viewing Azure SQL Analytics data
81
81
82
82
The dashboard includes the overview of all databases that are monitored through different perspectives. For different perspectives to work, you must enable proper metrics or logs on your SQL resources to be streamed to Log Analytics workspace.
83
83
84
84
If some metrics or logs are not streamed into Azure Monitor, the tiles in Azure SQL Analytics are not populated with monitoring information.
85
85
86
-
### Single and pooled databases and elastic pools view
86
+
### SQL Database view
87
87
88
88
Once the Azure SQL Analytics tile for the database is selected, the monitoring dashboard is shown.
89
89
@@ -95,15 +95,15 @@ Selecting any of the tiles, opens a drill-down report into the specific perspect
95
95
96
96
Each perspective in this view provides summaries at the subscription, server, elastic pool, and database levels. In addition, each perspective shows a perspective specific to the report on the right. Selecting subscription, server, pool, or database from the list continues the drill-down.
97
97
98
-
### Managed instance and instances databases view
98
+
### SQL Managed Instance view
99
99
100
100
Once the Azure SQL Analytics tile for the databases is selected, the monitoring dashboard is shown.
Selecting any of the tiles, opens a drill-down report into the specific perspective. Once the perspective is selected, the drill-down report is opened.
105
105
106
-
Selecting the managed instance view, shows details on the managed instance utilization, databases it contains, and telemetry on the queries executed across the instance.
106
+
Selecting the SQL Managed Instance view, shows details on the managed instance utilization, databases it contains, and telemetry on the queries executed across the instance.
@@ -175,7 +175,7 @@ Automated alerting in Azure SQL Analytics is based on writing a Log Analytics qu
175
175
176
176
You can easily [create alerts](../platform/alerts-metric.md) with the data coming from Azure SQL Database resources. Here are some useful [log queries](../log-query/log-query-overview.md) that you can use with a log alert:
177
177
178
-
#### High CPU on Azure SQL Database
178
+
#### High CPU
179
179
180
180
```
181
181
AzureMetrics
@@ -191,7 +191,7 @@ AzureMetrics
191
191
> - Pre-requirement of setting up this alert is that monitored databases stream basic metrics to Azure SQL Analytics.
192
192
> - Replace the MetricName value cpu_percent with dtu_consumption_percent to obtain high DTU results instead.
193
193
194
-
#### High CPU on Azure SQL Database elastic pools
194
+
#### High CPU on elastic pools
195
195
196
196
```
197
197
AzureMetrics
@@ -207,7 +207,7 @@ AzureMetrics
207
207
> - Pre-requirement of setting up this alert is that monitored databases stream Basic metrics to Azure SQL Analytics.
208
208
> - Replace the MetricName value cpu_percent with dtu_consumption_percent to obtain high DTU results instead.
209
209
210
-
#### Azure SQL Database storage in average above 95% in the last 1 hr
210
+
#### Storage in average above 95% in the last 1 hr
211
211
212
212
```
213
213
let time_range = 1h;
@@ -251,9 +251,9 @@ AzureDiagnostics
251
251
| distinct rootCauseAnalysis_s
252
252
```
253
253
254
-
### Creating alerts for managed instances
254
+
### Creating alerts for SQL Managed Instance
255
255
256
-
#### Managed instance storage is above 90%
256
+
#### Storage is above 90%
257
257
258
258
```
259
259
let storage_percentage_threshold = 90;
@@ -269,7 +269,7 @@ AzureDiagnostics
269
269
> - Pre-requirement of setting up this alert is that monitored the managed instance has the streaming of ResourceUsageStats log enabled to Azure SQL Analytics.
270
270
> - This query requires an alert rule to be set up to fire off an alert when there exist results (> 0 results) from the query, denoting that the condition exists on the managed instance. The output is storage percentage consumption on the managed instance.
271
271
272
-
#### Managed instance CPU average consumption is above 95% in the last 1 hr
272
+
#### CPU average consumption is above 95% in the last 1 hr
Copy file name to clipboardExpand all lines: articles/azure-sql/database/auto-failover-group-configure.md
+31-31Lines changed: 31 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -336,19 +336,19 @@ Fail over to the secondary server:
336
336
> [!IMPORTANT]
337
337
> If you need to delete the secondary database, remove it from the failover group before deleting it. Deleting a secondary database before it is removed from the failover group can cause unpredictable behavior.
338
338
339
-
## Managed instance in SQL Managed Instance
339
+
## SQL Managed Instance
340
340
341
-
Create a failover group between two managed instances in Azure SQL Managed Instance using the Azure portal or PowerShell.
341
+
Create a failover group between two managed instances in SQL Managed Instance using the Azure portal or PowerShell.
342
342
343
-
You will either need to configure [ExpressRoute](../../expressroute/expressroute-howto-circuit-portal-resource-manager.md) or to create a gateway for the virtual network of each SQL Managed Instance, connect the two gateways, and then create the failover group.
343
+
You will either need to configure [ExpressRoute](../../expressroute/expressroute-howto-circuit-portal-resource-manager.md) or to create a gateway for the virtual network of each managed instance, connect the two gateways, and then create the failover group.
344
344
345
345
### Prerequisites
346
346
347
347
Consider the following prerequisites:
348
348
349
-
- The secondary SQL Managed Instance must be empty.
349
+
- The secondary managed instance must be empty.
350
350
- The subnet range for the secondary virtual network must not overlap the subnet range of the primary virtual network.
351
-
- The collation and timezone of the secondary SQL Managed Instance must match that of the primary SQL Managed Instance.
351
+
- The collation and timezone of the secondary managed instance must match that of the primary managed instance.
352
352
- When connecting the two gateways, the **Shared Key** should be the same for both connections.
353
353
354
354
### Create primary virtual network gateway
@@ -359,29 +359,29 @@ If you have not configured [ExpressRoute](../../expressroute/expressroute-howto-
359
359
360
360
Create the primary virtual network gateway using the Azure portal.
361
361
362
-
1. In the [Azure portal](https://portal.azure.com), go to your resource group and select the **Virtual network** resource for your primary SQL Managed Instance.
362
+
1. In the [Azure portal](https://portal.azure.com), go to your resource group and select the **Virtual network** resource for your primary managed instance.
363
363
1. Select **Subnets** under **Settings** and then select to add a new **Gateway subnet**. Leave the default values.
364
364
365
-

365
+

366
366
367
367
1. Once the subnet gateway is created, select **Create a resource** from the left navigation pane and then type `Virtual network gateway` in the search box. Select the **Virtual network gateway** resource published by **Microsoft**.
368
368
369
369

370
370
371
-
1. Fill out the required fields to configure the gateway your primary SQL Managed Instance.
371
+
1. Fill out the required fields to configure the gateway your primary managed instance.
372
372
373
-
The following table shows the values necessary for the gateway for the primary SQL Managed Instance:
373
+
The following table shows the values necessary for the gateway for the primary managed instance:
374
374
375
375
|**Field**| Value |
376
376
| --- | --- |
377
-
|**Subscription**| The subscription where your primary SQL Managed Instance is. |
377
+
|**Subscription**| The subscription where your primary managed instance is. |
378
378
|**Name**| The name for your virtual network gateway. |
379
-
|**Region**| The region where your primary SQL Managed Instance is. |
379
+
|**Region**| The region where your primary managed instance is. |
380
380
|**Gateway type**| Select **VPN**. |
381
381
|**VPN Type**| Select **Route-based**|
382
382
|**SKU**| Leave default of `VpnGw1`. |
383
-
|**Location**| The location where your secondary SQL Managed Instance and secondary virtual network is. |
384
-
|**Virtual network**| Select the virtual network for your secondary SQL Managed Instance. |
383
+
|**Location**| The location where your secondary managed instance and secondary virtual network is. |
384
+
|**Virtual network**| Select the virtual network for your secondary managed instance. |
385
385
|**Public IP address**| Select **Create new**. |
386
386
|**Public IP address name**| Enter a name for your IP address. |
387
387
| | |
@@ -430,19 +430,19 @@ Create the secondary virtual network gateway using the Azure portal or PowerShel
430
430
431
431
# [Portal](#tab/azure-portal)
432
432
433
-
Repeat the steps in the previous section to create the virtual network subnet and gateway for the secondary SQL Managed Instance. Fill out the required fields to configure the gateway for your secondary SQL Managed Instance.
433
+
Repeat the steps in the previous section to create the virtual network subnet and gateway for the secondary managed instance. Fill out the required fields to configure the gateway for your secondary managed instance.
434
434
435
-
The following table shows the values necessary for the gateway for the secondary SQL Managed Instance:
435
+
The following table shows the values necessary for the gateway for the secondary managed instance:
436
436
437
437
|**Field**| Value |
438
438
| --- | --- |
439
-
|**Subscription**| The subscription where your secondary SQL Managed Instance is. |
439
+
|**Subscription**| The subscription where your secondary managed instance is. |
440
440
|**Name**| The name for your virtual network gateway, such as `secondary-mi-gateway`. |
441
-
|**Region**| The region where your secondary SQL Managed Instance is. |
441
+
|**Region**| The region where your secondary managed instance is. |
442
442
|**Gateway type**| Select **VPN**. |
443
443
|**VPN Type**| Select **Route-based**|
444
444
|**SKU**| Leave default of `VpnGw1`. |
445
-
|**Location**| The location where your secondary SQL Managed Instance and secondary virtual network is. |
445
+
|**Location**| The location where your secondary managed instance and secondary virtual network is. |
446
446
|**Virtual network**| Select the virtual network that was created in section 2, such as `vnet-sql-mi-secondary`. |
447
447
|**Public IP address**| Select **Create new**. |
448
448
|**Public IP address name**| Enter a name for your IP address, such as `secondary-gateway-IP`. |
@@ -501,8 +501,8 @@ Create connections between the two gateways using the Azure portal.
501
501
1. On the **Basics** tab, select the following values and then select **OK**.
502
502
1. Select `VNet-to-VNet` for the **Connection type**.
503
503
1. Select your subscription from the drop-down.
504
-
1. Select the resource group for your SQL Managed Instance in the drop-down.
505
-
1. Select the location of your primary SQL Managed Instance from the drop-down.
504
+
1. Select the resource group for your managed instance in the drop-down.
505
+
1. Select the location of your primary managed instance from the drop-down.
506
506
1. On the **Settings** tab, select or enter the following values and then select **OK**:
507
507
1. Choose the primary network gateway for the **First virtual network gateway**, such as `Primary-Gateway`.
508
508
1. Choose the secondary network gateway for the **Second virtual network gateway**, such as `Secondary-Gateway`.
@@ -547,27 +547,27 @@ Create connections between the two gateways using PowerShell.
547
547
548
548
### Create the failover group
549
549
550
-
Create the failover group for your SQL Managed Instances using the Azure portal or PowerShell.
550
+
Create the failover group for your managed instances using the Azure portal or PowerShell.
551
551
552
552
# [Portal](#tab/azure-portal)
553
553
554
-
Create the failover group for your SQL Managed Instances using Azure portal.
554
+
Create the failover group for your managed instances using Azure portal.
555
555
556
556
1. Select **Azure SQL** in the left-hand menu of the [Azure portal](https://portal.azure.com). If **Azure SQL** is not in the list, select **All services**, then type Azure SQL in the search box. (Optional) Select the star next to **Azure SQL** to favorite it and add it as an item in the left-hand navigation.
557
-
1. Select the primary SQL Managed Instance you want to add to the failover group.
557
+
1. Select the primary managed instance you want to add to the failover group.
558
558
1. Under **Settings**, navigate to **Instance Failover Groups** and then choose to **Add group** to open the **Instance Failover Group** page.
559
559
560
560

561
561
562
-
1. On the **Instance Failover Group** page, type the name of your failover group and then choose the secondary SQL Managed Instance from the drop-down. Select **Create** to create your failover group.
562
+
1. On the **Instance Failover Group** page, type the name of your failover group and then choose the secondary managed instance from the drop-down. Select **Create** to create your failover group.
@@ -596,17 +596,17 @@ Test failover of your failover group using the Azure portal or PowerShell.
596
596
597
597
Test failover of your failover group using the Azure portal.
598
598
599
-
1. Navigate to your _secondary_SQL Managed Instance within the [Azure portal](https://portal.azure.com) and select **Instance Failover Groups** under settings.
600
-
1. Review which SQL Managed Instance is the primary, and which SQL Managed Instance is the secondary.
599
+
1. Navigate to your _secondary_managed instance within the [Azure portal](https://portal.azure.com) and select **Instance Failover Groups** under settings.
600
+
1. Review which managed instance is the primary, and which managed instance is the secondary.
601
601
1. Select **Failover** and then select **Yes** on the warning about TDS sessions being disconnected.
602
602
603
603

604
604
605
605
1. Review which manged instance is the primary and which instance is the secondary. If failover succeeded, the two instances should have switched roles.
606
606
607
-

607
+

608
608
609
-
1. Go to the new _secondary_SQL Managed Instance and select **Failover** once again to fail the primary instance back to the primary role.
609
+
1. Go to the new _secondary_managed instance and select **Failover** once again to fail the primary instance back to the primary role.
610
610
611
611
# [PowerShell](#tab/azure-powershell)
612
612
@@ -625,7 +625,7 @@ Test failover of your failover group using PowerShell.
0 commit comments