Skip to content

Commit db4add3

Browse files
authored
Merge pull request #115203 from MashaMSFT/move10
Move10
2 parents f119df5 + e88fc14 commit db4add3

File tree

236 files changed

+1016
-897
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

236 files changed

+1016
-897
lines changed

.openpublishing.redirection.json

Lines changed: 130 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52726,6 +52726,136 @@
5272652726
"source_path": "articles/sql-database/tutorial-sqlite-db-to-azure-sql-serverless-offline.md",
5272752727
"redirect_url": "/azure/azure-sql/database/tutorial-sqlite-db-to-azure-sql-serverless-offline",
5272852728
"redirect_document_id": true
52729+
},
52730+
{
52731+
"source_path": "articles/sql-database/quota-increase-request.md",
52732+
"redirect_url": "/azure/azure-sql/database/quota-increase-request",
52733+
"redirect_document_id": true
52734+
},
52735+
{
52736+
"source_path": "articles/sql-database/sql-database-aad-authentication-configure.md",
52737+
"redirect_url": "/azure/azure-sql/database/aad-authentication-configure",
52738+
"redirect_document_id": true
52739+
},
52740+
{
52741+
"source_path": "articles/sql-database/sql-database-aad-authentication.md",
52742+
"redirect_url": "/azure/azure-sql/database/aad-authentication-overview",
52743+
"redirect_document_id": true
52744+
},
52745+
{
52746+
"source_path": "articles/sql-database/sql-database-advanced-data-security.md",
52747+
"redirect_url": "/azure/azure-sql/database/advanced-data-security",
52748+
"redirect_document_id": true
52749+
},
52750+
{
52751+
"source_path": "articles/sql-database/sql-database-always-encrypted-azure-key-vault.md",
52752+
"redirect_url": "/azure/azure-sql/database/always-encrypted-azure-key-vault-configure",
52753+
"redirect_document_id": true
52754+
},
52755+
{
52756+
"source_path": "articles/sql-database/sql-database-always-encrypted.md",
52757+
"redirect_url": "/azure/azure-sql/database/always-encrypted-certificate-store-configure",
52758+
"redirect_document_id": true
52759+
},
52760+
{
52761+
"source_path": "articles/sql-database/sql-database-audit-log-format.md",
52762+
"redirect_url": "/azure/azure-sql/database/audit-log-format",
52763+
"redirect_document_id": true
52764+
},
52765+
{
52766+
"source_path": "articles/sql-database/sql-database-auto-failover-group.md",
52767+
"redirect_url": "/azure/azure-sql/database/auto-failover-group-overview",
52768+
"redirect_document_id": true
52769+
},
52770+
{
52771+
"source_path": "articles/sql-database/sql-database-automated-backups.md",
52772+
"redirect_url": "/azure/azure-sql/database/automated-backups-overview",
52773+
"redirect_document_id": true
52774+
},
52775+
{
52776+
"source_path": "articles/sql-database/sql-database-automatic-tuning.md",
52777+
"redirect_url": "/azure/azure-sql/database/automatic-tuning-overview",
52778+
"redirect_document_id": true
52779+
},
52780+
{
52781+
"source_path": "articles/sql-database/sql-database-azure-hybrid-benefit.md",
52782+
"redirect_url": "/azure/azure-sql/database/azure-hybrid-benefit",
52783+
"redirect_document_id": true
52784+
},
52785+
{
52786+
"source_path": "articles/sql-database/sql-database-business-continuity.md",
52787+
"redirect_url": "/azure/azure-sql/database/business-continuity-high-availability-disaster-recover-hadr-overview",
52788+
"redirect_document_id": true
52789+
},
52790+
{
52791+
"source_path": "articles/sql-database/sql-database-client-id-keys.md",
52792+
"redirect_url": "/azure/azure-sql/database/application-authentication-get-client-id-keys",
52793+
"redirect_document_id": true
52794+
},
52795+
{
52796+
"source_path": "articles/sql-database/sql-database-designing-cloud-solutions-for-disaster-recovery.md",
52797+
"redirect_url": "/azure/azure-sql/database/designing-cloud-solutions-for-disaster-recovery",
52798+
"redirect_document_id": true
52799+
},
52800+
{
52801+
"source_path": "articles/sql-database/sql-database-develop-overview.md",
52802+
"redirect_url": "/azure/azure-sql/database/develop-overview",
52803+
"redirect_document_id": true
52804+
},
52805+
{
52806+
"source_path": "articles/sql-database/sql-database-disaster-recovery.md",
52807+
"redirect_url": "/azure/azure-sql/database/disaster-recovery-guidance",
52808+
"redirect_document_id": true
52809+
},
52810+
{
52811+
"source_path": "articles/sql-database/sql-database-disaster-recovery-drills.md",
52812+
"redirect_url": "/azure/azure-sql/database/disaster-recovery-drills",
52813+
"redirect_document_id": true
52814+
},
52815+
{
52816+
"source_path": "articles/sql-database/sql-database-manage-automation.md",
52817+
"redirect_url": "/azure/azure-sql/database/manage-automation",
52818+
"redirect_document_id": true
52819+
},
52820+
{
52821+
"source_path": "articles/sql-database/sql-database-manage-application-rolling-upgrade.md",
52822+
"redirect_url": "/azure/azure-sql/database/manage-application-rolling-upgrade",
52823+
"redirect_document_id": true
52824+
},
52825+
{
52826+
"source_path": "articles/sql-database/sql-database-metrics-diag-logging.md",
52827+
"redirect_url": "/azure/azure-sql/database/configure-streaming-export-metrics-diagnostic-telemtry-logging",
52828+
"redirect_document_id": true
52829+
},
52830+
{
52831+
"source_path": "articles/sql-database/sql-database-monitoring-with-dmvs.md",
52832+
"redirect_url": "/azure/azure-sql/database/monitoring-with-dmvs",
52833+
"redirect_document_id": true
52834+
},
52835+
{
52836+
"source_path": "articles/sql-database/sql-database-multi-model-features.md",
52837+
"redirect_url": "/azure/azure-sql/database/multi-model-features",
52838+
"redirect_document_id": true
52839+
},
52840+
{
52841+
"source_path": "articles/sql-database/sql-database-performance-guidance.md",
52842+
"redirect_url": "/azure/azure-sql/database/performance-guidance",
52843+
"redirect_document_id": true
52844+
},
52845+
{
52846+
"source_path": "articles/sql-database/sql-database-service-tier-hyperscale-faq.md",
52847+
"redirect_url": "/azure/azure-sql/database/service-tier-hyperscale-frequently-asked-questions-faq",
52848+
"redirect_document_id": true
52849+
},
52850+
{
52851+
"source_path": "articles/sql-database/sql-database-service-tiers-general-purpose-business-critical.md",
52852+
"redirect_url": "/azure/azure-sql/database/service-tiers-general-purpose-business-critical",
52853+
"redirect_document_id": true
52854+
},
52855+
{
52856+
"source_path": "articles/sql-database/sql-database-temporal-tables-retention-policy.md",
52857+
"redirect_url": "/azure/azure-sql/database/temporal-tables-retention-policy",
52858+
"redirect_document_id": true
5272952859
}
5273052860
]
5273152861
}

articles/app-service/app-service-web-tutorial-connect-msi.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ To debug your app using SQL Database as the back end, make sure that you've allo
4646

4747
## Grant database access to Azure AD user
4848

49-
First enable Azure AD authentication to SQL Database by assigning an Azure AD user as the Active Directory admin of the server. This user is different from the Microsoft account you used to sign up for your Azure subscription. It must be a user that you created, imported, synced, or invited into Azure AD. For more information on allowed Azure AD users, see [Azure AD features and limitations in SQL Database](../sql-database/sql-database-aad-authentication.md#azure-ad-features-and-limitations).
49+
First enable Azure AD authentication to SQL Database by assigning an Azure AD user as the Active Directory admin of the server. This user is different from the Microsoft account you used to sign up for your Azure subscription. It must be a user that you created, imported, synced, or invited into Azure AD. For more information on allowed Azure AD users, see [Azure AD features and limitations in SQL Database](../azure-sql/database/aad-authentication-overview.md#azure-ad-features-and-limitations).
5050

5151
If your Azure AD tenant doesn't have a user yet, create one by following the steps at [Add or delete users using Azure Active Directory](../active-directory/fundamentals/add-users-azure-active-directory.md).
5252

@@ -65,7 +65,7 @@ Add this Azure AD user as an Active Directory admin using [`az sql server ad-adm
6565
az sql server ad-admin create --resource-group myResourceGroup --server-name <server-name> --display-name ADMIN --object-id $azureaduser
6666
```
6767

68-
For more information on adding an Active Directory admin, see [Provision an Azure Active Directory administrator for your server](../sql-database/sql-database-aad-authentication-configure.md#provision-azure-ad-admin-sql-managed-instance)
68+
For more information on adding an Active Directory admin, see [Provision an Azure Active Directory administrator for your server](../azure-sql/database/aad-authentication-configure.md#provision-azure-ad-admin-sql-managed-instance)
6969

7070
## Set up Visual Studio
7171

articles/azure-databricks/howto-regional-disaster-recovery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -302,7 +302,7 @@ To create your own regional disaster recovery topology, follow these requirement
302302

303303
## Disaster recovery for your Azure ecosystem
304304

305-
If you are using other Azure services, be sure to implement disaster recovery best practices for those services, too. For example, if you choose to use an external Hive metastore instance, you should consider disaster recovery for [Azure SQL Database](../sql-database/sql-database-disaster-recovery.md), [Azure HDInsight](../hdinsight/hdinsight-high-availability-linux.md), and/or [Azure Database for MySQL](../mysql/concepts-business-continuity.md). For general information about disaster recovery, see [Disaster recovery for Azure applications](https://docs.microsoft.com/azure/architecture/resiliency/disaster-recovery-azure-applications).
305+
If you are using other Azure services, be sure to implement disaster recovery best practices for those services, too. For example, if you choose to use an external Hive metastore instance, you should consider disaster recovery for [Azure SQL Database](../azure-sql/database/disaster-recovery-guidance.md), [Azure HDInsight](../hdinsight/hdinsight-high-availability-linux.md), and/or [Azure Database for MySQL](../mysql/concepts-business-continuity.md). For general information about disaster recovery, see [Disaster recovery for Azure applications](https://docs.microsoft.com/azure/architecture/resiliency/disaster-recovery-azure-applications).
306306

307307
## Next steps
308308

articles/azure-monitor/insights/azure-sql.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Use the process described in [Add Azure Monitor solutions from the Solutions Gal
5959

6060
Once you have created Azure SQL Analytics solution in your workspace, you need to **configure each** resource that you want to monitor to stream its diagnostics telemetry to Azure SQL Analytics. Follow detailed instructions on this page:
6161

62-
- Enable Azure Diagnostics for your Azure SQL database to [stream diagnostics telemetry to Azure SQL Analytics](../../sql-database/sql-database-metrics-diag-logging.md).
62+
- Enable Azure Diagnostics for your Azure SQL database to [stream diagnostics telemetry to Azure SQL Analytics](../../azure-sql/database/configure-streaming-export-metrics-diagnostic-telemtry-logging.md).
6363

6464
The above page also provides instructions on enabling support for monitoring multiple Azure subscriptions from a single Azure SQL Analytics workspace as a single pane of glass.
6565

@@ -167,7 +167,7 @@ Once the new role is created, assign this role to each user that you need to gra
167167

168168
## Analyze data and create alerts
169169

170-
Data analysis in Azure SQL Analytics is based on [Log Analytics language](../log-query/get-started-queries.md) for your custom querying and reporting. Find description of the available data collected from database resource for custom querying in [metrics and logs available](../../sql-database/sql-database-metrics-diag-logging.md#metrics-and-logs-available).
170+
Data analysis in Azure SQL Analytics is based on [Log Analytics language](../log-query/get-started-queries.md) for your custom querying and reporting. Find description of the available data collected from database resource for custom querying in [metrics and logs available](../../azure-sql/database/configure-streaming-export-metrics-diagnostic-telemtry-logging.md#metrics-and-logs-available).
171171

172172
Automated alerting in Azure SQL Analytics is based on writing a Log Analytics query that triggers an alert upon a condition met. Find below several examples on Log Analytics queries upon which alerting can be set up in Azure SQL Analytics.
173173

articles/azure-monitor/platform/diagnostic-logs-schema.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -72,15 +72,15 @@ The schema for resource diagnostic logs varies depending on the resource and log
7272
| Recovery Services | [Data Model for Azure Backup](../../backup/backup-azure-reports-data-model.md)|
7373
| Search |[Enabling and using Search Traffic Analytics](../../search/search-traffic-analytics.md) |
7474
| Service Bus |[Azure Service Bus logs](../../service-bus-messaging/service-bus-diagnostic-logs.md) |
75-
| SQL Database | [Azure SQL Database logging](../../sql-database/sql-database-metrics-diag-logging.md) |
75+
| SQL Database | [Azure SQL Database logging](../../azure-sql/database/configure-streaming-export-metrics-diagnostic-telemtry-logging.md) |
7676
| Stream Analytics |[Job logs](../../stream-analytics/stream-analytics-job-diagnostic-logs.md) |
7777
| Traffic Manager | [Traffic Manager Log schema](../../traffic-manager/traffic-manager-diagnostic-logs.md) |
7878
| Virtual Networks | Schema not available. |
7979
| Virtual Network Gateways | Schema not available. |
8080

8181
## Supported log categories per resource type
8282

83-
Some categories may only be supported for specific types of resources. This is list of all that are available in some form. For example, Microsoft.Sql/servers/databases categories aren't available for all types of databases. For more information, see [information on SQL Database diagnostic logging](../../sql-database/sql-database-metrics-diag-logging.md).
83+
Some categories may only be supported for specific types of resources. This is list of all that are available in some form. For example, Microsoft.Sql/servers/databases categories aren't available for all types of databases. For more information, see [information on SQL Database diagnostic logging](../../azure-sql/database/configure-streaming-export-metrics-diagnostic-telemtry-logging.md).
8484

8585
|Resource Type|Category|Category Display Name|
8686
|---|---|---|

0 commit comments

Comments
 (0)