Skip to content

Commit 030fc94

Browse files
authored
Merge branch 'main' into broken-link-fix-David-Engel
2 parents c0f7903 + d49c925 commit 030fc94

File tree

51 files changed

+782
-361
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+782
-361
lines changed

.github/workflows/signoff-review.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -646,6 +646,8 @@ jobs:
646646
# If so, always return success. If not, always keep at pending until approved.
647647
if ($ApprovedLabelSet)
648648
{
649+
$ActionableComment = $True
650+
649651
Write-Host "Content team already approved. Returning success."
650652
$Status.state = "success"
651653
$Status.description = $ContentApprovalMessage

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -67189,6 +67189,11 @@
6718967189
"source_path": "docs/relational-databases/data-tier-applications/validate-a-dac-package.md",
6719067190
"redirect_url": "/sql/tools/sql-database-projects/concepts/data-tier-applications/unpack-dacpac-file",
6719167191
"redirect_document_id": false
67192+
},
67193+
{
67194+
"source_path": "docs/relational-databases/sql-server-configuration-manager.md",
67195+
"redirect_url": "/sql/tools/configuration-manager/sql-server-configuration-manager",
67196+
"redirect_document_id": true
6719267197
}
6719367198
]
6719467199
}

azure-sql/database/adonet-v12-develop-direct-route-ports.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ ms.custom: sqldbrb=1
1616
This topic describes the Azure SQL Database connection behavior for clients that use ADO.NET 4.5 or a later version.
1717

1818
> [!IMPORTANT]
19-
> For information about connectivity architecture, see [Azure SQL Database connectivity architecture](connectivity-architecture.md).
19+
> For information about connectivity architecture, see [Connectivity architecture](connectivity-architecture.md).
2020
>
2121
2222
## Outside vs inside

azure-sql/database/automatic-tuning-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.topic: concept-article
1212
ms.custom:
1313
- sqldbrb=2
1414
- ignite-2024
15-
monikerRange: "=azuresql || =azuresql-db || =azuresql-mi || =fabric"
15+
monikerRange: "=azuresql || =azuresql-db || =azuresql-mi || =fabricsql"
1616
---
1717
# Automatic database tuning
1818

azure-sql/database/connectivity-architecture.md

Lines changed: 43 additions & 37 deletions
Large diffs are not rendered by default.

azure-sql/database/connectivity-settings.md

Lines changed: 26 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,40 +1,40 @@
11
---
2-
title: Connectivity settings for Azure SQL Database and Azure Synapse Analytics
3-
titleSuffix: Azure SQL Database and Azure Synapse Analytics
4-
description: This article explains the Transport Layer Security (TLS) version choice and the Proxy versus Redirect settings for Azure SQL Database and Azure Synapse Analytics.
2+
title: Connectivity settings
3+
titleSuffix: Azure SQL Database and SQL database in Fabric
4+
description: This article explains the Transport Layer Security (TLS) version choice and the Proxy versus Redirect settings for Azure SQL Database and SQL database in Microsoft Fabric.
55
author: VanMSFT
66
ms.author: vanto
7-
ms.reviewer: wiassaf, mathoma, vanto
7+
ms.reviewer: wiassaf, mathoma
88
ms.service: azure-sql-database
9-
ms.date: 09/13/2024
9+
ms.date: 03/18/2025
1010
ms.subservice: connect
1111
ms.topic: how-to
1212
ms.custom:
1313
- devx-track-azurepowershell
1414
- devx-track-azurecli
1515
ms.devlang: azurecli
16+
monikerRange: "=azuresql || =azuresql-db || =fabricsql"
1617
---
17-
# Connectivity settings for Azure SQL Database and Azure Synapse Analytics
18-
[!INCLUDE [appliesto-sqldb-asa](../includes/appliesto-sqldb-asa-formerly-sqldw.md)]
18+
# Connectivity settings
1919

20-
This article introduces settings that control connectivity to the server for Azure SQL Database and [dedicated SQL pool (formerly SQL DW)](/azure/synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is) in Azure Synapse Analytics.
20+
[!INCLUDE [appliesto-sqldb-fabricsqldb](../includes/appliesto-sqldb-fabricsqldb.md)]
21+
22+
This article introduces settings that control connectivity to the server for Azure SQL Database and SQL database in Microsoft Fabric.
2123

2224
- For more information on various components that direct network traffic and connection policies, see [connectivity architecture](connectivity-architecture.md).
2325
- This article does not apply to Azure SQL Managed Instance, instead see [Connect your application to Azure SQL Managed Instance](../managed-instance/connect-application-instance.md).
24-
- This article does not apply to dedicated SQL pools in Azure Synapse Analytics workspaces. See [Azure Synapse Analytics IP firewall rules](/azure/synapse-analytics/security/synapse-workspace-ip-firewall) for guidance on how to configure IP firewall rules for Azure Synapse Analytics with workspaces.
26+
- This article does *not* apply to Azure Synapse Analytics.
27+
- For settings that control connectivity to dedicated SQL pools in Azure Synapse Analytics, see [Azure Synapse Analytics connectivity settings](/azure/synapse-analytics/security/connectivity-settings).
28+
- For connection strings to Azure Synapse Analytics pools, see [Connect to Synapse SQL](/azure/synapse-analytics/sql/connect-overview).
29+
- See [Azure Synapse Analytics IP firewall rules](/azure/synapse-analytics/security/synapse-workspace-ip-firewall) for guidance on how to configure IP firewall rules for Azure Synapse Analytics with workspaces.
2530

2631
## Networking and connectivity
2732

28-
You can change these settings in your [logical server](logical-servers.md). A logical SQL server can host both Azure SQL databases and standalone dedicated SQL pools not in an Azure Synapse Analytics workspace.
29-
30-
> [!NOTE]
31-
> These settings apply to Azure SQL databases and dedicated SQL pools (formerly SQL DW) associated with the logical server. These instructions do not apply to dedicated SQL pools in an Azure Synapse analytics workspace.
32-
33-
:::image type="content" source="media/connectivity-settings/manage-connectivity-settings.png" alt-text="Screenshot of the Firewalls and virtual networks settings in Azure portal for SQL server.":::
33+
You can change these settings in your [logical server](logical-servers.md).
3434

3535
## Change public network access
3636

37-
It's possible to change the public network access for your Azure SQL Database or standalone dedicated SQL pool via the Azure portal, Azure PowerShell, and the Azure CLI.
37+
It's possible to change the public network access for your Azure SQL Database via the Azure portal, Azure PowerShell, and the Azure CLI.
3838

3939
> [!NOTE]
4040
> These settings take effect immediately after they're applied. Your customers might experience connection loss if they don't meet the requirements for each setting.
@@ -43,6 +43,8 @@ It's possible to change the public network access for your Azure SQL Database or
4343

4444
To enable public network access for the logical server hosting your databases:
4545

46+
:::image type="content" source="media/connectivity-settings/manage-connectivity-settings.png" alt-text="Screenshot of the Firewalls and virtual networks settings in Azure portal for a logical SQL server.":::
47+
4648
1. Go to the Azure portal, and go to the [logical server in Azure](logical-servers.md).
4749
1. Under **Security**, select the **Networking** page.
4850
1. Choose the **Public access** tab, and then set the **Public network access** to **Select networks**.
@@ -109,7 +111,7 @@ Unable to create or modify firewall rules when public network interface for the
109111
To manage server or database level firewall rules, please enable the public network interface.
110112
```
111113

112-
Ensure that **Public network access** is set to **Selected networks** to be able to add, remove, or edit any firewall rules for Azure SQL Database and Azure Synapse Analytics.
114+
Ensure that **Public network access** is set to **Selected networks** to be able to add, remove, or edit any firewall rules for Azure SQL Database.
113115

114116
## Minimum TLS version
115117

@@ -121,7 +123,7 @@ Currently, Azure SQL Database supports TLS 1.0, 1.1, 1.2, and 1.3. Setting a min
121123

122124
Azure has announced that support for older TLS versions (TLS 1.0, and 1.1) ends August 31, 2025. For more information, see [TLS 1.0 and 1.1 deprecation](https://azure.microsoft.com/updates/azure-support-tls-will-end-by-31-october-2024-2/).
123125

124-
Starting November 2024, you will no longer be able to set the minimal TLS version for Azure SQL Database and Azure Synapse Analytics client connections below TLS 1.2.
126+
Starting November 2024, you will no longer be able to set the minimal TLS version for Azure SQL Database client connections below TLS 1.2.
125127

126128
### Configure minimum TLS version
127129

@@ -209,11 +211,11 @@ You can use the Azure portal and SQL audit logs to identify clients that are con
209211

210212
In the Azure portal, go to **Metrics** under **Monitoring** for your database resource, and then filter by *Successful connections*, and *TLS versions* = `1.0` and `1.1`:
211213

212-
:::image type="content" source="media/connectivity-settings/connections-in-portal.png" alt-text="Screenshot of the monitoring page for the database resource in the Azure portal with successful tls 1.0 and 1.1 connections filtered. ":::
214+
:::image type="content" source="media/connectivity-settings/connections-in-portal.png" alt-text="Screenshot of the monitoring page for the database resource in the Azure portal with successful T L S 1.0 and 1.1 connections filtered. ":::
213215

214-
You can also query [sys.fn_get_audit_file](/sql/relational-databases/system-functions/sys-fn-get-audit-file-transact-sql) directly within your database to view the `client_tls_version_name` in the audit file:
216+
You can also query [sys.fn_get_audit_file](/sql/relational-databases/system-functions/sys-fn-get-audit-file-transact-sql) directly within your database to view the `client_tls_version_name` in the audit file, looking for events named `audit_event`.
215217

216-
:::image type="content" source="media/connectivity-settings/tls-entries-in-audit-file.png" alt-text="Screenshot of a query result of the audit file showing tls version connections. ":::
218+
:::image type="content" source="media/connectivity-settings/tls-entries-in-audit-file.png" alt-text="Screenshot of a query result of the audit file showing T L S version connections. ":::
217219

218220

219221
## Change the connection policy
@@ -276,6 +278,8 @@ It's possible to change the connection policy for your logical server by using t
276278
277279
### Azure CLI in a Bash shell
278280

281+
For information on how to change the Azure SQL Database connection policy for a server, see [conn-policy](/cli/azure/sql/server/conn-policy)
282+
279283
The following CLI script shows how to change the connection policy in a Bash shell:
280284

281285
```azurecli-interactive
@@ -311,5 +315,4 @@ az resource update --ids %sqlserverid% --set properties.connectionType=Proxy
311315

312316
## Related content
313317

314-
- [Azure SQL Database and Azure Synapse Analytics connectivity architecture](connectivity-architecture.md)
315-
- [conn-policy](/cli/azure/sql/server/conn-policy)
318+
- [Connectivity architecture](connectivity-architecture.md)

azure-sql/database/develop-overview.md

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn about available connectivity libraries and best practices for
55
author: dzsquared
66
ms.author: drskwier
77
ms.reviewer: wiassaf, mathoma
8-
ms.date: 11/14/2019
8+
ms.date: 03/18/2025
99
ms.service: azure-sql
1010
ms.subservice: development
1111
ms.topic: concept-article
@@ -15,6 +15,7 @@ ms.custom:
1515
monikerRange: "=azuresql || =azuresql-db || =azuresql-mi || =fabricsql"
1616
---
1717
# Application development overview - Azure SQL Database & Azure SQL Managed Instance
18+
1819
[!INCLUDE [appliesto-sqldb-sqlmi-fabricsqldb](../includes/appliesto-sqldb-sqlmi-fabricsqldb.md)]
1920

2021
This article walks through the basic considerations that a developer should be aware of when writing code to connect to your database in Azure. This article applies to Azure SQL Database, and Azure SQL Managed Instance.
@@ -23,23 +24,22 @@ This article walks through the basic considerations that a developer should be a
2324

2425
You can use various [programming languages and platforms](connect-query-content-reference-guide.md) to connect and query Azure SQL Database. You can find [sample applications](https://azure.microsoft.com/resources/samples/?service=sql-database&sort=0) that you can use to connect to the database.
2526

26-
You can leverage open-source tools like [cheetah](https://github.com/wunderlist/cheetah), [sql-cli](https://www.npmjs.com/package/sql-cli), [VS Code](https://code.visualstudio.com/). Additionally, Azure SQL Database works with Microsoft tools like [Visual Studio](https://www.visualstudio.com/downloads/) and [SQL Server Management Studio](/sql/ssms/sql-server-management-studio-ssms). You can also use the Azure portal, PowerShell, and REST APIs to help you gain additional productivity.
27+
You can use open-source tools like [cheetah](https://github.com/wunderlist/cheetah), [sql-cli](https://www.npmjs.com/package/sql-cli), [VS Code](https://code.visualstudio.com/). Additionally, Azure SQL Database works with Microsoft tools like [Visual Studio](https://visualstudio.microsoft.com/downloads) and [SQL Server Management Studio](/sql/ssms/sql-server-management-studio-ssms). You can also use the Azure portal, PowerShell, and REST APIs to help you gain more productivity.
2728

2829
## Authentication
2930

3031
Access to Azure SQL Database is protected with logins and firewalls. Azure SQL Database and SQL Managed Instance support users and logins for both SQL authentication and [authentication](authentication-aad-overview.md) with Microsoft Entra ID ([formerly Azure Active Directory](/entra/fundamentals/new-name)). Microsoft Entra logins are generally available in SQL Managed Instance and are in Public Preview for Azure SQL Database.
3132

32-
Learn more about [managing database access and login](logins-create-manage.md).
33+
Learn more about [managing database access and logins](logins-create-manage.md).
3334

3435
## Client connections
3536

3637
In your client connection logic, override the default timeout to be 30 seconds. The default of 15 seconds is too short for connections that depend on the internet.
3738

38-
If you are using a [connection pool](/dotnet/framework/data/adonet/sql-server-connection-pooling), be sure to close the connection the instant your program is not actively using it, and is not preparing to reuse it.
39+
If you're using a [connection pool](/dotnet/framework/data/adonet/sql-server-connection-pooling), be sure to close the connection the instant your program isn't actively using it, and isn't preparing to reuse it.
3940

4041
Avoid long-running transactions because any infrastructure or connection failure might roll back the transaction. If possible, split the transaction in the multiple smaller transactions and use [batching to improve performance](../performance-improve-use-batching.md).
4142

42-
4343
It's possible to connect your application to your Azure SQL resource by using the following languages:
4444

4545
- [.NET with Visual Studio](connect-query-dotnet-visual-studio.md)
@@ -53,24 +53,23 @@ It's possible to connect your application to your Azure SQL resource by using th
5353
It's possible to configure Microsoft Entra authentication to your Azure SQL resource. Review the following articles for more information:
5454

5555
- [Connect to Azure SQL with Microsoft Entra authentication and SqlClient](/sql/connect/ado-net/sql/azure-active-directory-authentication)
56-
- [Use Managed Identities in Microsoft Entra ID for Azure SQL](authentication-azure-ad-user-assigned-managed-identity.md)
56+
- [Managed identities in Microsoft Entra for Azure SQL](authentication-azure-ad-user-assigned-managed-identity.md)
5757
- [Connect to SQL Database from .NET App Service without secrets using a managed identity](/azure/app-service/tutorial-connect-msi-sql-database)
5858

59-
6059
## Resiliency
6160

62-
Azure SQL Database is a cloud service where you might expect transient errors that happen in the underlying infrastructure or in the communication between cloud entities. Although Azure SQL Database is resilient on the transitive infrastructure failures, these failures might affect your connectivity. When a transient error occurs while connecting to SQL Database, your code should [retry the call](troubleshoot-common-connectivity-issues.md). We recommend that retry logic use backoff logic, so that it does not overwhelm the service with multiple clients retrying simultaneously. Retry logic depends on the [error messages for SQL Database client programs](troubleshoot-common-errors-issues.md).
61+
Azure SQL Database is a cloud service where you might expect transient errors that happen in the underlying infrastructure or in the communication between cloud entities. Although Azure SQL Database is resilient on the transitive infrastructure failures, these failures might affect your connectivity. When a transient error occurs while connecting to SQL Database, your code should [retry the call](troubleshoot-common-connectivity-issues.md). We recommend that retry logic use backoff logic, so that it doesn't overwhelm the service with multiple clients retrying simultaneously. Retry logic depends on the [error messages for SQL Database client programs](troubleshoot-common-errors-issues.md).
6362

6463
For more information about how to prepare for planned maintenance events on your Azure SQL Database, see [planning for Azure maintenance events in Azure SQL Database](planned-maintenance.md).
6564

6665
## Network considerations
6766

68-
- On the computer that hosts your client program, ensure the firewall allows outgoing TCP communication on port 1433. More information: [Configure an Azure SQL Database firewall](firewall-configure.md).
69-
- If your client program connects to SQL Database while your client runs on an Azure virtual machine (VM), you must open certain port ranges on the VM. More information: [Ports beyond 1433 for ADO.NET 4.5 and SQL Database](adonet-v12-develop-direct-route-ports.md).
70-
- Client connections to Azure SQL Database sometimes bypass the proxy and interact directly with the database. Ports other than 1433 become important. For more information, [Azure SQL Database connectivity architecture](connectivity-architecture.md) and [Ports beyond 1433 for ADO.NET 4.5 and SQL Database](adonet-v12-develop-direct-route-ports.md).
67+
- On the computer that hosts your client program, ensure the firewall allows outgoing TCP communication on port 1433. More information: [Azure SQL Database IP firewall rules](firewall-configure.md).
68+
- If your client program connects to SQL Database while your client runs on an Azure virtual machine (VM), you must open certain port ranges on the VM. More information: [Ports beyond 1433 for ADO.NET 4.5](adonet-v12-develop-direct-route-ports.md).
69+
- Client connections to Azure SQL Database sometimes bypass the proxy and interact directly with the database. Ports other than 1433 become important. For more information, [Connectivity architecture](connectivity-architecture.md) and [Ports beyond 1433 for ADO.NET 4.5](adonet-v12-develop-direct-route-ports.md).
7170
- For networking configuration for an instance of SQL Managed Instance, see [network configuration for SQL Managed Instance](../managed-instance/how-to-content-reference-guide.md#network-configuration).
7271

73-
## Next steps
72+
## Related content
7473

7574
Explore all the capabilities of [SQL Database](sql-database-paas-overview.md) and [SQL Managed Instance](../managed-instance/sql-managed-instance-paas-overview.md).
7675

azure-sql/database/monitoring-with-dmvs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.custom:
1313
- azure-sql-split
1414
- sqldbrb=2
1515
- ignite-2024
16-
monikerRange: "=azuresql || =azuresql-db || =fabric"
16+
monikerRange: "=azuresql || =azuresql-db || =fabricsql"
1717
---
1818
# Monitor performance using dynamic management views
1919

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
---
2+
author: WilliamDAssafMSFT
3+
ms.author: wiassaf
4+
ms.date: 03/18/2025
5+
ms.service: azure-sql-database
6+
ms.topic: include
7+
---
8+
9+
[!INCLUDE [applies-md](applies-md.md)] :::image type="icon" source="../media/applies-to/yes-icon.svg" border="false"::: [Azure SQL Database](/sql/sql-server/sql-docs-navigation-guide#applies-to) :::image type="icon" source="../media/applies-to/yes-icon.svg" border="false"::: [Azure Synapse Analytics (dedicated SQL pools only)](/sql/sql-server/sql-docs-navigation-guide#applies-to) :::image type="icon" source="../media/applies-to/yes-icon.svg" border="false"::: [SQL database in Fabric](/sql/sql-server/sql-docs-navigation-guide#applies-to)

0 commit comments

Comments
 (0)