Skip to content

Commit 49eeaa8

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/sql-docs-pr into docs-editor/copy-into-transact-sql-1751126904
2 parents c2f0944 + 5266f47 commit 49eeaa8

File tree

789 files changed

+14468
-13479
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

789 files changed

+14468
-13479
lines changed

.openpublishing.publish.config.json

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -134,12 +134,6 @@
134134
"branch": "master",
135135
"branch_mapping": {}
136136
},
137-
{
138-
"path_to_root": "azure-docs-pr",
139-
"url": "https://github.com/MicrosoftDocs/azure-docs-pr",
140-
"branch": "main",
141-
"branch_mapping": {}
142-
},
143137
{
144138
"path_to_root": "azure-compute-docs-pr",
145139
"url": "https://github.com/MicrosoftDocs/azure-compute-docs-pr",
@@ -199,4 +193,4 @@
199193
".openpublishing.redirection.stretch-database.json",
200194
".openpublishing.redirection.visual-studio-code-extensions.json"
201195
]
202-
}
196+
}

.openpublishing.redirection.json

Lines changed: 130 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,125 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "docs/dma/dma-assess-sql-data-estate-to-sqldb-commandline.md",
5+
"redirect_url": "/previous-versions/sql/dma/dma-assess-sql-data-estate-to-sqldb-commandline",
6+
"redirect_document_id": false,
7+
"monikers": [
8+
"sql-server-ver16"
9+
]
10+
},
11+
{
12+
"source_path": "docs/dma/dma-assess-sql-data-estate-to-sqldb.md",
13+
"redirect_url": "/previous-versions/sql/dma/dma-assess-sql-data-estate-to-sqldb",
14+
"redirect_document_id": false,
15+
"monikers": [
16+
"sql-server-ver16"
17+
]
18+
},
19+
{
20+
"source_path": "docs/dma/dma-assess-ssis.md",
21+
"redirect_url": "/previous-versions/sql/dma/dma-assess-ssis",
22+
"redirect_document_id": false,
23+
"monikers": [
24+
"sql-server-ver16"
25+
]
26+
},
27+
{
28+
"source_path": "docs/dma/dma-assesssqlonprem.md",
29+
"redirect_url": "/previous-versions/sql/dma/dma-assesssqlonprem",
30+
"redirect_document_id": false,
31+
"monikers": [
32+
"sql-server-ver16"
33+
]
34+
},
35+
{
36+
"source_path": "docs/dma/dma-bestpractices.md",
37+
"redirect_url": "/previous-versions/sql/dma/dma-bestpractices",
38+
"redirect_document_id": false,
39+
"monikers": [
40+
"sql-server-ver16"
41+
]
42+
},
43+
{
44+
"source_path": "docs/dma/dma-commandline.md",
45+
"redirect_url": "/previous-versions/sql/dma/dma-commandline",
46+
"redirect_document_id": false,
47+
"monikers": [
48+
"sql-server-ver16"
49+
]
50+
},
51+
{
52+
"source_path": "docs/dma/dma-configurationsettings.md",
53+
"redirect_url": "/previous-versions/sql/dma/dma-configurationsettings",
54+
"redirect_document_id": false,
55+
"monikers": [
56+
"sql-server-ver16"
57+
]
58+
},
59+
{
60+
"source_path": "docs/dma/dma-diagnostic-data-collection.md",
61+
"redirect_url": "/previous-versions/sql/dma/dma-diagnostic-data-collection",
62+
"redirect_document_id": false,
63+
"monikers": [
64+
"sql-server-ver16"
65+
]
66+
},
67+
{
68+
"source_path": "docs/dma/dma-migrateonpremsql.md",
69+
"redirect_url": "/previous-versions/sql/dma/dma-migrateonpremsql",
70+
"redirect_document_id": false,
71+
"monikers": [
72+
"sql-server-ver16"
73+
]
74+
},
75+
{
76+
"source_path": "docs/dma/dma-migrateonpremsqltosqldb.md",
77+
"redirect_url": "/previous-versions/sql/dma/dma-migrateonpremsqltosqldb",
78+
"redirect_document_id": false,
79+
"monikers": [
80+
"sql-server-ver16"
81+
]
82+
},
83+
{
84+
"source_path": "docs/dma/dma-migrateserverlogins.md",
85+
"redirect_url": "/previous-versions/sql/dma/dma-migrateserverlogins",
86+
"redirect_document_id": false,
87+
"monikers": [
88+
"sql-server-ver16"
89+
]
90+
},
91+
{
92+
"source_path": "docs/dma/dma-overview.md",
93+
"redirect_url": "/previous-versions/sql/dma/dma-overview",
94+
"redirect_document_id": false,
95+
"monikers": [
96+
"sql-server-ver16"
97+
]
98+
},
99+
{
100+
"source_path": "docs/dma/dma-save-load-assessments.md",
101+
"redirect_url": "/previous-versions/sql/dma/dma-save-load-assessments",
102+
"redirect_document_id": false,
103+
"monikers": [
104+
"sql-server-ver16"
105+
]
106+
},
107+
{
108+
"source_path": "docs/dma/dma-sku-recommend-sql-db.md",
109+
"redirect_url": "/previous-versions/sql/dma/dma-sku-recommend-sql-db",
110+
"redirect_document_id": false,
111+
"monikers": [
112+
"sql-server-ver16"
113+
]
114+
},
115+
{
116+
"source_path": "docs/dma/dma-whats-new.md",
117+
"redirect_url": "/previous-versions/sql/dma/dma-whats-new",
118+
"redirect_document_id": false,
119+
"monikers": [
120+
"sql-server-ver16"
121+
]
122+
},
3123
{
4124
"source_path": "azure-sql/database/saas-dbpertenant-dr-geo-replication.md",
5125
"redirect_url": "/previous-versions/sql/database/saas-dbpertenant-dr-geo-replication",
@@ -47630,6 +47750,11 @@
4763047750
"redirect_url": "/previous-versions/sql/2014/tools/sqlagent90-application",
4763147751
"redirect_document_id": false
4763247752
},
47753+
{
47754+
"source_path": "docs/tools/sqlagent90-application.md",
47755+
"redirect_url": "/sql/tools/sqlagent-application",
47756+
"redirect_document_id": false
47757+
},
4763347758
{
4763447759
"source_path": "docs/2014/tools/sqlcmd-utility.md",
4763547760
"redirect_url": "/previous-versions/sql/2014/tools/sqlcmd-utility",
@@ -47900,6 +48025,11 @@
4790048025
"redirect_url": "/previous-versions/sql/2014/tools/configuration-manager/sql-server-browser-service",
4790148026
"redirect_document_id": false
4790248027
},
48028+
{
48029+
"source_path": "docs/tools/configuration-manager/sql-server-browser-service.md",
48030+
"redirect_url": "/sql/database-engine/configure-windows/sql-server-browser-service-database-engine-and-ssas",
48031+
"redirect_document_id": false
48032+
},
4790348033
{
4790448034
"source_path": "docs/2014/tools/configuration-manager/sql-server-browser-sql-server-configuration-manager.md",
4790548035
"redirect_url": "/previous-versions/sql/2014/tools/configuration-manager/sql-server-browser-sql-server-configuration-manager",

azure-sql/azure-hybrid-benefit.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ You can enable the Azure Hybrid Benefit for Azure SQL Database by using the Azur
3030

3131
For Azure SQL Database, Azure Hybrid Benefit is only available when using the provisioned compute tier of the [vCore-based purchasing model](database/service-tiers-vcore.md). Azure Hybrid Benefit doesn't apply to the [DTU-based purchasing model](database/service-tiers-dtu.md) or the [serverless compute tier](database/serverless-tier-overview.md).
3232

33-
#### [Portal](#tab/azure-portal)
33+
#### [Azure portal](#tab/azure-portal)
3434

3535
To set or update the license type to the Azure Hybrid Benefit by using the Azure portal:
3636

@@ -65,7 +65,7 @@ To set or update the license type to the Azure Hybrid Benefit by using the REST
6565

6666
You can enable the Azure Hybrid Benefit for Azure SQL Managed Instance by using the Azure portal, PowerShell, Azure CLI, or REST API.
6767

68-
#### [Portal](#tab/azure-portal)
68+
#### [Azure portal](#tab/azure-portal)
6969

7070
To set or update the license type to the Azure Hybrid Benefit by using the Azure portal:
7171

azure-sql/azure-sql-iaas-vs-paas-what-is-overview.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -190,4 +190,3 @@ For pricing:
190190

191191
To migrate:
192192
- [Migrate to Azure SQL](migration-guides/index.yml)
193-
- [Identify the right SKU for your on-premises database](/sql/dma/dma-sku-recommend-sql-db/)

azure-sql/database-watcher-data.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: A detailed description of SQL monitoring data collected by database
55
author: lcwright
66
ms.author: lancewright
77
ms.reviewer: dfurman
8-
ms.date: 05/04/2025
8+
ms.date: 07/08/2025
99
ms.service: azure-sql
1010
ms.subservice: monitoring
1111
ms.topic: conceptual
@@ -101,7 +101,10 @@ END CATCH;
101101

102102
To avoid concurrency conflicts such as blocking and deadlocks between data collection and database workloads running on your Azure SQL resources, the monitoring queries use short [lock timeouts](/sql/relational-databases/sql-server-transaction-locking-and-row-versioning-guide#customizing-the-lock-time-out) and low [deadlock priority](/sql/t-sql/statements/set-deadlock-priority-transact-sql). If there is a concurrency conflict, priority is given to the application workload queries.
103103

104-
You might observe gaps in the collected data if the overall resource utilization is high, or if concurrency conflicts occur. In these cases, monitoring queries might be deprioritized in favor of application workloads.
104+
You might observe gaps in the collected data in the following scenarios:
105+
106+
- If the overall resource utilization is high, or if concurrency conflicts between monitoring queries and application workloads occur. In these cases, monitoring queries are deprioritized in favor of application workloads.
107+
- If you have automation that terminates long-running sessions. To avoid gaps in collected data, exclude any session where the `program_name` column in the [sys.dm_exec_sessions](/sql/relational-databases/system-dynamic-management-views/sys-dm-exec-sessions-transact-sql) system view is `SQLExternalMonitoring` or `x_ms_reserved_sql_external_monitoring`.
105108

106109
### Data collection in elastic pools
107110

azure-sql/database/ai-artificial-intelligence-intelligent-applications.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@ author: WilliamDAssafMSFT
55
ms.author: wiassaf
66
ms.reviewer: damauri, josephsack, randolphwest, mathoma
77
ms.date: 05/06/2025
8+
ms.update-cycle: 180-days
89
ms.service: azure-sql-database
910
ms.topic: conceptual
1011
ms.collection:
@@ -195,7 +196,7 @@ End-to-end examples:
195196

196197
[Semantic Kernel is an open-source SDK](/semantic-kernel/overview/) that lets you easily build agents that can call your existing code. As a highly extensible SDK, you can use Semantic Kernel with models from OpenAI, Azure OpenAI, Hugging Face, and more. By combining your existing C#, Python, and Java code with these models, you can build agents that answer questions and automate processes.
197198

198-
- [Microsoft.SemanticKernel.Connectors.SqlServer](https://github.com/microsoft/semantic-kernel/tree/main/dotnet/src/Connectors/Connectors.Memory.SqlServer)
199+
- [Microsoft.SemanticKernel.Connectors.SqlServer](/dotnet/api/microsoft.semantickernel.connectors.sqlserver)
199200

200201
An example of how easily Semantic Kernel helps to build AI-enabled solution is here:
201202

azure-sql/database/alerts-create.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ You can configure and get information about alert rules using:
4949
- [PowerShell](/azure/azure-monitor/alerts/alerts-create-rule-cli-powershell-arm#create-a-new-alert-rule-using-powershell)
5050
- [Command-line interface (CLI)](/azure/azure-monitor/alerts/alerts-create-rule-cli-powershell-arm#create-a-new-alert-rule-using-the-cli)
5151
- [ARM template](/azure/azure-monitor/alerts/alerts-create-rule-cli-powershell-arm#create-a-new-alert-rule-using-an-arm-template)
52-
- [Azure Monitor REST API](/rest/api/monitor/alertrules)
52+
- [Azure Monitor REST API](/rest/api/monitor/alertsmanagement/alert-processing-rules)
5353

5454
## Get started with a new alert rule in the Azure portal
5555

azure-sql/database/always-encrypted-with-secure-enclaves-landing.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ landingContent:
120120
- text: Inside Azure Datacenter Architecture with Mark Russinovich
121121
url: https://youtu.be/69PrhWQorEM?t=4523
122122
- text: A webinar including a section on secure enclaves
123-
url: https://info.microsoft.com/ww-ondemand-azure-webinar-series-four-ways-to-take-your-data-security-to-the-next-level.html
123+
url: https://info.microsoft.com/en-us-ondemand-SimplifyandautomateresearchcomplianceresponsibilitieswithAzure-none.html
124124

125125
# Card
126126
- title: Query columns

azure-sql/database/auditing-analyze-audit-logs.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,15 @@ titleSuffix: Azure SQL Database & Azure Synapse Analytics
44
description: Use Auditing to analyze logs in Log Analytics, Event Hubs, or through an Azure storage account.
55
author: sravanisaluru
66
ms.author: srsaluru
7-
ms.reviewer: mathoma
8-
ms.date: 06/10/2025
7+
ms.reviewer: mathoma, vanto
8+
ms.date: 07/09/2025
99
ms.service: azure-sql-database
1010
ms.subservice: security
1111
ms.topic: how-to
1212
---
1313
# Use Auditing to analyze audit logs and reports
1414

15-
[!INCLUDE[appliesto-sqldb-asa](../includes/appliesto-sqldb-asa.md)]
15+
[!INCLUDE [appliesto-sqldb-asa](../includes/appliesto-sqldb-asa.md)]
1616

1717
This article provides an overview of analyzing audit logs using Auditing for [Azure SQL Database](sql-database-paas-overview.md) and [Azure Synapse Analytics](/azure/synapse-analytics/sql-data-warehouse/sql-data-warehouse-overview-what-is). You can use Auditing to analyze audit logs stored in:
1818

@@ -26,7 +26,7 @@ If you chose to write audit logs to Log Analytics:
2626

2727
1. Use the [Azure portal](https://portal.azure.com).
2828
1. Go to the relevant database resource.
29-
1. At the top of the database's **Auditing** page, select **View audit logs**.
29+
1. At the top of the database's **Auditing** page, select **View audit logs** to display a sample of audit logs with a limited set of fields that cover activity from up to 2 hours prior to the selected **End Time** (which defaults to 'now'):
3030

3131
:::image type="content" source="media/auditing-analyze-audit-logs/view-audit-logs.png" alt-text="Screenshot of the Auditing menu in the Azure portal where you can select the View audit logs option." lightbox="media/auditing-analyze-audit-logs/view-audit-logs.png":::
3232

@@ -69,7 +69,7 @@ If you chose to write audit logs to an Azure storage account, there are several
6969

7070
1. The merged file opens in SSMS, where you can view and analyze it, as well as export it to an XEL or CSV file, or to a table.
7171

72-
- Use Power BI. You can view and analyze audit log data in Power BI. For more information and to access a downloadable template, see [Blog: Analyze audit log data in Power BI](https://techcommunity.microsoft.com/blog/azuredbsupport/sql-azure-blob-auditing-basic-power-bi-dashboard/368895).
72+
- Use Power BI. You can view and analyze audit log data in Power BI. For more information, see [Using Azure Log Analytics in Power BI](/power-bi/transform-model/log-analytics/desktop-log-analytics-overview).
7373
- Download log files from your Azure Storage blob container via the portal or by using a tool such as [Azure Storage Explorer](https://azure.microsoft.com/products/storage/storage-explorer).
7474
- After you have downloaded a log file locally, double-click the file to open, view, and analyze the logs in SSMS.
7575
- You can also download multiple files simultaneously in Azure Storage Explorer. To do so, right-click a specific subfolder and select **Save as** to save in a local folder.

azure-sql/database/auditing-overview.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: SQL Auditing for Azure SQL Database and Azure Synapse Analytics tra
55
author: sravanisaluru
66
ms.author: srsaluru
77
ms.reviewer: wiassaf, vanto, mathoma
8-
ms.date: 03/12/2025
8+
ms.date: 07/02/2025
99
ms.service: azure-sql-database
1010
ms.subservice: security
1111
ms.topic: conceptual
@@ -39,21 +39,21 @@ You can use SQL Database auditing to:
3939
> [!IMPORTANT]
4040
> Auditing for Azure SQL Database, Azure Synapse Analytics SQL pools, and Azure SQL Managed Instance is optimized for availability and performance of the database or instance being audited. During periods of very high activity or high network load, the auditing feature might allow transactions to proceed without recording all of the events marked for auditing.
4141
42-
## Enhancements to performance, availability, and reliability in server auditing for Azure SQL Database (March 2025)
42+
## Enhancements to performance, availability, and reliability in server auditing for Azure SQL Database (July 2025 GA)
4343

44-
- Re-architected major portions of SQL Auditing resulting in increased availability and reliability of server audits. As an added benefit, there's closer feature alignment with SQL Server and Azure SQL Managed Instance. Database auditing remains unchanged.
44+
- Re-architected major portions of SQL Auditing resulting in increased availability and reliability of server audits. As an added benefit, there's closer feature alignment with SQL Server and Azure SQL Managed Instance. Database auditing remains unchanged.
4545
- The previous design of auditing triggers a database level audit and executes one audit session for each database in the server. The new architecture of auditing creates one extended event session at the server level that captures audit events for all databases.
4646
- The new auditing design optimizes memory and CPU, and is consistent with how auditing works in SQL Server and Azure SQL Managed Instance.
4747

48-
### Changes from the re-architecture of server auditing
48+
### Changes from the re-architecture of server auditing
4949

5050
- Folder structure change for storage account:
5151
- One of the primary changes involves a folder structure change for audit logs stored in storage account containers. Previously, server audit logs were written to separate folders; one for each database, with the database name serving as the folder name. With the new update, all server audit logs will be consolidated into a single folder labeled `master`. This behavior is the same as Azure SQL Managed Instance and SQL Server.
5252
- Folder structure change for read-only replicas:
5353
- Read-only database replicas previously had their logs stored in a read-only folder. Those logs will now be written into the `master` folder. You can retrieve these logs by filtering on the new column `is_secondary_replica_true`.
5454
- Permissions required to view Audit logs:
5555
- Only **Server admin** principals can view audit logs stored in the `master` folder.
56-
56+
5757
## Auditing limitations
5858

5959
- Enabling auditing on a paused **Azure Synapse SQL pool** isn't supported. To enable auditing, resume the **Synapse SQL pool**.
@@ -84,5 +84,4 @@ You can use SQL Database auditing to:
8484
- [What's New in Azure SQL Auditing](/shows/data-exposed/server-audit-redesign-for-azure-sql-database-data-exposed)
8585
- [Get started with Azure SQL Managed Instance auditing](../managed-instance/auditing-configure.md)
8686
- [Auditing for SQL Server](/sql/relational-databases/security/auditing/sql-server-audit-database-engine)
87-
8887
- [Set up Auditing for Azure SQL Database and Azure Synapse Analytics](auditing-setup.md)

0 commit comments

Comments
 (0)