You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-sql/database/auditing-overview.md
+5-6Lines changed: 5 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: SQL Auditing for Azure SQL Database and Azure Synapse Analytics tra
5
5
author: sravanisaluru
6
6
ms.author: srsaluru
7
7
ms.reviewer: wiassaf, vanto, mathoma
8
-
ms.date: 03/12/2025
8
+
ms.date: 07/02/2025
9
9
ms.service: azure-sql-database
10
10
ms.subservice: security
11
11
ms.topic: conceptual
@@ -39,21 +39,21 @@ You can use SQL Database auditing to:
39
39
> [!IMPORTANT]
40
40
> Auditing for Azure SQL Database, Azure Synapse Analytics SQL pools, and Azure SQL Managed Instance is optimized for availability and performance of the database or instance being audited. During periods of very high activity or high network load, the auditing feature might allow transactions to proceed without recording all of the events marked for auditing.
41
41
42
-
## Enhancements to performance, availability, and reliability in server auditing for Azure SQL Database (March 2025)
42
+
## Enhancements to performance, availability, and reliability in server auditing for Azure SQL Database (July 2025 GA)
43
43
44
-
- Re-architected major portions of SQL Auditing resulting in increased availability and reliability of server audits. As an added benefit, there's closer feature alignment with SQL Server and Azure SQL Managed Instance. Database auditing remains unchanged.
44
+
- Re-architected major portions of SQL Auditing resulting in increased availability and reliability of server audits. As an added benefit, there's closer feature alignment with SQL Server and Azure SQL Managed Instance. Database auditing remains unchanged.
45
45
- The previous design of auditing triggers a database level audit and executes one audit session for each database in the server. The new architecture of auditing creates one extended event session at the server level that captures audit events for all databases.
46
46
- The new auditing design optimizes memory and CPU, and is consistent with how auditing works in SQL Server and Azure SQL Managed Instance.
47
47
48
-
### Changes from the re-architecture of server auditing
48
+
### Changes from the re-architecture of server auditing
49
49
50
50
- Folder structure change for storage account:
51
51
- One of the primary changes involves a folder structure change for audit logs stored in storage account containers. Previously, server audit logs were written to separate folders; one for each database, with the database name serving as the folder name. With the new update, all server audit logs will be consolidated into a single folder labeled `master`. This behavior is the same as Azure SQL Managed Instance and SQL Server.
52
52
- Folder structure change for read-only replicas:
53
53
- Read-only database replicas previously had their logs stored in a read-only folder. Those logs will now be written into the `master` folder. You can retrieve these logs by filtering on the new column `is_secondary_replica_true`.
54
54
- Permissions required to view Audit logs:
55
55
- Only **Server admin** principals can view audit logs stored in the `master` folder.
56
-
56
+
57
57
## Auditing limitations
58
58
59
59
- Enabling auditing on a paused **Azure Synapse SQL pool** isn't supported. To enable auditing, resume the **Synapse SQL pool**.
@@ -84,5 +84,4 @@ You can use SQL Database auditing to:
84
84
-[What's New in Azure SQL Auditing](/shows/data-exposed/server-audit-redesign-for-azure-sql-database-data-exposed)
85
85
-[Get started with Azure SQL Managed Instance auditing](../managed-instance/auditing-configure.md)
86
86
-[Auditing for SQL Server](/sql/relational-databases/security/auditing/sql-server-audit-database-engine)
87
-
88
87
-[Set up Auditing for Azure SQL Database and Azure Synapse Analytics](auditing-setup.md)
Copy file name to clipboardExpand all lines: azure-sql/database/doc-changes-updates-release-notes-whats-new.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,6 +66,7 @@ The following table lists features of Azure SQL Database that have been made gen
66
66
67
67
| Feature | GA Month | Details |
68
68
| --- | --- | --- |
69
+
|**Audit re-architecture**| July 2025 | Increased availability and reliability of server audits through a re-architecture of auditing in Azure SQL Database that is closely aligned with SQL Server and Azure SQL Managed Instance. For more information, see [Auditing](auditing-overview.md#enhancements-to-performance-availability-and-reliability-in-server-auditing-for-azure-sql-database-july-2025-ga).|
69
70
|**Hyperscale increased log generation rate**| May 2025 | The transaction log generation rate in Azure SQL Database Hyperscale single databases has been increased from 100 MiB/s to 150 MiB/s for premium-series and premium-series memory optimized hardware. For more information, read [Blog: Enhancements to Azure SQL Database Hyperscale](https://aka.ms/HSenhancements).|
70
71
|**Hyperscale continuous priming**| May 2025 |[Continuous priming](service-tier-hyperscale.md#continuous-priming) optimizes Hyperscale performance during failovers by priming high availability secondary compute replicas. Continuous priming is now generally available. For more information, read [Blog: Enhancements to Azure SQL Database Hyperscale](https://aka.ms/HSenhancements). |
71
72
|**JSON native data type**| May 2025 | The [**json** data type and JSON aggregate functions](/sql/t-sql/data-types/json-data-type?view=azuresqldb-current&preserve-view=true) provide new capabilities for handling semistructured data in Azure SQL Database. |
@@ -102,6 +103,7 @@ Learn about significant changes to the Azure SQL Database documentation. For pre
102
103
| Changes | Details |
103
104
| --- | --- |
104
105
|**Convert to Hyperscale with geo-replicas (preview)**|The ability to [convert a geo-replicated database non-Hyperscale database to Hyperscale](convert-to-hyperscale.md) using T-SQL, REST API, PowerShell, or Azure CLI is currently a preview feature. For more information, see [Blog: Hyperscale conversion support for geo-replicas](https://aka.ms/hs-conversion-geodr-preview). |
106
+
|**Audit re-architecture GA**| Enhancements to performance, availability, and reliability in server auditing for Azure SQL Database. For more information, see [Auditing](auditing-overview.md#enhancements-to-performance-availability-and-reliability-in-server-auditing-for-azure-sql-database-july-2025-ga). |
@@ -288,6 +288,17 @@ Microsoft is fully responsible for keeping and rotating keys for databases with
288
288
289
289
Automatic backups stored in Azure-managed storage accounts are automatically encrypted by Azure storage. Learn more about [Azure Storage encryption for data at rest](/azure/storage/common/storage-service-encryption).
290
290
291
+
## Common issues with automated backups due to customer actions
292
+
293
+
While Azure SQL Managed Instance provides automated backups to ensure data protection and recovery, certain customer-side configurations or actions can lead to backup failures. Common scenarios include:
294
+
295
+
- Insufficient storage for the SQL managed instance. If the storage allocated to your instance is full, automated backups aren't taken.
296
+
- User-defined jobs or scripts that kill system processes can stop automated backup operations.
297
+
- Incorrect DNS settings can prevent the SQL managed instance from accessing required Azure endpoints, including those used for backups, leading to backup failures.
298
+
- The transaction log could fill due to prevented truncation from misconfigured replication, CDC or full storage (at the instance level). If the transaction log is full and can't be truncated, full and differential backups fail, but log backups still succeed without truncating the log file.
299
+
300
+
To ensure reliable backups, it's important to monitor system resources, validate configuration settings, and avoid interfering with built-in service operations. Make sure to monitor allocated storage, have correct DNS settings, and review custom jobs and replication configurations.
301
+
291
302
## Backup integrity
292
303
293
304
All database backups are taken with the CHECKSUM option to provide additional backup integrity. Automatic testing of automated database backups by the Azure SQL engineering team isn't currently available for Azure SQL Managed Instance. Schedule test backup restoration and DBCC CHECKDB on your databases in SQL Managed Instance around your workload.
Copy file name to clipboardExpand all lines: docs/relational-databases/polybase/polybase-guide.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,8 +53,9 @@ PolyBase provides these same functionalities for the following SQL products from
53
53
54
54
| New to [!INCLUDE [sssql25-md](../../includes/sssql25-md.md)]| Details |
55
55
| --- | --- |
56
-
| Native support for CSV, Parquet, & Delta <sup>1</sup> |You don't have to install PolyBase Query Service for External Data to use OPENROWSET, CREATE EXTERNAL TABLE, or CREATE EXTERNAL TABLE AS SELECT with the following types of external data: Parquet, Delta, Azure Blob Storage (ABS), Azure Data Lake Storage (ADLS), or S3-Compatible Object storage. |
56
+
| Native support for CSV, Parquet, & Delta <sup>1</sup> | PolyBase Query Service for External Data installation is no longer required to use OPENROWSET, CREATE EXTERNAL TABLE, or CREATE EXTERNAL TABLE AS SELECT with the following types of external data: Parquet, Delta, Azure Blob Storage (ABS), Azure Data Lake Storage (ADLS), or S3-Compatible Object storage. |
57
57
| Use generic ODBC data sources on Linux | For more information, see [Configure PolyBase to access external data with ODBC generic types](polybase-configure-odbc-generic.md). |
58
+
|TDS 8.0 Support|When using [Microsoft ODBC Driver 18 for SQL Server driver](/sql/connect/odbc/windows/features-of-the-microsoft-odbc-driver-for-sql-server-on-windows).<br /><br /> TDS 8.0 is not supported for sqlserver as [external data source](/sql/t-sql/statements/create-external-data-source-transact-sql).|
58
59
59
60
<sup>1</sup> On [!INCLUDE [sssql25-md](../../includes/sssql25-md.md)], PolyBase Query Service for External Data is still required to connect with other databases. For example: SQL Server, Oracle, DB2, Teradata, MongoDB, or ODBC.
60
61
@@ -157,7 +158,7 @@ Azure Storage connectors must be changed based on the following reference table:
Copy file name to clipboardExpand all lines: docs/sql-server/azure-arc/connect-already-enabled.md
+16-12Lines changed: 16 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,26 +1,30 @@
1
1
---
2
-
title: Connect SQL Server on a server already enabled by Azure Arc
2
+
title: Connect SQL Server on a Server Already Enabled by Azure Arc
3
3
description: Connect an instance of SQL Server to Azure Arc on a server that is already enabled by Azure Arc. Allows you to manage SQL Server centrally, as an Arc-enabled resource.
4
4
author: anosov1960
5
5
ms.author: sashan
6
6
ms.reviewer: mikeray, maghan
7
-
ms.date: 03/08/2024
7
+
ms.date: 06/30/2025
8
8
ms.topic: how-to
9
9
---
10
10
11
11
# Connect your SQL Server to Azure Arc on a server already enabled by Azure Arc
This article explains how to connect your SQL Server instance to Azure Arc on an Arc-enabled server. For example, you need to use this method to connect a SQL Server instance to Azure Arc at this time in US Government Virginia region, because automatic connection isn't currently available in that region. For this case, follow the steps under [Connect](#connect).
16
+
17
+
If the physical or virtual server isn't connected to Azure yet, follow the steps in [Connect your SQL Server to Azure Arc](connect.md).
18
+
15
19
[!INCLUDE [automatic](includes/if-manual.md)]
16
20
17
-
Before you proceed, complete the [Prerequisites](prerequisites.md).
21
+
## Prerequisites
18
22
19
-
This article explains how to connect your SQL Server instance to Azure Arc on an Arc-enabled server. If the physical or virtual server isn't connected to Azure yet, follow the steps in [Connect your SQL Server to Azure Arc](connect.md).
23
+
Verify that `Microsoft.AzureArcData` is registered in each subscription. Review instructions at [Register resource providers](prerequisites.md#register-resource-providers).
20
24
21
-
If the machine with SQL Server is already connected to Azure Arc, to connect the SQL Server instances, install *Azure extension for SQL Server*. The extension is in the extension tab of "Server -Azure Arc" resource as **Azure Extension for SQL Server**.
25
+
Review all of the prerequisites at [Prerequisites - SQL Server enabled by Azure Arc](prerequisites.md).
22
26
23
-
For example, you need to use this method to connect a SQL Server instance to Azure Arc at this time in US Government Virginia region, because automatic connection is not currently available in that region. For this case, follow the steps under [Connect](#connect).
27
+
If the machine with SQL Server is already connected to Azure Arc, to connect the SQL Server instances, install *Azure extension for SQL Server*. The extension is in the extension tab of "Server - Azure Arc" resource as **Azure Extension for SQL Server**.
24
28
25
29
> [!IMPORTANT]
26
30
> The Azure resource with type `SQL Server - Azure Arc` representing the SQL Server instance installed on the machine uses the same region and resource group as the Azure resources for Arc-enabled servers.
@@ -35,9 +39,9 @@ To install the Azure extension for SQL Server, use the following steps:
35
39
1. Search for the connected server with the SQL Server instance that you want to connect to Azure.
36
40
1. Under **Extensions**, select **+ Add**.
37
41
1. Select `Azure extension for SQL Server` and select **Next**.
38
-
1. Specify the SQL Server edition and license type you are using on this machine. Some Arc-enabled SQL Server features are only available for SQL Server instances with Software Assurance (Paid) or with Azure pay-as-you-go. For more information, review [Manage SQL Server license type](manage-configuration.md).
42
+
1. Specify the SQL Server edition and license type you're using on this machine. Some Arc-enabled SQL Server features are only available for SQL Server instances with Software Assurance (Paid) or with Azure pay-as-you-go. For more information, review [Configure SQL Server enabled by Azure Arc](manage-configuration.md).
39
43
1. Specify the SQL Server instance(s) you want to exclude from registering (if you have multiple instances to skip, separate them by spaces) and select **Review + Create**.
40
-
:::image type="content" source="media/join/license-type-in-extension.png" alt-text="Screenshot for license type and exclude instances.":::
44
+
:::image type="content" source="media/join/license-type-in-extension.png" alt-text="Screenshot for license type and exclude instances." lightbox="media/join/license-type-in-extension.png":::
41
45
1. Select **Create**.
42
46
43
47
### [PowerShell](#tab/powershell)
@@ -83,10 +87,10 @@ The extension runs continuously to detect changes in the SQL Server configuratio
83
87
84
88
Go to **Azure Arc > SQL Server** and open the newly registered Arc-enabled SQL Server resource to validate.
85
89
86
-
:::image type="content" source="media/join/validate-sql-server-azure-arc.png" alt-text="Screenshot of validating a connected SQL Server.":::
90
+
:::image type="content" source="media/join/validate-sql-server-azure-arc.png" alt-text="Screenshot of validating a connected SQL Server." lightbox="media/join/validate-sql-server-azure-arc.png":::
87
91
88
-
## Next steps
92
+
## Related content
89
93
90
-
-[Configure advanced data security for your SQL Server instance](configure-advanced-data-security.md)
91
-
-[Configure best practices assessment on a [!INCLUDE [ssazurearc](../../includes/ssazurearc.md)] instance](assess.md)
94
+
-[Protect SQL Server with Microsoft Defender for Cloud](configure-advanced-data-security.md)
95
+
-[Configure best practices assessment for SQL Server enabled by Azure Arc](assess.md)
92
96
-[Known issues: SQL Server enabled by Azure Arc](known-issues.md)
0 commit comments