Skip to content

Commit e2bb677

Browse files
authored
Merge pull request #33934 from MicrosoftDocs/main
4/25/2025 AM Publish
2 parents 1eb85f3 + a47eb0f commit e2bb677

File tree

4 files changed

+55
-4
lines changed

4 files changed

+55
-4
lines changed

docs/relational-databases/security/encryption/always-encrypted-wizard-ssms-21.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -130,6 +130,22 @@ Use the online approach:
130130

131131
- To minimize the downtime/unavailability of the database to your applications.
132132

133+
## Post migration
134+
135+
Clear the plan cache for all batches and stored procedures that access the table to refresh parameters encryption information.
136+
137+
```sql
138+
ALTER DATABASE SCOPED CONFIGURATION CLEAR PROCEDURE_CACHE;
139+
```
140+
141+
> [!NOTE]
142+
> If you don't remove the plan for the impacted query from the cache, the first execution of the query after encryption might fail.
143+
>
144+
> Use `ALTER DATABASE SCOPED CONFIGURATION CLEAR PROCEDURE_CACHE` or `DBCC FREEPROCCACHE` to clear the plan cache carefully, as it can result in temporary query performance degradation. To minimize the negative impact of clearing the cache, you can selectively remove the plans for only the impacted queries.
145+
146+
Call [sp_refresh_parameter_encryption](../../system-stored-procedures/sp-refresh-parameter-encryption-transact-sql.md) to update the metadata for the parameters of each module (stored procedure, function, view, trigger) that are persisted in [sys.parameters](../..//system-catalog-views/sys-parameters-transact-sql.md) and may have been invalidated by encrypting the columns.
147+
148+
133149
## Related content
134150

135151
- [Always Encrypted](../../../relational-databases/security/encryption/always-encrypted-database-engine.md)

docs/relational-databases/security/encryption/always-encrypted-wizard.md

Lines changed: 20 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: "Configure column encryption using Always Encrypted Wizard"
33
description: Learn how to set the Always Encrypted configuration for database columns by using the Always Encrypted Wizard in SQL Server.
4-
author: jaszymas
5-
ms.author: jaszymas
4+
author: Pietervanhove
5+
ms.author: pivanho
66
ms.reviewer: vanto
77
ms.date: "10/30/2019"
88
ms.service: sql
@@ -91,7 +91,24 @@ If you have configured a secure enclave in your database and you're using enclav
9191

9292
For more information about enclave attestation, see [Configure attestation for Always Encrypted using Azure Attestation](/azure/azure-sql/database/always-encrypted-enclaves-configure-attestation)
9393

94-
## Next steps
94+
## Post encryption
95+
96+
Clear the plan cache for all batches and stored procedures that access the table to refresh parameters encryption information.
97+
98+
```sql
99+
ALTER DATABASE SCOPED CONFIGURATION CLEAR PROCEDURE_CACHE;
100+
```
101+
102+
> [!NOTE]
103+
> If you do not remove the plan for the impacted query from the cache, the first execution of the query after encryption might fail.
104+
>
105+
> Use `ALTER DATABASE SCOPED CONFIGURATION CLEAR PROCEDURE_CACHE` or `DBCC FREEPROCCACHE` to clear the plan cache carefully, as it can result in temporary query performance degradation. To minimize the negative impact of clearing the cache, you can selectively remove the plans for only the impacted queries.
106+
107+
Call [sp_refresh_parameter_encryption](../../system-stored-procedures/sp-refresh-parameter-encryption-transact-sql.md) to update the metadata for the parameters of each module (stored procedure, function, view, trigger) that are persisted in [sys.parameters](../..//system-catalog-views/sys-parameters-transact-sql.md) and might have been invalidated by encrypting the columns.
108+
109+
110+
## Related content
111+
95112
- [Query columns using Always Encrypted with SQL Server Management Studio](always-encrypted-query-columns-ssms.md)
96113
- [Run Transact-SQL statements using secure enclaves](always-encrypted-enclaves-query-columns.md)
97114
- [Develop applications using Always Encrypted](always-encrypted-client-development.md)

docs/relational-databases/security/encryption/configure-column-encryption-using-powershell.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,22 @@ for($i=0; $i -lt $tables.Count; $i++){
161161
# Decrypt all columns.
162162
Set-SqlColumnEncryption -ColumnEncryptionSettings $ces -InputObject $database -LogFileDirectory . -KeyVaultAccessToken $keyVaultAccessToken
163163
```
164-
164+
165+
## Post encryption
166+
167+
Clear the plan cache for all batches and stored procedures that access the table to refresh parameters encryption information.
168+
169+
```sql
170+
ALTER DATABASE SCOPED CONFIGURATION CLEAR PROCEDURE_CACHE;
171+
```
172+
173+
> [!NOTE]
174+
> If you don't remove the plan for the impacted query from the cache, the first execution of the query after encryption might fail.
175+
>
176+
> Use `ALTER DATABASE SCOPED CONFIGURATION CLEAR PROCEDURE_CACHE` or `DBCC FREEPROCCACHE` to clear the plan cache carefully, as it can result in temporary query performance degradation. To minimize the negative impact of clearing the cache, you can selectively remove the plans for only the impacted queries.
177+
178+
Call [sp_refresh_parameter_encryption](../../system-stored-procedures/sp-refresh-parameter-encryption-transact-sql.md) to update the metadata for the parameters of each module (stored procedure, function, view, trigger) that are persisted in [sys.parameters](../..//system-catalog-views/sys-parameters-transact-sql.md) and might have been invalidated by encrypting the columns.
179+
165180
## Next Steps
166181
- [Develop applications using Always Encrypted](always-encrypted-client-development.md)
167182

docs/sql-server/azure-arc/manage-license-billing.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -218,13 +218,16 @@ For information, see:
218218
- All replicas present in the operating system environment (OSE) must be a secondary replica of an Always On availability group or the forwarder of a distributed availability group.
219219
- No standalone database outside of an AG irrespective of [database state](../../relational-databases/databases/database-states.md#database-state-definitions).
220220
- No active connections to any database except master, msdb, tempdb, or model databases.
221+
- No instances of [associated services](#manage-ssxs) in the same OSE.
221222

222223
If there are multiple SQL Server instances on the OSE, all instances and replicas must meet the conditions above.
223224

224225
### To qualify as passive node of failover clustered Instance (FCI)
225226

226227
- The node must be passive of all FCIs present.
227228
- There is no standalone instance present in the node that does not qualify for AG passive replica.
229+
- No instances of [associated services](#manage-ssxs) in the same OSE.
230+
228231

229232
### Limitations
230233

0 commit comments

Comments
 (0)