You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/relational-databases/system-dynamic-management-views/sys-dm-resource-governor-resource-pools-history-ex-azure-sql-database.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -88,7 +88,7 @@ Returns snapshot at 20 seconds interval for last 32 minutes (128 recs in total
88
88
|**avg_data_io_percent**|decimal(5,2)|Average I/O utilization in percentage based on the limit of the pool.|
89
89
|**avg_log_write_percent**|decimal(5,2)|Average write resource utilization in percentage of the limit of the pool.|
90
90
|**avg_storage_percent**|decimal(5,2)|Average storage utilization in percentage of the storage limit of the pool.|
91
-
|**avg_allocated_storage_percent**|decimal(5,2)|The percentage of data space allocated by all databases in the elastic pool. This is the ratio of data space allocated to data max size for the elastic pool. For more information see: File space management in SQL DB|
91
+
|**avg_allocated_storage_percent**|decimal(5,2)|The percentage of data space allocated by all databases in the elastic pool. This is the ratio of data space allocated to data max size for the elastic pool. For more information see: File space management in SQL Database|
92
92
|**max_worker_percent**|decimal(5,2)|Maximum concurrent workers (requests) in percentage based on the limit of the pool.|
93
93
|**max_session_percent**|decimal(5,2)|Maximum concurrent sessions in percentage based on the limit of the pool.|
| action_id |**varchar(4)**| ID of the action. Not nullable. |
83
83
| additional_information |**nvarchar(4000)**| Unique information that only applies to a single event is returned as XML. A small number of auditable actions contain this kind of information.<br /><br /> One level of TSQL stack will be displayed in XML format for actions that have TSQL stack associated with them. The XML format will be:<br /><br /> `<tsql_stack><frame nest_level = '%u' database_name = '%.*s' schema_name = '%.*s' object_name = '%.*s' /></tsql_stack>`<br /><br /> Frame nest_level indicates the current nesting level of the frame. The Module name is represented in three part format (database_name, schema_name and object_name). The module name will be parsed to escape invalid xml characters like `'\<'`, `'>'`, `'/'`, `'_x'`. They will be escaped as `_xHHHH\_`. The HHHH stands for the four-digit hexadecimal UCS-2 code for the character<br /><br /> Is nullable. Returns NULL when there is no additional information reported by the event. |
84
-
| affected_rows |**bigint**|**Applies to**: Azure SQL DB only<br /><br /> Number of rows affected by the executed statement. |
85
-
| application_name |**nvarchar(128)**|**Applies to**: Azure SQL DB + SQL Server (starting with 2017)<br /><br /> Name of client application which executed the statement that caused the audit event |
84
+
| affected_rows |**bigint**|**Applies to**: Azure SQL Database only<br /><br /> Number of rows affected by the executed statement. |
85
+
| application_name |**nvarchar(128)**|**Applies to**: Azure SQL Database + SQL Server (starting with 2017)<br /><br /> Name of client application which executed the statement that caused the audit event |
86
86
| audit_file_offset |**bigint**|**Applies to**: SQL Server only<br /><br /> The buffer offset in the file that contains the audit record. Is not nullable. |
87
87
| audit_schema_version |**int**| Always 1 |
88
88
| class_type |**varchar(2)**| The type of auditable entity that the audit occurs on. Is not nullable. |
89
-
| client_ip |**nvarchar(128)**|**Applies to**: Azure SQL DB + SQL Server (starting with 2017)<br /><br /> Source IP of the client application |
90
-
| connection_id | GUID |**Applies to**: Azure SQL DB and Managed instance<br /><br /> ID of the connection in the server |
91
-
| data_sensitivity_information | nvarchar(4000) |**Applies to**: Azure SQL DB only<br /><br /> Information types and sensitivity labels returned by the audited query, based on the classified columns in the database. Learn more about [Azure SQL Database data discover and classification](https://docs.microsoft.com/azure/sql-database/sql-database-data-discovery-and-classification)|
89
+
| client_ip |**nvarchar(128)**|**Applies to**: Azure SQL Database + SQL Server (starting with 2017)<br /><br /> Source IP of the client application |
90
+
| connection_id | GUID |**Applies to**: Azure SQL Database and SQL Managed instance<br /><br /> ID of the connection in the server |
91
+
| data_sensitivity_information | nvarchar(4000) |**Applies to**: Azure SQL Database only<br /><br /> Information types and sensitivity labels returned by the audited query, based on the classified columns in the database. Learn more about [Azure SQL Database data discover and classification](https://docs.microsoft.com/azure/sql-database/sql-database-data-discovery-and-classification)|
92
92
| database_name |**sysname**| The database context in which the action occurred. Is nullable. Returns NULL for audits occurring at the server level. |
93
93
| database_principal_id |**int**|ID of the database user context that the action is performed in. Is not nullable. Returns 0 if this does not apply. For example, a server operation.|
94
94
| database_principal_name |**sysname**| Current user. Is nullable. Returns NULL if not available. |
95
-
| duration_milliseconds |**bigint**|**Applies to**: Azure SQL DB and Managed instance<br /><br /> Query execution duration in milliseconds |
95
+
| duration_milliseconds |**bigint**|**Applies to**: Azure SQL Database and SQL Managed instance<br /><br /> Query execution duration in milliseconds |
96
96
| event_time |**datetime2**| Date and time when the auditable action is fired. Is not nullable. |
97
97
| file_name |**varchar(260)**| The path and name of the audit log file that the record came from. Is not nullable. |
98
98
| is_column_permission |**bit**| Flag indicating if this is a column level permission. Is not nullable. Returns 0 when the permission_bitmask = 0.<br /> 1 = true<br /> 0 = false |
99
99
| object_id |**int**| The ID of the entity on which the audit occurred. This includes the following:<br /> Server objects<br /> Databases<br /> Database objects<br /> Schema objects<br /> Is not nullable. Returns 0 if the entity is the Server itself or if the audit is not performed at an object level. For example, Authentication. |
100
100
| object_name |**sysname**| The name of the entity on which the audit occurred. This includes the following:<br /> Server objects<br /> Databases<br /> Database objects<br /> Schema objects<br /> Is nullable. Returns NULL if the entity is the Server itself or if the audit is not performed at an object level. For example, Authentication. |
101
101
| permission_bitmask |**varbinary(16)**| In some actions, this is the permissions that were grant, denied, or revoked. |
102
-
| response_rows |**bigint**|**Applies to**: Azure SQL DB and Managed instance<br /><br /> Number of rows returned in the result set. |
102
+
| response_rows |**bigint**|**Applies to**: Azure SQL Database and SQL Managed instance<br /><br /> Number of rows returned in the result set. |
103
103
| schema_name |**sysname**| The schema context in which the action occurred. Is nullable. Returns NULL for audits occurring outside a schema. |
104
104
| sequence_group_id |**varbinary**|**Applies to**: SQL Server only (starting with 2016)<br /><br /> Unique identifier |
105
105
| sequence_number |**int**| Tracks the sequence of records within a single audit record that was too large to fit in the write buffer for audits. Is not nullable. |
| target_server_principal_name |**sysname**| Target login of action. Is nullable. Returns NULL if not applicable. |
118
118
| target_server_principal_sid |**varbinary**| SID of target login. Is nullable. Returns NULL if not applicable. |
119
119
| transaction_id |**bigint**|**Applies to**: SQL Server only (starting with 2016)<br /><br /> Unique identifier to identify multiple audit events in one transaction |
120
-
| user_defined_event_id |**smallint**|**Applies to**: [!INCLUDE[ssSQL11](../../includes/sssql11-md.md)] and later, Azure SQL DB and Managed instance<br /><br /> User defined event id passed as an argument to **sp_audit_write**. **NULL** for system events (default) and non-zero for user-defined event. For more information, see [sp_audit_write (Transact-SQL)](../../relational-databases/system-stored-procedures/sp-audit-write-transact-sql.md). |
121
-
| user_defined_information |**nvarchar(4000)**|**Applies to**: [!INCLUDE[ssSQL11](../../includes/sssql11-md.md)] and later, Azure SQL DB and Managed instance<br /><br /> Used to record any extra information the user wants to record in audit log by using the **sp_audit_write** stored procedure. |
120
+
| user_defined_event_id |**smallint**|**Applies to**: [!INCLUDE[ssSQL11](../../includes/sssql11-md.md)] and later, Azure SQL Database and SQL Managed instance<br /><br /> User defined event id passed as an argument to **sp_audit_write**. **NULL** for system events (default) and non-zero for user-defined event. For more information, see [sp_audit_write (Transact-SQL)](../../relational-databases/system-stored-procedures/sp-audit-write-transact-sql.md). |
121
+
| user_defined_information |**nvarchar(4000)**|**Applies to**: [!INCLUDE[ssSQL11](../../includes/sssql11-md.md)] and later, Azure SQL Database and SQL Managed instance<br /><br /> Used to record any extra information the user wants to record in audit log by using the **sp_audit_write** stored procedure. |
-**SQL Server**: Requires the **CONTROL SERVER** permission.
130
-
-**Azure SQL DB**: Requires the **CONTROL DATABASE** permission.
130
+
-**Azure SQL Database**: Requires the **CONTROL DATABASE** permission.
131
131
- Server admins can access audit logs of all databases on the server.
132
132
- Non server admins can only access audit logs from the current database.
133
133
- Blobs that do not meet the above criteria will be skipped (a list of skipped blobs will be displayed in the query output message), and the function will return logs only from blobs for which access is allowed.
Copy file name to clipboardExpand all lines: docs/samples/wide-world-importers-oltp-install-configure.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -62,7 +62,7 @@ To import a bacpac into a new SQL Database, you can use Management Studio.
62
62
63
63
### Full-Text Indexing
64
64
65
-
The sample database can make use of Full-Text Indexing. However, that feature is not installed by default with SQL Server - you need to select it during SQL Server setup (it is enabled by default in Azure SQL DB). Therefore, a post-installation step is required.
65
+
The sample database can make use of Full-Text Indexing. However, that feature is not installed by default with SQL Server - you need to select it during SQL Server setup (it is enabled by default in Azure SQL Database). Therefore, a post-installation step is required.
66
66
67
67
1. In SQL Server Management Studio, connect to the WideWorldImporters database and open a new query window.
68
68
2. Run the following T-SQL command to enable the use of Full-Text Indexing in the database:
Copy file name to clipboardExpand all lines: docs/ssdt/release-notes-ssdt.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -985,7 +985,7 @@ _For SQL Server 2016._
985
985
**Updates and fixes**
986
986
***Database tools:**
987
987
* From now on SSDT will never disable Transparent Data Encryption (TDE) on a database. Previously since the default encryption option in a project's database settings was disabled, it would turn off encryption. With this fix encryption can be enabled but never disabled during publish.
988
-
* Increased the retry count and resiliency for Azure SQL DB connections during initial connection.
988
+
* Increased the retry count and resiliency for Azure SQL Database connections during initial connection.
989
989
* If the default filegroup is not PRIMARY, Import/Publish to Azure V12 would fail. Now this setting is ignored when publishing.
990
990
* Fixed an issue where when exporting a database with an object with Quoted Identifier on, export validation could fail in some instances.
991
991
* Fixed an issue where the TEXTIMAGE_ON option was incorrectly added for Hekaton table creations where it is not allowed.
Use the Connect to SQL Azure dialog box to connect to the SQL Azure database that you want to migrate.
16
16
17
17
To access this dialog box, on the **File** menu, select **Connect to SQL Azure**. If you have previously connected, the command is **Reconnect to SQL Azure.**
Copy file name to clipboardExpand all lines: docs/ssma/access/connecting-to-azure-sql-db-accesstosql.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: "Connecting to Azure SQL DB (AccessToSQL) | Microsoft Docs"
2
+
title: "Connecting to Azure SQL Database (AccessToSQL) | Microsoft Docs"
3
3
description: Learn how to connect to a target instance of Azure SQL Database to migrate Access databases. SSMA obtains metadata about databases in Azure SQL Database.
To migrate Access databases to SQL Azure, you must connect to the target instance of SQL Azure. When you connect, SSMA obtains metadata about all the databases in the instance of SQL Azure and displays database metadata in the SQL Azure Metadata Explorer. SSMA stores information about which instance of SQL Azure you are connected to, but does not store passwords.
25
25
26
26
Your connection to SQL Azure stays active until you close the project. When you reopen the project, you must reconnect to SQL Azure if you want an active connection to the server. You can work offline until you load database objects into SQL Azure and migrate data.
Copy file name to clipboardExpand all lines: docs/ssma/access/creating-and-managing-projects-accesstosql.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,7 +61,7 @@ SSMA starts without loading a default project. To migrate data from Access datab
61
61
62
62
3. In the **Location** box, enter or select a folder for the project
63
63
64
-
4. In the Migration To drop down, select one of SQL Server 2005/ SQL Server 2008/ SQL Server 2012/ SQL Server 2014/ SQL Server 2016/ Azure SQL DB, and then click **OK**.
64
+
4. In the Migration To drop down, select one of SQL Server 2005/ SQL Server 2008/ SQL Server 2012/ SQL Server 2014/ SQL Server 2016/ Azure SQL Database, and then click **OK**.
65
65
66
66
SSMA creates the project file. You can now perform the next step of [adding one or more Access databases](adding-and-removing-access-database-files-accesstosql.md).
0 commit comments