Skip to content

Commit 2003e33

Browse files
committed
SQL DB - more
1 parent 3a5c4d6 commit 2003e33

34 files changed

Lines changed: 98 additions & 98 deletions

File tree

docs/relational-databases/system-dynamic-management-views/sys-dm-resource-governor-resource-pools-history-ex-azure-sql-database.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ Returns snapshot at 20 seconds interval for last 32 minutes (128 recs in total
8888
|**avg_data_io_percent**|decimal(5,2)|Average I/O utilization in percentage based on the limit of the pool.|
8989
|**avg_log_write_percent**|decimal(5,2)|Average write resource utilization in percentage of the limit of the pool.|
9090
|**avg_storage_percent**|decimal(5,2)|Average storage utilization in percentage of the storage limit of the pool.|
91-
|**avg_allocated_storage_percent**|decimal(5,2)|The percentage of data space allocated by all databases in the elastic pool. This is the ratio of data space allocated to data max size for the elastic pool. For more information see: File space management in SQL DB|
91+
|**avg_allocated_storage_percent**|decimal(5,2)|The percentage of data space allocated by all databases in the elastic pool. This is the ratio of data space allocated to data max size for the elastic pool. For more information see: File space management in SQL Database|
9292
|**max_worker_percent**|decimal(5,2)|Maximum concurrent workers (requests) in percentage based on the limit of the pool.|
9393
|**max_session_percent**|decimal(5,2)|Maximum concurrent sessions in percentage based on the limit of the pool.|
9494
|||

docs/relational-databases/system-functions/sys-fn-get-audit-file-transact-sql.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -81,25 +81,25 @@ fn_get_audit_file ( file_pattern,
8181
|-------------|------|-------------|
8282
| action_id | **varchar(4)** | ID of the action. Not nullable. |
8383
| additional_information | **nvarchar(4000)** | Unique information that only applies to a single event is returned as XML. A small number of auditable actions contain this kind of information.<br /><br /> One level of TSQL stack will be displayed in XML format for actions that have TSQL stack associated with them. The XML format will be:<br /><br /> `<tsql_stack><frame nest_level = '%u' database_name = '%.*s' schema_name = '%.*s' object_name = '%.*s' /></tsql_stack>`<br /><br /> Frame nest_level indicates the current nesting level of the frame. The Module name is represented in three part format (database_name, schema_name and object_name). The module name will be parsed to escape invalid xml characters like `'\<'`, `'>'`, `'/'`, `'_x'`. They will be escaped as `_xHHHH\_`. The HHHH stands for the four-digit hexadecimal UCS-2 code for the character<br /><br /> Is nullable. Returns NULL when there is no additional information reported by the event. |
84-
| affected_rows | **bigint** | **Applies to**: Azure SQL DB only<br /><br /> Number of rows affected by the executed statement. |
85-
| application_name | **nvarchar(128)** | **Applies to**: Azure SQL DB + SQL Server (starting with 2017)<br /><br /> Name of client application which executed the statement that caused the audit event |
84+
| affected_rows | **bigint** | **Applies to**: Azure SQL Database only<br /><br /> Number of rows affected by the executed statement. |
85+
| application_name | **nvarchar(128)** | **Applies to**: Azure SQL Database + SQL Server (starting with 2017)<br /><br /> Name of client application which executed the statement that caused the audit event |
8686
| audit_file_offset | **bigint** | **Applies to**: SQL Server only<br /><br /> The buffer offset in the file that contains the audit record. Is not nullable. |
8787
| audit_schema_version | **int** | Always 1 |
8888
| class_type | **varchar(2)** | The type of auditable entity that the audit occurs on. Is not nullable. |
89-
| client_ip | **nvarchar(128)** | **Applies to**: Azure SQL DB + SQL Server (starting with 2017)<br /><br /> Source IP of the client application |
90-
| connection_id | GUID | **Applies to**: Azure SQL DB and Managed instance<br /><br /> ID of the connection in the server |
91-
| data_sensitivity_information | nvarchar(4000) | **Applies to**: Azure SQL DB only<br /><br /> Information types and sensitivity labels returned by the audited query, based on the classified columns in the database. Learn more about [Azure SQL Database data discover and classification](https://docs.microsoft.com/azure/sql-database/sql-database-data-discovery-and-classification) |
89+
| client_ip | **nvarchar(128)** | **Applies to**: Azure SQL Database + SQL Server (starting with 2017)<br /><br /> Source IP of the client application |
90+
| connection_id | GUID | **Applies to**: Azure SQL Database and SQL Managed instance<br /><br /> ID of the connection in the server |
91+
| data_sensitivity_information | nvarchar(4000) | **Applies to**: Azure SQL Database only<br /><br /> Information types and sensitivity labels returned by the audited query, based on the classified columns in the database. Learn more about [Azure SQL Database data discover and classification](https://docs.microsoft.com/azure/sql-database/sql-database-data-discovery-and-classification) |
9292
| database_name | **sysname** | The database context in which the action occurred. Is nullable. Returns NULL for audits occurring at the server level. |
9393
| database_principal_id | **int** |ID of the database user context that the action is performed in. Is not nullable. Returns 0 if this does not apply. For example, a server operation.|
9494
| database_principal_name | **sysname** | Current user. Is nullable. Returns NULL if not available. |
95-
| duration_milliseconds | **bigint** | **Applies to**: Azure SQL DB and Managed instance<br /><br /> Query execution duration in milliseconds |
95+
| duration_milliseconds | **bigint** | **Applies to**: Azure SQL Database and SQL Managed instance<br /><br /> Query execution duration in milliseconds |
9696
| event_time | **datetime2** | Date and time when the auditable action is fired. Is not nullable. |
9797
| file_name | **varchar(260)** | The path and name of the audit log file that the record came from. Is not nullable. |
9898
| is_column_permission | **bit** | Flag indicating if this is a column level permission. Is not nullable. Returns 0 when the permission_bitmask = 0.<br /> 1 = true<br /> 0 = false |
9999
| object_id | **int** | The ID of the entity on which the audit occurred. This includes the following:<br /> Server objects<br /> Databases<br /> Database objects<br /> Schema objects<br /> Is not nullable. Returns 0 if the entity is the Server itself or if the audit is not performed at an object level. For example, Authentication. |
100100
| object_name | **sysname** | The name of the entity on which the audit occurred. This includes the following:<br /> Server objects<br /> Databases<br /> Database objects<br /> Schema objects<br /> Is nullable. Returns NULL if the entity is the Server itself or if the audit is not performed at an object level. For example, Authentication. |
101101
| permission_bitmask | **varbinary(16)** | In some actions, this is the permissions that were grant, denied, or revoked. |
102-
| response_rows | **bigint** | **Applies to**: Azure SQL DB and Managed instance<br /><br /> Number of rows returned in the result set. |
102+
| response_rows | **bigint** | **Applies to**: Azure SQL Database and SQL Managed instance<br /><br /> Number of rows returned in the result set. |
103103
| schema_name | **sysname** | The schema context in which the action occurred. Is nullable. Returns NULL for audits occurring outside a schema. |
104104
| sequence_group_id | **varbinary** | **Applies to**: SQL Server only (starting with 2016)<br /><br /> Unique identifier |
105105
| sequence_number | **int** | Tracks the sequence of records within a single audit record that was too large to fit in the write buffer for audits. Is not nullable. |
@@ -117,8 +117,8 @@ fn_get_audit_file ( file_pattern,
117117
| target_server_principal_name | **sysname** | Target login of action. Is nullable. Returns NULL if not applicable. |
118118
| target_server_principal_sid | **varbinary** | SID of target login. Is nullable. Returns NULL if not applicable. |
119119
| transaction_id | **bigint** | **Applies to**: SQL Server only (starting with 2016)<br /><br /> Unique identifier to identify multiple audit events in one transaction |
120-
| user_defined_event_id | **smallint** | **Applies to**: [!INCLUDE[ssSQL11](../../includes/sssql11-md.md)] and later, Azure SQL DB and Managed instance<br /><br /> User defined event id passed as an argument to **sp_audit_write**. **NULL** for system events (default) and non-zero for user-defined event. For more information, see [sp_audit_write &#40;Transact-SQL&#41;](../../relational-databases/system-stored-procedures/sp-audit-write-transact-sql.md). |
121-
| user_defined_information | **nvarchar(4000)** | **Applies to**: [!INCLUDE[ssSQL11](../../includes/sssql11-md.md)] and later, Azure SQL DB and Managed instance<br /><br /> Used to record any extra information the user wants to record in audit log by using the **sp_audit_write** stored procedure. |
120+
| user_defined_event_id | **smallint** | **Applies to**: [!INCLUDE[ssSQL11](../../includes/sssql11-md.md)] and later, Azure SQL Database and SQL Managed instance<br /><br /> User defined event id passed as an argument to **sp_audit_write**. **NULL** for system events (default) and non-zero for user-defined event. For more information, see [sp_audit_write &#40;Transact-SQL&#41;](../../relational-databases/system-stored-procedures/sp-audit-write-transact-sql.md). |
121+
| user_defined_information | **nvarchar(4000)** | **Applies to**: [!INCLUDE[ssSQL11](../../includes/sssql11-md.md)] and later, Azure SQL Database and SQL Managed instance<br /><br /> Used to record any extra information the user wants to record in audit log by using the **sp_audit_write** stored procedure. |
122122

123123

124124
## Remarks
@@ -127,7 +127,7 @@ fn_get_audit_file ( file_pattern,
127127
## Permissions
128128

129129
- **SQL Server**: Requires the **CONTROL SERVER** permission.
130-
- **Azure SQL DB**: Requires the **CONTROL DATABASE** permission.
130+
- **Azure SQL Database**: Requires the **CONTROL DATABASE** permission.
131131
- Server admins can access audit logs of all databases on the server.
132132
- Non server admins can only access audit logs from the current database.
133133
- Blobs that do not meet the above criteria will be skipped (a list of skipped blobs will be displayed in the query output message), and the function will return logs only from blobs for which access is allowed.

docs/relational-databases/system-stored-procedures/sp-addlinkedserver-transact-sql.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -289,7 +289,7 @@ EXEC sp_addlinkedserver
289289

290290
```sql
291291
-- Configure the linked server
292-
-- Add one Azure SQL DB as Linked Server
292+
-- Add one Azure SQL Database as Linked Server
293293
EXEC sp_addlinkedserver
294294
@server='myLinkedServer', -- here you can specify the name of the linked server
295295
@srvproduct='',

docs/samples/wide-world-importers-oltp-install-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ To import a bacpac into a new SQL Database, you can use Management Studio.
6262

6363
### Full-Text Indexing
6464

65-
The sample database can make use of Full-Text Indexing. However, that feature is not installed by default with SQL Server - you need to select it during SQL Server setup (it is enabled by default in Azure SQL DB). Therefore, a post-installation step is required.
65+
The sample database can make use of Full-Text Indexing. However, that feature is not installed by default with SQL Server - you need to select it during SQL Server setup (it is enabled by default in Azure SQL Database). Therefore, a post-installation step is required.
6666

6767
1. In SQL Server Management Studio, connect to the WideWorldImporters database and open a new query window.
6868
2. Run the following T-SQL command to enable the use of Full-Text Indexing in the database:

docs/ssdt/release-notes-ssdt.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -985,7 +985,7 @@ _For SQL Server 2016._
985985
**Updates and fixes**
986986
* **Database tools:**
987987
* From now on SSDT will never disable Transparent Data Encryption (TDE) on a database. Previously since the default encryption option in a project's database settings was disabled, it would turn off encryption. With this fix encryption can be enabled but never disabled during publish.
988-
* Increased the retry count and resiliency for Azure SQL DB connections during initial connection.
988+
* Increased the retry count and resiliency for Azure SQL Database connections during initial connection.
989989
* If the default filegroup is not PRIMARY, Import/Publish to Azure V12 would fail. Now this setting is ignored when publishing.
990990
* Fixed an issue where when exporting a database with an object with Quoted Identifier on, export validation could fail in some instances.
991991
* Fixed an issue where the TEXTIMAGE_ON option was incorrectly added for Hekaton table creations where it is not allowed.

docs/ssma/access/connect-to-azure-sql-db-accesstosql.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "Connect To Azure SQL DB (AccessToSQL) | Microsoft Docs"
2+
title: "Connect To Azure SQL Database (AccessToSQL) | Microsoft Docs"
33
ms.prod: sql
44
ms.date: "01/19/2017"
55
ms.reviewer: ""
@@ -11,7 +11,7 @@ ms.assetid: bf44b236-d9be-41ae-a5fd-bd73038e505f
1111
author: Shamikg
1212
ms.author: Shamikg
1313
---
14-
# Connect To Azure SQL DB (AccessToSQL)
14+
# Connect To Azure SQL Database (AccessToSQL)
1515
Use the Connect to SQL Azure dialog box to connect to the SQL Azure database that you want to migrate.
1616

1717
To access this dialog box, on the **File** menu, select **Connect to SQL Azure**. If you have previously connected, the command is **Reconnect to SQL Azure.**

docs/ssma/access/connecting-to-azure-sql-db-accesstosql.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "Connecting to Azure SQL DB (AccessToSQL) | Microsoft Docs"
2+
title: "Connecting to Azure SQL Database (AccessToSQL) | Microsoft Docs"
33
description: Learn how to connect to a target instance of Azure SQL Database to migrate Access databases. SSMA obtains metadata about databases in Azure SQL Database.
44
ms.prod: sql
55
ms.custom: ""
@@ -20,7 +20,7 @@ ms.assetid: 1ba0d113-dc05-4431-8689-e14a8821bafd
2020
author: "Shamikg"
2121
ms.author: "Shamikg"
2222
---
23-
# Connecting to Azure SQL DB (AccessToSQL)
23+
# Connecting to Azure SQL Database (AccessToSQL)
2424
To migrate Access databases to SQL Azure, you must connect to the target instance of SQL Azure. When you connect, SSMA obtains metadata about all the databases in the instance of SQL Azure and displays database metadata in the SQL Azure Metadata Explorer. SSMA stores information about which instance of SQL Azure you are connected to, but does not store passwords.
2525

2626
Your connection to SQL Azure stays active until you close the project. When you reopen the project, you must reconnect to SQL Azure if you want an active connection to the server. You can work offline until you load database objects into SQL Azure and migrate data.

docs/ssma/access/creating-and-managing-projects-accesstosql.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ SSMA starts without loading a default project. To migrate data from Access datab
6161

6262
3. In the **Location** box, enter or select a folder for the project
6363

64-
4. In the Migration To drop down, select one of SQL Server 2005/ SQL Server 2008/ SQL Server 2012/ SQL Server 2014/ SQL Server 2016/ Azure SQL DB, and then click **OK**.
64+
4. In the Migration To drop down, select one of SQL Server 2005/ SQL Server 2008/ SQL Server 2012/ SQL Server 2014/ SQL Server 2016/ Azure SQL Database, and then click **OK**.
6565

6666
SSMA creates the project file. You can now perform the next step of [adding one or more Access databases](adding-and-removing-access-database-files-accesstosql.md).
6767

0 commit comments

Comments
 (0)