You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-sql/database/threat-detection-configure.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ You can receive notifications about the detected threats via [email notification
45
45
46
46
## Set up Advanced Threat Protection using PowerShell
47
47
48
-
For a script example, see [Configure auditing and Advanced Threat Protection using PowerShell](/powershell/module/az.sql/get-azsqldatabaseadvancedthreatprotectionsetting?view=azps-10.0.0&preserve-view=true).
48
+
For a script example, see [Configure auditing and Advanced Threat Protection using PowerShell](/powershell/module/az.sql/update-azsqlserveradvancedthreatprotectionsetting?preserve-view=true).
description: Learn how to enroll new and existing instances in the November 2022 feature wave.
5
5
author: MashaMSFT
6
6
ms.author: mathoma
7
-
ms.date: 11/16/2022
7
+
ms.date: 07/12/2023
8
8
ms.service: sql-managed-instance
9
9
ms.subservice: service-overview
10
10
ms.topic: how-to
@@ -15,9 +15,9 @@ ms.topic: how-to
15
15
16
16
Learn how to enroll new and existing managed instances in the November 2022 feature wave for Azure SQL Managed Instance.
17
17
18
-
The November 2022 feature wave is rolling out over several months. The initial rollout phase focuses on managed instances that belong to Dev/Test subscription types. Other subscription types will enroll in upcoming months.
18
+
The November 2022 feature wave is being released in a phased manner. The current phase makes managed instances belonging to Dev/Test subscriptions eligible for the feature wave.
19
19
20
-
Eligible existing instances that were created before November 2022 can enroll in the feature wave immediately to unlock new benefits and features.
20
+
Existing eligible instances that were created before November 2022 can enroll in the feature wave immediately to unlock new benefits and features.
21
21
22
22
## New benefits and features
23
23
@@ -26,7 +26,7 @@ The November 2022 feature wave introduced new features and automatic benefits fo
26
26
The benefits in the feature wave include:
27
27
28
28
-**Fast instance provisioning**. It takes less time to deploy an instance.
29
-
-[**Simplified connectivity architecture**](connectivity-architecture-overview.md). The connectivity architecture of SQL Managed Instance is simplified by removing the management endpoint and reducing the number of mandatory rules.
29
+
-[**Improved network security**](connectivity-architecture-overview.md). Internal service traffic is now isolated and secured by Microsoft.
30
30
-[**Enhanced virtual cluster**](connectivity-architecture-overview.md?tab=current#virtual-cluster-connectivity-architecture). The functionality of the underlying virtual cluster is enhanced.
31
31
32
32
These new preview features were introduced in the wave:
@@ -37,23 +37,23 @@ These new preview features were introduced in the wave:
37
37
38
38
For more information, see [Frequently asked questions](frequently-asked-questions-faq.yml#november-2022-feature-wave).
39
39
40
-
## Feature wave rollout
40
+
## November 2022 feature wave rollout
41
41
42
-
The November 2022 feature wave is rolling out over several months. The initial rollout phase focuses on instances that belong to [Dev/Test subscriptions](frequently-asked-questions-faq.yml#what-azure-offers-and-subscription-types-are-enrolled-in-the-november-2022-feature-wave). Other subscription types will be enrolled in upcoming months. Unsupported subscription types can't be enabled individually.
42
+
The November 2022 feature wave is being released in a phased manner. The current phase makes managed instances belonging to [Dev/Test subscriptions](frequently-asked-questions-faq.yml#what-azure-offers-and-subscription-types-are-enrolled-in-the-november-2022-feature-wave) eligible for the feature wave.
43
43
44
44
The enrollment experience is different for new instances and existing instances:
45
45
46
46
-*New instances* created after November 2022 in eligible subnets will be enrolled in the feature wave automatically and get access to the new benefits and features.
47
47
-*Existing instances* will be enrolled in the November 2022 feature wave gradually and automatically. Eligible existing instances that were created before November 2022 can enroll in the feature wave immediately to unlock the new benefits and features.
48
48
49
49
> [!NOTE]
50
-
> Benefits and features can't be enabled individually on instances that haven't enrolled in the feature wave.
50
+
> Benefits and features can't be enabled individually on managed instances that haven't enrolled in the feature wave.
51
51
52
52
## Enroll an existing instance
53
53
54
54
Existing eligible instances that were created before November 2022 eventually will be automatically enrolled in the feature wave. However, you can choose to enroll your existing instance immediately if your instance meets the following conditions:
55
55
56
-
- Your instance is hosted in a subscription type that's ready for the November 2022 feature wave. Currently, only the Dev/Test subscription type is supported.
56
+
- Your instance is hosted in a subscription type that's ready for the November 2022 feature wave. Currently, Dev/Test subscription type is supported.
57
57
- You can update the virtual network subnet to one of the supported types:
58
58
59
59
- A new subnet
@@ -115,7 +115,7 @@ To confirm that your new instance is enrolled in the feature wave during deploym
115
115
116
116
1. Select **Review + Create** to validate your settings. Check the **Nov 2022 feature wave** section to confirm that all configuration options are compatible with the feature wave:
117
117
118
-
:::image type="content" source="media/november-2022-feature-wave-enroll/review-and-create.png" alt-text="Screenshot that shows the Review + create pane in the Azure portal, with the November 22 feature wave options highlighted.":::
118
+
:::image type="content" source="media/november-2022-feature-wave-enroll/review-and-create.png" alt-text="Screenshot that shows the Review + create pane in the Azure portal, with the November 2022 feature wave options highlighted.":::
Copy file name to clipboardExpand all lines: azure-sql/managed-instance/public-endpoint-configure.md
+10-1Lines changed: 10 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: "Learn how to configure a public endpoint for Azure SQL Managed Ins
4
4
author: zoran-rilak-msft
5
5
ms.author: zoranrilak
6
6
ms.reviewer: vanto, mathoma
7
-
ms.date: 06/12/2023
7
+
ms.date: 07/14/2023
8
8
ms.service: sql-managed-instance
9
9
ms.subservice: security
10
10
ms.topic: how-to
@@ -163,6 +163,15 @@ Use the Azure portal to allow public traffic within the network security group.
163
163
> [!NOTE]
164
164
> Port 3342 is used for public endpoint connections to managed instance, and can't be changed currently.
165
165
166
+
167
+
## Confirm that routing is properly configured
168
+
169
+
A route with the 0.0.0.0/0 address prefix instructs Azure how to route traffic destined for an IP address that is not within the address prefix of any other route in a subnet's route table. When a subnet is created, Azure creates a default route to the 0.0.0.0/0 address prefix, with the **Internet** next hop type.
170
+
171
+
Overriding this default route without adding the necessary route(s) to ensure the public endpoint traffic is routed directly to **Internet** may cause asymmetric routing issues since incoming traffic does not flow via the Virtual appliance/Virtual network gateway. Ensure that all traffic reaching the managed instance over public internet goes back out over public internet as well by either adding specific routes for each source or setting the default route to the 0.0.0.0/0 address prefix back to **Internet** as next hop type.
172
+
173
+
See more the details about impact of changes on this default route at [0.0.0.0/0 address prefix](/azure/virtual-network/virtual-networks-udr-overview#default-route).
174
+
166
175
## Obtain the public endpoint connection string
167
176
168
177
1. Navigate to the managed instance configuration page that has been enabled for public endpoint. Select the **Connection strings** tab under the **Settings** configuration.
-[Subscriptions with monthly Azure credit for Visual Studio subscribers](https://azure.microsoft.com/pricing/member-offers/credit-for-visual-studio-subscribers/)
Copy file name to clipboardExpand all lines: azure-sql/managed-instance/tde-certificate-migrate.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -154,6 +154,9 @@ If the certificate is kept in the SQL Server local machine certificate store, it
154
154
155
155
The certificate is now available to the specified managed instance, and the backup of the corresponding TDE-protected database can be restored successfully.
156
156
157
+
> [!NOTE]
158
+
> Uploaded certificate is not visible in the sys.certificates catalog view. To confirm successful upload of the certificate you can run [RESTORE FILELISTONLY](/sql/t-sql/statements/restore-statements-filelistonly-transact-sql) command.
159
+
157
160
## Next steps
158
161
159
162
In this article, you learned how to migrate a certificate protecting the encryption key of a database with Transparent Data Encryption, from the on-premises or IaaS SQL Server instance to Azure SQL Managed Instance.
Copy file name to clipboardExpand all lines: azure-sql/managed-instance/tempdb-configure.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -113,7 +113,7 @@ You can use SQL Server Management Studio (SSMS) to modify the growth increment o
113
113
1. Right-click `tempdb`, and choose **Properties**.
114
114
1. Select **Files** under **Select a page** to view the existing number of `tempdb` files.
115
115
1. Choose the ellipses (...) next to a data file to open the **Change Autogrowth properties** dialog window.
116
-
1. Check the box next to **Enable Autogrwoth** and then modify your autogrowth settings by specifying the file growth values, in either percent, or megabytes.
116
+
1. Check the box next to **Enable Autogrowth** and then modify your autogrowth settings by specifying the file growth values, in either percent, or megabytes.
117
117
118
118
:::image type="content" source="media/tempdb-configure/change-growth-increment.png" alt-text="Screenshot of Change Autogrowth for tempdev in SSMS, with new database file name highlighted.":::
0 commit comments