Skip to content

Commit e667c43

Browse files
authored
Merge pull request #24453 from MicrosoftDocs/main
10/04 PM Publish
2 parents ccd60ac + 43fc169 commit e667c43

15 files changed

+128
-118
lines changed

azure-sql/database/active-geo-replication-overview.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Use active geo-replication to create readable secondary databases o
44
author: rajeshsetlem
55
ms.author: rsetlem
66
ms.reviewer: wiassaf, mathoma
7-
ms.date: 4/14/2022
7+
ms.date: 10/04/2022
88
ms.service: sql-database
99
ms.subservice: high-availability
1010
ms.topic: conceptual
@@ -14,13 +14,12 @@ ms.custom: sqldbrb=1
1414
# Active geo-replication
1515
[!INCLUDE[appliesto-sqldb](../includes/appliesto-sqldb.md)]
1616

17-
Active geo-replication is a feature that lets you to create a continuously synchronized readable secondary database for a primary database. The readable secondary database may be in the same Azure region as the primary, or, more commonly, in a different region. This kind of readable secondary databases are also known as geo-secondaries, or geo-replicas.
17+
Active geo-replication is a feature that lets you create a continuously synchronized readable secondary database for a primary database. The readable secondary database may be in the same Azure region as the primary, or, more commonly, in a different region. This kind of readable secondary database is also known as a geo-secondary or geo-replica.
1818

1919
Active geo-replication is designed as a business continuity solution that lets you perform quick disaster recovery of individual databases in case of a regional disaster or a large scale outage. Once geo-replication is set up, you can initiate a geo-failover to a geo-secondary in a different Azure region. The geo-failover is initiated programmatically by the application or manually by the user.
2020

21-
2221
> [!NOTE]
23-
> Active geo-replication is not supported by Azure SQL Managed Instance. For geographic failover of instances of SQL Managed Instance, use [Auto-failover groups](auto-failover-group-sql-db.md).
22+
> For geographic failover of instances of SQL Managed Instance, use [Auto-failover groups](../managed-instance/auto-failover-group-sql-mi.md). For more information, [Compare geo-replication with failover groups](business-continuity-high-availability-disaster-recover-hadr-overview.md#compare-geo-replication-with-failover-groups). Active geo-replication is not supported by Azure SQL Managed Instance.
2423
2524
> [!NOTE]
2625
> To migrate SQL databases from Azure Germany using active geo-replication, see [Migrate SQL Database using active geo-replication](/azure/germany/germany-migration-databases#migrate-sql-database-using-active-geo-replication).
@@ -83,7 +82,7 @@ To achieve full business continuity, adding database regional redundancy is only
8382

8483
- **Unplanned geo-failover**
8584

86-
Unplanned, or forced, geo-failover immediately switches the geo-secondary to the primary role without any synchronization with the primary. Any transactions committed on the primary but not yet replicated to the secondary are lost. This operation is designed as a recovery method during outages when the primary is not accessible, but database availability must be quickly restored. When the original primary is back online, it will be automatically re-connected, reseeded using the current primary data, and become a new geo-secondary.
85+
Unplanned, or forced, geo-failover immediately switches the geo-secondary to the primary role without any synchronization with the primary. Any transactions committed on the primary but not yet replicated to the secondary are lost. This operation is designed as a recovery method during outages when the primary is not accessible, but database availability must be quickly restored. When the original primary is back online, it will be automatically reconnected, reseeded using the current primary data, and become a new geo-secondary.
8786

8887
> [!IMPORTANT]
8988
> After either planned or unplanned geo-failover, the connection endpoint for the new primary changes because the new primary is now located on a different logical server.
@@ -135,9 +134,9 @@ To create a geo-secondary in a subscription different from the subscription of t
135134
select client_net_address from sys.dm_exec_connections where session_id = @@SPID;
136135
```
137136

138-
For more information see, [Configure firewall](firewall-configure.md).
137+
For more information, see [Configure firewall](firewall-configure.md).
139138

140-
2. In the master database on the **primary** server, create a SQL authentication login dedicated to active geo-replication setup. Adjust login name and password as needed.
139+
2. In the `master` database on the **primary** server, create a SQL authentication login dedicated to active geo-replication setup. Adjust login name and password as needed.
141140

142141
```sql
143142
create login geodrsetup with password = 'ComplexPassword01';
@@ -156,7 +155,7 @@ To create a geo-secondary in a subscription different from the subscription of t
156155
select sid from sys.sql_logins where name = 'geodrsetup';
157156
```
158157

159-
5. Connect to the **primary** database (not the master database), and create a user for the same login.
158+
5. Connect to the **primary** database (not the `master` database), and create a user for the same login.
160159

161160
```sql
162161
create user geodrsetup for login geodrsetup;
@@ -192,13 +191,13 @@ To create a geo-secondary in a subscription different from the subscription of t
192191
> [!NOTE]
193192
> Cross-subscription geo-replication operations including setup and geo-failover are only supported using REST API & T-SQL commands.
194193
>
195-
> Adding a geo-secondary using T-SQL is not supported when connecting to the primary server over a [private endpoint](private-endpoint-overview.md). If a private endpoint is configured but public network access is allowed, adding a geo-secondary is supported when connected to the primary server from a public IP address. Once a geo-secondary is added, public access can be [denied](connectivity-settings.md#deny-public-network-access).
194+
> Adding a geo-secondary using T-SQL is not supported when connecting to the primary server over a [private endpoint](private-endpoint-overview.md). If a private endpoint is configured but public network access is allowed, adding a geo-secondary is supported when connected to the primary server from a public IP address. Once a geo-secondary is added, [public network access can be denied](connectivity-settings.md#deny-public-network-access).
196195
>
197196
> Creating a geo-secondary on a logical server in a different Azure tenant is not supported when [Azure Active Directory only](https://techcommunity.microsoft.com/t5/azure-sql/azure-active-directory-only-authentication-for-azure-sql/ba-p/2417673) authentication for Azure SQL is active (enabled) on either primary or secondary logical server.
198197
199198
## <a name="keeping-credentials-and-firewall-rules-in-sync"></a> Keep credentials and firewall rules in sync
200199

201-
When using public network access for connecting to the database, we recommend using [database-level IP firewall rules](firewall-configure.md) for geo-replicated databases. These rules are replicated with the database, which ensures that all geo-secondaries have the same IP firewall rules as the primary. This approach eliminates the need for customers to manually configure and maintain firewall rules on servers hosting the primary and secondary databases. Similarly, using [contained database users](logins-create-manage.md) for data access ensures both primary and secondary databases always have the same authentication credentials. This way, after a geo-failover, there is no disruptions due to authentication credential mismatches. If you are using logins and users (rather than contained users), you must take extra steps to ensure that the same logins exist for your secondary database. For configuration details see [How to configure logins and users](active-geo-replication-security-configure.md).
200+
When using public network access for connecting to the database, we recommend using [database-level IP firewall rules](firewall-configure.md) for geo-replicated databases. These rules are replicated with the database, which ensures that all geo-secondaries have the same IP firewall rules as the primary. This approach eliminates the need for customers to manually configure and maintain firewall rules on servers hosting the primary and secondary databases. Similarly, using [contained database users](logins-create-manage.md) for data access ensures both primary and secondary databases always have the same authentication credentials. This way, after a geo-failover, there are no disruptions due to authentication credential mismatches. If you are using logins and users (rather than contained users), you must take extra steps to ensure that the same logins exist for your secondary database. For configuration details, see [How to configure logins and users](active-geo-replication-security-configure.md).
202201

203202
## <a name="upgrading-or-downgrading-primary-database"></a> Scale primary database
204203

@@ -280,7 +279,6 @@ As discussed previously, active geo-replication can also be managed programmatic
280279
| [Replication Links - List By Database](/rest/api/sql/replicationlinks/listbydatabase) | Gets all replication links for a given database in a geo-replication partnership. It retrieves the information visible in the sys.geo_replication_links catalog view. |
281280
| [Delete Replication Link](/rest/api/sql/replicationlinks/delete) | Deletes a database replication link. Cannot be done during failover. |
282281

283-
284282
## Next steps
285283

286284
- For sample scripts, see:
@@ -290,4 +288,4 @@ As discussed previously, active geo-replication can also be managed programmatic
290288
- For a business continuity overview and scenarios, see [Business continuity overview](business-continuity-high-availability-disaster-recover-hadr-overview.md).
291289
- To learn about Azure SQL Database automated backups, see [SQL Database automated backups](automated-backups-overview.md).
292290
- To learn about using automated backups for recovery, see [Restore a database from the service-initiated backups](recovery-using-backups.md).
293-
- To learn about authentication requirements for a new primary server and database, see [SQL Database security after disaster recovery](active-geo-replication-security-configure.md).
291+
- To learn about authentication requirements for a new primary server and database, see [SQL Database security after disaster recovery](active-geo-replication-security-configure.md).

azure-sql/database/long-term-backup-retention-configure.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to store and restore automated backups for Azure SQL Data
44
author: SudhirRaparla
55
ms.author: nvraparl
66
ms.reviewer: wiassaf, mathoma
7-
ms.date: 07/20/2022
7+
ms.date: 10/4/2022
88
ms.service: sql-database
99
ms.subservice: backup-restore
1010
ms.topic: how-to
@@ -323,6 +323,11 @@ Restore-AzSqlDatabase -FromLongTermRetentionBackup -ResourceId $ltrBackup.Resour
323323
## Limitations
324324
- When restoring from an LTR backup, the read scale property is disabled. To enable, read scale on the restored database, update the database after it has been created.
325325
- You need to specify the target service level objective, when restoring from an LTR backup, which was created when the database was in an elastic pool.
326+
- LTR in the Hyperscale service tier is in limited public preview
327+
328+
> [!NOTE]
329+
> LTR can be enabled for Hyperscale databases created or migrated from other service tiers after June 2022. LTR support for all other Hyperscale databases will be added over the next several weeks. If you attempt to enable LTR for a Hyperscale database where it is not yet supported, you will receive the following error: “Long Term Retention is not supported: Long-term retention on Hyperscale is currently in limited preview and cannot be enabled as yet for your database. To enable long-term retention please reach out to Microsoft support.” Please create a support ticket to resolve this, or wait until LTR support is enabled for your database.
330+
326331

327332
## Next steps
328333

azure-sql/database/service-tier-hyperscale-replicas.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: This article describes the different types of secondary replicas av
44
author: yorek
55
ms.author: damauri
66
ms.reviewer: wiassaf, mathoma
7-
ms.date: 9/24/2021
7+
ms.date: 10/04/2022
88
ms.service: sql-database
99
ms.subservice: service-overview
1010
ms.topic: overview
@@ -194,7 +194,6 @@ Geo-replicas are used to maintain a transactionally consistent copy of the datab
194194
Geo-replication for Hyperscale database has following current limitations:
195195
- Only one geo-replica can be created (in the same or different region).
196196
- Point in time restore of the geo-replica is not supported.
197-
- Creating a database copy of the geo-replica is not supported.
198197
- Secondary of a secondary (also known as "geo-replica chaining") is not supported.
199198

200199
## Next steps

azure-sql/database/transparent-data-encryption-byok-key-rotation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to rotate the Transparent data encryption (TDE) protector
55
author: rwestMSFT
66
ms.author: randolphwest
77
ms.reviewer: wiassaf, vanto, mathoma
8-
ms.date: 08/18/2022
8+
ms.date: 10/04/2022
99
ms.service: sql-database
1010
ms.subservice: security
1111
ms.topic: how-to
@@ -16,7 +16,7 @@ ms.custom:
1616
---
1717
# Rotate the Transparent data encryption (TDE) protector
1818

19-
[!INCLUDE[appliesto-sqldb-asa](../includes/appliesto-sqldb-asa.md)]
19+
[!INCLUDE[appliesto-sqldb-sqlmi-asa](../includes/appliesto-sqldb-sqlmi-asa.md)]
2020

2121
This article describes key rotation for a [server](logical-servers.md) using a TDE protector from Azure Key Vault. Rotating the logical TDE protector for a server means to switch to a new asymmetric key that protects the databases on the server. Key rotation is an online operation and should only take a few seconds to complete, because this only decrypts and re-encrypts the database's data encryption key, not the entire database.
2222

azure-sql/managed-instance/auto-failover-group-configure-sql-mi.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Configure an auto-failover group
33
description: Learn how to configure an auto-failover group for Azure SQL Managed Instance by using the Azure portal, and Azure PowerShell.
44
author: MladjoA
55
ms.author: mlandzic
6-
ms.reviewer: kendralittle, mathoma
6+
ms.reviewer: mathoma
77
ms.date: 07/09/2022
88
ms.service: sql-managed-instance
99
ms.subservice: high-availability
@@ -240,10 +240,14 @@ The listener endpoint is in the form of `fog-name.database.windows.net`, and is
240240

241241
## <a name="creating-a-failover-group-between-managed-instances-in-different-subscriptions"></a> Create group between instances in different subscriptions
242242

243-
You can create a failover group between SQL Managed Instances in two different subscriptions, as long as subscriptions are associated to the same [Azure Active Directory Tenant](/azure/active-directory/fundamentals/active-directory-whatis#terminology). When using PowerShell API, you can do it by specifying the `PartnerSubscriptionId` parameter for the secondary SQL Managed Instance. When using REST API, each instance ID included in the `properties.managedInstancePairs` parameter can have its own Subscription ID.
243+
You can create a failover group between SQL Managed Instances in two different subscriptions, as long as subscriptions are associated to the same [Azure Active Directory Tenant](/azure/active-directory/fundamentals/active-directory-whatis#terminology).
244+
245+
- When using PowerShell API, you can do it by specifying the `PartnerSubscriptionId` parameter for the secondary SQL Managed Instance.
246+
- When using REST API, each instance ID included in the `properties.managedInstancePairs` parameter can have its own Subscription ID.
247+
- Azure portal does not support creation of failover groups across different subscriptions.
244248

245249
> [!IMPORTANT]
246-
> Azure portal does not support creation of failover groups across different subscriptions. Also, for the existing failover groups across different subscriptions and/or resource groups, failover can't be initiated manually via portal from the primary SQL Managed Instance. Initiate it from the geo-secondary instance instead.
250+
> Azure portal does not support creation of failover groups across different subscriptions. For failover groups across different subscriptions and/or resource groups, failover can't be initiated manually via the Azure portal from the primary SQL managed instance. Initiate it from the geo-secondary instance instead.
247251
248252
## Change the secondary region
249253

0 commit comments

Comments
 (0)