Skip to content

Commit b0c70b5

Browse files
Merge pull request #35777 from MicrosoftDocs/main
Auto Publish – main to live - 2025-11-06 23:30 UTC
2 parents fa4e5ec + bc2eb97 commit b0c70b5

934 files changed

Lines changed: 141 additions & 1986 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50007,7 +50007,12 @@
5000750007
},
5000850008
{
5000950009
"source_path": "docs/big-data-cluster/deploy-install-azdata-pip.md",
50010-
"redirect_url": "/sql/azdata/install/deploy-install-azdata-pip",
50010+
"redirect_url": "/sql/azdata/install/deploy-install-azdata-installer",
50011+
"redirect_document_id": false
50012+
},
50013+
{
50014+
"source_path": "docs/azdata/install/deploy-install-azdata-pip.md",
50015+
"redirect_url": "/sql/azdata/install/deploy-install-azdata-installer",
5001150016
"redirect_document_id": false
5001250017
},
5001350018
{

azure-sql/database/backup-immutability-legal-hold.md

Lines changed: 29 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to configure legal hold backup immutability for long-term
55
author: WilliamDAssafMSFT
66
ms.author: wiassaf
77
ms.reviewer: dinethi
8-
ms.date: 09/29/2025
8+
ms.date: 11/06/2025
99
ms.service: azure-sql-database
1010
ms.subservice: backup-restore
1111
ms.topic: how-to
@@ -35,7 +35,7 @@ For permissions to view, managed, and delete LTR backups, see [Manage Azure SQL
3535

3636
## Enable legal hold immutability for existing LTR backups
3737

38-
You can enable legal hold immutability on any existing backups. These backups are protected from any edits or deletes until the legal hold is explicitly removed.
38+
You can enable legal hold immutability on any existing backups in the Azure portal, PowerShell, and Azure CLI. These backups are protected from any edits or deletes until the legal hold is explicitly removed.
3939

4040
> [!IMPORTANT]
4141
> Legal hold backup immutability can apply only to existing backups. To make future backups automatically immutable, instead use [time-based immutability](backup-immutability-time-based.md).
@@ -56,19 +56,31 @@ You can enable legal hold immutability on any existing backups. These backups ar
5656

5757
**To enable legal hold backup immutability with PowerShell:**
5858

59+
Replace `<backup name>` with the unique identifier of the desired backup.
60+
5961
```powershell
6062
Set-AzSqlDatabaseLongTermRetentionBackupLegalHold
6163
-Location southeastasia
6264
-ServerName myAzureSQL
6365
-DatabaseName mysqldb
64-
-BackupName 'myLTRbackup-1-24'
66+
-BackupName '<backup name>'
67+
```
68+
69+
#### [Azure CLI](#tab/azure-cli)
70+
71+
**To enable legal hold backup immutability with the Azure CLI:**
72+
73+
Replace `<backup name>` with the unique identifier of the desired backup.
74+
75+
```azurecli
76+
az sql db ltr-backup set-legal-hold-immutability --resource-group mygroup --location southeastasia --server myserver --database mydb --name "<backup name>"
6577
```
6678

6779
---
6880

6981
## Remove legal hold immutability
7082

71-
Legal hold immutability on specific backups can be disabled as follows:
83+
Legal hold immutability on specific backups can be disabled in the Azure portal, PowerShell, and Azure CLI.
7284

7385
#### [Azure portal](#tab/azure-portal)
7486

@@ -84,12 +96,24 @@ Legal hold immutability on specific backups can be disabled as follows:
8496

8597
**To remove legal hold immutability from a backup with PowerShell:**
8698

99+
Replace `<backup name>` with the unique identifier of the desired backup.
100+
87101
```powershell
88102
Remove-AzSqlDatabaseLongTermRetentionBackupLegalHold
89103
-Location southeastasia
90104
-ServerName myAzureSQL
91105
-DatabaseName mysqldb
92-
-BackupName 'myLTRbackup-1-24'
106+
-BackupName '<backup name>'
107+
```
108+
109+
#### [Azure CLI](#tab/azure-cli)
110+
111+
**To remove legal hold immutability from a backup with the Azure CLI:**
112+
113+
Replace `<backup name>` with the unique identifier of the desired backup.
114+
115+
```azurecli
116+
az sql db ltr-backup remove-legal-hold-immutability --resource-group mygroup --location southeastasia --server myserver --database mydb --name "<backup name>"
93117
```
94118

95119
---

azure-sql/database/backup-immutability-time-based.md

Lines changed: 45 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to configure time-based backup immutability for long-term
55
author: WilliamDAssafMSFT
66
ms.author: wiassaf
77
ms.reviewer: dinethi
8-
ms.date: 09/29/2025
8+
ms.date: 11/06/2025
99
ms.service: azure-sql-database
1010
ms.subservice: backup-restore
1111
ms.topic: how-to
@@ -38,6 +38,8 @@ For permissions to view, managed, and delete LTR backups, see [Manage Azure SQL
3838
> [!IMPORTANT]
3939
> Only backups taken after enabling and locking the policy will be immutable. To make existing backups immutable, instead use [legal hold immutability](backup-immutability-legal-hold.md).
4040
41+
You can create time-based immutability in the Azure portal, PowerShell, and Azure CLI.
42+
4143
#### [Azure portal](#tab/azure-portal)
4244

4345
**To enable and lock time-based immutability from the Azure portal:**
@@ -69,7 +71,13 @@ Set-AzSqlDatabaseBackupLongTermRetentionPolicy
6971
-TimeBasedImmutabilityMode Locked
7072
```
7173

74+
#### [Azure CLI](#tab/azure-cli)
75+
76+
**To enable and lock time-based immutability with Azure CLI:**
7277

78+
```azurecli
79+
az sql db ltr-policy set --resource-group mygroup --server myserver --name mydb --weekly-retention "P0W" --monthly-retention "P0M" --yearly-retention "P0Y" --tb-immutability Enabled --tb-immutability-mode Locked
80+
```
7381

7482
---
7583

@@ -82,7 +90,7 @@ For backups that have immutability enabled but not locked, there are two options
8290
- Lock the immutability.
8391
- Remove immutability for each backup.
8492

85-
Locking immutability for specific backups can be done as follows:
93+
Locking immutability for specific backups can be done in the Azure portal, PowerShell, and Azure CLI.
8694

8795
#### [Azure portal](#tab/azure-portal)
8896

@@ -101,15 +109,29 @@ Locking immutability for specific backups can be done as follows:
101109
> [!IMPORTANT]
102110
> The command needs to be run independently for each of the LTR backups that have immutability enabled but not locked.
103111
112+
Replace `<backup name>` with the unique identifier of the desired backup.
113+
104114
```powershell
105115
Lock-AzSqlDatabaseLongTermRetentionBackupImmutability
106116
-Location southeastasia
107117
-ServerName myAzureSQL
108118
-DatabaseName mysqldb
109-
-BackupName 'myLTRbackup-1-24'
119+
-BackupName '<backup name>'
110120
-ResourceGroupName testrg
111121
```
112122

123+
#### [Azure CLI](#tab/azure-cli)
124+
125+
**To lock time-based immutability on a backup with the Azure CLI:**
126+
127+
> [!IMPORTANT]
128+
> The command needs to be run independently for each of the LTR backups that have immutability enabled but not locked.
129+
130+
Replace `<backup name>` with the unique identifier of the desired backup.
131+
132+
```azurecli
133+
az sql db ltr-backup lock-time-based-immutability --resource-group mygroup --location southeastasia --server myserver --database mydb --name "<backup name>"
134+
```
113135

114136
---
115137

@@ -131,21 +153,32 @@ For backups that have immutability enabled but not locked, the immutability can
131153

132154
**To remove immutability on a backup with PowerShell:**
133155

156+
Replace `<backup name>` with the unique identifier of the desired backup.
157+
134158
```powershell
135159
Remove-AzSqlDatabaseLongTermRetentionBackupImmutability
136160
-Location southeastasia
137161
-ServerName myAzureSQL
138162
-DatabaseName mysqldb
139-
-BackupName 'myLTRbackup-1-24'
163+
-BackupName '<backup name>'
140164
-ResourceGroupName testrg
141165
```
142166

167+
#### [Azure CLI](#tab/azure-cli)
168+
169+
**To remove immutability on a backup with the Azure CLI:**
170+
171+
Replace `<backup name>` with the unique identifier of the desired backup.
172+
173+
```azurecli
174+
az sql db ltr-backup remove-time-based-immutability --resource-group mygroup --location southeastasia --server myserver --database mydb --name "<backup name>"
175+
```
143176

144177
---
145178

146179
## Disable immutability policy
147180

148-
Immutability can be disabled from the LTR policy configuration page in the Azure portal and PowerShell.
181+
Immutability can be disabled from the LTR policy configuration page in the Azure portal, PowerShell, and Azure CLI.
149182

150183
Once immutability is disabled, any new LTR backups from this point won't be protected from immutability. Any existing LTR backups however, will continue to be immutable, if already locked as immutable.
151184

@@ -173,6 +206,13 @@ Set-AzSqlDatabaseBackupLongTermRetentionPolicy
173206
-TimeBasedImmutability Disabled
174207
```
175208

209+
#### [Azure CLI](#tab/azure-cli)
210+
211+
**To disable a backup immutability policy with the Azure CLI:**
212+
213+
```azurecli
214+
az sql db ltr-policy set --resource-group mygroup --server myserver --name mydb --weekly-retention "P0W" --monthly-retention "P0M" --yearly-retention "P0Y" --tb-immutability disabled
215+
```
176216

177217
---
178218

azure-sql/database/high-cpu-diagnose-troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -294,7 +294,7 @@ Select **Configure** in the top right of the pane to select a different time per
294294

295295
Select a bar in the chart to drill in and see queries running in a specific time period. The **Top Resource Consuming Queries** pane will open. Alternately, you can open **Top Resource Consuming Queries** from the Query Store node under your database in Object Explorer directly.
296296

297-
:::image type="content" source="media/high-cpu-diagnose-troubleshoot/ssms-query-store-top-resource-consuming-queries.png" alt-text="Screenshot shows the Top Resource Consuming Queries pane for Query Store in S S M S." lightbox="media/high-cpu-diagnose-troubleshoot/ssms-query-store-top-resource-consuming-queries.png":::
297+
:::image type="content" source="media/high-cpu-diagnose-troubleshoot/ssms-query-store-top-resource-consuming-queries.png" alt-text="Screenshot shows the Top Resource Consuming Queries pane for Query Store in SSMS." lightbox="media/high-cpu-diagnose-troubleshoot/ssms-query-store-top-resource-consuming-queries.png":::
298298

299299
In the default view, the **Top Resource Consuming Queries** pane shows queries by **Duration (ms)**. Duration might sometimes be lower than CPU time: queries using parallelism might use much more CPU time than their overall duration. Duration might also be higher than CPU time if wait times are significant. To see queries by CPU time, select the **Metric** dropdown list at the top left of the pane and select **CPU Time(ms)**.
300300

azure-sql/database/scripts/vnet-service-endpoint-rule-powershell-create.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -366,7 +366,7 @@ Or, you might be unsure whether your subnet has the `Microsoft.Sql` type name. Y
366366

367367
Here are the phases of the PowerShell script:
368368

369-
1. Sign in to to your Azure account, needed only once per PowerShell session. Assign variables.
369+
1. Sign in to your Azure account, needed only once per PowerShell session. Assign variables.
370370
2. Search for your virtual network, and then for your subnet.
371371
3. Is your subnet tagged as `Microsoft.Sql` endpoint server type?
372372
4. Add a Virtual Service endpoint of type name `Microsoft.Sql`, on your subnet.

azure-sql/includes/passwordless/associate-managed-identity-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ If you are working with Git Bash, be careful of path conversions when using full
3131

3232
# [Azure Spring Apps](#tab/spring-apps-identity)
3333

34-
You can assign a managed identity to your Azure Spring Apps instance using the [az spring app identity assign](/azure/spring-apps/basic-standard/how-to-manage-user-assigned-managed-identities?tabs=azure-cli&pivots=sc-standard) command command in the Azure CLI.
34+
You can assign a managed identity to your Azure Spring Apps instance using the [az spring app identity assign](/azure/spring-apps/basic-standard/how-to-manage-user-assigned-managed-identities?tabs=azure-cli&pivots=sc-standard) command in the Azure CLI.
3535

3636
```azurecli
3737
az spring app identity assign \

azure-sql/includes/sql-managed-instance/azure-sql-managed-instance-link-check-network.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ To test network connectivity between SQL Server and SQL Managed Instance in SSMS
2626
1. Connect to the instance that will be the primary replica in SSMS.
2727
1. In **Object Explorer**, expand databases, and right-click the database you intend to link with the secondary. Select **Tasks** > **Azure SQL Managed Instance link** > **Test Connection** to open the **Network Checker** wizard:
2828

29-
:::image type="content" source="../../managed-instance/media/managed-instance-link-preparation/test-connection-in-ssms.png" alt-text="Screenshot of object explorer in S S M S, with test connection selected in the database link right-click menu.":::
29+
:::image type="content" source="../../managed-instance/media/managed-instance-link-preparation/test-connection-in-ssms.png" alt-text="Screenshot of object explorer in SSMS, with test connection selected in the database link right-click menu.":::
3030

3131
1. Select **Next** on the **Introduction** page of the **Network Checker** wizard.
3232
1. If all requirements are met on the **Prerequisites** page, select **Next**. Otherwise resolve any unmet prerequisites, and then select **Re-run Validation**.
@@ -189,7 +189,7 @@ Use SQL Server Agent on SQL Server to run connectivity tests from SQL Server to
189189
190190
1. Run the script and check the results. You should see results such as the following example:
191191
192-
:::image type="content" source="../../managed-instance/media/managed-instance-link-preparation/test-connectivity-results.png" alt-text="Screenshot that shows the output with the test results in S S M S.":::
192+
:::image type="content" source="../../managed-instance/media/managed-instance-link-preparation/test-connectivity-results.png" alt-text="Screenshot that shows the output with the test results in SSMS.":::
193193
194194
1. Verify the results:
195195

azure-sql/managed-instance/aad-security-configure-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -206,7 +206,7 @@ Authorization to individual databases works much the same way in SQL Managed Ins
206206

207207
Now that we've created a database called **MyMITestDB** and a login that only has default permissions, the next step is to create a user from that login. At the moment, the login can connect to the SQL managed instance and see all the databases, but it can't interact with the databases. If you sign in with the Microsoft Entra account that has the default permissions and try to expand the newly created database, you'll see the following error:
208208
209-
![Screenshot of an error message from the the SSMS Object Explorer that reads "The database MyMITestDB is not accessible. (ObjectExplorer)".](./media/aad-security-configure-tutorial/ssms-db-not-accessible.png)
209+
![Screenshot of an error message from the SSMS Object Explorer that reads "The database MyMITestDB is not accessible. (ObjectExplorer)".](./media/aad-security-configure-tutorial/ssms-db-not-accessible.png)
210210
211211
For more information on granting database permissions, see [Getting Started with Database Engine Permissions](/sql/relational-databases/security/authentication-access/getting-started-with-database-engine-permissions).
212212

azure-sql/managed-instance/data-virtualization-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ SECRET = 'sv=2018-03-28&ss=bfqt&srt=sco&sp=rwdlacup&se=2019-04-18T20:42:12Z&st=2
134134

135135
## External data source
136136

137-
An external data source is an abstraction that that provides an easy reference to a file location across multiple queries. To query public locations, specify the file location when you create an external data source:
137+
An external data source is an abstraction that provides an easy reference to a file location across multiple queries. To query public locations, specify the file location when you create an external data source:
138138

139139
```sql
140140
CREATE EXTERNAL DATA SOURCE MyExternalDataSource

azure-sql/managed-instance/managed-instance-link-configure-how-to-ssms.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ After the link is created, your database is replicated to the secondary replica.
123123

124124
On either replica, use **Object Explorer** in SSMS to view the **Synchronized** state of the replicated database.
125125

126-
:::image type="content" source="./media/managed-instance-link-configure-how-to-ssms/check-replicated-database-on-sql-server.png" alt-text="Screenshot that shows the state of the SQL Server database and distributed availability group in S S M S.":::
126+
:::image type="content" source="./media/managed-instance-link-configure-how-to-ssms/check-replicated-database-on-sql-server.png" alt-text="Screenshot that shows the state of the SQL Server database and distributed availability group in SSMS.":::
127127

128128
Expand **Always On High Availability** and **Availability Groups** to view the distributed availability group created for each link.
129129

0 commit comments

Comments
 (0)