You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-sql/database/backup-immutability-legal-hold.md
+29-5Lines changed: 29 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: Learn how to configure legal hold backup immutability for long-term
5
5
author: WilliamDAssafMSFT
6
6
ms.author: wiassaf
7
7
ms.reviewer: dinethi
8
-
ms.date: 09/29/2025
8
+
ms.date: 11/06/2025
9
9
ms.service: azure-sql-database
10
10
ms.subservice: backup-restore
11
11
ms.topic: how-to
@@ -35,7 +35,7 @@ For permissions to view, managed, and delete LTR backups, see [Manage Azure SQL
35
35
36
36
## Enable legal hold immutability for existing LTR backups
37
37
38
-
You can enable legal hold immutability on any existing backups. These backups are protected from any edits or deletes until the legal hold is explicitly removed.
38
+
You can enable legal hold immutability on any existing backups in the Azure portal, PowerShell, and Azure CLI. These backups are protected from any edits or deletes until the legal hold is explicitly removed.
39
39
40
40
> [!IMPORTANT]
41
41
> Legal hold backup immutability can apply only to existing backups. To make future backups automatically immutable, instead use [time-based immutability](backup-immutability-time-based.md).
@@ -56,19 +56,31 @@ You can enable legal hold immutability on any existing backups. These backups ar
56
56
57
57
**To enable legal hold backup immutability with PowerShell:**
58
58
59
+
Replace `<backup name>` with the unique identifier of the desired backup.
60
+
59
61
```powershell
60
62
Set-AzSqlDatabaseLongTermRetentionBackupLegalHold
61
63
-Location southeastasia
62
64
-ServerName myAzureSQL
63
65
-DatabaseName mysqldb
64
-
-BackupName 'myLTRbackup-1-24'
66
+
-BackupName '<backup name>'
67
+
```
68
+
69
+
#### [Azure CLI](#tab/azure-cli)
70
+
71
+
**To enable legal hold backup immutability with the Azure CLI:**
72
+
73
+
Replace `<backup name>` with the unique identifier of the desired backup.
74
+
75
+
```azurecli
76
+
az sql db ltr-backup set-legal-hold-immutability --resource-group mygroup --location southeastasia --server myserver --database mydb --name "<backup name>"
65
77
```
66
78
67
79
---
68
80
69
81
## Remove legal hold immutability
70
82
71
-
Legal hold immutability on specific backups can be disabled as follows:
83
+
Legal hold immutability on specific backups can be disabled in the Azure portal, PowerShell, and Azure CLI.
72
84
73
85
#### [Azure portal](#tab/azure-portal)
74
86
@@ -84,12 +96,24 @@ Legal hold immutability on specific backups can be disabled as follows:
84
96
85
97
**To remove legal hold immutability from a backup with PowerShell:**
86
98
99
+
Replace `<backup name>` with the unique identifier of the desired backup.
Copy file name to clipboardExpand all lines: azure-sql/database/backup-immutability-time-based.md
+45-5Lines changed: 45 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: Learn how to configure time-based backup immutability for long-term
5
5
author: WilliamDAssafMSFT
6
6
ms.author: wiassaf
7
7
ms.reviewer: dinethi
8
-
ms.date: 09/29/2025
8
+
ms.date: 11/06/2025
9
9
ms.service: azure-sql-database
10
10
ms.subservice: backup-restore
11
11
ms.topic: how-to
@@ -38,6 +38,8 @@ For permissions to view, managed, and delete LTR backups, see [Manage Azure SQL
38
38
> [!IMPORTANT]
39
39
> Only backups taken after enabling and locking the policy will be immutable. To make existing backups immutable, instead use [legal hold immutability](backup-immutability-legal-hold.md).
40
40
41
+
You can create time-based immutability in the Azure portal, PowerShell, and Azure CLI.
42
+
41
43
#### [Azure portal](#tab/azure-portal)
42
44
43
45
**To enable and lock time-based immutability from the Azure portal:**
**To remove immutability on a backup with the Azure CLI:**
170
+
171
+
Replace `<backup name>` with the unique identifier of the desired backup.
172
+
173
+
```azurecli
174
+
az sql db ltr-backup remove-time-based-immutability --resource-group mygroup --location southeastasia --server myserver --database mydb --name "<backup name>"
175
+
```
143
176
144
177
---
145
178
146
179
## Disable immutability policy
147
180
148
-
Immutability can be disabled from the LTR policy configuration page in the Azure portaland PowerShell.
181
+
Immutability can be disabled from the LTR policy configuration page in the Azure portal, PowerShell, and Azure CLI.
149
182
150
183
Once immutability is disabled, any new LTR backups from this point won't be protected from immutability. Any existing LTR backups however, will continue to be immutable, if already locked as immutable.
Copy file name to clipboardExpand all lines: azure-sql/database/high-cpu-diagnose-troubleshoot.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -294,7 +294,7 @@ Select **Configure** in the top right of the pane to select a different time per
294
294
295
295
Select a bar in the chart to drill in and see queries running in a specific time period. The **Top Resource Consuming Queries** pane will open. Alternately, you can open **Top Resource Consuming Queries** from the Query Store node under your database in Object Explorer directly.
296
296
297
-
:::image type="content" source="media/high-cpu-diagnose-troubleshoot/ssms-query-store-top-resource-consuming-queries.png" alt-text="Screenshot shows the Top Resource Consuming Queries pane for Query Store in S S M S." lightbox="media/high-cpu-diagnose-troubleshoot/ssms-query-store-top-resource-consuming-queries.png":::
297
+
:::image type="content" source="media/high-cpu-diagnose-troubleshoot/ssms-query-store-top-resource-consuming-queries.png" alt-text="Screenshot shows the Top Resource Consuming Queries pane for Query Store in SSMS." lightbox="media/high-cpu-diagnose-troubleshoot/ssms-query-store-top-resource-consuming-queries.png":::
298
298
299
299
In the default view, the **Top Resource Consuming Queries** pane shows queries by **Duration (ms)**. Duration might sometimes be lower than CPU time: queries using parallelism might use much more CPU time than their overall duration. Duration might also be higher than CPU time if wait times are significant. To see queries by CPU time, select the **Metric** dropdown list at the top left of the pane and select **CPU Time(ms)**.
Copy file name to clipboardExpand all lines: azure-sql/includes/passwordless/associate-managed-identity-cli.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ If you are working with Git Bash, be careful of path conversions when using full
31
31
32
32
# [Azure Spring Apps](#tab/spring-apps-identity)
33
33
34
-
You can assign a managed identity to your Azure Spring Apps instance using the [az spring app identity assign](/azure/spring-apps/basic-standard/how-to-manage-user-assigned-managed-identities?tabs=azure-cli&pivots=sc-standard) command command in the Azure CLI.
34
+
You can assign a managed identity to your Azure Spring Apps instance using the [az spring app identity assign](/azure/spring-apps/basic-standard/how-to-manage-user-assigned-managed-identities?tabs=azure-cli&pivots=sc-standard) command in the Azure CLI.
Copy file name to clipboardExpand all lines: azure-sql/includes/sql-managed-instance/azure-sql-managed-instance-link-check-network.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,7 @@ To test network connectivity between SQL Server and SQL Managed Instance in SSMS
26
26
1. Connect to the instance that will be the primary replica in SSMS.
27
27
1. In **Object Explorer**, expand databases, and right-click the database you intend to link with the secondary. Select **Tasks** > **Azure SQL Managed Instance link** > **Test Connection** to open the **Network Checker** wizard:
28
28
29
-
:::image type="content" source="../../managed-instance/media/managed-instance-link-preparation/test-connection-in-ssms.png" alt-text="Screenshot of object explorer in S S M S, with test connection selected in the database link right-click menu.":::
29
+
:::image type="content" source="../../managed-instance/media/managed-instance-link-preparation/test-connection-in-ssms.png" alt-text="Screenshot of object explorer in SSMS, with test connection selected in the database link right-click menu.":::
30
30
31
31
1. Select **Next** on the **Introduction** page of the **Network Checker** wizard.
32
32
1. If all requirements are met on the **Prerequisites** page, select **Next**. Otherwise resolve any unmet prerequisites, and then select **Re-run Validation**.
@@ -189,7 +189,7 @@ Use SQL Server Agent on SQL Server to run connectivity tests from SQL Server to
189
189
190
190
1. Run the script and check the results. You should see results such as the following example:
191
191
192
-
:::image type="content" source="../../managed-instance/media/managed-instance-link-preparation/test-connectivity-results.png" alt-text="Screenshot that shows the output with the test results in S S M S.":::
192
+
:::image type="content" source="../../managed-instance/media/managed-instance-link-preparation/test-connectivity-results.png" alt-text="Screenshot that shows the output with the test results in SSMS.":::
Copy file name to clipboardExpand all lines: azure-sql/managed-instance/aad-security-configure-tutorial.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -206,7 +206,7 @@ Authorization to individual databases works much the same way in SQL Managed Ins
206
206
207
207
Now that we've created a database called **MyMITestDB** and a login that only has default permissions, the next step is to create a user from that login. At the moment, the login can connect to the SQL managed instance and see all the databases, but it can't interact with the databases. If you sign in with the Microsoft Entra account that has the default permissions and try to expand the newly created database, you'll see the following error:
208
208
209
-

209
+

210
210
211
211
For more information on granting database permissions, see [Getting Started with Database Engine Permissions](/sql/relational-databases/security/authentication-access/getting-started-with-database-engine-permissions).
An external data source is an abstraction that that provides an easy reference to a file location across multiple queries. To query public locations, specify the file location when you create an external data source:
137
+
An external data source is an abstraction that provides an easy reference to a file location across multiple queries. To query public locations, specify the file location when you create an external data source:
Copy file name to clipboardExpand all lines: azure-sql/managed-instance/managed-instance-link-configure-how-to-ssms.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -123,7 +123,7 @@ After the link is created, your database is replicated to the secondary replica.
123
123
124
124
On either replica, use **Object Explorer** in SSMS to view the **Synchronized** state of the replicated database.
125
125
126
-
:::image type="content" source="./media/managed-instance-link-configure-how-to-ssms/check-replicated-database-on-sql-server.png" alt-text="Screenshot that shows the state of the SQL Server database and distributed availability group in S S M S.":::
126
+
:::image type="content" source="./media/managed-instance-link-configure-how-to-ssms/check-replicated-database-on-sql-server.png" alt-text="Screenshot that shows the state of the SQL Server database and distributed availability group in SSMS.":::
127
127
128
128
Expand **Always On High Availability** and **Availability Groups** to view the distributed availability group created for each link.
0 commit comments