Skip to content

Commit cd0e3ba

Browse files
authored
SQL MI & VM freshness pass (#36795)
1 parent 9f96135 commit cd0e3ba

26 files changed

Lines changed: 627 additions & 637 deletions

azure-sql/includes/sql-vm-iaas-extension-permissions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,5 +7,5 @@ ms.topic: include
77
---
88

99
> [!NOTE]
10-
> SQL Server VMs deployed via the Azure marketplace after October 2022 have the [least privileged model](../virtual-machines/windows/sql-server-iaas-agent-extension-automate-management.md#permissions-models) enabled by default.
10+
> SQL Server VMs deployed via the Azure marketplace after October 2022 have the [least privileged model](../virtual-machines/windows/sql-server-iaas-agent-extension-automate-management.md#permission-models) enabled by default.
1111
> [Management modes](../virtual-machines/windows/sql-server-iaas-agent-extension-automate-management.md#management-modes) for the SQL IaaS Agent extension were removed in March 2023.

azure-sql/managed-instance/instance-pools-overview.md

Lines changed: 37 additions & 36 deletions
Large diffs are not rendered by default.

azure-sql/managed-instance/managed-instance-link-configure-how-to-ssms.md

Lines changed: 31 additions & 31 deletions
Large diffs are not rendered by default.

azure-sql/managed-instance/media/tde-certificate-migrate/backup-onprem-certificate.png renamed to azure-sql/managed-instance/media/tde-certificate-migrate/backup-on-premises-certificate.png

File renamed without changes.

azure-sql/managed-instance/media/tde-certificate-migrate/onprem-certificate-list.png renamed to azure-sql/managed-instance/media/tde-certificate-migrate/on-premises-certificate-list.png

File renamed without changes.

azure-sql/managed-instance/service-endpoint-policies-configure.md

Lines changed: 35 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Configure Azure Storage service endpoint policies to protect Azure
44
author: zoran-rilak-msft
55
ms.author: zoranrilak
66
ms.reviewer: mathoma
7-
ms.date: 11/02/2021
7+
ms.date: 03/31/2026
88
ms.service: azure-sql-managed-instance
99
ms.subservice: security
1010
ms.topic: how-to
@@ -15,63 +15,63 @@ ms.custom:
1515
# Configure service endpoint policies for Azure SQL Managed Instance
1616
[!INCLUDE[appliesto-sqlmi](../includes/appliesto-sqlmi.md)]
1717

18-
Virtual Network (VNet) Azure Storage [service endpoint policies](/azure/virtual-network/virtual-network-service-endpoint-policies-overview) allow you to filter egress virtual network traffic to Azure Storage, restricting data transfers to specific storage accounts.
18+
By using [service endpoint policies](/azure/virtual-network/virtual-network-service-endpoint-policies-overview) for Azure Storage service endpoints on a virtual network (VNet) subnet, you can filter egress virtual network traffic to Azure Storage and restrict data transfers to specific storage accounts.
1919

2020
## Key benefits
2121

22-
Configuring Virtual network Azure Storage service endpoint policies for your Azure SQL Managed Instance provides the following benefits:
22+
Configuring Virtual Network Azure Storage service endpoint policies for your Azure SQL Managed Instance provides the following benefits:
2323

24-
- __Improved security for your Azure SQL Managed Instance traffic to Azure Storage__: Endpoint policies establish a security control that prevents erroneous or malicious exfiltration of business-critical data. Traffic can be limited to only those storage accounts that are compliant with your data governance requirements.
24+
- __Improved security for your Azure SQL Managed Instance traffic to Azure Storage__: Endpoint policies establish a security control that prevents erroneous or malicious exfiltration of business-critical data. You can limit traffic to only those storage accounts that are compliant with your data governance requirements.
2525

2626
- __Granular control over which storage accounts can be accessed__: Service endpoint policies can permit traffic to storage accounts at a subscription, resource group, and individual storage account level. Administrators can use service endpoint policies to enforce adherence to the organization's data security architecture in Azure.
2727

28-
- __System traffic remains unaffected__: Service endpoint policies never obstruct access to storage that is required for Azure SQL Managed Instance to function. This includes the storage of backups, data files, transaction log files, and other assets.
28+
- __System traffic remains unaffected__: Service endpoint policies never obstruct access to storage that is required for Azure SQL Managed Instance to function. This storage includes backups, data files, transaction log files, and other assets.
2929

30-
Service endpoint policies only control traffic that originates from the SQL Managed Instance subnet and terminates in Azure Storage. They do not affect other means of data egress; for example, exporting the database to an on-premises BACPAC file, Azure Data Factory integration, data exfiltration to other cloud providers, or other mechanisms of data extraction that do not directly target Azure Storage. Those pathways can be protected with other means of traffic control, like user-defined routes, network security groups, and Azure Firewall.
30+
Service endpoint policies only control traffic that originates from the SQL Managed Instance subnet and terminates in Azure Storage. They don't affect other means of data egress. For example, they don't affect exporting the database to an on-premises BACPAC file, Azure Data Factory integration, data exfiltration to other cloud providers, or other mechanisms of data extraction that don't directly target Azure Storage. You can protect those pathways by using other means of traffic control, such as user-defined routes, network security groups, and Azure Firewall.
3131

3232
## Limitations
3333

34-
Enabling service endpoint policies for your Azure SQL Managed Instance has the following limitations:
34+
Service endpoint policies for Azure SQL Managed Instance have the following limitations:
3535

3636
- Service endpoint policies for Azure Storage in managed instance subnets are available in all Azure regions where SQL Managed Instance is supported except those listed in [Service endpoint policy regional availability](region-availability.md#service-endpoint-policy).
37-
- The feature is available only to virtual networks deployed through the Azure Resource Manager deployment model.
38-
- The feature is available only in subnets that have [service endpoints](/azure/virtual-network/virtual-network-service-endpoints-overview) for Azure Storage enabled.
39-
- Assigning a service endpoint policy to a service endpoint upgrades the endpoint from regional to global scope. In other words, all traffic to Azure Storage will go through the service endpoint regardless of the region in which the storage account resides.
40-
- Allowing a storage account will automatically allow access to its RA-GRS secondary if it exists.
37+
- You can use this feature only with virtual networks deployed through the Azure Resource Manager deployment model.
38+
- You can use this feature only in subnets that have [service endpoints](/azure/virtual-network/virtual-network-service-endpoints-overview) for Azure Storage enabled.
39+
- Assigning a service endpoint policy to a service endpoint upgrades the endpoint from regional to global scope. In other words, all traffic to Azure Storage goes through the service endpoint regardless of the region in which the storage account resides.
40+
- Allowing a storage account automatically allows access to its RA-GRS secondary, if it exists.
4141

4242
## Prepare storage inventory
4343

44-
Before you begin configuring service endpoint policies on a subnet, compose a list of storage accounts that the managed instance should have access to in that subnet.
44+
Before you configure service endpoint policies on a subnet, create a list of storage accounts the managed instance needs access to in that subnet.
4545

46-
The following is a list of workflows that may contact Azure Storage:
46+
The following workflows might contact Azure Storage:
4747

4848
- [Auditing](auditing-configure.md) to Azure Storage.
4949
- Performing a [copy-only backup](/sql/relational-databases/backup-restore/copy-only-backups-sql-server) to Azure Storage.
5050
- [Restoring](restore-sample-database-quickstart.md) a database from Azure Storage.
51-
- Importing data with [BULK INSERT or OPENROWSET(BULK ...)](/sql/relational-databases/import-export/import-bulk-data-by-using-bulk-insert-or-openrowset-bulk-sql-server).
51+
- Importing data by using [BULK INSERT or OPENROWSET(BULK ...)](/sql/relational-databases/import-export/import-bulk-data-by-using-bulk-insert-or-openrowset-bulk-sql-server).
5252
- Logging [extended events](../database/xevent-db-diff-from-svr.md) to an Event File target on Azure Storage.
5353
- [Azure DMS offline migration](/azure/dms/tutorial-sql-server-to-managed-instance) to Azure SQL Managed Instance.
5454
- [Log Replay Service migration](log-replay-service-migrate.md) to Azure SQL Managed Instance.
55-
- Synchronizing tables using [transactional replication](replication-transactional-overview.md).
55+
- Synchronizing tables by using [transactional replication](replication-transactional-overview.md).
5656

57-
Note the account name, resource group, and subscription for any storage account that participates in these, or any other, workflows that access storage.
57+
Note the account name, resource group, and subscription for any storage account that participates in these or any other workflows that access storage.
5858

5959
## Configure policies
6060

61-
You'll first need to create your service endpoint policy, and then associate the policy with the SQL Managed Instance subnet. Modify the workflow in this section to suit your business needs.
61+
First, create your service endpoint policy, and then associate it with the SQL Managed Instance subnet. Modify the workflow in this section to suit your business needs.
6262

6363
> [!NOTE]
64-
> - SQL Managed Instance subnets require policies to contain the /Services/Azure/ManagedInstance service alias (See step 5).
64+
> - SQL Managed Instance subnets require policies to contain the /Services/Azure/ManagedInstance service alias (see step 5).
6565
6666
### Create a service endpoint policy
6767

6868
To create a service endpoint policy, follow these steps:
6969

70-
1. Sign into the [Azure portal](https://portal.azure.com).
70+
1. Sign in to the [Azure portal](https://portal.azure.com).
7171
1. Select **+ Create a resource**.
72-
1. In the search pane, enter _service endpoint policy_, select **Service endpoint policy**, and then select **Create**.
72+
1. In the search pane, enter *service endpoint policy*, select **Service endpoint policy**, and then select **Create**.
7373

74-
![Create service endpoint policy](media/service-endpoint-policies-configure/create-sep-add-resource.png)
74+
:::image type="content" source="./media/service-endpoint-policies-configure/create-sep-add-resource.png" alt-text="Screenshot that shows creating a service endpoint policy." lightbox="./media/service-endpoint-policies-configure/create-sep-add-resource.png":::
7575

7676
1. Fill in the following values on the **Basics** page:
7777

@@ -80,32 +80,32 @@ To create a service endpoint policy, follow these steps:
8080
- Name: Provide a name for your policy, such as **mySEP**.
8181
- Location: Select the region of the virtual network hosting the managed instance.
8282

83-
![Create service endpoint policy basics](media/service-endpoint-policies-configure/create-sep-basics.png)
83+
:::image type="content" source="./media/service-endpoint-policies-configure/create-sep-basics.png" alt-text="Screenshot that shows the Basics page for creating a service endpoint policy." lightbox="./media/service-endpoint-policies-configure/create-sep-basics.png":::
8484

8585
1. In **Policy definitions**, select **Add an alias** and enter the following information on the **Add an alias** pane:
8686
- Service Alias: Select /Services/Azure/ManagedInstance.
8787
- Select **Add** to finish adding the service alias.
8888

89-
![Add an alias to a service endpoint policy](./media/service-endpoint-policies-configure/add-an-alias.png)
89+
:::image type="content" source="./media/service-endpoint-policies-configure/add-an-alias.png" alt-text="Screenshot that shows adding an alias to a service endpoint policy." lightbox="./media/service-endpoint-policies-configure/add-an-alias.png":::
9090

91-
1. In Policy definitions, select **+ Add** under **Resources** and enter or select the following information in the **Add a resource** pane:
91+
1. In **Policy definitions**, select **+ Add** under **Resources** and enter or select the following information in the **Add a resource** pane:
9292
- Service: Select **Microsoft.Storage**.
9393
- Scope: Select **All accounts in subscription**.
94-
- Subscription: Select a subscription containing the storage account(s) to permit. Refer to your [inventory of Azure storage accounts](#prepare-storage-inventory) created earlier.
94+
- Subscription: Select a subscription containing the storage accounts to permit. Refer to your [inventory of Azure storage accounts](#prepare-storage-inventory) created earlier.
9595
- Select **Add** to finish adding the resource.
9696
- Repeat this step to add any additional subscriptions.
9797

98-
![Add a resource to a service endpoint policy](./media/service-endpoint-policies-configure/add-a-resource.png)
98+
:::image type="content" source="./media/service-endpoint-policies-configure/add-a-resource.png" alt-text="Screenshot that shows adding a resource to a service endpoint policy." lightbox="./media/service-endpoint-policies-configure/add-a-resource.png":::
9999

100-
1. Optional: you may configure tags on the service endpoint policy under **Tags**.
100+
1. (Optional) Configure tags on the service endpoint policy under **Tags**.
101101
1. Select **Review + Create**. Validate the information and select **Create**. To make further edits, select **Previous**.
102102

103103
> [!TIP]
104104
> First, configure policies to allow access to entire subscriptions. Validate the configuration by ensuring that all workflows operate normally. Then, optionally, reconfigure policies to allow individual storage accounts, or accounts in a resource group. To do so, select **Single account** or **All accounts in resource group** in the _Scope:_ field instead and fill in the other fields accordingly.
105105
106106
### Associate policy with subnet
107107

108-
After your service endpoint policy is created, associate the policy with your SQL Managed Instance subnet.
108+
After you create your service endpoint policy, associate the policy with your SQL Managed Instance subnet.
109109

110110
To associate your policy, follow these steps:
111111

@@ -115,18 +115,18 @@ To associate your policy, follow these steps:
115115
- Services: Select **Microsoft.Storage**. If this field is empty, you need to configure the service endpoint for Azure Storage on this subnet.
116116
- Service endpoint policies: Select any service endpoint policies you want to apply to the SQL Managed Instance subnet.
117117

118-
![Associate a service endpoint policy with a subnet](./media/service-endpoint-policies-configure/associate-service-endpoint-policy.png)
118+
:::image type="content" source="./media/service-endpoint-policies-configure/associate-service-endpoint-policy.png" alt-text="Screenshot that shows associating a service endpoint policy with a subnet." lightbox="./media/service-endpoint-policies-configure/associate-service-endpoint-policy.png":::
119119

120120
1. Select **Save** to finish configuring the virtual network.
121121

122122
> [!WARNING]
123-
> If the policies on this subnet do not have the `/Services/Azure/ManagedInstance` alias, you may see the following error:
123+
> If the policies on this subnet don't have the `/Services/Azure/ManagedInstance` alias, you might see the following error:
124124
> ` Failed to save subnet 'subnet'. Error: 'Found conflicts with NetworkIntentPolicy.`
125125
> `Details: Service endpoint policies on subnet are missing definitions`
126-
> To resolve this, update all the policies on the subnet to include the `/Services/Azure/ManagedInstance` alias.
126+
> To resolve this error, update all the policies on the subnet to include the `/Services/Azure/ManagedInstance` alias.
127127
128-
## Next steps
128+
## Related content
129129

130-
- Learn more on [securing your Azure Storage accounts](/azure/storage/common/storage-network-security).
131-
- Read about [SQL Managed Instance's security capabilities](../database/security-overview.md).
132-
- Explore the [connectivity architecture](connectivity-architecture-overview.md) of SQL Managed Instance.
130+
- [Secure your Azure Storage accounts](/azure/storage/common/storage-network-security)
131+
- [SQL Managed Instance security capabilities](../database/security-overview.md)
132+
- [Connectivity architecture for Azure SQL Managed Instance](connectivity-architecture-overview.md)

0 commit comments

Comments
 (0)