You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-sql/includes/sql-vm-iaas-extension-permissions.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,5 +7,5 @@ ms.topic: include
7
7
---
8
8
9
9
> [!NOTE]
10
-
> SQL Server VMs deployed via the Azure marketplace after October 2022 have the [least privileged model](../virtual-machines/windows/sql-server-iaas-agent-extension-automate-management.md#permissions-models) enabled by default.
10
+
> SQL Server VMs deployed via the Azure marketplace after October 2022 have the [least privileged model](../virtual-machines/windows/sql-server-iaas-agent-extension-automate-management.md#permission-models) enabled by default.
11
11
> [Management modes](../virtual-machines/windows/sql-server-iaas-agent-extension-automate-management.md#management-modes) for the SQL IaaS Agent extension were removed in March 2023.
Virtual Network (VNet) Azure Storage [service endpoint policies](/azure/virtual-network/virtual-network-service-endpoint-policies-overview)allow you to filter egress virtual network traffic to Azure Storage, restricting data transfers to specific storage accounts.
18
+
By using [service endpoint policies](/azure/virtual-network/virtual-network-service-endpoint-policies-overview)for Azure Storage service endpoints on a virtual network (VNet) subnet, you can filter egress virtual network traffic to Azure Storage and restrict data transfers to specific storage accounts.
19
19
20
20
## Key benefits
21
21
22
-
Configuring Virtual network Azure Storage service endpoint policies for your Azure SQL Managed Instance provides the following benefits:
22
+
Configuring Virtual Network Azure Storage service endpoint policies for your Azure SQL Managed Instance provides the following benefits:
23
23
24
-
-__Improved security for your Azure SQL Managed Instance traffic to Azure Storage__: Endpoint policies establish a security control that prevents erroneous or malicious exfiltration of business-critical data. Traffic can be limited to only those storage accounts that are compliant with your data governance requirements.
24
+
-__Improved security for your Azure SQL Managed Instance traffic to Azure Storage__: Endpoint policies establish a security control that prevents erroneous or malicious exfiltration of business-critical data. You can limit traffic to only those storage accounts that are compliant with your data governance requirements.
25
25
26
26
-__Granular control over which storage accounts can be accessed__: Service endpoint policies can permit traffic to storage accounts at a subscription, resource group, and individual storage account level. Administrators can use service endpoint policies to enforce adherence to the organization's data security architecture in Azure.
27
27
28
-
-__System traffic remains unaffected__: Service endpoint policies never obstruct access to storage that is required for Azure SQL Managed Instance to function. This includes the storage of backups, data files, transaction log files, and other assets.
28
+
-__System traffic remains unaffected__: Service endpoint policies never obstruct access to storage that is required for Azure SQL Managed Instance to function. This storage includes backups, data files, transaction log files, and other assets.
29
29
30
-
Service endpoint policies only control traffic that originates from the SQL Managed Instance subnet and terminates in Azure Storage. They do not affect other means of data egress; for example, exporting the database to an on-premises BACPAC file, Azure Data Factory integration, data exfiltration to other cloud providers, or other mechanisms of data extraction that do not directly target Azure Storage. Those pathways can be protected with other means of traffic control, like user-defined routes, network security groups, and Azure Firewall.
30
+
Service endpoint policies only control traffic that originates from the SQL Managed Instance subnet and terminates in Azure Storage. They don't affect other means of data egress. For example, they don't affect exporting the database to an on-premises BACPAC file, Azure Data Factory integration, data exfiltration to other cloud providers, or other mechanisms of data extraction that don't directly target Azure Storage. You can protect those pathways by using other means of traffic control, such as user-defined routes, network security groups, and Azure Firewall.
31
31
32
32
## Limitations
33
33
34
-
Enabling service endpoint policies for your Azure SQL Managed Instance has the following limitations:
34
+
Service endpoint policies for Azure SQL Managed Instance have the following limitations:
35
35
36
36
- Service endpoint policies for Azure Storage in managed instance subnets are available in all Azure regions where SQL Managed Instance is supported except those listed in [Service endpoint policy regional availability](region-availability.md#service-endpoint-policy).
37
-
-The feature is available only to virtual networks deployed through the Azure Resource Manager deployment model.
38
-
-The feature is available only in subnets that have [service endpoints](/azure/virtual-network/virtual-network-service-endpoints-overview) for Azure Storage enabled.
39
-
- Assigning a service endpoint policy to a service endpoint upgrades the endpoint from regional to global scope. In other words, all traffic to Azure Storage will go through the service endpoint regardless of the region in which the storage account resides.
40
-
- Allowing a storage account will automatically allow access to its RA-GRS secondary if it exists.
37
+
-You can use this feature only with virtual networks deployed through the Azure Resource Manager deployment model.
38
+
-You can use this feature only in subnets that have [service endpoints](/azure/virtual-network/virtual-network-service-endpoints-overview) for Azure Storage enabled.
39
+
- Assigning a service endpoint policy to a service endpoint upgrades the endpoint from regional to global scope. In other words, all traffic to Azure Storage goes through the service endpoint regardless of the region in which the storage account resides.
40
+
- Allowing a storage account automatically allows access to its RA-GRS secondary, if it exists.
41
41
42
42
## Prepare storage inventory
43
43
44
-
Before you begin configuring service endpoint policies on a subnet, compose a list of storage accounts that the managed instance should have access to in that subnet.
44
+
Before you configure service endpoint policies on a subnet, create a list of storage accounts the managed instance needs access to in that subnet.
45
45
46
-
The following is a list of workflows that may contact Azure Storage:
46
+
The following workflows might contact Azure Storage:
47
47
48
48
-[Auditing](auditing-configure.md) to Azure Storage.
49
49
- Performing a [copy-only backup](/sql/relational-databases/backup-restore/copy-only-backups-sql-server) to Azure Storage.
50
50
-[Restoring](restore-sample-database-quickstart.md) a database from Azure Storage.
51
-
- Importing data with[BULK INSERT or OPENROWSET(BULK ...)](/sql/relational-databases/import-export/import-bulk-data-by-using-bulk-insert-or-openrowset-bulk-sql-server).
51
+
- Importing data by using[BULK INSERT or OPENROWSET(BULK ...)](/sql/relational-databases/import-export/import-bulk-data-by-using-bulk-insert-or-openrowset-bulk-sql-server).
52
52
- Logging [extended events](../database/xevent-db-diff-from-svr.md) to an Event File target on Azure Storage.
53
53
-[Azure DMS offline migration](/azure/dms/tutorial-sql-server-to-managed-instance) to Azure SQL Managed Instance.
54
54
-[Log Replay Service migration](log-replay-service-migrate.md) to Azure SQL Managed Instance.
55
-
- Synchronizing tables using [transactional replication](replication-transactional-overview.md).
55
+
- Synchronizing tables by using [transactional replication](replication-transactional-overview.md).
56
56
57
-
Note the account name, resource group, and subscription for any storage account that participates in these, or any other, workflows that access storage.
57
+
Note the account name, resource group, and subscription for any storage account that participates in these or any other workflows that access storage.
58
58
59
59
## Configure policies
60
60
61
-
You'll first need to create your service endpoint policy, and then associate the policy with the SQL Managed Instance subnet. Modify the workflow in this section to suit your business needs.
61
+
First, create your service endpoint policy, and then associate it with the SQL Managed Instance subnet. Modify the workflow in this section to suit your business needs.
62
62
63
63
> [!NOTE]
64
-
> - SQL Managed Instance subnets require policies to contain the /Services/Azure/ManagedInstance service alias (See step 5).
64
+
> - SQL Managed Instance subnets require policies to contain the /Services/Azure/ManagedInstance service alias (see step 5).
65
65
66
66
### Create a service endpoint policy
67
67
68
68
To create a service endpoint policy, follow these steps:
69
69
70
-
1. Sign into the [Azure portal](https://portal.azure.com).
70
+
1. Sign in to the [Azure portal](https://portal.azure.com).
71
71
1. Select **+ Create a resource**.
72
-
1. In the search pane, enter _service endpoint policy_, select **Service endpoint policy**, and then select **Create**.
72
+
1. In the search pane, enter *service endpoint policy*, select **Service endpoint policy**, and then select **Create**.
:::image type="content" source="./media/service-endpoint-policies-configure/create-sep-add-resource.png" alt-text="Screenshot that shows creating a service endpoint policy." lightbox="./media/service-endpoint-policies-configure/create-sep-add-resource.png":::
75
75
76
76
1. Fill in the following values on the **Basics** page:
77
77
@@ -80,32 +80,32 @@ To create a service endpoint policy, follow these steps:
80
80
- Name: Provide a name for your policy, such as **mySEP**.
81
81
- Location: Select the region of the virtual network hosting the managed instance.
:::image type="content" source="./media/service-endpoint-policies-configure/create-sep-basics.png" alt-text="Screenshot that shows the Basics page for creating a service endpoint policy." lightbox="./media/service-endpoint-policies-configure/create-sep-basics.png":::
84
84
85
85
1. In **Policy definitions**, select **Add an alias** and enter the following information on the **Add an alias** pane:
86
86
- Service Alias: Select /Services/Azure/ManagedInstance.
87
87
- Select **Add** to finish adding the service alias.
88
88
89
-

89
+
:::image type="content" source="./media/service-endpoint-policies-configure/add-an-alias.png" alt-text="Screenshot that shows adding an alias to a service endpoint policy." lightbox="./media/service-endpoint-policies-configure/add-an-alias.png":::
90
90
91
-
1. In Policy definitions, select **+ Add** under **Resources** and enter or select the following information in the **Add a resource** pane:
91
+
1. In **Policy definitions**, select **+ Add** under **Resources** and enter or select the following information in the **Add a resource** pane:
92
92
- Service: Select **Microsoft.Storage**.
93
93
- Scope: Select **All accounts in subscription**.
94
-
- Subscription: Select a subscription containing the storage account(s) to permit. Refer to your [inventory of Azure storage accounts](#prepare-storage-inventory) created earlier.
94
+
- Subscription: Select a subscription containing the storage accounts to permit. Refer to your [inventory of Azure storage accounts](#prepare-storage-inventory) created earlier.
95
95
- Select **Add** to finish adding the resource.
96
96
- Repeat this step to add any additional subscriptions.
97
97
98
-

98
+
:::image type="content" source="./media/service-endpoint-policies-configure/add-a-resource.png" alt-text="Screenshot that shows adding a resource to a service endpoint policy." lightbox="./media/service-endpoint-policies-configure/add-a-resource.png":::
99
99
100
-
1. Optional: you may configure tags on the service endpoint policy under **Tags**.
100
+
1.(Optional) Configure tags on the service endpoint policy under **Tags**.
101
101
1. Select **Review + Create**. Validate the information and select **Create**. To make further edits, select **Previous**.
102
102
103
103
> [!TIP]
104
104
> First, configure policies to allow access to entire subscriptions. Validate the configuration by ensuring that all workflows operate normally. Then, optionally, reconfigure policies to allow individual storage accounts, or accounts in a resource group. To do so, select **Single account** or **All accounts in resource group** in the _Scope:_ field instead and fill in the other fields accordingly.
105
105
106
106
### Associate policy with subnet
107
107
108
-
After your service endpoint policy is created, associate the policy with your SQL Managed Instance subnet.
108
+
After you create your service endpoint policy, associate the policy with your SQL Managed Instance subnet.
109
109
110
110
To associate your policy, follow these steps:
111
111
@@ -115,18 +115,18 @@ To associate your policy, follow these steps:
115
115
- Services: Select **Microsoft.Storage**. If this field is empty, you need to configure the service endpoint for Azure Storage on this subnet.
116
116
- Service endpoint policies: Select any service endpoint policies you want to apply to the SQL Managed Instance subnet.
117
117
118
-

118
+
:::image type="content" source="./media/service-endpoint-policies-configure/associate-service-endpoint-policy.png" alt-text="Screenshot that shows associating a service endpoint policy with a subnet." lightbox="./media/service-endpoint-policies-configure/associate-service-endpoint-policy.png":::
119
119
120
120
1. Select **Save** to finish configuring the virtual network.
121
121
122
122
> [!WARNING]
123
-
> If the policies on this subnet do not have the `/Services/Azure/ManagedInstance` alias, you may see the following error:
123
+
> If the policies on this subnet don't have the `/Services/Azure/ManagedInstance` alias, you might see the following error:
124
124
> ` Failed to save subnet 'subnet'. Error: 'Found conflicts with NetworkIntentPolicy.`
125
125
> `Details: Service endpoint policies on subnet are missing definitions`
126
-
> To resolve this, update all the policies on the subnet to include the `/Services/Azure/ManagedInstance` alias.
126
+
> To resolve this error, update all the policies on the subnet to include the `/Services/Azure/ManagedInstance` alias.
127
127
128
-
## Next steps
128
+
## Related content
129
129
130
-
-Learn more on [securing your Azure Storage accounts](/azure/storage/common/storage-network-security).
131
-
-Read about [SQL Managed Instance's security capabilities](../database/security-overview.md).
132
-
-Explore the [connectivity architecture](connectivity-architecture-overview.md) of SQL Managed Instance.
130
+
-[Secure your Azure Storage accounts](/azure/storage/common/storage-network-security)
0 commit comments