You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
### Restore operation failures after migrating to SQL Managed Instance
11
+
12
+
If you migrate a database to Azure SQL Managed Instance from SQL Server 2019 and later versions with [accelerated database recovery](/sql/relational-databases/accelerated-database-recovery-concepts) enabled, but configured with the persistent version store (PVS) set to something other than the `PRIMARY` file group, you can experience restore operation failures on the target SQL managed instance.
13
+
14
+
To work around this issue, make sure you set the [persistent version store (PVS) to PRIMARY](/sql/relational-databases/accelerated-database-recovery-management#change-the-pvs-filegroup) on the source SQL Server database before you migrate it to SQL Managed Instance. If you already migrated the database without setting the PVS to `PRIMARY`, you can set it on the source SQL Server database, and then re-migrate the database to SQL Managed Instance.
15
+
16
+
### Unable to use accelerated database recovery after migrating to SQL Managed Instance
17
+
18
+
Starting with SQL Server 2019, if you migrate a database to Azure SQL Managed Instance, and the source database has [accelerated database recovery](/sql/relational-databases/accelerated-database-recovery-concepts) disabled, you can't use accelerated database recovery on the target SQL managed instance.
19
+
20
+
To work around this issue, make sure you [enable accelerated database recovery](/sql/relational-databases/accelerated-database-recovery-management#enable-accelerated-database-recovery) on the source SQL Server database before you migrate it to SQL Managed Instance. If you already migrated the database without enabling accelerated database recovery, you can enable it on the source SQL Server database, and then re-migrate the database to SQL managed instance.
21
+
22
+
SQL Server 2017 and earlier versions don't support accelerated database recovery, so this issue doesn't apply to databases migrated from those versions of SQL Server.
23
+
24
+
### Unable to use Service Broker after migrating to SQL Managed Instance
25
+
26
+
If you migrate a database to Azure SQL Managed Instance, and [Service Broker is disabled on the source database](/sql/database-engine/service-broker/how-to-activate-service-broker-message-delivery-in-databases-transact-sql), you can't use Service Broker on the target SQL managed instance.
27
+
28
+
To work around this issue, make sure you enable Service Broker on the source SQL Server database before you migrate it to SQL Managed Instance. If you already migrated the database without enabling Service Broker, you can enable it on the source SQL Server database, and then re-migrate the database to SQL Managed Instance.
For SQL Server 2019 and later versions, enable [accelerated database recovery](/sql/relational-databases/accelerated-database-recovery-concepts), and ensure the persistent version store (PVS) is set to `PRIMARY`. If accelerated database recovery isn't enabled on the source SQL Server database, you can't enable it on the target SQL managed instance after the database is migrated. If the persistent version store (PVS) isn't set to `PRIMARY`, you can experience issues with restore operations on the target SQL managed instance.
13
+
14
+
For SQL Server 2017 and earlier versions, accelerated database recovery isn't supported, so this step isn't necessary.
15
+
16
+
To configure accelerated database recovery properly on the source SQL Server database, follow these steps:
17
+
18
+
1. Enable accelerated database recovery by running the following Transact-SQL script on SQL Server:
19
+
20
+
```sql
21
+
ALTERDATABASE [<database name>] SET ACCELERATED_DATABASE_RECOVERY =ON;
22
+
```
23
+
1. The persistent version store (PVS) must be set to `PRIMARY` on the source database, which is the default configuration. If this was changed previously, you must [change it back to PRIMARY](/sql/relational-databases/accelerated-database-recovery-management#change-the-pvs-filegroup) before starting the migration.
24
+
25
+
### Enable Service Broker
26
+
27
+
[Service Broker](/sql/database-engine/configure-windows/sql-server-service-broker) is enabled by default for all versions of SQL Server. If Service Broker was disabled and you plan to use it on SQL Managed Instance, enable Service Broker on the source SQL Server database before you migrate to SQL Managed Instance. If Service Broker isn't enabled on the source SQL Server database, you can't use it on the target SQL managed instance.
28
+
29
+
To check if Service Broker is enabled, run the following Transact-SQL script on SQL Server instance:
30
+
31
+
```sql
32
+
SELECT name AS [Database Name], is_broker_enabled AS [Service Broker Enabled]
33
+
FROMsys.databases
34
+
WHERE name ='<database name>';
35
+
```
36
+
37
+
If Service Broker is disabled, enable it by running the following Transact-SQL script on the source SQL Server database:
Copy file name to clipboardExpand all lines: azure-sql/managed-instance/doc-changes-updates-known-issues.md
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,10 @@ This article lists the currently known issues with [Azure SQL Managed Instance](
22
22
23
23
| Issue | Date discovered | Status | Date resolved |
24
24
| --- | --- | --- | --- |
25
-
|[Misleading error message when connecting to a read replica using invalid credentials](#misleading-error-message-when-connecting-to-a-read-replica-using-invalid-credentials)| February 2026 |
25
+
|[Restore operation failures after migrating to SQL Managed Instance](#restore-operation-failures-after-migrating-to-sql-managed-instance)| March 2026 | Has workaround ||
26
+
|[Unable to use Service Broker after migrating to SQL Managed Instance](#unable-to-use-service-broker-after-migrating-to-sql-managed-instance)| March 2026 | Has workaround ||
27
+
|[Unable to use accelerated database recovery after migrating to SQL Managed Instance](#unable-to-use-accelerated-database-recovery-after-migrating-to-sql-managed-instance)| March 2026 | Has workaround ||
28
+
|[Misleading error message when connecting to a read replica using invalid credentials](#misleading-error-message-when-connecting-to-a-read-replica-using-invalid-credentials)| February 2026 |No resolution||
26
29
|[Modifying backup retention period for the free offer](#modifying-backup-retention-period-for-the-free-offer)| June 2025 | Has workaround ||
27
30
|[Login to read-secondary failed due to long wait on "HADR_DATABASE_WAIT_FOR_TRANSITION_TO_VERSIONING"](#login-to-read-secondary-failed-due-to-long-wait-on-hadr_database_wait_for_transition_to_versioning)| April 2025 | Has workaround ||
28
31
|[Interim guidance on 2024 time zone updates for Paraguay](#interim-guidance-on-2024-time-zone-updates-for-paraguay)| March 2025 | Resolved | February 2026 |
@@ -60,6 +63,9 @@ This article lists the currently known issues with [Azure SQL Managed Instance](
### Modifying backup retention period for the free offer
64
70
65
71
You can only modify the backup retention policy of your databases in the free SQL managed instance by using [REST API](/rest/api/sql/managed-backup-short-term-retention-policies), [PowerShell](/powershell/module/az.sql/set-azsqlinstancedatabasebackupshorttermretentionpolicy), and [Azure CLI](/cli/azure/sql/midb/short-term-retention-policy) commands. You can't modify the backup retention policy through the [Azure portal](https://portal.azure.com).
Copy file name to clipboardExpand all lines: azure-sql/managed-instance/log-replay-service-migrate.md
+11Lines changed: 11 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,6 +58,8 @@ Make sure that you meet the following requirements for SQL Server:
58
58
- For SQL Server 2016 and later, you can [take your backup directly](#take-backups-directly-to-your-blob-storage-account) to your Azure Blob Storage account.
59
59
- Although having `CHECKSUM` enabled for backups isn't required, it's highly recommended to prevent unintentionally migrating a corrupt database, and for faster restore operations.
60
60
- Any version of Windows Server is supported based on the SQL Server version supportability.
61
+
- For SQL Server 2019 and later, accelerated database recovery should be enabled, with the persistent version store set to `PRIMARY`. For more information, see [Known issues after migrating to SQL Managed Instance](#known-issues-after-migrating-to-sql-managed-instance) in this article.
62
+
- To use Service Broker on a database migrated to Azure SQL Managed Instance, Service Broker must be enabled on the source database before migration. For more information, see [Known issues after migrating to SQL Managed Instance](#known-issues-after-migrating-to-sql-managed-instance) in this article.
61
63
62
64
### Azure
63
65
@@ -630,6 +632,9 @@ Consider the following limitations when migrating with LRS:
630
632
- There are two scenarios, at the beginning and end of the migration process, where a migration is aborted if a failover occurs, and the migration job must be manually restarted from the beginning as the database is dropped from SQL Managed Instance:
631
633
- If a failover occurs when the first full database backup is in the process of being restored to SQL Managed Instance when the migration job is first started, then the migration job must be manually restarted from the beginning.
632
634
- If a failover occurs after migration cutover is initiated, the migration job must be manually restarted from the beginning. Ensure the last backup file is as small as possible to minimize cutover time and reduce the risk of a failover during the cutover process.
635
+
- If [accelerated database recovery](/sql/relational-databases/accelerated-database-recovery-concepts) is disabled on your source SQL Server 2019 and later instances, you can no longer enable it after migrating to Azure SQL Managed Instance. Additionally, if the persistent version store (PVS) isn't set to `PRIMARY`, you can experience issues with restore operations on the target SQL managed instance.
636
+
- If [Service Broker](/sql/database-engine/configure-windows/sql-server-service-broker) is disabled on the source SQL Server instance, you can't use Service Broker on the target SQL managed instance after migration.
637
+
633
638
634
639
> [!NOTE]
635
640
> If you require a database to be read-only accessible during the migration, with a much longer time frame for performing the migration and with minimal downtime, consider using the [Overview of the Managed Instance link](managed-instance-link-feature-overview.md) feature as a recommended migration solution.
@@ -655,6 +660,12 @@ If it's important that databases are available as soon as cutover completes, the
655
660
- Migrate to the General Purpose service tier first, and then upgrade to the **Business Critical** service tier. Upgrading your service tier is an online operation that keeps your databases online until a short failover as the final step of the upgrade operation.
656
661
- Use the [Managed Instance link](managed-instance-link-migrate.md) for an online migration to a **Business Critical** instance without having to wait for databases to be available after the cutover.
657
662
663
+
## Known issues after migrating to SQL Managed Instance
664
+
665
+
Consider the following known issues after migrating to Azure SQL Managed Instance:
Copy file name to clipboardExpand all lines: azure-sql/managed-instance/managed-instance-link-feature-overview.md
+12-13Lines changed: 12 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: This article describes the Managed Instance link, which you can use
5
5
author: djordje-jeremic
6
6
ms.author: djjeremi
7
7
ms.reviewer: mathoma, randolphwest
8
-
ms.date: 01/28/2026
8
+
ms.date: 03/06/2026
9
9
ms.service: azure-sql-managed-instance
10
10
ms.subservice: data-movement
11
11
ms.topic: concept-article
@@ -125,8 +125,6 @@ When failing back to SQL Server, you can choose to fail back:
125
125
126
126
:::image type="content" source="media/managed-instance-link-feature-overview/disaster-recovery-scenario.png" alt-text="Diagram showing the disaster recovery scenario.":::
127
127
128
-
129
-
130
128
## Use Azure services
131
129
132
130
Use the link feature to take advantage of Azure services by using SQL Server data without migrating it to the cloud. Examples include reporting, analytics, backups, machine learning, and other jobs that send data to Azure.
@@ -199,20 +197,19 @@ Data replication limitations include:
199
197
200
198
Configuration limitations include:
201
199
202
-
- If there are multiple SQL Server instances on a server, you can configure a link for each instance, but you must configure each instance to use a separate database mirroring endpoint, with a dedicated port per instance. Only the default instance should use port 5022 for the database mirroring endpoint.
203
-
- You can place only one database into a single availability group for one Managed Instance link. However, you can replicate multiple databases in a single SQL Server instance by establishing multiple links.
200
+
- If there are multiple SQL Server instances on a server, you can configure a link for each instance, but you must configure each instance to use a separate database mirroring endpoint, with a dedicated port per instance. Only the default instance should use port 5022 for the database mirroring endpoint.
201
+
- You can place only one database into a single availability group for one Managed Instance link. However, you can replicate multiple databases in a single SQL Server instance by establishing multiple links.
204
202
205
203
> [!NOTE]
206
204
> If you're interested in participating in a limited preview of a change to this behavior, please fill out the following [form](https://aka.ms/milink-multidb-prpr).
207
205
208
-
- You can create a link with an existing availability group with a single database. If your existing availability group has multiple databases, you can create a link with the availability group only if you remove all databases except one from the availability group.
209
-
- A single General Purpose or Business Critical SQL Managed Instance supports up to 100 links, and a single Next-gen General Purpose SQL Managed Instance supports up to 500 links, from the same, or from multiple SQL Server sources.
210
-
- A Managed Instance link can replicate a database of any size if it fits into the chosen storage size of the target SQL Managed Instance deployment.
211
-
- Managed Instance link authentication between SQL Server and SQL Managed Instance is certificate-based and available only through an exchange of certificates. You can't use Windows authentication to establish the link between the SQL Server instance and the SQL managed instance.
212
-
- You can establish a link with only s [VNet-local endpoint](connectivity-architecture-overview.md#vnet-local-endpoint) to SQL Managed Instance.
213
-
- You can't use public endpoint or private endpoints to establish the link with the managed instance.
214
-
- You can't replicate databases with multiple log files, because SQL Managed Instance doesn't support multiple log files.
215
-
206
+
- You can create a link with an existing availability group with a single database. If your existing availability group has multiple databases, you can create a link with the availability group only if you remove all databases except one from the availability group.
207
+
- A single General Purpose or Business Critical SQL Managed Instance supports up to 100 links, and a single Next-gen General Purpose SQL Managed Instance supports up to 500 links, from the same, or from multiple SQL Server sources.
208
+
- A Managed Instance link can replicate a database of any size if it fits into the chosen storage size of the target SQL Managed Instance deployment.
209
+
- Managed Instance link authentication between SQL Server and SQL Managed Instance is certificate-based and available only through an exchange of certificates. You can't use Windows authentication to establish the link between the SQL Server instance and the SQL managed instance.
210
+
- You can establish a link with only a [VNet-local endpoint](connectivity-architecture-overview.md#vnet-local-endpoint) to SQL Managed Instance.
211
+
- You can't use public endpoint or private endpoints to establish the link with the managed instance.
212
+
- You can't replicate databases with multiple log files, because SQL Managed Instance doesn't support multiple log files.
216
213
217
214
Feature limitations include:
218
215
@@ -223,6 +220,8 @@ Feature limitations include:
223
220
- If you're migrating a database that is configured as a Publisher in a transactional replication topology by using the link, you must reconfigure the database as a Publisher on the target instance after the migration is complete.
224
221
- If you're using distributed transactions with a database that's replicated from the SQL Server instance and, in a migration scenario, on the cutover to the cloud, Distributed Transaction Coordinator capabilities won't be transferred. It's not possible for the migrated database to get involved in distributed transactions with the SQL Server instance, because the SQL Managed Instance deployment doesn't support distributed transactions with SQL Server at this time. For reference, SQL Managed Instance today supports distributed transactions only between other managed instances. For more information, see [Distributed transactions across cloud databases](../database/elastic-transactions-overview.md#transactions-for-sql-managed-instance).
225
222
- If you're using Transparent Data Encryption (TDE) to encrypt SQL Server databases, you need to export the database encryption key from SQL Server and upload it to Azure Key Vault, and you need to also configure the BYOK TDE option on SQL Managed Instance before creating the link.
223
+
- If [accelerated database recovery](/sql/relational-databases/accelerated-database-recovery-concepts) is disabled on your source SQL Server 2019 and later instances, you can no longer enable it after migrating to Azure SQL Managed Instance. Additionally, if the persistent version store (PVS) isn't set to `PRIMARY`, you can experience issues with restore operations on the target SQL managed instance.
224
+
- If [Service Broker](/sql/database-engine/configure-windows/sql-server-service-broker) is disabled on the source SQL Server instance, you can't use Service Broker on the target SQL managed instance after migration.
226
225
- You can't link SQL Managed Instance databases that are encrypted with service-managed TDE keys to SQL Server. You can link an encrypted database to SQL Server only if you encrypted it with a customer-managed key and the destination server has access to the same key that's used to encrypt the database. For more information, see [Set up SQL Server TDE with Azure Key Vault](/sql/relational-databases/security/encryption/setup-steps-for-extensible-key-management-using-the-azure-key-vault).
227
226
- You can't establish a link between SQL Server and SQL Managed Instance if the functionality that you use on the SQL Server instance isn't supported on the SQL managed instance. For example:
228
227
- You can't replicate databases with file tables and file streams, because SQL Managed Instance doesn't support file tables or file streams.
0 commit comments