You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/includes/entra-id-tutorial.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -103,7 +103,7 @@ Or,
103
103
104
104
1. For the **Method of certificate creation**, use **Generate**.
105
105
106
-
1. Add a certificate name and subject.
106
+
1. Add a certificate name and subject. The certificate name must be unique. A certificate name that matches an existing certificate causes an error when the login is created.
107
107
108
108
1. The recommended validity period is at most 12 months. The rest of the values can be left as default.
@@ -235,6 +235,19 @@ LAQ is disabled for the database if the percentage of the potentially wasted wor
235
235
236
236
If the wasted work and the number of restarted statements fall below their respective thresholds, LAQ is re-enabled for the database.
237
237
238
+
#### LAQ limitations
239
+
240
+
Lock after qualification might not be used in the following scenarios:
241
+
242
+
- When disabled by [LAQ heuristics](#laq-heuristics).
243
+
- When conflicting locking hints, such as `UPDLOCK`, `READCOMMITTEDLOCK`, `XLOCK`, or `HOLDLOCK` are used.
244
+
- When the transaction isolation level is other than `READ COMMITTED`, or when the `READ_COMMITTED_SNAPSHOT` database option is disabled.
245
+
- When the table being modified has a columnstore index.
246
+
- When the DML statement includes variable assignment.
247
+
- When the DML statement has an `OUTPUT` clause.
248
+
- When the DML statement uses more than one index seek or scan operator to read the rows being modified.
249
+
- In `MERGE` statements.
250
+
238
251
### <aid="behavior"></a> Query behavior changes with optimized locking and RCSI
239
252
240
253
Concurrent workloads under read committed snapshot isolation (RCSI) that rely on strict execution order of transactions might experience differences in query behavior when optimized locking is enabled.
@@ -304,7 +317,7 @@ The following improvements help you monitor and troubleshoot blocking and deadlo
304
317
- Under each resource in the deadlock report `<resource-list>`, each `<xactlock>` element reports the underlying resources and specific information for locks of each member of a deadlock. For more information and an example, see [Optimized locking and deadlocks](../sql-server-deadlocks-guide.md#optimized-locking-and-deadlocks).
305
318
- Extended events
306
319
- The `lock_after_qual_stmt_abort` event fires when a statement is internally aborted and restarted because of a conflict with another transaction. For more information, see [Lock after qualification (LAQ)](#lock-after-qualification-laq).
307
-
- In [!INCLUDE [sssql25-md](../../includes/sssql25-md.md)], the `locking_stats` event fires for every database every several minutes and provides aggregate locking statistics for the time interval, such as the number of lock escalations, whether TID locking and LAQ components of optimized locking are enabled, and the number of queries that were ineligible for LAQ for various reasons. This event fires even if optimized locking is disabled.
320
+
- In [!INCLUDE [sssql25-md](../../includes/sssql25-md.md)], the `locking_stats` event fires for every database every several minutes and provides aggregate locking statistics for the time interval, such as the number of lock escalations, whether TID locking and LAQ components of optimized locking are enabled, and the number of queries where LAQ wasn't used for various reasons. This event fires even if optimized locking is disabled.
Copy file name to clipboardExpand all lines: docs/relational-databases/polybase/polybase-guide.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: PolyBase enables your SQL Server instance to process Transact-SQL q
4
4
author: MikeRayMSFT
5
5
ms.author: mikeray
6
6
ms.reviewer: hudequei, randolphwest
7
-
ms.date: 04/29/2025
7
+
ms.date: 07/08/2025
8
8
ms.service: sql
9
9
ms.subservice: polybase
10
10
ms.topic: "overview"
@@ -55,7 +55,7 @@ PolyBase provides these same functionalities for the following SQL products from
55
55
| --- | --- |
56
56
| Native support for CSV, Parquet, & Delta <sup>1</sup> | PolyBase Query Service for External Data installation is no longer required to use OPENROWSET, CREATE EXTERNAL TABLE, or CREATE EXTERNAL TABLE AS SELECT with the following types of external data: Parquet, Delta, Azure Blob Storage (ABS), Azure Data Lake Storage (ADLS), or S3-Compatible Object storage. |
57
57
| Use generic ODBC data sources on Linux | For more information, see [Configure PolyBase to access external data with ODBC generic types](polybase-configure-odbc-generic.md). |
58
-
|TDS 8.0 Support|When using [Microsoft ODBC Driver 18 for SQL Server driver](/sql/connect/odbc/windows/features-of-the-microsoft-odbc-driver-for-sql-server-on-windows).<br /><br /> TDS 8.0 is not supported for sqlserver as [external data source](/sql/t-sql/statements/create-external-data-source-transact-sql).|
58
+
|TDS 8.0 support |When using [Microsoft ODBC Driver 18 for SQL Server](../../connect/odbc/windows/features-of-the-microsoft-odbc-driver-for-sql-server-on-windows.md), TDS 8.0 isn't supported for [!INCLUDE [ssnoversion-md](../../includes/ssnoversion-md.md)]as an [external data source](../../t-sql/statements/create-external-data-source-transact-sql.md). |
59
59
60
60
<sup>1</sup> On [!INCLUDE [sssql25-md](../../includes/sssql25-md.md)], PolyBase Query Service for External Data is still required to connect with other databases. For example: SQL Server, Oracle, DB2, Teradata, MongoDB, or ODBC.
61
61
@@ -69,7 +69,7 @@ PolyBase provides these same functionalities for the following SQL products from
69
69
| Delta table format | PolyBase is now capable of querying (read-only) data from Delta Table format stored on S3-compatible object storage, Azure Storage Account V2, and Azure Data Lake Storage Gen2. For more information, see to [Virtualize delta table with PolyBase](virtualize-delta.md)|
70
70
| Create External Table as Select (CETAS) | PolyBase can now use CETAS to create an external table and then export, in parallel, the result of a [!INCLUDE [tsql](../../includes/tsql-md.md)] SELECT statement to Azure Data Lake Storage Gen2, Azure Storage Account V2, and S3-compatible object storage. For more information, see [CREATE EXTERNAL TABLE AS SELECT (CETAS)](../../t-sql/statements/create-external-table-as-select-transact-sql.md). |
71
71
72
-
For more new features of [!INCLUDE [sssql22-md](../../includes/sssql22-md.md)], see [What's new in SQL Server 2022?](../../sql-server/what-s-new-in-sql-server-2022.md)
72
+
For more new features of [!INCLUDE [sssql22-md](../../includes/sssql22-md.md)], see [What's new in SQL Server 2022](../../sql-server/what-s-new-in-sql-server-2022.md).
73
73
74
74
> [!TIP]
75
75
> For a tutorial of PolyBase features and capabilities in [!INCLUDE [sssql22-md](../../includes/sssql22-md.md)], see [Get started with PolyBase in SQL Server 2022](polybase-get-started.md).
Copy file name to clipboardExpand all lines: docs/relational-databases/security/authentication-access/azure-ad-authentication-sql-server-setup-tutorial.md
Copy file name to clipboardExpand all lines: docs/relational-databases/security/encryption/sql-server-connector-maintenance-troubleshooting.md
+9Lines changed: 9 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,6 +46,15 @@ Versions 1.0.0.440 and older have been replaced and are no longer supported in p
46
46
1. Start SQL Server service.
47
47
1. Test encrypted databases are accessible.
48
48
49
+
If your database is in a `RECOVERY PENDING` state, you need to run an `ALTER` command on the cryptographic provider. Replace *AzureKeyVault_EKM* with the name of your actual cryptographic provider, which you can find in the [sys.cryptographic_providers](../../../relational-databases/system-catalog-views/sys-cryptographic-providers-transact-sql.md) system view.
50
+
51
+
```sql
52
+
ALTER CRYPTOGRAPHIC PROVIDER AzureKeyVault_EKM DISABLE;
53
+
ALTER CRYPTOGRAPHIC PROVIDER AzureKeyVault_EKM FROM FILE ='C:\Program Files\SQL Server Connector for Microsoft Azure Key Vault\Microsoft.AzureKeyVaultService.EKM.dll';
54
+
ALTER CRYPTOGRAPHIC PROVIDER AzureKeyVault_EKM ENABLE;
55
+
```
56
+
Restart the SQL Server service after modifying the cryptographic provider.
57
+
49
58
### Rollback
50
59
51
60
1. Stop SQL Server service using **SQL Server Configuration Manager**.
Copy file name to clipboardExpand all lines: docs/relational-databases/security/encryption/sql-server-connector-registry-modification.md
+33-19Lines changed: 33 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: This article describes enabling errors and logging for SQL Server C
4
4
author: VanMSFT
5
5
ms.author: vanto
6
6
ms.reviewer: vanto
7
-
ms.date: 08/23/2021
7
+
ms.date: 07/08/2025
8
8
ms.service: sql
9
9
ms.subservice: security
10
10
ms.topic: how-to
@@ -27,44 +27,58 @@ Use the [Azure Key Vault forum](https://social.msdn.microsoft.com/Forums/AzureKe
27
27
28
28
## Upgrade SQL Server Connector to the latest version
29
29
30
-
To upgrade the SQL Server Connector (Version: 1.0.5.0 with a Date Published: September 2020) to the latest version DLL Crypto provider, follow these steps.
30
+
To upgrade the SQL Server Connector (Version: 1.0.5.0 with a Date Published: January 2025) to the latest version DLL Crypto provider, follow these steps.
31
31
32
32
### Upgrade
33
33
34
-
1. Stop SQL Server service using SQL Server Configuration Manager
35
-
1. Uninstall the old version using **Control Panel\Programs\Programs and Features**
34
+
1. Stop SQL Server service using **SQL Server Configuration Manager**.
35
+
1. Uninstall the old version using **Control Panel** > **Programs** > **Programs and Features**.
36
36
1. Application name: SQL Server Connector for Microsoft Azure Key Vault
1. Install (upgrade) new SQL Server Connector for Microsoft Azure Key Vault
40
-
1. Version: 15.0.2000.440 (or latest version)
41
-
1. DLL file date: 09/11/2020 5:17 AM (or later)
42
-
1. Start SQL Server service
43
-
1. Test encrypted DB(s) is/are accessible
37
+
1. Version: 15.0.300.96 (or older)
38
+
1. DLL file date: January 30 2018 (or older)
39
+
1. Install (upgrade) new SQL Server Connector for Microsoft Azure Key Vault.
40
+
1. Version: 15.0.2000.440
41
+
1. DLL file date: November 9 2024
42
+
1. Start SQL Server service.
43
+
1. Test encrypted databases are accessible.
44
+
45
+
If your database is in a `RECOVERY PENDING` state, you need to run an `ALTER` command on the cryptographic provider. Replace *AzureKeyVault_EKM* with the name of your actual cryptographic provider, which you can find in the [sys.cryptographic_providers](../../../relational-databases/system-catalog-views/sys-cryptographic-providers-transact-sql.md) system view.
46
+
47
+
```sql
48
+
ALTER CRYPTOGRAPHIC PROVIDER AzureKeyVault_EKM DISABLE;
49
+
ALTER CRYPTOGRAPHIC PROVIDER AzureKeyVault_EKM FROM FILE ='C:\Program Files\SQL Server Connector for Microsoft Azure Key Vault\Microsoft.AzureKeyVaultService.EKM.dll';
50
+
ALTER CRYPTOGRAPHIC PROVIDER AzureKeyVault_EKM ENABLE;
51
+
```
52
+
Restart the SQL Server service after modifying the cryptographic provider.
44
53
45
54
### Rollback
46
55
47
-
1. Stop SQL Server service using SQL Server Configuration Manager
48
-
1. Uninstall the new version using **Control Panel\Programs\Programs and Features**
56
+
1. Stop SQL Server service using **SQL Server Configuration Manager**.
57
+
1. Uninstall the new version using **Control Panel** > **Programs** > **Programs and Features**.
49
58
1. Application name: SQL Server Connector for Microsoft Azure Key Vault
50
59
1. Version: 15.0.2000.440
51
-
1. DLL file date: 09/11/2020 5:17 AM
52
-
1. Install old version of SQL Server Connector for Microsoft Azure Key Vault
60
+
1. DLL file date: November 9 2024
61
+
62
+
1. Install old version of SQL Server Connector for Microsoft Azure Key Vault.
53
63
1. Version: 15.0.300.96
54
-
1. DLL file date: 01/30/2018 3:00 PM
55
-
1. Start SQL Server service
56
-
1. Test encrypted DB(s) is/are accessible
64
+
1. DLL file date: January 30 2018
65
+
1. Start SQL Server service.
66
+
1. Check that the databases using TDE are accessible.
67
+
68
+
1. After validating that the update works, you can delete the old [!INCLUDE [ssNoVersion](../../../includes/ssnoversion-md.md)]**Connector** folder (if you chose to rename it instead of uninstalling in Step 3).
57
69
58
70
> [!NOTE]
59
71
> - SQL Server Connector versions 1.0.0.440 and older have been replaced and are no longer supported in production environments. For more information on troubleshooting SQL Server Connector issues, see [SQL Server Connector Maintenance & Troubleshooting](../../../relational-databases/security/encryption/sql-server-connector-maintenance-troubleshooting.md).
60
72
> - Starting with version 1.0.3.0, the SQL Server Connector reports relevant error messages to the Windows event logs for troubleshooting.
61
73
> - Starting with [1.0.4.0: (version 13.0.811.168)](https://download.microsoft.com/download/8/0/9/809494f2-bac9-4388-ad07-7eaf9745d77b/SQL%20Server%20Connector%20for%20Microsoft%20Azure%20Key%20Vault%201.0.4.0.msi), there is support for private Azure clouds, including Azure operated by 21Vianet, Azure Germany, and Azure Government.
62
74
> - There is a breaking change in version 1.0.5.0 in terms of the thumbprint algorithm. You may experience database restore failures after upgrading to 1.0.5.0. For more information, see [Error 33111 when restoring backups from older versions of SQL Server Connector for Microsoft Azure Key Vault](/troubleshoot/sql/database-engine/backup-restore/error-33111-restore-issues-sql-connector).
63
-
> -**Starting with version [1.0.5.0 (with a file date of September 2020)](https://www.microsoft.com/en-us/download/details.aspx?id=45344), the SQL Server Connector supports filtering messages and network request retry logic.**
75
+
> - Starting with version [1.0.5.0 (with a file date of September 2020)](https://www.microsoft.com/en-us/download/details.aspx?id=45344), the SQL Server Connector supports filtering messages and network request retry logic.
76
+
> - Starting with version [1.0.5.0 (with a file date of November 2024)](https://www.microsoft.com/en-us/download/details.aspx?id=45344) and SQL Server 2022 CU17 and later versions., the SQL Server Connector supports authentication with Azure Key Vault using managed identity for SQL Server on Azure Virtual Machines.
64
77
> -*The old version of the SQL Server Connector is also version: [1.0.5.0 (version 15.0.300.96) – File date January 2018](https://download.microsoft.com/download/8/0/9/809494f2-bac9-4388-ad07-7eaf9745d77b/1033_15.0.2000.367/SQLServerConnectorforMicrosoftAzureKeyVault.msi)*. Upgrade to the newest SQL Server Connector if you experience any issues.
65
78
66
79
**System Requirements** - Supported SQL Server versions:
67
80
81
+
- SQL Server 2022 RTM Enterprise or Standard 64-bit
68
82
- SQL Server 2019 RTM Enterprise or Standard 64-bit
0 commit comments