- You
cannot restart Azure SQL database.
- You
cannot see the database files.
- You
cannot shrink the database log files.
- You
cannot backup the Azure SQL database manually. The only option is to Export
the Azure SQL Database as a bacpac file.
- You
cannot use Windows Authenticated users directly first need to synchronize AD with Microsoft Entra ID.
- You
can use Transactional Replication , Data Migration Service , bacpac file ,
BCP to migrate SQL Server on-prem database to Azure SQL Database.
- You
cannot create linked service directly between two Azure SQL
Databases. You need to use either Azure Data Factory or Azure Synapse
Pipelines.
- You
can use built-in performance tuning features in Azure SQL Databases
which are not available in on-prem SQL Server.
- You
can easily identify and apply missing indexes in Azure SQL Databases which
is not so direct in on-prem SQL Server.
- Microsoft
Copilot in Azure is now integrated with Azure SQL Database. Currently it's
in preview but in few days you can simply say like "My database is
slow" and it will give details like why it is slow and what are the
fixes.
- In
few days you may need not write any queries for details... you can simply
give prompts like " Are there any deadlocks in the database? " ,
" who are currently actively connected to the database? " and so
on. These features are currently can be tested using copilot which is in
preview.
- You
cannot use Azure Data Studio beyond Feb 2026. Visual Studio Code is the
next stop.
- Database
Watcher is going to be one stop in-depth monitoring solution for Azure SQL
Database and Azure SQL Managed Instance.
- You
need to use the feature Failover Groups if you want to manage the
replication and failover of Azure SQL database(s) from one region to
another Azure region.
- You
do not have control over Azure SQL Database maintenances but you can
configure notifications so that you will get notified about the
maintenance events of your Azure SQL Database.
- As
of now each new Azure subscription includes 10 serverless databases. Each
database comes with a complimentary allocation of 100,000 vCore seconds of
compute, 32 GB of data storage, and 32 GB of backup storage every month,
for the lifetime of your subscription.
Hi, I am Vinay. I am a Certified Azure Architect and I am experience in Azure Architecting, Database Architecting, Cloud migrations, DBA by profession for more than a decade. This blog I use for sharing the new things I learn and the day-to-day issues I face. I also share other technical topics which I find useful to the readers. I invite you to follow me on LinkedIn, Twitter and this blog.
Monday, July 14, 2025
16 Azure SQL Database Critical Concepts You Must Know Before Deployment
Monday, July 7, 2025
How to create firewall rules for Azure SQL Database?
After
creation of Azure database server and the Azure SQL database as discussed in
previous articles the next steps are 1) add firewall rules to the database and
2) allow the permission for other azure resources to access the database.
In
on-prem we have windows firewall which comes into play while accessing the SQL
Server within a windows server, we need to open firewall at server level for
the required servers and ports. Similarly in Azure DB PaaS we have firewall
rules that need to be setup at the Azure database server level which will then
allow access to the databases within that Azure database server from the
required VMs and IPs. We will see how to do that here
To
begin with search for " sql database " in azure portal and click
on " SQL databases "
when
we go to the database page we can see on the left side “Query editor (preview)”
Once
we click on it on right side there is provision to enter “ Login ” and “
Password ”, lets enter the “sqladmin” login credentials we created during azure
database server creation and click “ OK ”
We
will see errors like below for both SQL Server authentication and Microsoft
Entra Authentication :
Reason: An instance-specific error
occurred while establishing a connection to SQL Server. Connection was denied
since Deny Public Network Access is set to Yes
(https://docs.microsoft.com/azure/azure-sql/database/connectivity-settings#deny-public-network-access).
To connect to this server, use the Private Endpoint from inside your virtual
network (https://docs.microsoft.com/azure/sql-database/sql-database-private-endpoint-overview#how-to-set-up-private-link-for-azure-sql-database).
Reason: An instance-specific error occurred while establishing a connection to SQL Server. Connection was denied since Deny Public Network Access is set to Yes (https://docs.microsoft.com/azure/azure-sql/database/connectivity-settings#deny-public-network-access). To connect to this server, use the Private Endpoint from inside your virtual network (https://docs.microsoft.com/azure/sql-database/sql-database-private-endpoint-overview#how-to-set-up-private-link-for-azure-sql-database).
This is happening because we haven’t allowed access
to the azure database server yet to any of the azure resources. To allow access
we need to go back to azure database server by clicking on “overview” we can go
back to database page first
In the overview page you click on the server name as
highlighted below
This will take to the database server page, in this
click on “ show network settings ” next to “ Networking ”
This will take us to the “ Networking ” page , in
this page under “ Public access ” check the “ Selected networks ”
Next scroll down and we can see a section “
Firewall rules ” , here we need to click on “ Add a firewall rule ” to add the
required firewall rules
Note: For the Azure SQL database to be accessible
from any VM or machine, that VM or machine’s IP address should be added as a
firewall rule. If not we will not be able to access the Azure SQL database from
the respective VMs.
We need to provide below information :
Rule name : name as per your
choice
Start IP and End IP : Here we need to enter IP ranges of the servers.
For example : Let’s say we have 20 application servers
from where we need to access Azure sql database. So, instead of creating a 20
different firewall rules we can use their IP address range.
In the above screenshot “Access from App Server” is
my firewall rule name, Start IP is 123.12.12.1 and End IP is 123.12.12.20. So,
this means all the machines between these to IP addresses *12.1 to *12.20 can
access the database.
As I’m testing this from my laptop I will add my
laptop IP to the firewall, to do that I will click on “ Add your client IPV4
address ”. after that click on “ Save ”
Now scroll down in the same page and check the “
Allow azure services and resources to access this server ” box
Now let’s go back to the “ query editor ” in
database page
Here enter the login as “ sqladmin ” and give the
password and click “ ok ”. Note : This we created in previous
article.
Now on right side the query editor will open. We
can type required queries and click “ Run ” to execute the queries. Here I
executed a simple SQL query to check the sys.tables. As there is not data in
the database the result is empty.
To open a new query click on “ New Query”
In
the next article we will see how to create an Azure automation account which
requires to be created for performing any database automation's.
Thanks VV!!