forked from Huachao/azure-content
-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #18655 from MikeRayMSFT/ProvisioningSQL
virtual machines sql server provisioning doc and images.
- Loading branch information
Showing
28 changed files
with
532 additions
and
110 deletions.
There are no files selected for viewing
Binary file added
BIN
+5.11 KB
...achines-sql-server-connectivity-resource-manager/sql-vm-portal-connectivity.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+25 KB
.../virtual-machines-sql-server-provision-resource-manager/azure-compute-blade.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+45.2 KB
...es-sql-server-provision-resource-manager/azure-compute-sql-deployment-model.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+205 KB
...rtual-machines-sql-server-provision-resource-manager/azure-portal-dashboard.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+16.9 KB
...ia/virtual-machines-sql-server-provision-resource-manager/azure-sql-arm-akv.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+4.33 KB
...machines-sql-server-provision-resource-manager/azure-sql-arm-authentication.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+13.3 KB
...ual-machines-sql-server-provision-resource-manager/azure-sql-arm-autobackup.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+30.1 KB
.../virtual-machines-sql-server-provision-resource-manager/azure-sql-arm-basic.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+4.24 KB
...chines-sql-server-provision-resource-manager/azure-sql-arm-connectivity-alt.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+3.19 KB
...l-machines-sql-server-provision-resource-manager/azure-sql-arm-connectivity.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+13.4 KB
...rtual-machines-sql-server-provision-resource-manager/azure-sql-arm-patching.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added
BIN
+16.5 KB
...irtual-machines-sql-server-provision-resource-manager/azure-sql-arm-storage.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
101 changes: 101 additions & 0 deletions
101
...s/virtual-machines/virtual-machines-sql-server-connectivity-resource-manager.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,101 @@ | ||
<properties | ||
pageTitle="Connect to a SQL Server Virtual Machine (Resource Manager) | Microsoft Azure" | ||
description="This topic uses resources created with the classic deployment model, and describes how to connect to SQL Server running on a Virtual Machine in Azure. The scenarios differ depending on the networking configuration and the location of the client." | ||
services="virtual-machines" | ||
documentationCenter="na" | ||
authors="rothja" | ||
manager="jeffreyg" | ||
editor="monicar" | ||
tags="azure-service-management"/> | ||
<tags | ||
ms.service="virtual-machines" | ||
ms.devlang="na" | ||
ms.topic="article" | ||
ms.tgt_pltfrm="vm-windows-sql-server" | ||
ms.workload="infrastructure-services" | ||
ms.date="12/18/2015" | ||
ms.author="jroth" /> | ||
|
||
# Connect to a SQL Server Virtual Machine on Azure (Resource Manager) | ||
|
||
> [AZURE.SELECTOR] | ||
- [Resource Manager](virtual-machines-sql-server-connectivity-resource-manager.md) | ||
- [Classic](virtual-machines-sql-server-connectivity.md) | ||
|
||
## Overview | ||
|
||
Configuring connectivity to SQL Server running on an Azure Virtual Machine in Resource Manager does not differ dramatically from the steps required for an on-premises SQL Server instance. You still have to work with configuration steps involving the firewall, authentication, and database logins. | ||
|
||
But there are some SQL Server connectivity aspects that are specific to Azure VMs. This article covers some [general connectivity scenarios](#connection-scenarios) and then provides [detailed steps for configuring SQL Server connectivity in an Azure VM](#steps-for-manually-configuring-sql-server-connectivity-in-an-azure-vm). | ||
|
||
This article focuses on connectivity. For a full walk-through of both provisioning and connectivity, see [Provisioning a SQL Server Virtual Machine on Azure](virtual-machines-provision-sql-server.md). | ||
|
||
[AZURE.INCLUDE [learn-about-deployment-models](../../includes/learn-about-deployment-models-rm-include.md)] classic deployment model. | ||
|
||
## Connection scenarios | ||
|
||
The way a client connects to SQL Server running on a Virtual Machine differs depending on the location of the client and the machine/networking configuration. These scenarios include: | ||
|
||
- [Connect to SQL Server over the internet](#connect-to-sql-server-over-the-internet) | ||
- [Connect to SQL Server in the same virtual network](#connect-to-sql-server-in-the-same-virtual-network) | ||
|
||
### Connect to SQL Server over the Internet | ||
|
||
If you want to connect to your SQL Server database engine from the Internet, there are several steps required, such as configuring the firewall, enabling SQL Authentication, and configuring your network security group you must have a Network Security Group rule to allow TCP traffic on port 1433. | ||
|
||
If you use the portal to provision a SQL Server virtual machine image with the resource manager, these steps are done for you when you select **Public** for the SQL connectivity option: | ||
|
||
![](./media/virtual-machines-sql-server-connectivity-resource-manager/sql-vm-portal-connectivity.png) | ||
|
||
If this was not one during provisioning, then you can manually configure SQL Server and your virtual machines by following the [steps in this article to manually configure connectivity](#steps-for-manually-configuring-sql-server-connectivity-in-an-azure-vm). | ||
|
||
Once this is done, any client with internet access can connect to the SQL Server instance by specifying either the public IP address of the virtual machine or the DNS label assigned to that IP address. If the SQL Server port is 1433, you do not need to specify it in the connection string. | ||
|
||
"Server=sqlvmlabel.eastus.cloudapp.azure.com;Integrated Security=false;User ID=<login_name>;Password=<your_password>" | ||
|
||
Although this enables connectivity for clients over the internet, this does not imply that anyone can connect to your SQL Server. Outside clients have to the correct username and password. For additional security, you can avoid the well-known port 1433. For example, if you configured SQL Server to listen on port 1500 and established proper firewall and network security group rules, you could connect by appending the port number to the Server name as in the following example: | ||
|
||
"Server=sqlvmlabel.eastus.cloudapp.azure.com,1500;Integrated Security=false;User ID=<login_name>;Password=<your_password>" | ||
|
||
>[AZURE.NOTE] It is important to note that when you use this technique to communicate with SQL Server, all data returned is considered outgoing traffic from the datacenter. It is subject to normal [pricing on outbound data transfers](http://azure.microsoft.com/pricing/details/data-transfers). This is true even if you use this technique from another machine or cloud service within the same Azure datacenter, because traffic still goes through Azure's public load balancer. | ||
### Connect to SQL Server in the same virtual network | ||
|
||
[Virtual Network](..\virtual-network\virtual-networks-overview.md) enables additional scenarios. You can connect VMs in the same virtual network, even if those VMs exist in different resource groups. And with a [site-to-site VPN](../vpn-gateway/vpn-gateway-site-to-site-create.md), you can create a hybrid architecture that connects VMs with on-premises networks and machines. | ||
|
||
Virtual networks also enables you to join your Azure VMs to a domain. This is the only way to use Windows Authentication to SQL Server. The other connection scenarios require SQL Authentication with user names and passwords. | ||
|
||
If you use the portal to provision a SQL Server virtual machine image with the resource manager, the proper firewall rules for communication on the virtual network are setup when you select **Private** for the SQL connectivity option. If this was not one during provisioning, then you can manually configure SQL Server and your virtual machines by following the [steps in this article to manually configure connectivity](#steps-for-manually-configuring-sql-server-connectivity-in-an-azure-vm). But if you are planning to configure a domain environment and Windows Authentication, you do not need to use the steps in this article to configure SQL Authentication and logins. You also do not need to configure Network Security Group rules for access over the internet. | ||
|
||
Assuming that you have configured DNS in your virtual network, you can connect to your SQL Server instance by specifying the SQL Server VM computer name in the connection string. The following example also assumes that Windows Authentication has also been configured and that the user has been granted access to the SQL Server instance. | ||
|
||
"Server=mysqlvm;Integrated Security=true" | ||
|
||
Note that in this scenario, you could also specify the IP address of the VM. | ||
|
||
## Steps for manually configuring SQL Server connectivity in an Azure VM | ||
|
||
The following steps demonstrate how to manually setup connectivity to the SQL Server instance and then optionally connect over the internet using SQL Server Management Studio (SSMS). Note that many of these steps are done for you when you select the appropriate SQL Server connectivity options in the portal. | ||
|
||
Before you can connect to the instance of SQL Server from another VM or the internet, you must complete the following tasks as described in the sections that follow: | ||
|
||
- [Open TCP ports in the Windows firewall](#open-tcp-ports-in-the-windows-firewall-for-the-default-instance-of-the-database-engine) | ||
- [Configure SQL Server to listen on the TCP protocol](#configure-sql-server-to-listen-on-the-tcp-protocol) | ||
- [Configure SQL Server for mixed mode authentication](#configure-sql-server-for-mixed-mode-authentication) | ||
- [Create SQL Server authentication logins](#create-sql-server-authentication-logins) | ||
- [Configure a DNS Label for the public IP address](#configure-a-dns-label-for-the-public-ip-address) | ||
- [Connect to the Database Engine from another computer](#connect-to-the-database-engine-from-another-computer) | ||
|
||
[AZURE.INCLUDE [Connect to SQL Server in a VM](../../includes/virtual-machines-sql-server-connection-steps.md)] | ||
|
||
[AZURE.INCLUDE [Connect to SQL Server in a VM Resource Manager](../../includes/virtual-machines-sql-server-connection-steps-resource-manager-nsg-rule.md)] | ||
|
||
[AZURE.INCLUDE [Connect to SQL Server in a VM Resource Manager](../../includes/virtual-machines-sql-server-connection-steps-resource-manager.md)] | ||
|
||
## Next Steps | ||
|
||
To see provisioning instructions along with these connectivity steps, see [Provisioning a SQL Server Virtual Machine on Azure](virtual-machines-provision-sql-server.md). | ||
|
||
It is important to review all of the security best practices for SQL Server running on an Azure virtual machine. For more information, see [Security Considerations for SQL Server in Azure Virtual Machines](virtual-machines-sql-server-security-considerations.md). | ||
|
||
For other topics related to running SQL Server in Azure VMs, see [SQL Server on Azure Virtual Machines](virtual-machines-sql-server-infrastructure-services.md). |
Oops, something went wrong.