Azure Arc enabled SQL Server (preview)
Azure Arc enabled SQL Server is part of the Azure Arc for servers. It extends Azure services to SQL Server instances hosted outside of Azure in the customer’s datacenter, on the edge or in a multi-cloud environment.
To enable Azure services, a running SQL Server instance must be registered with Azure Arc using the Azure portal and a registration script. After registration the instance will be represented on Azure as a SQL Server – Azure Arc resource . The properties of this resource reflect a subset of the SQL Server configuration settings.
The SQL Server can be installed in a virtual or physical machine running Windows or Linux that is connected to Azure Arc via the Connected Machine agent. The agent is installed and machine is and registered automatically as part of the SQL Server instance registration. The Connected Machine agent communicates outbound securely to Azure Arc over TCP port 443. If the machine connects through a firewall or a HTTP proxy server to communicate over the Internet, review the network configuration requirements for the Connected Machine agent.
The public preview of Azure Arc enabled SQL Server supports a set of solutions that require the Microsoft Monitoring Agent (MMA) server extension to be installed and connected to a Azure Log analytics workspace for data collection and reporting. These solutions include Advanced data security using Azure Security Center and Azure Sentinel, and SQL Environment health checks using On-demand SQL Assessment feature.
The following diagram illustrates the architecture of Azure Arc enable SQL Server.
Supported SQL versions and operating systems
Azure Arc enabled SQL Server supports SQL Server 2012 or higher running on one of the following versions of the Windows or Linux operating system:
- Windows Server 2012 R2 and higher
- Ubuntu 16.04 and 18.04 (x64)
- Red Hat Enterprise Linux (RHEL) 7 (x64)
- SUSE Linux Enterprise Server (SLES) 15 (x64)
To connect the SQL Server instances and the hosting to Azure Arc, you must have an account with privileges to perform the following actions:
For optimal security, we recommend creating a custom role in Azure that has the minimal permissions listed. For information on how to create a custom role in Azure with these permissions, see Custom roles overview. To add role assignment, see Add or remove role assignments using Azure portal or Add or remove role assignments using Azure RBAC and Azure CLI.
Azure subscription and service limits
Before configuring your SQL server instances and machines with Azure Arc, review the Azure Resource Manager subscription limits and resource group limits to plan for the number of machines to be connected.
Networking configuration and resource providers
Review networking configuration, transport layer security and resource providers required for Connected machine agent.
Supported Azure regions
The public preview is available in the following regions:
- East US
- East US 2
- West US 2
- Australia East
- Southeast Asia
- North Europe
- West Europe
- UK South