diff --git a/azps-12.5.0/Az.Sql/Get-AzSqlDatabaseLongTermRetentionBackup.md b/azps-12.5.0/Az.Sql/Get-AzSqlDatabaseLongTermRetentionBackup.md index 0052384e7e..e3c651b7c8 100644 --- a/azps-12.5.0/Az.Sql/Get-AzSqlDatabaseLongTermRetentionBackup.md +++ b/azps-12.5.0/Az.Sql/Get-AzSqlDatabaseLongTermRetentionBackup.md @@ -71,24 +71,24 @@ Get-AzSqlDatabaseLongTermRetentionBackup -Location northeurope ```output BackupExpirationTime : 3/22/2018 5:50:55 AM -BackupName : 601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000 +BackupName : b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000 BackupTime : 3/15/2018 5:50:55 AM DatabaseName : database01 DatabaseDeletionTime : Location : northeurope -ResourceId : /subscriptions/371edd6d-9630-4558-a7bd-ee139498e6a1/resourceGroups/resourcegroup01/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server01/longTermRetentionDatabases/database01/longTermRetentionBackups/601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000 +ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/resourcegroup01/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server01/longTermRetentionDatabases/database01/longTermRetentionBackups/b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000 ServerName : server01 ServerCreateTime : 2/29/2018 12:12:19 AM ResourceGroupName : BackupStorageRedundancy : Geo BackupExpirationTime : 3/22/2018 11:43:18 PM -BackupName : 55970792-164c-4a4a-88e5-7158d092d503;131656309980000000 +BackupName : c2c2c2c2-dddd-eeee-ffff-a3a3a3a3a3a3;131656309980000000 BackupTime : 3/15/2018 11:43:18 PM DatabaseName : database02 DatabaseDeletionTime : 3/18/2018 4:36:00 PM Location : northeurope -ResourceId : /subscriptions/371edd6d-9630-4558-a7bd-ee139498e6a1/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server02/longTermRetentionDatabases/database02/longTermRetentionBackups/55970792-164c-4a4a-88e5-7158d092d503;131656309980000000 +ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server02/longTermRetentionDatabases/database02/longTermRetentionBackups/c2c2c2c2-dddd-eeee-ffff-a3a3a3a3a3a3;131656309980000000 ServerName : server02 ServerCreateTime : 2/28/2018 12:12:19 AM ResourceGroupName : @@ -104,12 +104,12 @@ Get-AzSqlDatabaseLongTermRetentionBackup -Location northeurope -ResourceGroupNam ```output BackupExpirationTime : 3/22/2018 5:50:55 AM -BackupName : 601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000 +BackupName : b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000 BackupTime : 3/15/2018 5:50:55 AM DatabaseName : database01 DatabaseDeletionTime : Location : northeurope -ResourceId : /subscriptions/371edd6d-9630-4558-a7bd-ee139498e6a1/resourceGroups/resourcegroup01/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server01/longTermRetentionDatabases/database01/longTermRetentionBackups/601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000 +ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/resourcegroup01/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server01/longTermRetentionDatabases/database01/longTermRetentionBackups/b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000 ServerName : server01 ServerCreateTime : 2/29/2018 12:12:19 AM ResourceGroupName : resourceGroup01 @@ -120,24 +120,24 @@ This command gets all long term retention backups for all databases (which may b ### Example 3: Get a specific long term retention backup ```powershell -Get-AzSqlDatabaseLongTermRetentionBackup -Location northeurope -ServerName server01 -DatabaseName database01 -BackupName "601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000" +Get-AzSqlDatabaseLongTermRetentionBackup -Location northeurope -ServerName server01 -DatabaseName database01 -BackupName "b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000" ``` ```output BackupExpirationTime : 3/22/2018 5:50:55 AM -BackupName : 601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000 +BackupName : b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000 BackupTime : 3/15/2018 5:50:55 AM DatabaseName : database01 DatabaseDeletionTime : Location : northeurope -ResourceId : /subscriptions/371edd6d-9630-4558-a7bd-ee139498e6a1/resourceGroups/resourcegroup01/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server01/longTermRetentionDatabases/database01/longTermRetentionBackups/601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000 +ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/resourcegroup01/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server01/longTermRetentionDatabases/database01/longTermRetentionBackups/b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000 ServerName : server01 ServerCreateTime : 2/29/2018 12:12:19 AM ResourceGroupName : BackupStorageRedundancy : Geo ``` -This command gets the backup with name 601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000 +This command gets the backup with name b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000 ### Example 4: Get all long term retention backups for a database ```powershell @@ -146,12 +146,12 @@ Get-AzSqlDatabase -ResourceGroupName resourcegroup01 -ServerName server01 -Datab ```output BackupExpirationTime : 3/22/2018 5:50:55 AM -BackupName : 601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000 +BackupName : b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000 BackupTime : 3/15/2018 5:50:55 AM DatabaseName : database01 DatabaseDeletionTime : Location : northeurope -ResourceId : /subscriptions/371edd6d-9630-4558-a7bd-ee139498e6a1/resourceGroups/resourcegroup01/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server01/longTermRetentionDatabases/database01/longTermRetentionBackups/601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000 +ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/resourcegroup01/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server01/longTermRetentionDatabases/database01/longTermRetentionBackups/b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000 ServerName : server01 ServerCreateTime : 2/29/2018 12:12:19 AM ResourceGroupName : @@ -167,24 +167,24 @@ Get-AzSqlDatabaseLongTermRetentionBackup -Location northeurope -ServerName serve ```output BackupExpirationTime : 3/22/2018 11:43:18 PM -BackupName : 601061b7-164c-4a4a-88e5-7158d092d503;131656309980000000 +BackupName : d3d3d3d3-eeee-ffff-aaaa-b4b4b4b4b4b4;131656309980000000 BackupTime : 3/15/2018 11:43:18 PM DatabaseName : database02 DatabaseDeletionTime : 3/18/2018 4:36:00 PM Location : northeurope -ResourceId : /subscriptions/371edd6d-9630-4558-a7bd-ee139498e6a1/resourceGroups/resourcegroup01/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server01/longTermRetentionDatabases/database02/longTermRetentionBackups/601061b7-164c-4a4a-88e5-7158d092d503;131656309980000000 +ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/resourcegroup01/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server01/longTermRetentionDatabases/database02/longTermRetentionBackups/d3d3d3d3-eeee-ffff-aaaa-b4b4b4b4b4b4;131656309980000000 ServerName : server01 ServerCreateTime : 2/28/2018 12:12:19 AM ResourceGroupName : BackupStorageRedundancy : Geo BackupExpirationTime : 3/22/2018 5:50:55 AM -BackupName : 601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000 +BackupName : b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000 BackupTime : 3/15/2018 5:50:55 AM DatabaseName : database01 DatabaseDeletionTime : Location : northeurope -ResourceId : /subscriptions/371edd6d-9630-4558-a7bd-ee139498e6a1/resourceGroups/resourcegroup01/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server01/longTermRetentionDatabases/database01/longTermRetentionBackups/601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000 +ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/resourcegroup01/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server01/longTermRetentionDatabases/database01/longTermRetentionBackups/b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000 ServerName : server01 ServerCreateTime : 2/29/2018 12:12:19 AM ResourceGroupName : @@ -418,4 +418,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Set-AzSqlDatabaseBackupLongTermRetentionPolicy](./Set-AzSqlDatabaseBackupLongTermRetentionPolicy.md) -[SQL Database Documentation](https://learn.microsoft.com/azure/sql-database/) \ No newline at end of file +[SQL Database Documentation](https://learn.microsoft.com/azure/sql-database/) diff --git a/azps-12.5.0/Az.Sql/Get-AzSqlInstance.md b/azps-12.5.0/Az.Sql/Get-AzSqlInstance.md index a6c2265ef3..3421c95225 100644 --- a/azps-12.5.0/Az.Sql/Get-AzSqlInstance.md +++ b/azps-12.5.0/Az.Sql/Get-AzSqlInstance.md @@ -385,14 +385,14 @@ AdministratorType : ActiveDirectory PrincipalType : Group Login : Dummy Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 +TenantId : aaaabbbb-0000-cccc-1111-dddd2222eeee AzureADOnlyAuthentication : True AdministratorType : ActiveDirectory PrincipalType : Group Login : Dummy2 Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 +TenantId : aaaabbbb-0000-cccc-1111-dddd2222eeee AzureADOnlyAuthentication : True ``` @@ -428,7 +428,7 @@ AdministratorType : ActiveDirectory PrincipalType : Group Login : Dummy Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 +TenantId : aaaabbbb-0000-cccc-1111-dddd2222eeee AzureADOnlyAuthentication : True ``` diff --git a/azps-12.5.0/Az.Sql/Get-AzSqlInstanceDatabaseLongTermRetentionBackup.md b/azps-12.5.0/Az.Sql/Get-AzSqlInstanceDatabaseLongTermRetentionBackup.md index 2ca16c617f..032033745f 100644 --- a/azps-12.5.0/Az.Sql/Get-AzSqlInstanceDatabaseLongTermRetentionBackup.md +++ b/azps-12.5.0/Az.Sql/Get-AzSqlInstanceDatabaseLongTermRetentionBackup.md @@ -78,7 +78,7 @@ BackupTime : 2/22/2020 6:04:15 AM DatabaseName : test DatabaseDeletionTime : 2/24/2020 2:56:44 PM Location : southeastasia -ResourceId : /subscriptions/f46521f3-5bb0-4eea-a3c2-c2d5987df96b/resourceGroups/testResourceGroup/providers/Microsoft.Sql/locations/southeastasia/longTermRetentionManaged +ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/testResourceGroup/providers/Microsoft.Sql/locations/southeastasia/longTermRetentionManaged Instances/testInstance/longTermRetentionDatabases/test/longTermRetentionManagedInstanceBackups/15be823c-7e2c-49d8-819f-a3fdcad92215;132268250550000000 ManagedInstanceName : testInstance InstanceCreateTime : 10/17/2019 4:52:10 PM @@ -296,4 +296,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Set-AzSqlInstanceDatabaseBackupLongTermRetentionPolicy](./Set-AzSqlInstanceDatabaseBackupLongTermRetentionPolicy.md) -[SQL Database Documentation](https://learn.microsoft.com/azure/sql-database/) \ No newline at end of file +[SQL Database Documentation](https://learn.microsoft.com/azure/sql-database/) diff --git a/azps-12.5.0/Az.Sql/Get-AzSqlServer.md b/azps-12.5.0/Az.Sql/Get-AzSqlServer.md index 806bae84b4..19be363e6a 100644 --- a/azps-12.5.0/Az.Sql/Get-AzSqlServer.md +++ b/azps-12.5.0/Az.Sql/Get-AzSqlServer.md @@ -174,14 +174,14 @@ AdministratorType : ActiveDirectory PrincipalType : Group Login : Dummy Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 +TenantId : aaaabbbb-0000-cccc-1111-dddd2222eeee AzureADOnlyAuthentication : True AdministratorType : ActiveDirectory PrincipalType : Group Login : Dummy2 Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 +TenantId : aaaabbbb-0000-cccc-1111-dddd2222eeee AzureADOnlyAuthentication : True ``` @@ -207,7 +207,7 @@ AdministratorType : ActiveDirectory PrincipalType : Group Login : Dummy Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 +TenantId : aaaabbbb-0000-cccc-1111-dddd2222eeee AzureADOnlyAuthentication : True ``` @@ -328,5 +328,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Set-AzSqlServer](./Set-AzSqlServer.md) [SQL Database Documentation](https://learn.microsoft.com/azure/sql-database/) - - diff --git a/azps-12.5.0/Az.Sql/New-AzSqlInstance.md b/azps-12.5.0/Az.Sql/New-AzSqlInstance.md index 939dad70f9..5c2304d81b 100644 --- a/azps-12.5.0/Az.Sql/New-AzSqlInstance.md +++ b/azps-12.5.0/Az.Sql/New-AzSqlInstance.md @@ -358,7 +358,7 @@ AdministratorType : ActiveDirectory PrincipalType : Group Login : DummyLogin Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 +TenantId : aaaabbbb-0000-cccc-1111-dddd2222eeee AzureADOnlyAuthentication : True ``` diff --git a/azps-12.5.0/Az.Sql/New-AzSqlServer.md b/azps-12.5.0/Az.Sql/New-AzSqlServer.md index e161983325..012aac1d35 100644 --- a/azps-12.5.0/Az.Sql/New-AzSqlServer.md +++ b/azps-12.5.0/Az.Sql/New-AzSqlServer.md @@ -76,7 +76,7 @@ AdministratorType : ActiveDirectory PrincipalType : Group Login : DummyLogin Sid : df7667b8-f9fd-4029-a0e3-b43c75ce9538 -TenantId : 00001111-aaaa-2222-bbbb-3333cccc4444 +TenantId : aaaabbbb-0000-cccc-1111-dddd2222eeee AzureADOnlyAuthentication : True ``` diff --git a/azps-12.5.0/Az.Sql/Remove-AzSqlDatabaseLongTermRetentionBackup.md b/azps-12.5.0/Az.Sql/Remove-AzSqlDatabaseLongTermRetentionBackup.md index c163a1a937..849291b269 100644 --- a/azps-12.5.0/Az.Sql/Remove-AzSqlDatabaseLongTermRetentionBackup.md +++ b/azps-12.5.0/Az.Sql/Remove-AzSqlDatabaseLongTermRetentionBackup.md @@ -40,41 +40,41 @@ The **Remove-AzSqlDatabaseLongTermRetentionBackup** cmdlet deletes the backup sp ### Example 1: Delete a single backup with resource group ```powershell -Remove-AzSqlDatabaseLongTermRetentionBackup -Location northeurope -ServerName server01 -DatabaseName database01 -BackupName "601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000" -ResourceGroupName resourcegroup01 +Remove-AzSqlDatabaseLongTermRetentionBackup -Location northeurope -ServerName server01 -DatabaseName database01 -BackupName "b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000" -ResourceGroupName resourcegroup01 ``` ```output BackupExpirationTime : 3/22/2018 5:50:55 AM -BackupName : 601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000 +BackupName : b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000 BackupTime : 3/15/2018 5:50:55 AM DatabaseName : database01 DatabaseDeletionTime : Location : northeurope -ResourceId : /subscriptions/371edd6d-9630-4558-a7bd-ee139498e6a1/resourceGroups/resourcegroup01/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server01/longTermRetentionDatabases/database01/longTermRetentionBackups/601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000 +ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/resourcegroup01/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server01/longTermRetentionDatabases/database01/longTermRetentionBackups/b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000 ServerName : server01 ServerCreateTime : 2/29/2018 12:12:19 AM ``` -Deletes the backup with name 601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000 +Deletes the backup with name b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000 ### Example 2: Delete a single backup without resource group ```powershell -Remove-AzSqlDatabaseLongTermRetentionBackup -Location northeurope -ServerName server02 -DatabaseName database02 -BackupName "55970792-164c-4a4a-88e5-7158d092d503;131656309980000000" +Remove-AzSqlDatabaseLongTermRetentionBackup -Location northeurope -ServerName server02 -DatabaseName database02 -BackupName "c2c2c2c2-dddd-eeee-ffff-a3a3a3a3a3a3;131656309980000000" ``` ```output BackupExpirationTime : 3/22/2018 11:43:18 PM -BackupName : 55970792-164c-4a4a-88e5-7158d092d503;131656309980000000 +BackupName : c2c2c2c2-dddd-eeee-ffff-a3a3a3a3a3a3;131656309980000000 BackupTime : 3/15/2018 11:43:18 PM DatabaseName : database02 DatabaseDeletionTime : 3/18/2018 4:36:00 PM Location : northeurope -ResourceId : /subscriptions/371edd6d-9630-4558-a7bd-ee139498e6a1/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server02/longTermRetentionDatabases/database02/longTermRetentionBackups/55970792-164c-4a4a-88e5-7158d092d503;131656309980000000 +ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server02/longTermRetentionDatabases/database02/longTermRetentionBackups/c2c2c2c2-dddd-eeee-ffff-a3a3a3a3a3a3;131656309980000000 ServerName : server02 ServerCreateTime : 2/28/2018 12:12:19 AM ``` -Deletes the backup with name 601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000 +Deletes the backup with name b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000 ### Example 3: Delete all backups for a location ```powershell @@ -83,22 +83,22 @@ Get-AzSqlDatabaseLongTermRetentionBackup -Location northeurope | Remove-AzSqlDat ```output BackupExpirationTime : 3/22/2018 5:50:55 AM -BackupName : 601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000 +BackupName : b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000 BackupTime : 3/15/2018 5:50:55 AM DatabaseName : database01 DatabaseDeletionTime : Location : northeurope -ResourceId : /subscriptions/371edd6d-9630-4558-a7bd-ee139498e6a1/resourceGroups/resourcegroup01/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server01/longTermRetentionDatabases/database01/longTermRetentionBackups/601061b7-d10b-46e0-bf77-a2bfb16a6add;131655666550000000 +ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/resourcegroup01/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server01/longTermRetentionDatabases/database01/longTermRetentionBackups/b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;131655666550000000 ServerName : server01 ServerCreateTime : 2/29/2018 12:12:19 AM BackupExpirationTime : 3/22/2018 11:43:18 PM -BackupName : 55970792-164c-4a4a-88e5-7158d092d503;131656309980000000 +BackupName : c2c2c2c2-dddd-eeee-ffff-a3a3a3a3a3a3;131656309980000000 BackupTime : 3/15/2018 11:43:18 PM DatabaseName : database02 DatabaseDeletionTime : 3/18/2018 4:36:00 PM Location : northeurope -ResourceId : /subscriptions/371edd6d-9630-4558-a7bd-ee139498e6a1/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server02/longTermRetentionDatabases/database02/longTermRetentionBackups/55970792-164c-4a4a-88e5-7158d092d503;131656309980000000 +ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/providers/Microsoft.Sql/locations/northeurope/longTermRetentionServers/server02/longTermRetentionDatabases/database02/longTermRetentionBackups/c2c2c2c2-dddd-eeee-ffff-a3a3a3a3a3a3;131656309980000000 ServerName : server02 ServerCreateTime : 2/28/2018 12:12:19 AM ``` @@ -313,4 +313,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Set-AzSqlDatabaseBackupLongTermRetentionPolicy](./Set-AzSqlDatabaseBackupLongTermRetentionPolicy.md) -[SQL Database Documentation](https://learn.microsoft.com/azure/sql-database/) \ No newline at end of file +[SQL Database Documentation](https://learn.microsoft.com/azure/sql-database/) diff --git a/azps-12.5.0/Az.Sql/Restore-AzSqlInstanceDatabase.md b/azps-12.5.0/Az.Sql/Restore-AzSqlInstanceDatabase.md index 6d5b45279b..478f8bac1a 100644 --- a/azps-12.5.0/Az.Sql/Restore-AzSqlInstanceDatabase.md +++ b/azps-12.5.0/Az.Sql/Restore-AzSqlInstanceDatabase.md @@ -185,7 +185,7 @@ The second command restores the fetched database, from the specified point-in-ti ### Example 6: Restore a database from LTR backup. ```powershell -Restore-AzSqlInstanceDatabase -FromLongTermRetentionBackup -ResourceId "/subscriptions/f46521f3-5bb0-4eea-a3c2-c2d5987df96b/resourceGroups/testResourceGroup/providers/Microsoft.Sql/locations/southeastasia/longTermRetentionManagedInstances/testInstance/longTermRetentionDatabases/test/longTermRetentionManagedInstanceBackups/15be823c-7e2c-49d8-819f-a3fdcad92215;132268250550000000" -TargetInstanceDatabaseName "restoreTarget" -TargetInstanceName "testInstance" -TargetResourceGroupName "testResourceGroup" +Restore-AzSqlInstanceDatabase -FromLongTermRetentionBackup -ResourceId "/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/testResourceGroup/providers/Microsoft.Sql/locations/southeastasia/longTermRetentionManagedInstances/testInstance/longTermRetentionDatabases/test/longTermRetentionManagedInstanceBackups/b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;132268250550000000" -TargetInstanceDatabaseName "restoreTarget" -TargetInstanceName "testInstance" -TargetResourceGroupName "testResourceGroup" ``` ```output @@ -209,7 +209,7 @@ ManagedInstanceName : testInstance Name : restoreTarget CreationDate : 3/4/2020 8:12:56 AM EarliestRestorePoint : 3/4/2020 8:14:29 AM -Id : /subscriptions/f46521f3-5bb0-4eea-a3c2-c2d5987df96b/resourceGroups/testResourceGroup/providers/Microsoft.Sql/managedInstances/testInstance/databases/restoreTarget +Id : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/testResourceGroup/providers/Microsoft.Sql/managedInstances/testInstance/databases/restoreTarget ``` Restores LTR backup with the given resource ID (which can be found by running Get-AzSqlInstanceDatabaseLongTermRetentionBackup). diff --git a/azps-12.5.0/Az.Sql/Set-AzSqlDatabaseAudit.md b/azps-12.5.0/Az.Sql/Set-AzSqlDatabaseAudit.md index 095b9d09e5..f3fcc4fb81 100644 --- a/azps-12.5.0/Az.Sql/Set-AzSqlDatabaseAudit.md +++ b/azps-12.5.0/Az.Sql/Set-AzSqlDatabaseAudit.md @@ -75,7 +75,7 @@ Set-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server0 ### Example 7: Enable the log analytics auditing policy of an Azure SQL Database ```powershell -Set-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" +Set-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" ``` ### Example 8: Disable the log analytics auditing policy of an Azure SQL Database @@ -90,12 +90,12 @@ Get-AzSqlDatabase -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -D ### Example 10: Disable sending audit records of an Azure SQL Database to blob storage, and enable sending them to log analytics. ```powershell -Set-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" -BlobStorageTargetState Disabled +Set-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" -BlobStorageTargetState Disabled ``` ### Example 11: Enable sending audit records of an Azure SQL Database to blob storage, event hub and log analytics. ```powershell -Set-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage" -EventHubTargetState Enabled -EventHubName "EventHubName" -EventHubAuthorizationRuleResourceId "EventHubAuthorizationRuleResourceId" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" +Set-AzSqlDatabaseAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DatabaseName "Database01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage" -EventHubTargetState Enabled -EventHubName "EventHubName" -EventHubAuthorizationRuleResourceId "EventHubAuthorizationRuleResourceId" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" ``` ## PARAMETERS @@ -398,7 +398,7 @@ Accept wildcard characters: False ``` ### -WorkspaceResourceId -The workspace ID (resource ID of a Log Analytics workspace) for a Log Analytics workspace to which you would like to send Audit Logs. Example: /subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2 +The workspace ID (resource ID of a Log Analytics workspace) for a Log Analytics workspace to which you would like to send Audit Logs. Example: /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2 ```yaml Type: System.String diff --git a/azps-12.5.0/Az.Sql/Set-AzSqlInstanceActiveDirectoryAdministrator.md b/azps-12.5.0/Az.Sql/Set-AzSqlInstanceActiveDirectoryAdministrator.md index b1b34f91f4..4bc4a01681 100644 --- a/azps-12.5.0/Az.Sql/Set-AzSqlInstanceActiveDirectoryAdministrator.md +++ b/azps-12.5.0/Az.Sql/Set-AzSqlInstanceActiveDirectoryAdministrator.md @@ -50,13 +50,13 @@ We recommend that you provision a dedicated Microsoft Entra group as an administ ### Example 1: Provision an administrator group for a managed instance associated with resource group ```powershell -Set-AzSqlInstanceActiveDirectoryAdministrator -ResourceGroupName "ResourceGroup01" -InstanceName "ManagedInstance01" -DisplayName "DBAs" -ObjectId "40b79501-b343-44ed-9ce7-da4c8cc7353b" +Set-AzSqlInstanceActiveDirectoryAdministrator -ResourceGroupName "ResourceGroup01" -InstanceName "ManagedInstance01" -DisplayName "DBAs" -ObjectId "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb" ``` ```output ResourceGroupName InstanceName DisplayName ObjectId ----------------- ----------------- ----------- -------- -ResourceGroup01 ManagedInstance01 DBAs 40b79501-b343-44ed-9ce7-da4c8cc7353b +ResourceGroup01 ManagedInstance01 DBAs aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb ``` This command provisions a Microsoft Entra administrator group named DBAs for the managed instance named ManagedInstance01. @@ -64,26 +64,26 @@ This server is associated with resource group ResourceGroup01. ### Example 2: Provision an administrator user using managed instance object ```powershell -Get-AzSqlInstance -ResourceGroupName "ResourceGroup01" -InstanceName "ManagedInstance01" | Set-AzSqlInstanceActiveDirectoryAdministrator -DisplayName "David Chew" -ObjectId "11E95548-B179-4FE1-9AF4-ACA49D13ABB9" +Get-AzSqlInstance -ResourceGroupName "ResourceGroup01" -InstanceName "ManagedInstance01" | Set-AzSqlInstanceActiveDirectoryAdministrator -DisplayName "David Chew" -ObjectId "bbbbbbbb-1111-2222-3333-cccccccccccc" ``` ```output ResourceGroupName InstanceName DisplayName ObjectId ----------------- ----------------- ----------- -------- -Resourcegroup01 ManagedInstance01 David Chew 11E95548-B179-4FE1-9AF4-ACA49D13ABB9 +Resourcegroup01 ManagedInstance01 David Chew bbbbbbbb-1111-2222-3333-cccccccccccc ``` This command provisions a Microsoft Entra user as an administrator from the managed instance object. ### Example 3: Provision an administrator using managed instance resource identifier ```powershell -Get-AzSqlInstance -ResourceId "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/ResourceGroup01/providers/Microsoft.Sql/managedInstances/ManagedInstance01" | Set-AzSqlInstanceActiveDirectoryAdministrator -DisplayName "David Chew" -ObjectId "11E95548-B179-4FE1-9AF4-ACA49D13ABB9" +Get-AzSqlInstance -ResourceId "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/ResourceGroup01/providers/Microsoft.Sql/managedInstances/ManagedInstance01" | Set-AzSqlInstanceActiveDirectoryAdministrator -DisplayName "David Chew" -ObjectId "bbbbbbbb-1111-2222-3333-cccccccccccc" ``` ```output ResourceGroupName InstanceName DisplayName ObjectId ----------------- ----------------- ----------- -------- -Resourcegroup01 ManagedInstance01 David Chew 11E95548-B179-4FE1-9AF4-ACA49D13ABB9 +Resourcegroup01 ManagedInstance01 David Chew bbbbbbbb-1111-2222-3333-cccccccccccc ``` This command provisions a Microsoft Entra user as an administrator using managed instance resource identifier. diff --git a/azps-12.5.0/Az.Sql/Set-AzSqlServerActiveDirectoryAdministrator.md b/azps-12.5.0/Az.Sql/Set-AzSqlServerActiveDirectoryAdministrator.md index 41e90fe395..4bb42b220d 100644 --- a/azps-12.5.0/Az.Sql/Set-AzSqlServerActiveDirectoryAdministrator.md +++ b/azps-12.5.0/Az.Sql/Set-AzSqlServerActiveDirectoryAdministrator.md @@ -43,7 +43,7 @@ Set-AzSqlServerActiveDirectoryAdministrator -ResourceGroupName "ResourceGroup01" ```output ResourceGroupName ServerName DisplayName ObjectId IsAzureADOnlyAuthentication ----------------- ---------- ----------- -------- --------------------------- -ResourceGroup01 Server01 DBAs 40b79501-b343-44ed-9ce7-da4c8cc7353b False +ResourceGroup01 Server01 DBAs aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb False ``` This command provisions a Microsoft Entra administrator group named DBAs for the server named Server01. @@ -64,13 +64,13 @@ This command provisions a Microsoft Entra user as an administrator for the serve ### Example 3: Provision an administrator group by specifying its ID ```powershell -Set-AzSqlServerActiveDirectoryAdministrator -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DisplayName "DBAs" -ObjectId "40b79501-b343-44ed-9ce7-da4c8cc7353b" +Set-AzSqlServerActiveDirectoryAdministrator -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -DisplayName "DBAs" -ObjectId "aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb" ``` ```output ResourceGroupName ServerName DisplayName ObjectId IsAzureADOnlyAuthentication ----------------- ---------- ----------- -------- -ResourceGroup01 Server01 DBAs 40b79501-b343-44ed-9ce7-da4c8cc7353b False +ResourceGroup01 Server01 DBAs aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb False ``` This command provisions a Microsoft Entra administrator group named DBAs for the server named Server01. diff --git a/azps-12.5.0/Az.Sql/Set-AzSqlServerAudit.md b/azps-12.5.0/Az.Sql/Set-AzSqlServerAudit.md index bab4d57123..e7c56285d0 100644 --- a/azps-12.5.0/Az.Sql/Set-AzSqlServerAudit.md +++ b/azps-12.5.0/Az.Sql/Set-AzSqlServerAudit.md @@ -75,7 +75,7 @@ Set-AzSqlServerAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" ### Example 7: Enable the log analytics auditing policy of an Azure SQL server ```powershell -Set-AzSqlServerAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" +Set-AzSqlServerAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" ``` ### Example 8: Disable the log analytics auditing policy of an Azure SQL server @@ -90,12 +90,12 @@ Get-AzSqlServer -ResourceGroupName "ResourceGroup01" -ServerName "Server01" | Se ### Example 10: Disable sending audit records of an Azure SQL server to blob storage, and enable sending them to log analytics. ```powershell -Set-AzSqlServerAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" -BlobStorageTargetState Disabled +Set-AzSqlServerAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" -BlobStorageTargetState Disabled ``` ### Example 11: Enable sending audit records of an Azure SQL server to blob storage, event hub and log analytics. ```powershell -Set-AzSqlServerAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage" -EventHubTargetState Enabled -EventHubName "EventHubName" -EventHubAuthorizationRuleResourceId "EventHubAuthorizationRuleResourceId" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" +Set-AzSqlServerAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage" -EventHubTargetState Enabled -EventHubName "EventHubName" -EventHubAuthorizationRuleResourceId "EventHubAuthorizationRuleResourceId" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" ``` ## PARAMETERS @@ -367,7 +367,7 @@ Accept wildcard characters: False ``` ### -WorkspaceResourceId -The workspace ID (resource ID of a Log Analytics workspace) for a Log Analytics workspace to which you would like to send Audit Logs. Example: /subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2 +The workspace ID (resource ID of a Log Analytics workspace) for a Log Analytics workspace to which you would like to send Audit Logs. Example: /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2 ```yaml Type: System.String diff --git a/azps-12.5.0/Az.Sql/Set-AzSqlServerMSSupportAudit.md b/azps-12.5.0/Az.Sql/Set-AzSqlServerMSSupportAudit.md index 66628d6457..1bd126e9d4 100644 --- a/azps-12.5.0/Az.Sql/Set-AzSqlServerMSSupportAudit.md +++ b/azps-12.5.0/Az.Sql/Set-AzSqlServerMSSupportAudit.md @@ -62,7 +62,7 @@ Set-AzSqlServerMSSupportAudit -ResourceGroupName "ResourceGroup01" -ServerName " ### Example 5: Enable the log analytics Microsoft support operations auditing policy of an Azure SQL server ```powershell -Set-AzSqlServerMSSupportAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" +Set-AzSqlServerMSSupportAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" ``` ### Example 6: Disable the log analytics Microsoft support operations auditing policy of an Azure SQL server @@ -77,12 +77,12 @@ Get-AzSqlServer -ResourceGroupName "ResourceGroup01" -ServerName "Server01" | Se ### Example 8: Disable sending Microsoft support operations audit records of an Azure SQL server to blob storage, and enable sending them to log analytics. ```powershell -Set-AzSqlServerMSSupportAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" -BlobStorageTargetState Disabled +Set-AzSqlServerMSSupportAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" -BlobStorageTargetState Disabled ``` ### Example 9: Enable sending Microsoft support operations audit records of an Azure SQL server to blob storage, event hub and log analytics. ```powershell -Set-AzSqlServerMSSupportAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage" -EventHubTargetState Enabled -EventHubName "EventHubName" -EventHubAuthorizationRuleResourceId "EventHubAuthorizationRuleResourceId" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" +Set-AzSqlServerMSSupportAudit -ResourceGroupName "ResourceGroup01" -ServerName "Server01" -BlobStorageTargetState Enabled -StorageAccountResourceId "/subscriptions/7fe3301d-31d3-4668-af5e-211a890ba6e3/resourceGroups/resourcegroup01/providers/Microsoft.Storage/storageAccounts/mystorage" -EventHubTargetState Enabled -EventHubName "EventHubName" -EventHubAuthorizationRuleResourceId "EventHubAuthorizationRuleResourceId" -LogAnalyticsTargetState Enabled -WorkspaceResourceId "/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2" ``` ## PARAMETERS @@ -286,7 +286,7 @@ Accept wildcard characters: False ``` ### -WorkspaceResourceId -The workspace ID (resource ID of a Log Analytics workspace) for a Log Analytics workspace to which you would like to send Microsoft support operations Audit Logs. Example: /subscriptions/4b9e8510-67ab-4e9a-95a9-e2f1e570ea9c/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2 +The workspace ID (resource ID of a Log Analytics workspace) for a Log Analytics workspace to which you would like to send Microsoft support operations Audit Logs. Example: /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/insights-integration/providers/Microsoft.OperationalInsights/workspaces/viruela2 ```yaml Type: System.String diff --git a/azps-12.5.0/Az.Sql/Update-AzSqlDatabaseLongTermRetentionBackup.md b/azps-12.5.0/Az.Sql/Update-AzSqlDatabaseLongTermRetentionBackup.md index e08d3611b0..b8456c0f90 100644 --- a/azps-12.5.0/Az.Sql/Update-AzSqlDatabaseLongTermRetentionBackup.md +++ b/azps-12.5.0/Az.Sql/Update-AzSqlDatabaseLongTermRetentionBackup.md @@ -43,17 +43,17 @@ Updates the properties of a long term retention backup. ### Example 1: Update Backup Storage Redundancy of a long term retention backup. ```powershell -Update-AzSqlDatabaseLongTermRetentionBackup -Location southeastasia -ServerName ayang-stage-seas -DatabaseName ltr3 -BackupName 'e5c20f43-494c-4925-89d1-58e0f4569fb3;132579992320000000' -ResourceGroupName testrg -BackupStorageRedundancy Geo +Update-AzSqlDatabaseLongTermRetentionBackup -Location southeastasia -ServerName ayang-stage-seas -DatabaseName ltr3 -BackupName 'b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;132579992320000000' -ResourceGroupName testrg -BackupStorageRedundancy Geo ``` ```output BackupExpirationTime : 3/19/2021 1:33:52 AM -BackupName : e5c20f43-494c-4925-89d1-58e0f4569fb3;132579992320000000 +BackupName : b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;132579992320000000 BackupTime : 2/17/2021 1:33:52 AM DatabaseName : ltr3 DatabaseDeletionTime : 3/16/2021 6:28:11 AM Location : southeastasia -ResourceId : /subscriptions/01c4ec88-e179-44f7-9eb0-e9719a5087ab/resourceGroups/testrg/providers/Microsoft.Sql/locations/southeastasia/longTermRetentionServers/ayang-stage-seas/longTermRetentionDatabases/ltr3/longTermRetentionBackups/e5c20f43-494c-4925-89d1-58e0f4569fb3;132579992320000000 +ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/testrg/providers/Microsoft.Sql/locations/southeastasia/longTermRetentionServers/ayang-stage-seas/longTermRetentionDatabases/ltr3/longTermRetentionBackups/b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;132579992320000000 ServerName : ayang-stage-seas ServerCreateTime : 4/22/2020 9:58:33 PM ResourceGroupName : testrg @@ -64,17 +64,17 @@ This command sets the Backup Storage Redundancy of the specified backup using lo ### Example 2: Update Backup Storage Redundancy of a long term retention backup (using Resource Id). ```powershell -Update-AzSqlDatabaseLongTermRetentionBackup -ResourceId '/subscriptions/01c4ec88-e179-44f7-9eb0-e9719a5087ab/resourceGroups/testrg/providers/Microsoft.Sql/locations/southeastasia/longTermRetentionServers/ayang-stage-seas/longTermRetentionDatabases/ltr3/longTermRetentionBackups/e5c20f43-494c-4925-89d1-58e0f4569fb3;132579992320000000' -BackupStorageRedundancy Geo +Update-AzSqlDatabaseLongTermRetentionBackup -ResourceId '/subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/testrg/providers/Microsoft.Sql/locations/southeastasia/longTermRetentionServers/ayang-stage-seas/longTermRetentionDatabases/ltr3/longTermRetentionBackups/b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;132579992320000000' -BackupStorageRedundancy Geo ``` ```output BackupExpirationTime : 3/19/2021 1:33:52 AM -BackupName : e5c20f43-494c-4925-89d1-58e0f4569fb3;132579992320000000 +BackupName : b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;132579992320000000 BackupTime : 2/17/2021 1:33:52 AM DatabaseName : ltr3 DatabaseDeletionTime : 3/16/2021 6:28:11 AM Location : southeastasia -ResourceId : /subscriptions/01c4ec88-e179-44f7-9eb0-e9719a5087ab/resourceGroups/testrg/providers/Microsoft.Sql/locations/southeastasia/longTermRetentionServers/ayang-stage-seas/longTermRetentionDatabases/ltr3/longTermRetentionBackups/e5c20f43-494c-4925-89d1-58e0f4569fb3;132579992320000000 +ResourceId : /subscriptions/a0a0a0a0-bbbb-cccc-dddd-e1e1e1e1e1e1/resourceGroups/testrg/providers/Microsoft.Sql/locations/southeastasia/longTermRetentionServers/ayang-stage-seas/longTermRetentionDatabases/ltr3/longTermRetentionBackups/b1b1b1b1-cccc-dddd-eeee-f2f2f2f2f2f2;132579992320000000 ServerName : ayang-stage-seas ServerCreateTime : 4/22/2020 9:58:33 PM ResourceGroupName : testrg @@ -293,4 +293,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Set-AzSqlDatabaseBackupLongTermRetentionPolicy](./Set-AzSqlDatabaseBackupLongTermRetentionPolicy.md) -[SQL Database Documentation](https://learn.microsoft.com/azure/sql-database/) \ No newline at end of file +[SQL Database Documentation](https://learn.microsoft.com/azure/sql-database/)