You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sql-database/sql-database-managed-instance-transact-sql-information.md
+11-8Lines changed: 11 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -57,6 +57,7 @@ Managed instances have automatic backups, so users can create full database `COP
57
57
Limitations:
58
58
59
59
- With a managed instance, you can back up an instance database to a backup with up to 32 stripes, which is enough for databases up to 4 TB if backup compression is used.
60
+
- You can't execute `BACKUP DATABASE ... WITH COPY_ONLY` on a database that's encrypted with service-managed Transparent Data Encryption (TDE). Service-managed TDE forces backups to be encrypted with an internal TDE key. The key can't be exported, so you can't restore the backup. Use automatic backups and point-in-time restore, or use [customer-managed (BYOK) TDE](https://docs.microsoft.com/azure/sql-database/transparent-data-encryption-azure-sql#customer-managed-transparent-data-encryption---bring-your-own-key) instead. You also can disable encryption on the database.
60
61
- The maximum backup stripe size by using the `BACKUP` command in a managed instance is 195 GB, which is the maximum blob size. Increase the number of stripes in the backup command to reduce individual stripe size and stay within this limit.
61
62
62
63
> [!TIP]
@@ -533,6 +534,14 @@ Cross-database Service Broker dialogs fail to deliver the messages after change
533
534
534
535
**Workaround:** Stop any activity that uses cross-database Service Broker dialog conversations before updating service tier and re-initialize them after.
535
536
537
+
### Some AAD login types cannot be impersonated
538
+
539
+
**Date:** July 2019
540
+
541
+
Impersonation using `EXECUTE AS USER` or `EXECUTE AS LOGIN` of following AAD principals is not supported:
542
+
- Aliased AAD users. The following error is returned in this case `15517`.
543
+
- AAD logins and users based on AAD applications or service principals. The following errors are returned in this case `15517` and `15406`.
544
+
536
545
### @query parameter not supported in sp_send_db_mail
537
546
538
547
**Date:** April 2019
@@ -541,13 +550,13 @@ The `@query` parameter in the [sp_send_db_mail](https://docs.microsoft.com/sql/r
541
550
542
551
### AAD logins and users are not supported in tools
543
552
544
-
**Date:**April 2019
553
+
**Date:**Jan 2019
545
554
546
555
SQL Server Management Studio and SQL Server Data Tools don't fuly support Azure Acctive directory logins and users.
547
556
- Using Azure AD server principals (logins) and users (public preview) with SQL Server Data Tools currently isn't supported.
548
557
- Scripting for Azure AD server principals (logins) and users (public preview) isn't supported in SQL Server Management Studio.
549
558
550
-
### TEMPDB structure is re-created
559
+
### TEMPDB structure and content is re-created
551
560
552
561
The `tempdb` database is always split into 12 data files and the file structure cannot be changed. The maximum size per file can't be changed, and new files cannot be added to `tempdb`. `Tempdb` is always re-created as an empty database when the instance starts or fails over, and any changes made in `tempdb` will not be preserved.
553
562
@@ -619,12 +628,6 @@ CLR modules placed in a managed instance and linked servers or distributed queri
619
628
620
629
**Workaround:** Use context connections in a CLR module if possible.
621
630
622
-
### TDE-encrypted databases with a service-managed key don't support user-initiated backups
623
-
624
-
You can't execute `BACKUP DATABASE ... WITH COPY_ONLY` on a database that's encrypted with service-managed Transparent Data Encryption (TDE). Service-managed TDE forces backups to be encrypted with an internal TDE key. The key can't be exported, so you can't restore the backup.
625
-
626
-
**Workaround:** Use automatic backups and point-in-time restore, or use [customer-managed (BYOK) TDE](https://docs.microsoft.com/azure/sql-database/transparent-data-encryption-azure-sql#customer-managed-transparent-data-encryption---bring-your-own-key) instead. You also can disable encryption on the database.
627
-
628
631
## Next steps
629
632
630
633
- For more information about managed instances, see [What is a managed instance?](sql-database-managed-instance.md)
0 commit comments