Skip to content

Commit 161868c

Browse files
Merge pull request #36114 from MicrosoftDocs/main
Auto Publish – main to live - 2025-12-18 18:30 UTC
2 parents 4295c86 + e9e1649 commit 161868c

16 files changed

Lines changed: 80 additions & 190 deletions

.openpublishing.redirection.ssms.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6189,6 +6189,11 @@
61896189
"source_path": "docs/ssms/visual-db-tools/work-with-tables-in-database-diagram-visual-database-tools.md",
61906190
"redirect_url": "/ssms/visual-db-tools/work-with-tables-in-database-diagram-visual-database-tools",
61916191
"redirect_document_id": false
6192+
},
6193+
{
6194+
"source_path": "docs/tools/sqlcmd/edit-sqlcmd-scripts-query-editor.md",
6195+
"redirect_url": "/ssms/scripting/sqlcmd-scripts-query-editor",
6196+
"redirect_document_id": false
61926197
}
61936198
]
61946199
}

azure-sql/virtual-machines/windows/sql-assessment-for-sql-vm.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -256,6 +256,18 @@ After a VM is associated with a Log Analytics workspace, it can't be changed fro
256256

257257
This error indicates that results are no longer retained in the Log Analytics workspace, based on its retention policy. You can [change the retention period](/azure/azure-monitor/logs/manage-cost-storage#change-the-data-retention-period) for the workspace.
258258

259+
### SQL best practice assessment not enabled in Azure portal after enabling via Azure Policy or other automation
260+
261+
The names of the data collection rule and data collection rule association for **SQL best practice assessment** follow a specific *case-sensitive* naming convention. If **SQL best practice assessment** is enabled by using an Azure Policy, or some other form of automation, which creates a name that fails to follow the appropriate naming convention, **SQL best practices assessment** won't be enabled.
262+
263+
Both the data collection rule and data collection rule association names are *case sensitive*, with `DCR` and `DCRA` capitalized, while the rest of the name must be lower case.
264+
265+
The names must use the following naming conventions:
266+
267+
- The data collection rule must be named using the `<guid>_<regionname>_DCR_<number>` naming convention, such as the following example: `37e0cae3-c2bd-44f3-85af-975f28b08871_eastus2_DCR_1`
268+
- The data collection rule association must be named using the `<guid>_<regionname>_DCRA_<number>` naming convention, such as the following example: `37e0cae3-c2bd-44f3-85af-975f28b08871_eastus2_DCRA_1`
269+
270+
259271
## Related content
260272

261273
- [Automatic registration with SQL IaaS Agent extension](sql-agent-extension-automatic-registration-all-vms.md)

docs/database-engine/availability-groups/windows/create-clustered-dtc-for-an-always-on-availability-group.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ This article walks you through a complete configuration of a clustered DTC resou
1818

1919
The walkthrough creates a clustered DTC resource and the [!INCLUDE [ssnoversion-md](../../../includes/ssnoversion-md.md)] AGs to align with the requirements at [How to cluster the DTC service for an Always On availability group](cluster-dtc-for-sql-server-2016-availability-groups.md).
2020

21-
The walkthrough uses PowerShell and Transact-SQL (T-SQL) scripts. Many of the T-SQL scripts require **SQLCMD Mode** to be enabled. For more information on **SQLCMD Mode**, see [Edit SQLCMD Scripts with Query Editor](../../../tools/sqlcmd/edit-sqlcmd-scripts-query-editor.md). The PowerShell module `FailoverClusters` must be imported. For more information about importing a PowerShell module, see [Importing a PowerShell Module](/powershell/scripting/developer/module/importing-a-powershell-module). This walkthrough is based on the following configuration options:
21+
The walkthrough uses PowerShell and Transact-SQL (T-SQL) scripts. Many of the T-SQL scripts require **SQLCMD Mode** to be enabled. For more information on **SQLCMD Mode**, see [Edit SQLCMD scripts with Query Editor](/ssms/scripting/sqlcmd-scripts-query-editor). The PowerShell module `FailoverClusters` must be imported. For more information about importing a PowerShell module, see [Importing a PowerShell Module](/powershell/scripting/developer/module/importing-a-powershell-module). This walkthrough is based on the following configuration options:
2222

2323
- All requirements from [Prerequisites, restrictions, and recommendations for Always On availability groups](prereqs-restrictions-recommendations-always-on-availability.md) are met.
2424
- The domain is `contoso.lab`.

docs/includes/entra-id-tutorial.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: MikeRayMSFT
33
ms.author: mikeray
44
ms.reviewer: randolphwest
5-
ms.date: 07/31/2025
5+
ms.date: 12/18/2025
66
ms.service: sql
77
ms.topic: include
88
---
@@ -31,9 +31,13 @@ In this tutorial, you learn how to:
3131
- Access to Microsoft Entra ID is available for authentication purpose. For more information, see [Microsoft Entra authentication for SQL Server](../relational-databases/security/authentication-access/azure-ad-authentication-sql-server-overview.md).
3232
- A supported version of [SQL Server Management Studio](/ssms/install/install) is installed on the client machine.
3333
- A supported certificate.
34-
- [Network requirements for enabling Entra ID authentication](../sql-server/azure-arc/prerequisites.md#network-requirements-for-enabling-microsoft-entra-authentication)
3534

36-
Microsoft Entra ID supports CSP certificates. Entra ID doesn't support CNG certificates.
35+
> [!WARNING]
36+
> When configuring Microsoft Entra authentication for SQL Server, the certificate used for Microsoft Entra login must have a unique Common Name (CN). If multiple certificates in the computer's certificate store share the same CN, SQL Server might not select the correct certificate for Microsoft Entra authentication, and Microsoft Entra logins will fail.
37+
38+
- [Network requirements for enabling Microsoft Entra ID authentication](../sql-server/azure-arc/prerequisites.md#network-requirements-for-enabling-microsoft-entra-authentication)
39+
40+
Microsoft Entra ID supports CSP certificates. Microsoft Entra ID doesn't support CNG certificates.
3741

3842
### Authentication prerequisites
3943

docs/relational-databases/replication/concepts/replication-system-stored-procedures-concepts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ GO
125125
### Creating a SQL Query File in SQL Server Management Studio
126126
A replication [!INCLUDE[tsql](../../../includes/tsql-md.md)] script file can be created as a SQL Query file in a [!INCLUDE[ssManStudioFull](../../../includes/ssmanstudiofull-md.md)] project. After the script is written, a connection can be made to the database for this query file and the script can be executed. For more information about how to create [!INCLUDE[tsql](../../../includes/tsql-md.md)] scripts by using [!INCLUDE[ssManStudioFull](../../../includes/ssmanstudiofull-md.md)], see [Query and Text Editors &#40;SQL Server Management Studio&#41;](/ssms/f1-help/database-engine-query-editor-sql-server-management-studio).
127127

128-
To use a script that includes scripting variables, [!INCLUDE[ssManStudioFull](../../../includes/ssmanstudiofull-md.md)] must be running in **sqlcmd** mode. In **sqlcmd** mode, the Query Editor accepts additional syntax specific to **sqlcmd**, such as `:setvar`, which is used to a value for a variable. For more information about **sqlcmd** mode, see [Edit SQLCMD Scripts with Query Editor](../../../tools/sqlcmd/edit-sqlcmd-scripts-query-editor.md). In the following script, `:setvar` is used to provide a value for the `$(DistPubServer)` variable.
128+
To use a script that includes scripting variables, [!INCLUDE[ssManStudioFull](../../../includes/ssmanstudiofull-md.md)] must be running in SQLCMD mode. In SQLCMD mode, the Query Editor accepts additional syntax specific to **sqlcmd**, such as `:setvar`, which is used to a value for a variable. For more information about SQLCMD mode, see [Edit SQLCMD scripts with Query Editor](/ssms/scripting/sqlcmd-scripts-query-editor). In the following script, `:setvar` is used to provide a value for the `$(DistPubServer)` variable.
129129

130130
```
131131
:setvar DistPubServer N'MyPublisherAndDistributor';

docs/relational-databases/security/authentication-access/azure-ad-authentication-sql-server-setup-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Tutorial on how to set up Microsoft Entra authentication for SQL Se
44
author: PratimDasgupta
55
ms.author: prdasgu
66
ms.reviewer: vanto, randolphwest, mikeray
7-
ms.date: 08/28/2025
7+
ms.date: 12/18/2025
88
ms.service: sql
99
ms.subservice: security
1010
ms.topic: tutorial

docs/sql-server/sql-server-2025-known-issues.md

Lines changed: 16 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Known issues, causes, and workarounds for SQL Server 2025 (17.x), c
44
author: MikeRayMSFT
55
ms.author: mikeray
66
ms.reviewer: randolphwest
7-
ms.date: 11/18/2025
7+
ms.date: 12/17/2025
88
ms.service: sql
99
ms.subservice: release-landing
1010
ms.topic: troubleshooting-known-issue
@@ -19,7 +19,7 @@ monikerRange: ">=sql-server-2016"
1919

2020
This article describes known issues for [!INCLUDE [sssql25-md](../includes/sssql25-md.md)].
2121

22-
[!INCLUDE [sssql25-md](../includes/sssql25-md.md)] has currently identified the following known issues:
22+
The following issues are currently identified:
2323

2424
- [Installation fails when TLS 1.2 is disabled](#sql-server-2025-installation-fails-when-tls-12-is-disabled)
2525
- [Windows Arm64 not supported](#windows-arm64-not-supported)
@@ -36,6 +36,7 @@ This article describes known issues for [!INCLUDE [sssql25-md](../includes/sssql
3636
- [SQL Server audit events don't write to the Security log](#sql-server-audit-events-dont-write-to-the-security-log)
3737
- [Upgrade fails if Data Quality Services is installed](#upgrade-fails-if-data-quality-services-is-installed)
3838
- [Full-Text Search fails to index plaintext documents larger than 25 MB](#full-text-search-fails-to-index-plaintext-documents-larger-than-25-mb)
39+
- [Incorrect license agreement for LocalDB installer](#incorrect-license-agreement-for-localdb-installer)
3940

4041
## SQL Server 2025 installation fails when TLS 1.2 is disabled
4142

@@ -137,13 +138,13 @@ ALTER DATABASE [Database_Name]
137138
(OPERATION_MODE = READ_WRITE);
138139
```
139140

140-
Queries that meet the following conditions could experience an access violation when a PSP [query variant](../relational-databases/performance/parameter-sensitive-plan-optimization.md#query-variant) can't determine the persisted state of its parent dispatcher statement:
141+
Queries that meet the following conditions might experience an access violation when a PSP [query variant](../relational-databases/performance/parameter-sensitive-plan-optimization.md#query-variant) can't determine the persisted state of its parent dispatcher statement:
141142

142143
- Executed on a secondary replica
143144
- Sensitive to parameter sniffing
144145
- Eligible for parameter sensitive plan (PSP) optimization
145146

146-
A fix has been identified and will be part of a future release of [!INCLUDE [sssql25-md](../includes/sssql25-md.md)].
147+
We have identified a fix for a future release of [!INCLUDE [sssql25-md](../includes/sssql25-md.md)].
147148

148149
**Workaround**: Disable PSP on secondaries for each database that was onboarded to use the Query Store for readable secondaries feature. From within the context of a specific database, issue the following Transact-SQL statement:
149150

@@ -154,14 +155,14 @@ ALTER DATABASE SCOPED CONFIGURATION FOR SECONDARY
154155

155156
## SQL Server audit events don't write to the Security log
156157

157-
Assume that you configured multiple [!INCLUDE [ssnoversion-md](../includes/ssnoversion-md.md)] audit events to write to the Security log in [!INCLUDE [sssql25-md](../includes/sssql25-md.md)]. In this scenario, you notice that all server audits, except the first server audit, don't write. Additionally, when you add the second server audit, you might receive an error that resembles the following message in the [!INCLUDE [ssnoversion-md](../includes/ssnoversion-md.md)] error log:
158+
Assume that you configured multiple [!INCLUDE [ssnoversion-md](../includes/ssnoversion-md.md)] audit events to write to the [!INCLUDE [sssql25-md](../includes/sssql25-md.md)] Security log. In this scenario, you notice that all server audits, except the first server audit, don't write. Additionally, when you add the second server audit, you might receive an error that resembles the following message in the [!INCLUDE [ssnoversion-md](../includes/ssnoversion-md.md)] error log:
158159

159160
```output
160161
Error: 33204, Severity: 17, State: 1.
161162
SQL Server Audit could not write to the security log.
162163
```
163164

164-
A fix has been identified and will be part of a future release of [!INCLUDE [sssql25-md](../includes/sssql25-md.md)].
165+
We have identified a fix for a future release of [!INCLUDE [sssql25-md](../includes/sssql25-md.md)].
165166

166167
**Workaround**: Use one of the following methods:
167168

@@ -226,7 +227,15 @@ Edit the DWORD value `MaxTextFilterBytes`, which is located in `HKEY_LOCAL_MACHI
226227
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ContentIndex" /v MaxTextFilterBytes /t REG_DWORD /d ffffffff
227228
```
228229

229-
After updating the registry value, re-issue the Full-Text crawl.
230+
After updating the registry value, reissue the Full-Text crawl.
231+
232+
## Incorrect license agreement for LocalDB installer
233+
234+
**Issue**: The LocalDB installer points to a preview version of the end-user license agreement (EULA).
235+
236+
To work around this issue, you must download the Express edition installer instead, and choose the **LocalDB** option from the package selection screen.
237+
238+
We have identified a fix for a future release of [!INCLUDE [sssql25-md](../includes/sssql25-md.md)].
230239

231240
## Related content
232241

docs/t-sql/functions/date-bucket-transact-sql.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: "DATE_BUCKET (Transact-SQL)"
33
description: DATE_BUCKET returns the date-time value corresponding to the start of each date-time bucket from a defined origin timestamp.
4-
author: kendalvandyke
5-
ms.author: kendalv
6-
ms.reviewer: randolphwest
7-
ms.date: 11/03/2025
4+
author: rwestMSFT
5+
ms.author: randolphwest
6+
ms.reviewer: kendalv, jovanpop
7+
ms.date: 12/17/2025
88
ms.service: sql
99
ms.subservice: t-sql
1010
ms.topic: reference
@@ -18,10 +18,11 @@ helpviewer_keywords:
1818
- "analytic functions, DATE_BUCKET"
1919
dev_langs:
2020
- TSQL
21+
monikerRange: "=azuresqldb-current || =azuresqldb-mi-current || >=sql-server-ver16 || >=sql-server-linux-ver16 || =fabric || =fabric-sqldb"
2122
---
2223
# DATE_BUCKET (Transact-SQL)
2324

24-
[!INCLUDE [sqlserver2022-asde-fabricsqldb](../../includes/applies-to-version/sqlserver2022-asdb-asmi-asde-fabricsqldb.md)]
25+
[!INCLUDE [sqlserver2022-asdb-asmi-fabricse-fabricdw-fabricsqldb](../../includes/applies-to-version/sqlserver2022-asdb-asmi-fabricse-fabricdw-fabricsqldb.md)]
2526

2627
This function returns the date-time value corresponding to the start of each date-time bucket from the timestamp defined by the *origin* parameter, or the default origin value of `1900-01-01 00:00:00.000` if the origin parameter isn't specified.
2728

docs/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8468,7 +8468,7 @@ items:
84688468
- name: Use with scripting variables
84698469
href: tools/sqlcmd/sqlcmd-use-scripting-variables.md
84708470
- name: Edit SQLCMD scripts with Query Editor
8471-
href: tools/sqlcmd/edit-sqlcmd-scripts-query-editor.md
8471+
href: /ssms/scripting/sqlcmd-scripts-query-editor
84728472
- name: Create new local database in a container with sqlcmd
84738473
href: tools/sqlcmd/quickstart-sqlcmd-create-container.md
84748474
- name: SSB Diagnose

0 commit comments

Comments
 (0)