title | description | author | ms.author | ms.date | ms.service | ms.subservice | ms.topic | helpviewer_keywords | monikerRange | ||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Configure SQL Server Agent |
Configure SQL Server Agent |
markingmyname |
maghan |
01/19/2017 |
sql |
ssms |
how-to |
|
= azuresqldb-mi-current || >= sql-server-2016 |
[!INCLUDE SQL Server SQL MI]
Important
On Azure SQL Managed Instance, most, but not all SQL Server Agent features are currently supported. Enabling and disabling SQL Server Agent is currently not supported in SQL Managed Instance. SQL Agent is always running. See SQL Managed Instance T-SQL differences from SQL Server for details.
This topic describes how to specify some configuration options for [!INCLUDEssNoVersion] Agent during installation of [!INCLUDEssNoVersion]. The full set of [!INCLUDEssNoVersion] Agent configuration options is only available within SQL Server Management Studio, [!INCLUDEssNoVersion] Management Objects (SMO), or the [!INCLUDEssNoVersion] Agent stored procedures.
-
Select SQL Server Agent in Object Explorer of SQL Server Management Studio to administer jobs, operators, alerts, and the [!INCLUDEssNoVersion] Agent service. However, Object Explorer only displays the [!INCLUDEssNoVersion] Agent node if you have permission to use it.
-
Auto-restart should not be enabled for the [!INCLUDEssNoVersion] service or the [!INCLUDEssNoVersion] Agent service on failover cluster instances.
To perform its functions, [!INCLUDEssNoVersion] Agent must be configured to use the credentials of an account that is a member of the sysadmin fixed server role in [!INCLUDEssNoVersion]. The account must have the following Windows permissions:
-
Log on as a service (SeServiceLogonRight)
-
Replace a process-level token (SeAssignPrimaryTokenPrivilege)
-
Bypass traverse checking (SeChangeNotifyPrivilege)
-
Adjust memory quotas for a process (SeIncreaseQuotaPrivilege)
For more information about the Windows permissions required for the [!INCLUDEssNoVersion] Agent service account, see Select an Account for the SQL Server Agent Service and Setting Up Windows Service Accounts.
- Select the Start button, and then, on the Start menu, select Control Panel.
- In Control Panel, select System and Security, select Administrative Tools, and then select Local Security Policy.
- In Local Security Policy, select the chevron to expand the Local Policies folder, and then Select the User Rights Assignment folder.
- Right-click a permission that you want to configure for use with [!INCLUDEssNoVersion] and select Properties.
- In the permission's properties dialog box, verify that the account under which [!INCLUDEssNoVersion] Agent runs is listed. If not, select Add User or Group, enter the account under which [!INCLUDEssNoVersion] Agent runs in the Select Users, Computers, Service Accounts, or Groups dialog box, and then Select OK.
- Repeat for each permission that you want to add to run with [!INCLUDEssNoVersion] Agent. When finished, select OK.