You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/2014/analysis-services/instances/configure-service-accounts-analysis-services.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,7 +54,7 @@ manager: craigg
54
54
The sole member of the group is the per-service SID. Right next to it is the logon account. The logon account name is cosmetic, there to provide context to the per-service SID. If you subsequently change the logon account and then return to this page, you'll notice that the security group and per-service SID do not change, but the logon account label is different.
55
55
56
56
## <aname="bkmk_winpriv"></a> Windows privileges assigned to the Analysis Services service account
57
-
Analysis Services needs permissions from the operating system for service startup and to request system resources. Requirements vary by server mode and whether the instance is clustered. If you are unfamiliar with Windows privileges, see [Privileges](http://msdn.microsoft.com/library/windows/desktop/aa379306\(v=vs.85\).aspx) and [Privilege Constants (Windows)](http://msdn.microsoft.com/library/windows/desktop/bb530716\(v=vs.85\).aspx) for details.
57
+
Analysis Services needs permissions from the operating system for service startup and to request system resources. Requirements vary by server mode and whether the instance is clustered. If you are unfamiliar with Windows privileges, see [Privileges](http://msdn.microsoft.com/library/windows/desktop/aa379306\(v=vs.85\).aspx) and [Privilege Constants (Windows)](/windows/desktop/SecAuthZ/privilege-constants) for details.
58
58
59
59
All instances of Analysis Services require the **Log on as a service** (SeServiceLogonRight) privilege. SQL Server Setup assigns the privilege for you on the service account specified during installation. For servers running in Multidimensional and Data Mining mode, this is the only Windows privilege required by the Analysis Services service account for standalone server installations, and it is the only privilege that Setup configures for Analysis Services. For clustered and tabular instances, additional Windows privileges must be added manually.
60
60
@@ -150,8 +150,8 @@ manager: craigg
150
150
[Configure Windows Service Accounts and Permissions](../../database-engine/configure-windows/configure-windows-service-accounts-and-permissions.md)
151
151
[SQL Server Service Account and Per-Service SID (Blog)](http://www.travisgan.com/2013/06/sql-server-service-account-and-per.html)
152
152
[SQL Server uses a service SID to provide service isolation (KB Article)](http://support.microsoft.com/kb/2620201)
Copy file name to clipboardExpand all lines: docs/2014/analysis-services/multidimensional-models/olap-physical/object-naming-rules-analysis-services.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,7 +67,7 @@ manager: craigg
67
67
68
68
|Object|Invalid characters|
69
69
|------------|------------------------|
70
-
|`Server`|Follow Windows server naming conventions when naming a server object. See [Naming Conventions (Windows)](http://msdn.microsoft.com/library/windows/desktop/ms682856\(v=vs.85\).aspx) for details.|
70
+
|`Server`|Follow Windows server naming conventions when naming a server object. See [Naming Conventions (Windows)](/windows/desktop/DNS/naming-conventions) for details.|
Copy file name to clipboardExpand all lines: docs/2014/relational-databases/in-memory-oltp/determining-if-a-table-or-stored-procedure-should-be-ported-to-in-memory-oltp.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -120,7 +120,7 @@ manager: craigg
120
120
121
121
A data collector can be configured on a SQL Server 2012 or later version of [!INCLUDE[ssNoVersion](../../../includes/ssnoversion-md.md)].
122
122
123
-
You need a [!INCLUDE[ssNoVersion](../../../includes/ssnoversion-md.md)] Agent proxy established with the correct credential for a data collector to upload data to a Management Data Warehouse database on an instance that is different from where transactions will be profiled. To enable a [!INCLUDE[ssNoVersion](../../../includes/ssnoversion-md.md)] Agent proxy, you must first establish a credential with a domain-enabled login. The domain-enabled login must be a member of `mdw_admin` group for the Management Data Warehouse database. See [How to: Create a Credential (SQL Server Management Studio)](http://msdn.microsoft.com/library/ms190703\(v=sql.105\).aspx) for information on how to create a credential.
123
+
You need a [!INCLUDE[ssNoVersion](../../../includes/ssnoversion-md.md)] Agent proxy established with the correct credential for a data collector to upload data to a Management Data Warehouse database on an instance that is different from where transactions will be profiled. To enable a [!INCLUDE[ssNoVersion](../../../includes/ssnoversion-md.md)] Agent proxy, you must first establish a credential with a domain-enabled login. The domain-enabled login must be a member of `mdw_admin` group for the Management Data Warehouse database. See [How to: Create a Credential (SQL Server Management Studio)](../security/authentication-access/create-a-credential.md) for information on how to create a credential.
124
124
125
125
To configure data collection to upload to a Management Data Warehouse database on a different instance,
Copy file name to clipboardExpand all lines: docs/analysis-services/instances/configure-service-accounts-analysis-services.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ manager: kfile
45
45
The sole member of the group is the per-service SID. Right next to it is the logon account. The logon account name is cosmetic, there to provide context to the per-service SID. If you subsequently change the logon account and then return to this page, you'll notice that the security group and per-service SID do not change, but the logon account label is different.
46
46
47
47
## <aname="bkmk_winpriv"></a> Windows privileges assigned to the Analysis Services service account
48
-
Analysis Services needs permissions from the operating system for service startup and to request system resources. Requirements vary by server mode and whether the instance is clustered. If you are unfamiliar with Windows privileges, see [Privileges](http://msdn.microsoft.com/library/windows/desktop/aa379306\(v=vs.85\).aspx) and [Privilege Constants (Windows)](http://msdn.microsoft.com/library/windows/desktop/bb530716\(v=vs.85\).aspx) for details.
48
+
Analysis Services needs permissions from the operating system for service startup and to request system resources. Requirements vary by server mode and whether the instance is clustered. If you are unfamiliar with Windows privileges, see [Privileges](http://msdn.microsoft.com/library/windows/desktop/aa379306\(v=vs.85\).aspx) and [Privilege Constants (Windows)](/windows/desktop/SecAuthZ/privilege-constants) for details.
49
49
50
50
All instances of Analysis Services require the **Log on as a service** (SeServiceLogonRight) privilege. SQL Server Setup assigns the privilege for you on the service account specified during installation. For servers running in Multidimensional and Data Mining mode, this is the only Windows privilege required by the Analysis Services service account for standalone server installations, and it is the only privilege that Setup configures for Analysis Services. For clustered and tabular instances, additional Windows privileges must be added manually.
51
51
@@ -141,8 +141,8 @@ manager: kfile
141
141
[Configure Windows Service Accounts and Permissions](../../database-engine/configure-windows/configure-windows-service-accounts-and-permissions.md)
142
142
[SQL Server Service Account and Per-Service SID (Blog)](http://www.travisgan.com/2013/06/sql-server-service-account-and-per.html)
143
143
[SQL Server uses a service SID to provide service isolation (KB Article)](http://support.microsoft.com/kb/2620201)
Copy file name to clipboardExpand all lines: docs/analysis-services/multidimensional-models/olap-physical/object-naming-rules-analysis-services.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -60,7 +60,7 @@ manager: kfile
60
60
61
61
|Object|Invalid characters|
62
62
|------------|------------------------|
63
-
|**Server**|Follow Windows server naming conventions when naming a server object. See [Naming Conventions (Windows)](http://msdn.microsoft.com/library/windows/desktop/ms682856\(v=vs.85\).aspx) for details.|
63
+
|**Server**|Follow Windows server naming conventions when naming a server object. See [Naming Conventions (Windows)](/windows/desktop/DNS/naming-conventions) for details.|
Copy file name to clipboardExpand all lines: docs/database-engine/availability-groups/windows/configure-distributed-availability-groups.md
+26-22Lines changed: 26 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ GO
56
56
## Create first availability group
57
57
58
58
### Create the primary availability group on the first cluster
59
-
Create an availability group on the first WSFC. In this example, the availability group is named `ag1` for the database `db1`.
59
+
Create an availability group on the first WSFC. In this example, the availability group is named `ag1` for the database `db1`. The primary replica of the primary availability group is known as the **global primary** in a distributed availability group. Server1 is the global primary in this example.
60
60
61
61
```sql
62
62
CREATE AVAILABILITY GROUP [ag1]
@@ -108,7 +108,7 @@ GO
108
108
109
109
110
110
## Create second availability group
111
-
Then on the second WSFC, create a second availability group, `ag2`. In this case, the database is not specified, because it is automatically seeded from the primary availability group.
111
+
Then on the second WSFC, create a second availability group, `ag2`. In this case, the database is not specified, because it is automatically seeded from the primary availability group. The primary replica of the secondary availability group is known as the **forwarder** in a distributed availability group. In this example, server3 is the forwarder.
112
112
113
113
```sql
114
114
CREATE AVAILABILITY GROUP [ag2]
@@ -211,33 +211,37 @@ ALTER DATABASE [db1] SET HADR AVAILABILITY GROUP = [ag2];
211
211
Only manual failover is supported at this time. The following Transact-SQL statement fails over the distributed availability group named `distributedag`:
212
212
213
213
214
-
1. Set the availability mode to synchronous commit for both availability groups.
214
+
1. Set the distributed availability group to synchronous commit by running the following code on *both* the global primary and the forwarder.
ars.operational_state_desc, ars.synchronization_health_descfromsys.availability_groups ag
233
+
joinsys.availability_replicas ar onag.group_id=ar.group_id
234
+
left joinsys.dm_hadr_availability_replica_states ars
235
+
onars.replica_id=ar.replica_id
236
+
whereag.is_distributed=1
237
+
GO
238
+
235
239
```
236
240
>[!NOTE]
237
-
>Similarly to regular availability groups, the synchronization status between two availability groups replicas part of a distributed availability group, depends on the availability mode of both replicas. For example, for synchronous commit to occur, both the current primary availability group and the secondary availability group must be configured with synchronous_commit availability mode.
241
+
>Similarly to regular availability groups, the synchronization status between two availability groups replicas part of a distributed availability group, depends on the availability mode of both replicas. For example, for synchronous commit to occur, both the current primary availability group and the secondary availability group must be configured with synchronous_commit availability mode.
238
242
239
243
240
-
1. Wait until the status of the distributed availability group has changed to `SYNCHRONIZED`. Run the following query on the SQL Server that hosts the primary replica of the primary availability group.
244
+
1. Wait until the status of the distributed availability group has changed to `SYNCHRONIZED`. Run the following query on the global primary, which is the primary replica of the primary availability group.
241
245
242
246
```sql
243
247
SELECT ag.name
@@ -253,7 +257,7 @@ Only manual failover is supported at this time. The following Transact-SQL state
253
257
254
258
Proceed after the availability group **synchronization_state_desc** is `SYNCHRONIZED`. If **synchronization_state_desc** is not `SYNCHRONIZED`, run the command every five seconds until it changes. Do not proceed until the **synchronization_state_desc**=`SYNCHRONIZED`.
255
259
256
-
1. On the SQL Server that hosts the primary replica for the primary availability group, set the distributed availability group role to `SECONDARY`.
260
+
1. On the global primary, set the distributed availability group role to `SECONDARY`.
257
261
258
262
```sql
259
263
ALTER AVAILABILITY GROUP distributedag SET (ROLE = SECONDARY);
0 commit comments