Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit 55ca689

Browse files
committed
resolve merge conflict
2 parents 3a8c890 + dd7fec8 commit 55ca689

31 files changed

Lines changed: 209 additions & 100 deletions

File tree

docs/2014/integration-services/connect-to-a-remote-integration-services-server-ssis-service.md

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -91,13 +91,6 @@ ms.author: chugu
9191
## Connecting by using a Local Account
9292
If you are working in a local Windows account on a client computer, you can connect to the [!INCLUDE[ssISnoversion](../includes/ssisnoversion-md.md)] service on a remote computer only if a local account that has the same name and password and the appropriate rights exists on the remote computer.
9393

94-
## By default the SSIS service does not support delegation
95-
By default the [!INCLUDE[ssNoVersion](../includes/ssnoversion-md.md)] [!INCLUDE[ssISnoversion](../includes/ssisnoversion-md.md)] service does not support the delegation of credentials, or what is sometimes referred to as a double hop. In this scenario, you are working on a client computer, the [!INCLUDE[ssISnoversion](../includes/ssisnoversion-md.md)] service is running on a second computer, and [!INCLUDE[ssNoVersion](../includes/ssnoversion-md.md)] is running on a third computer. First, [!INCLUDE[ssManStudioFull](../includes/ssmanstudiofull-md.md)] successfully passes your credentials from the client computer to the second computer on which the [!INCLUDE[ssISnoversion](../includes/ssisnoversion-md.md)] service is running. Then, however, the [!INCLUDE[ssISnoversion](../includes/ssisnoversion-md.md)] service cannot delegate your credentials from the second computer to the third computer on which [!INCLUDE[ssNoVersion](../includes/ssnoversion-md.md)] is running.
96-
97-
You can enable delegation of credentials by granting the **Trust this user for delegation to any service (Kerberos Only)** right to the SQL Server service account, which launches the Integration Services service (ISServerExec.exe) as a child process. Before you grant this right, consider whether it meets the security requirements of your organization.
98-
99-
For more info, see [Getting Cross Domain Kerberos and Delegation working with SSIS Package](https://blogs.msdn.microsoft.com/psssql/2014/06/26/getting-cross-domain-kerberos-and-delegation-working-with-ssis-package/).
100-
10194
## See Also
10295
[Configure a Windows Firewall for Access to the SSIS Service](../../2014/integration-services/configure-a-windows-firewall-for-access-to-the-ssis-service.md)
10396

docs/big-data-cluster/deployment-high-availability.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.technology: big-data-cluster
1515

1616
[!INCLUDE[SQL Server 2019](../includes/applies-to-version/sqlserver2019.md)]
1717

18-
Because SQL Server Big Data Clusters is on Kubernetes as containerized applications, and uses features like stateful sets and persistent storage, this infrastructure has built-in health monitoring, failure detection, and failover mechanisms that cluster components leverage to maintain service health. For increased reliability, you can also configure SQL Server master instance or HDFS name node and Spark shared services to deploy with additional replicas in a high availability configuration. Monitoring, failure detection, and automatic failover are managed by a big data cluster management service, namely the control service. This service provide without user intervention – all from availability group setup, configuring database mirroring endpoints, to adding databases to the availability group or failover and upgrade coordination.
18+
Because SQL Server Big Data Clusters is on Kubernetes as containerized applications, and uses features like stateful sets and persistent storage, this infrastructure has built-in health monitoring, failure detection, and failover mechanisms that cluster components leverage to maintain service health. For increased reliability, you can also configure SQL Server master instance or HDFS name node and Spark shared services to deploy with additional replicas in a high availability configuration. Monitoring, failure detection, and automatic failover are managed by a big data cluster management service, namely the control service. This service is provided without user intervention – all from availability group setup, configuring database mirroring endpoints, to adding databases to the availability group or failover and upgrade coordination.
1919

2020
The following image represents how an availability group is deployed in a SQL Server Big Data Cluster:
2121

docs/big-data-cluster/reference-azdata-bdc-hdfs.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ azdata bdc hdfs ls --path -p
6464
### Examples
6565
List Status
6666
```bash
67-
azdata bdc hdfs ls --path "tmp/"
67+
azdata bdc hdfs ls --path tmp/
6868
```
6969
### Required Parameters
7070
#### `--path -p`
@@ -87,9 +87,9 @@ azdata bdc hdfs exists --path -p
8787

8888
```
8989
### Examples
90-
Check for file or directory existance.
90+
Check for file or directory existence.
9191
```bash
92-
azdata bdc hdfs exists --path "tmp/"
92+
azdata bdc hdfs exists --path tmp/
9393
```
9494
### Required Parameters
9595
#### `--path -p`
@@ -114,7 +114,7 @@ azdata bdc hdfs mkdir --path -p
114114
### Examples
115115
Make directory.
116116
```bash
117-
azdata bdc hdfs mkdir --path "tmp/"
117+
azdata bdc hdfs mkdir --path tmp/
118118
```
119119
### Required Parameters
120120
#### `--path -p`
@@ -139,7 +139,7 @@ azdata bdc hdfs mv --source-path -s
139139
### Examples
140140
Move file or directory.
141141
```bash
142-
azdata bdc hdfs mv --source-path "tmp/" --target-path "dest/"
142+
azdata bdc hdfs mv --source-path tmp/ --target-path "dest/"
143143
```
144144
### Required Parameters
145145
#### `--source-path -s`
@@ -224,7 +224,7 @@ azdata bdc hdfs rm --path -p
224224
### Examples
225225
Remove a file or directory.
226226
```bash
227-
azdata bdc hdfs rm --path "tmp/"
227+
azdata bdc hdfs rm --path tmp/
228228
```
229229
### Required Parameters
230230
#### `--path -p`
@@ -249,7 +249,7 @@ azdata bdc hdfs rmr --path -p
249249
### Examples
250250
Recursive remove directory.
251251
```bash
252-
azdata bdc hdfs rmr --path "tmp/"
252+
azdata bdc hdfs rmr --path tmp/
253253
```
254254
### Required Parameters
255255
#### `--path -p`

docs/connect/jdbc/using-always-encrypted-with-the-jdbc-driver.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: "Using Always Encrypted with the JDBC driver"
33
description: "Learn how to use Always Encrypted in your Java application with the JDBC driver for SQL Server to encrypt sensitive data on the server."
44
ms.custom: ""
5-
ms.date: "05/06/2020"
5+
ms.date: "07/10/2020"
66
ms.prod: sql
77
ms.prod_service: connectivity
88
ms.reviewer: ""
@@ -39,11 +39,11 @@ The Microsoft JDBC Driver for SQL Server communicates with a keystore using a co
3939
### Using built-in column master key store providers
4040
The Microsoft JDBC Driver for SQL Server comes with the following built-in column master key store providers. Some of these providers are pre-registered with the specific provider names (used to look up the provider) and some require either additional credentials or explicit registration.
4141

42-
| Class | Description | Provider (lookup) name | Is pre-registered? |
43-
| :---------------------------------------------------- | :------------------------------------------------- | :---------------------- | :----------------- |
44-
| **SQLServerColumnEncryptionAzureKeyVaultProvider** | A provider for a keystore for the Azure Key Vault. | AZURE_KEY_VAULT | _No_ before JDBC driver version 7.4.1, but _yes_ starting with JDBC driver version 7.4.1. |
45-
| **SQLServerColumnEncryptionCertificateStoreProvider** | A provider for the Windows Certificate Store. | MSSQL_CERTIFICATE_STORE | _Yes_ |
46-
| **SQLServerColumnEncryptionJavaKeyStoreProvider** | A provider for the Java keystore. | MSSQL_JAVA_KEYSTORE | _Yes_ |
42+
| Class | Description | Provider (lookup) name | Is pre-registered? | Platform |
43+
| :---------------------------------------------------- | :------------------------------------------------- | :---------------------- | :----------------- | :------- |
44+
| **SQLServerColumnEncryptionAzureKeyVaultProvider** | A provider for a keystore for the Azure Key Vault. | AZURE_KEY_VAULT | _No_ before JDBC driver version 7.4.1, but _yes_ starting with JDBC driver version 7.4.1. | Windows, Linux, macOS |
45+
| **SQLServerColumnEncryptionCertificateStoreProvider** | A provider for the Windows Certificate Store. | MSSQL_CERTIFICATE_STORE | _Yes_ | Windows |
46+
| **SQLServerColumnEncryptionJavaKeyStoreProvider** | A provider for the Java keystore. | MSSQL_JAVA_KEYSTORE | _Yes_ | Windows, Linux, macOS |
4747
|||||
4848

4949
For the pre-registered keystore providers, you don't need to make any application code changes to use these providers but note the following items:
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
title: "Allow PolyBase export configuration option | Microsoft Docs"
3+
description: Set `allow polybase export` configuration option in SQL Server settings
4+
ms.custom: ""
5+
ms.date: "07/10/2020"
6+
ms.prod: sql
7+
ms.prod_service:
8+
ms.reviewer: ""
9+
ms.technology: polybase
10+
ms.topic: conceptual
11+
author: MikeRayMSFT
12+
ms.author: mikeray
13+
---
14+
15+
# Set `allow polybase export` configuration option
16+
17+
[!INCLUDE [sqlserver2016](../../includes/applies-to-version/sqlserver2016.md)]
18+
19+
`allow polybase export` server configuration option allows `INSERT` into a Hadoop external table.
20+
21+
This feature does not support insert into other external data sources.
22+
23+
The possible values are described in the following table:
24+
25+
| Value | Meaning |
26+
|-------|----------------------------------------|
27+
| 0 | Disabled. This is the default setting. |
28+
| 1 | Enabled |
29+
30+
31+
The setting takes effect immediately.
32+
33+
## Example
34+
35+
The following example enables this setting.
36+
37+
```sql
38+
sp_configure 'show advanced options', 1;
39+
GO
40+
RECONFIGURE;
41+
GO
42+
sp_configure 'allow polybase export', 0;
43+
GO
44+
RECONFIGURE;
45+
GO
46+
```
47+
48+
## Next steps
49+
50+
[Exporting data](../../relational-databases/polybase/polybase-configure-hadoop.md#exporting-data)

docs/database-engine/configure-windows/configure-column-encryption-enclave-type.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@ ms.author: jaszymas
1313
monikerRange: ">= sql-server-ver15 || = sqlallproducts-allversions"
1414
---
1515
# Configure the enclave type for Always Encrypted Server Configuration Option
16+
1617
[!INCLUDE [sqlserver2019-windows-only](../../includes/applies-to-version/sqlserver2019-windows-only.md)]
1718

1819
This article describes how to enable or disable a secure enclave for Always Encrypted with secure enclaves. For more information, see [Always Encrypted with secure enclaves](../../relational-databases/security/encryption/always-encrypted-enclaves.md).

0 commit comments

Comments
 (0)