Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit 60c651c

Browse files
authored
Merge pull request #32108 from rwestMSFT/rw-1017-fix-an-sql
[SCOPED] SQL is "sequel", not "ess-que-ell"
2 parents 7efa571 + 7c28107 commit 60c651c

350 files changed

Lines changed: 588 additions & 588 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

azure-sql/database/active-geo-replication-configure-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "Tutorial: Geo-replication & failover in portal"
3-
description: Learn how to configure geo-replication for an SQL database using the Azure portal or Azure CLI, and initiate failover.
3+
description: Learn how to configure geo-replication for a SQL database using the Azure portal or Azure CLI, and initiate failover.
44
author: rajeshsetlem
55
ms.author: rsetlem
66
ms.reviewer: wiassaf, mathoma, randolphwest

azure-sql/database/authentication-aad-directory-readers-role-tutorial.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ For subsequent steps, the Global Administrator or Privileged Role Administrator
7878

7979
1. Go to the **Microsoft Entra ID** resource. Under **Managed**, go to **Groups**. Select the group that you created. Under the **Managed** setting of your group, select **Members**. Select **Add members** and add your SQL Managed Instance service principal as a member of the group by searching for the name found above.
8080

81-
:::image type="content" source="media/authentication-aad-directory-readers-role/azure-ad-add-managed-instance-service-principal.png" alt-text="Screenshot of the Members page for a Microsoft Entra resource with the options highlighted for adding an SQL Managed instance as a new member.":::
81+
:::image type="content" source="media/authentication-aad-directory-readers-role/azure-ad-add-managed-instance-service-principal.png" alt-text="Screenshot of the Members page for a Microsoft Entra resource with the options highlighted for adding a SQL Managed instance as a new member.":::
8282

8383
> [!NOTE]
8484
> It can take a few minutes to propagate the service principal permissions through the Azure system, and allow access to Microsoft Graph API. You may have to wait a few minutes before you provision a Microsoft Entra admin for SQL Managed Instance.

azure-sql/database/az-cli-script-samples-content-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ The following table includes links to Azure CLI script examples to manage single
4646
|Area|Description|
4747
|---|---|
4848
|**Create databases**||
49-
| [Create a single database](scripts/create-and-configure-database-cli.md) | Creates an SQL Database and configures a server-level firewall rule. |
49+
| [Create a single database](scripts/create-and-configure-database-cli.md) | Creates a SQL Database and configures a server-level firewall rule. |
5050
| [Create pooled databases](scripts/move-database-between-elastic-pools-cli.md) | Creates elastic pools, moves pooled databases, and changes compute sizes. |
5151
|**Scale databases**||
5252
| [Scale a single database](scripts/monitor-and-scale-database-cli.md) | Scales single database. |

azure-sql/database/connect-query-java.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -156,7 +156,7 @@ password=$AZ_SQL_SERVER_PASSWORD
156156
- Replace the two `$AZ_DATABASE_NAME` variables with the value that you configured at the beginning of this article.
157157
- Replace the `$AZ_SQL_SERVER_PASSWORD` variable with the value that you configured at the beginning of this article.
158158

159-
### Create an SQL file to generate the database schema
159+
### Create a SQL file to generate the database schema
160160

161161
We will use a *src/main/resources/`schema.sql`* file in order to create a database schema. Create that file, with the following content:
162162

azure-sql/database/elastic-pool-manage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ To create and manage SQL Database elastic pools with [Azure CLI](/cli/azure), us
7979

8080
## Transact-SQL (T-SQL)
8181

82-
To create and move databases within existing elastic pools or to return information about an SQL Database elastic pool with Transact-SQL, use the following T-SQL commands. You can issue these commands using the Azure portal, [SQL Server Management Studio](/sql/ssms/use-sql-server-management-studio), [Visual Studio Code](https://code.visualstudio.com/docs), or any other program that can connect to a server and pass Transact-SQL commands. To create and manage firewall rules using T-SQL, see [Manage firewall rules using Transact-SQL](firewall-configure.md#use-transact-sql-to-manage-ip-firewall-rules).
82+
To create and move databases within existing elastic pools or to return information about a SQL Database elastic pool with Transact-SQL, use the following T-SQL commands. You can issue these commands using the Azure portal, [SQL Server Management Studio](/sql/ssms/use-sql-server-management-studio), [Visual Studio Code](https://code.visualstudio.com/docs), or any other program that can connect to a server and pass Transact-SQL commands. To create and manage firewall rules using T-SQL, see [Manage firewall rules using Transact-SQL](firewall-configure.md#use-transact-sql-to-manage-ip-firewall-rules).
8383

8484
> [!IMPORTANT]
8585
> You cannot create, update, or delete an Azure SQL Database elastic pool using Transact-SQL. You can add or remove databases from an elastic pool, and you can use DMVs to return information about existing elastic pools.

azure-sql/database/saas-dbpertenant-get-started-deploy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -200,7 +200,7 @@ The initial deployment creates three sample tenants. Now you create another tena
200200
201201
The new tenant database is:
202202

203-
- Created in an SQL elastic pool.
203+
- Created in a SQL elastic pool.
204204
- Initialized.
205205
- Registered in the catalog.
206206

azure-sql/database/saas-tenancy-tenant-analytics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Multi-tenant SaaS applications typically have a vast amount of tenant data store
3636

3737
Accessing data for all tenants is simple when all the data is in just one multi-tenant database. But the access is more complex when distributed at scale across potentially thousands of databases. One way to tame the complexity and to minimize the impact of analytics queries on transactional data is to extract data into a purpose designed analytics database or data warehouse.
3838

39-
This tutorial presents a complete analytics scenario for Wingtip Tickets SaaS application. First, *Elastic Jobs* is used to extract data from each tenant database and load it into staging tables in an analytics store. The analytics store could either be an SQL Database or a dedicated SQL pool. For large-scale data extraction, [Azure Data Factory](/azure/data-factory/introduction) is recommended.
39+
This tutorial presents a complete analytics scenario for Wingtip Tickets SaaS application. First, *Elastic Jobs* is used to extract data from each tenant database and load it into staging tables in an analytics store. The analytics store could either be a SQL Database or a dedicated SQL pool. For large-scale data extraction, [Azure Data Factory](/azure/data-factory/introduction) is recommended.
4040

4141
Next, the aggregated data is transformed into a set of [star-schema](https://www.wikipedia.org/wiki/Star_schema) tables. The tables consist of a central fact table plus related dimension tables. For Wingtip Tickets:
4242

azure-sql/database/security-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ In Azure, all newly created databases are encrypted by default and the database
123123

124124
### Always Encrypted (Encryption-in-use)
125125

126-
![Diagram showing the basics of the Always Encrypted feature. An SQL database with a lock is only accessed by an app containing a key.](./media/security-overview/azure-database-ae.png)
126+
![Diagram showing the basics of the Always Encrypted feature. A SQL database with a lock is only accessed by an app containing a key.](./media/security-overview/azure-database-ae.png)
127127

128128
[Always Encrypted](/sql/relational-databases/security/encryption/always-encrypted-database-engine) is a feature designed to protect sensitive data stored in specific database columns from access (for example, credit card numbers, national/regional identification numbers, or data on a _need to know_ basis). This includes database administrators or other privileged users who are authorized to access the database to perform management tasks, but have no business need to access the particular data in the encrypted columns. The data is always encrypted, which means the encrypted data is decrypted only for processing by client applications with access to the encryption key. The encryption key is never exposed to SQL Database or SQL Managed Instance and can be stored either in the [Windows Certificate Store](always-encrypted-certificate-store-configure.md) or in [Azure Key Vault](always-encrypted-azure-key-vault-configure.md).
129129

azure-sql/includes/passwordless-connect-azure-sql-mssql.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
The following steps are required to connect the App Service instance to Azure SQL Database:
22

33
1. Create a managed identity for the App Service.
4-
1. Create an SQL database user and associate it with the App Service managed identity.
4+
1. Create a SQL database user and associate it with the App Service managed identity.
55
1. Assign SQL roles to the database user that allow for read, write, and potentially other permissions.
66

77
There are multiple tools available to implement these steps:
@@ -72,7 +72,7 @@ The Azure portal allows you to work with managed identities and run queries agai
7272

7373
:::image type="content" source="../database/media/passwordless-connections/query-editor-small.png" lightbox="../database/media/passwordless-connections/query-editor.png" alt-text="A screenshot showing how to use the Azure Query editor.":::
7474

75-
This SQL script creates an SQL database user that maps back to the managed identity of your App Service instance. It also assigns the necessary SQL roles to the user to allow your app to read, write, and modify the data and schema of your database. After this step is completed, your services are connected.
75+
This SQL script creates a SQL database user that maps back to the managed identity of your App Service instance. It also assigns the necessary SQL roles to the user to allow your app to read, write, and modify the data and schema of your database. After this step is completed, your services are connected.
7676

7777
> [!IMPORTANT]
7878
> Although this solution provides a simple approach for getting started, it's not a best practice for production-grade environments. In those scenarios, the app shouldn't perform all operations using a single, elevated identity. You should try to implement the principle of least privilege by configuring multiple identities with specific permissions for specific tasks.

azure-sql/managed-instance/transact-sql-tsql-differences-sql-server.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -416,7 +416,7 @@ Further, [CREATE EXTERNAL TABLE AS SELECT (CETAS)](/sql/t-sql/statements/create-
416416
For more information about configuring transactional replication, see the following tutorials:
417417

418418
- [Replication between a SQL MI publisher and SQL MI subscriber](replication-between-two-instances-configure-tutorial.md)
419-
- [Replication between an SQL MI publisher, SQL MI distributor, and SQL Server subscriber](replication-two-instances-and-sql-server-configure-tutorial.md)
419+
- [Replication between a SQL MI publisher, SQL MI distributor, and SQL Server subscriber](replication-two-instances-and-sql-server-configure-tutorial.md)
420420

421421
### RESTORE statement
422422

0 commit comments

Comments
 (0)