Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit ba3a58a

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/sql-docs-pr into davidph-appliesto
2 parents e121024 + 90828f7 commit ba3a58a

754 files changed

Lines changed: 1914 additions & 1733 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -58694,6 +58694,16 @@
5869458694
"source_path": "docs/relational-databases/data-tier-applications/dac-support-for-sql-server-objects-and-versions.md",
5869558695
"redirect_url": "https://docs.microsoft.com/en-us/previous-versions/sql/sql-server-2012/ee210549(v=sql.110)",
5869658696
"redirect_document_id": false
58697+
},
58698+
{
58699+
"source_path": "docs/sql-assessment-api/sql-assessment-api-overview.md",
58700+
"redirect_url": "/sql/tools/sql-assessment-api/sql-assessment-api-overview",
58701+
"redirect_document_id": false
58702+
},
58703+
{
58704+
"source_path": "docs/visual-studio-code/sql-server-develop-use-vscode.md",
58705+
"redirect_url": "/sql/tools/visual-studio-code/sql-server-develop-use-vscode",
58706+
"redirect_document_id": false
5869758707
}
5869858708
]
5869958709
}

docs/azure-data-studio/azure-sql-managed-instance-extension.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ With the extension installed, you'll see a **Managed Instance** tab in Azure Dat
3434

3535
The extension displays technical characteristics and some resource usage of your managed instance.
3636

37-
[ ![Managed instance properties](media/azure-sql-mi-extension/ads-mi-tab1.png )](media/azure-sql-mi-extension/ads-mi-tab1.png#lightbox)
37+
[ ![Managed Instance properties](media/azure-sql-mi-extension/ads-mi-tab1.png )](media/azure-sql-mi-extension/ads-mi-tab1.png#lightbox)
3838

3939
The top pane shows the following details:
4040

@@ -47,7 +47,7 @@ The top pane shows the following details:
4747

4848
When you select the second pane in the **Managed Instance** tab, you get recommendations and alerts to help optimize your managed instance.
4949

50-
[ ![Managed instance recommendations](media/azure-sql-mi-extension/ads-mi-tab2.png )](media/azure-sql-mi-extension/ads-mi-tab2.png#lightbox)
50+
[ ![Managed Instance recommendations](media/azure-sql-mi-extension/ads-mi-tab2.png )](media/azure-sql-mi-extension/ads-mi-tab2.png#lightbox)
5151

5252
You might see some of the following recommendations:
5353

@@ -64,15 +64,15 @@ Periodically review these recommendations, investigate the root causes, and take
6464

6565
The third pane in the **Managed Instance** tab shows you the state of database replicas in your managed instance.
6666

67-
[ ![Managed instance replicas](media/azure-sql-mi-extension/ads-mi-tab3.png )](media/azure-sql-mi-extension/ads-mi-tab3.png#lightbox)
67+
[ ![Managed Instance replicas](media/azure-sql-mi-extension/ads-mi-tab3.png )](media/azure-sql-mi-extension/ads-mi-tab3.png#lightbox)
6868

6969
On the general-purpose service tier, every database has a single (primary) replica. On a business-critical tier instance, every database has one primary and three secondary replicas, one of which is used for read-only workloads. On the **Replicas** pane, you can monitor the synchronization process and verify that all secondary replicas are synchronized with the primary replica.
7070

7171
## Logs
7272

7373
The fourth pane of **Managed Instance** shows the most recent and relevant SQL error log entries.
7474

75-
[ ![Managed instance log entries](media/azure-sql-mi-extension/ads-mi-tab4.png )](media/azure-sql-mi-extension/ads-mi-tab4.png#lightbox)
75+
[ ![Managed Instance log entries](media/azure-sql-mi-extension/ads-mi-tab4.png )](media/azure-sql-mi-extension/ads-mi-tab4.png#lightbox)
7676

7777
Although your managed instance generates a large number of log entries, most of them are internal/system information. Also, some log entries show physical database names (`GUID` values) instead of actual logical database names.
7878

docs/azure-data-studio/machine-learning-extension.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,14 +17,31 @@ The Machine Learning extension for [Azure Data Studio](what-is.md) enables you t
1717

1818
## Prerequisites
1919

20-
The following prerequisites need to be installed on the computer you run Azure Data Studio on.
20+
The following prerequisites need to be installed on the computer you run Azure Data Studio.
2121

2222
- [Python 3](https://www.python.org/downloads/). Once you have installed Python, you need to specify the local path to a Python installation under [Extension Settings](#settings). If you have used a [Python kernel notebook](notebooks-tutorial-python-kernel.md) in Azure Data Studio, the extension will use the path from the notebook by default.
2323

2424
- [Microsoft ODBC driver 17 for SQL Server](../connect/odbc/download-odbc-driver-for-sql-server.md) for Windows, macOS, or Linux.
2525

2626
- [R 3.5](https://www.r-project.org/) (optional). Other version than 3.5 is currently not supported. Once you have installed R 3.5, you need to enable R and specify the local path to an R installation under [Extension Settings](#settings). This is only required if you want to manage R packages in your database.
2727

28+
### Trouble installing Python 3 from within ADS?
29+
If you attempt to install Python 3 but get an error about TLS/SSL, add these two, optional components:
30+
31+
_sample error:_
32+
```
33+
$: ~/0.0.1/bin/python3 -m pip install --user "jupyter>=1.0.0" --extra-index-url https://prose-python-packages.azurewebsites.net
34+
WARNING: pip is configured with locations that require TLS/SSL, however the ssl module in Python is not available.
35+
Looking in indexes: https://pypi.org/simple, https://prose-python-packages.azurewebsites.net
36+
Requirement already satisfied: jupyter
37+
```
38+
39+
_install these:_
40+
41+
- [Homebrew](https://brew.sh) (optional). Install homebrew, then run `brew update` from the command line.
42+
43+
- *openssl* (optional). Next run `brew install openssl`.
44+
2845
## Install the extension
2946

3047
To install the Machine Learning extension in Azure Data Studio, follow the steps below.

docs/azure-data-studio/release-notes-azure-data-studio.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -503,7 +503,7 @@ October 29, 2018   /   version: 1.1.4
503503

504504
| Change | Details |
505505
| :----- | :------ |
506-
| Introducing the Azure Resource Explorer to browse Azure SQL Databases. |   |
506+
| Introducing the Azure Resource Explorer to browse Azure SQL Database. |   |
507507
| Improve Object Explorer and Query Editor connectivity robustness. |   |
508508
| SQL Agent extensions improvements. |   |
509509
| Update to the SQL Server 2019 Preview extension. | See [Data Virtualization extension](data-virtualization-extension.md?view=sql-server-ver15). |
@@ -543,7 +543,7 @@ General Availability release of Azure Data Studio (formerly SQL Operations Studi
543543
| :----- | :------ |
544544
| Support for SQL Server 2019 preview features including [big data cluster](../big-data-cluster/big-data-cluster-overview.md) support. | Connect to the HDFS/Spark Gateway shipped with SQL Server 2019 preview.<br/><br/>Browse HDFS, upload files, save files, and launch useful actions such as Analyze in Notebook for CSV files.<br/><br/>Submit Spark jobs from the dashboard or right-click on a HDFS/Spark connection in Object Explorer. |
545545
| Azure Data Studio Notebooks. | Create or open Notebooks using an integrated Notebook viewer. In this release, the Notebook viewer supports connecting to local kernels and the SQL Server 2019 big data cluster only.<br/><br/>Use the PROSE Code Accelerator libraries in your Notebook to learn file format and data types for fast data preparation. |
546-
| Azure Resource Explorer. | The Azure Resource Explorer view lets you browse data-related endpoints for your Azure accounts and create connections to them in Object Explorer. In this release, Azure SQL Databases and servers are supported. |
546+
| Azure Resource Explorer. | The Azure Resource Explorer view lets you browse data-related endpoints for your Azure accounts and create connections to them in Object Explorer. In this release, Azure SQL Database is supported. |
547547
| SQL Server PolyBase Create External Table Wizard. | Create an external table and its supporting metadata structures with an easy to use wizard. In this release, remote SQL Server and Oracle servers are supported. |
548548
| &nbsp; | &nbsp; |
549549

docs/big-data-cluster/kubernetes-rbac.md

Lines changed: 37 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -42,39 +42,43 @@ The default `admin` role does not have these permissions, so the user deploying
4242

4343
Starting with SQL Server 2019 CU5, Telegraf requires a service account with cluster wide role permissions to collect the pod and node metrics. During the deployment (or upgrade for existing deployments), we attempt to create the necessary service account and cluster role, but if the user deploying the cluster or performing the upgrade does not have sufficient permissions, deployment or upgrade will still proceed with a warning and succeed. In this case, the pod & node metrics will not be collected. The user deploying the cluster must ask a cluster administrator to create the role and service account (either before or after the deployment or upgrade). After they are created, BDC uses them.
4444

45-
Here is a script that shows how to create the required artifacts:
46-
47-
```console
48-
export CLUSTER_NAME=mssql-cluster
49-
kubectl create -f - <<EOF
50-
---
51-
apiVersion: rbac.authorization.k8s.io/v1
52-
kind: ClusterRole
53-
metadata:
54-
name: ${CLUSTER_NAME}:cr-mssql-metricsdc-reader
55-
rules:
56-
- apiGroups:
57-
- '*'
58-
resources:
59-
- pods
60-
- nodes/stats
61-
verbs:
62-
- get
63-
---
64-
apiVersion: rbac.authorization.k8s.io/v1
65-
kind: ClusterRoleBinding
66-
metadata:
67-
name: ${CLUSTER_NAME}:crb-mssql-metricsdc-reader
68-
roleRef:
69-
apiGroup: rbac.authorization.k8s.io
70-
kind: ClusterRole
71-
name: ${CLUSTER_NAME}:cr-mssql-metricsdc-reader
72-
subjects:
73-
- kind: ServiceAccount
74-
name: sa-mssql-metricsdc-reader
75-
namespace: ${CLUSTER_NAME}
76-
EOF
77-
```
45+
Here are the steps to show how to create the required artifacts:
46+
47+
1. Create a *metrics-role.yaml* file with below content. Make sure to replace the *<clusterName>* placeholders with the name of your big data cluster.
48+
49+
```yaml
50+
apiVersion: rbac.authorization.k8s.io/v1
51+
kind: ClusterRole
52+
metadata:
53+
name: <clusterName>:cr-mssql-metricsdc-reader
54+
rules:
55+
- apiGroups:
56+
- '*'
57+
resources:
58+
- pods
59+
- nodes/stats
60+
verbs:
61+
- get
62+
---
63+
apiVersion: rbac.authorization.k8s.io/v1
64+
kind: ClusterRoleBinding
65+
metadata:
66+
name: <clusterName>:crb-mssql-metricsdc-reader
67+
roleRef:
68+
apiGroup: rbac.authorization.k8s.io
69+
kind: ClusterRole
70+
name: <clusterName>:cr-mssql-metricsdc-reader
71+
subjects:
72+
- kind: ServiceAccount
73+
name: sa-mssql-metricsdc-reader
74+
namespace: <clusterName>
75+
```
76+
77+
2. Create the cluster role and the cluster role binding:
78+
79+
```bash
80+
kubectl create -f metrics-role.yaml
81+
```
7882

7983
The service account, cluster role and the cluster role binding can be created either before or post BDC deployment. Kubernetes automatically updates the permission for the Telegraf service account. If these are created as a pod deployment, you will see a few minutes' delay in the pod and node metrics being collected.
8084

docs/connect/jdbc/connecting-to-an-azure-sql-database.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,9 @@ ms.author: v-daenge
1818

1919
This article discusses issues when using the [!INCLUDE[jdbcNoVersion](../../includes/jdbcnoversion_md.md)] to connect to an [!INCLUDE[ssAzure](../../includes/ssazure_md.md)]. For more information about connecting to an [!INCLUDE[ssAzure](../../includes/ssazure_md.md)], see:
2020

21-
- [SQL Azure Database](https://docs.microsoft.com/azure/sql-database/sql-database-technical-overview)
21+
- [Azure SQL Database](https://docs.microsoft.com/azure/sql-database/sql-database-technical-overview)
2222

23-
- [How to: Connect to SQL Azure Using JDBC](https://docs.microsoft.com/azure/sql-database/sql-database-connect-query-java)
23+
- [How to: Connect to Azure SQL Using JDBC](https://docs.microsoft.com/azure/sql-database/sql-database-connect-query-java)
2424

2525
- [Connecting using Azure Active Directory Authentication](connecting-using-azure-active-directory-authentication.md)
2626

@@ -35,7 +35,7 @@ When connecting to an [!INCLUDE[ssAzure](../../includes/ssazure_md.md)], idle co
3535

3636
- Idle at the TCP layer, where connections can be dropped by any number of network devices.
3737

38-
- Idle by the SQL Azure Gateway, where TCP **keepalive** messages might be occurring (making the connection not idle from a TCP perspective), but not had an active query in 30 minutes. In this scenario, the Gateway will determine that the TDS connection is idle at 30 minutes and terminate the connection.
38+
- Idle by the Azure SQL Gateway, where TCP **keepalive** messages might be occurring (making the connection not idle from a TCP perspective), but not had an active query in 30 minutes. In this scenario, the Gateway will determine that the TDS connection is idle at 30 minutes and terminate the connection.
3939

4040
To avoid dropping idle connections by a network component, the following registry settings (or their non-Windows equivalents) should be set on the operating system where the driver is loaded:
4141

@@ -61,7 +61,7 @@ Then add a AddKeepAlive.cmd file to your project. Set the "Copy to Output Direct
6161
```bat
6262
if exist keepalive.txt goto done
6363
time /t > keepalive.txt
64-
REM Workaround for JDBC keep alive on SQL Azure
64+
REM Workaround for JDBC keep alive on Azure SQL
6565
REG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /v KeepAliveTime /t REG_DWORD /d 30000 >> keepalive.txt
6666
REG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /v KeepAliveInterval /t REG_DWORD /d 1000 >> keepalive.txt
6767
REG ADD HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters /v TcpMaxDataRetransmissions /t REG_DWORD /d 10 >> keepalive.txt

docs/connect/jdbc/connecting-to-sql-server-with-the-jdbc-driver.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ System.setProperty("java.net.preferIPv6Addresses", "true");
3737
|[Using database mirroring &#40;JDBC&#41;](../../connect/jdbc/using-database-mirroring-jdbc.md)|Describes how the JDBC driver supports the use of database mirroring.|
3838
|[JDBC driver support for High Availability, disaster recovery](../../connect/jdbc/jdbc-driver-support-for-high-availability-disaster-recovery.md)|Describes how to develop an application that will connect to an AlwaysOn availability group.|
3939
|[Using Kerberos Integrated Authentication to Connect to SQL Server](../../connect/jdbc/using-kerberos-integrated-authentication-to-connect-to-sql-server.md)|Discusses a Java implementation for applications to connect to a [!INCLUDE[ssNoVersion](../../includes/ssnoversion-md.md)] database using Kerberos integrated authentication.|
40-
|[Connecting to an Azure SQL database](../../connect/jdbc/connecting-to-an-azure-sql-database.md)|Discusses connectivity issues for databases on SQL Azure.|
40+
|[Connecting to an Azure SQL database](../../connect/jdbc/connecting-to-an-azure-sql-database.md)|Discusses connectivity issues for databases on Azure SQL.|
4141

4242
## See also
4343
[Overview of the JDBC driver](../../connect/jdbc/overview-of-the-jdbc-driver.md)

docs/connect/jdbc/connecting-using-azure-active-directory-authentication.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Connection properties to support Azure Active Directory authentication in the Mi
2424
* **authentication**: Use this property to indicate which SQL authentication method to use for the connection.
2525
Possible values are:
2626
* **ActiveDirectoryMSI**
27-
* Supported since driver version **v7.2**, `authentication=ActiveDirectoryMSI` can be used to connect to an Azure SQL Database/Data Warehouse from inside of an Azure Resource with "Identity" support enabled. Optionally, **msiClientId** can also be specified in the Connection/DataSource properties along with this authentication mode, which must contain the Client ID of a Managed Service Identity to be used to acquire the **accessToken** for establishing the connection.
27+
* Supported since driver version **v7.2**, `authentication=ActiveDirectoryMSI` can be used to connect to an Azure SQL Database/Data Warehouse from inside of an Azure Resource with "Identity" support enabled. Optionally, **msiClientId** can also be specified in the Connection/DataSource properties along with this authentication mode, which must contain the Client ID of a Managed Identity to be used to acquire the **accessToken** for establishing the connection.
2828
* **ActiveDirectoryIntegrated**
2929
* Supported since driver version **v6.0**, `authentication=ActiveDirectoryIntegrated` can be used to connect to an Azure SQL Database/Data Warehouse using integrated authentication. To use this authentication mode, you need to federate the on-premise Active Directory Federation Services (ADFS) with Azure Active Directory in the cloud. Once it is set up, you can connect by either adding the native library 'mssql-jdbc_auth-\<version>-\<arch>.dll' to the application class path on Windows OS, or setting up a Kerberos ticket for cross-platform authentication support. You will be able to access Azure SQL Database/SQL Data Warehouse without being prompted for credentials when you're logged in to a domain joined machine.
3030
* **ActiveDirectoryPassword**
@@ -44,7 +44,7 @@ For **ActiveDirectoryMSI** authentication, the below components must be installe
4444
* Java 8 or above
4545
* Microsoft JDBC Driver 7.2 (or higher) for SQL Server
4646
* Client Environment must be an Azure Resource and must have "Identity" feature support enabled.
47-
* A contained database user representing your Azure Resource's System Assigned Managed Identity or User Assigned Managed Identity, or one of the groups your MSI belongs to, must exist in the target database and must have the CONNECT permission.
47+
* A contained database user representing your Azure Resource's System Assigned Managed Identity or User Assigned Managed Identity, or one of the groups your Managed Identity belongs to, must exist in the target database and must have the CONNECT permission.
4848

4949
For other authentication modes, the below components must be installed on the client machine:
5050
* Java 7 or above
@@ -62,7 +62,7 @@ Replace the server/database name with your server/database name in the following
6262
ds.setServerName("aad-managed-demo.database.windows.net"); // replace 'aad-managed-demo' with your server name
6363
ds.setDatabaseName("demo"); // replace with your database name
6464
//Optional
65-
ds.setMSIClientId("94de34e9-8e8c-470a-96df-08110924b814"); // Replace with Client ID of User-Assigned MSI to be used
65+
ds.setMSIClientId("94de34e9-8e8c-470a-96df-08110924b814"); // Replace with Client ID of User-Assigned Managed Identity to be used
6666
```
6767

6868
The example to use ActiveDirectoryMSI authentication mode:
@@ -82,7 +82,7 @@ public class AAD_MSI {
8282
ds.setDatabaseName("demo"); // Replace with your database name
8383
ds.setAuthentication("ActiveDirectoryMSI");
8484
// Optional
85-
ds.setMsiClientId("94de34e9-8e8c-470a-96df-08110924b814"); // Replace with Client ID of User-Assigned MSI to be used
85+
ds.setMsiClientId("94de34e9-8e8c-470a-96df-08110924b814"); // Replace with Client ID of User-Assigned Managed Identity to be used
8686

8787
try (Connection connection = ds.getConnection();
8888
Statement stmt = connection.createStatement();
@@ -98,7 +98,7 @@ public class AAD_MSI {
9898
Running this example on an Azure Virtual Machine fetches an access token from _System Assigned Managed Identity_ or _User Assigned Managed Identity_ (if **msiClientId** is specified) and establishes a connection using the fetched access token. If a connection is established, you should see the following message:
9999

100100
```bash
101-
You have successfully logged on as: <your MSI username>
101+
You have successfully logged on as: <your Managed Identity username>
102102
```
103103

104104
## Connecting using ActiveDirectoryIntegrated authentication mode

0 commit comments

Comments
 (0)