You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|`DB_CONNECTION_STRING`| The connection string of SQL server. |`jdbc:sqlserver://sqlserverforwlsaks.database.windows.net:1433;database=wlsaksquickstart0125`|
557
+
|`DB_CONNECTION_STRING`| The connection string of SQL server. |`jdbc:sqlserver://server-name.database.windows.net:1433;database=wlsaksquickstart0125`|
558
558
|`DB_USER`| The username to sign in to the SQL server. |`welogic@sqlserverforwlsaks`|
559
559
|`DB_PASSWORD`| The password to sign in to the sQL server. |`Secret123456`|
560
560
@@ -577,7 +577,7 @@ In the previous steps, you created the auxiliary image including models and WDT.
577
577
In the following commands, be sure to set the variables `DB_CONNECTION_STRING`, `DB_USER`, and `DB_PASSWORD` correctly by replacing the placeholder examples with the values described in the previous steps. Be sure to enclose the value of the `DB_` variables in single quotes to prevent the shell from interfering with the values.
|hive.metastore.hdi.metastoreDbConnectionURL|JDBC connection string to database.|jdbc:sqlserver://mysqlserver1.database.windows.net;database=myhmsdb1;encrypt=true;trustServerCertificate=true;create=false;loginTimeout=30|
53
+
|hive.metastore.hdi.metastoreDbConnectionURL|JDBC connection string to database.|jdbc:sqlserver://server-name.database.windows.net;database=myhmsdb1;encrypt=true;trustServerCertificate=true;create=false;loginTimeout=30|
54
54
|hive.metastore.hdi.metastoreDbConnectionUserName|SQL user name to connect to database.|trinoadmin|
55
55
|hive.metastore.hdi.metastoreDbConnectionPasswordSecret|Secret referenceName configured in secretsProfile with password.|hms-db-pwd|
56
56
|hive.metastore.hdi.metastoreWarehouseDir|ABFS URI to location in storage where data is stored.|`abfs://[email protected]/hive/warehouse`|
@@ -127,7 +127,7 @@ To configure external Hive metastore to an existing Trino cluster, add the requi
@@ -181,7 +181,7 @@ Alternatively external Hive metastore database parameters can be specified in `t
181
181
|---|---|---|
182
182
|trinoProfile.catalogOptions.hive|List of Hive or iceberg or delta catalogs with parameters of external Hive metastore database, require parameters for each. To use external metastore database, catalog must be present in this list.
183
183
|trinoProfile.catalogOptions.hive[*].catalogName|Name of Trino catalog configured in `serviceConfigsProfiles`, which configured to use external Hive metastore database.|hive1|
184
-
|trinoProfile.catalogOptions.hive[*].metastoreDbConnectionURL|JDBC connection string to database.|jdbc:sqlserver://mysqlserver1.database.windows.net;database=myhmsdb1;encrypt=true;trustServerCertificate=true;create=false;loginTimeout=30|
184
+
|trinoProfile.catalogOptions.hive[*].metastoreDbConnectionURL|JDBC connection string to database.|jdbc:sqlserver://server-name.database.windows.net;database=myhmsdb1;encrypt=true;trustServerCertificate=true;create=false;loginTimeout=30|
185
185
|trinoProfile.catalogOptions.hive[*].metastoreDbConnectionUserName|SQL user name to connect to database.|trinoadmin|
186
186
|trinoProfile.catalogOptions.hive[*].metastoreDbConnectionPasswordSecret|Secret referenceName configured in secretsProfile with password.|hms-db-pwd|
187
187
|trinoProfile.catalogOptions.hive[*].metastoreWarehouseDir|ABFS URI to location in storage where data is stored.|`abfs://[email protected]/hive/warehouse`|
@@ -236,7 +236,7 @@ Alternatively external Hive metastore database parameters can be specified in `t
Copy file name to clipboardExpand all lines: articles/private-link/tutorial-inspect-traffic-azure-firewall.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -130,7 +130,7 @@ In this section, you enable the firewall logs and send them to the log analytics
130
130
| Resource group | Select **test-rg**. |
131
131
|**Database details**||
132
132
| Database name | Enter **sql-db**. |
133
-
| Server | Select **Create new**. </br> Enter **sql-server-1** in **Server name** (Server names must be unique, replace **sql-server-1** with a unique value). </br> Select **(US) East US 2** in **Location**. </br> Select **Use SQL authentication**. </br> Enter a server admin sign-in and password. </br> Select **OK**. |
133
+
| Server | Select **Create new**. </br> Enter **server-name** in **Server name** (Server names must be unique, replace **server-name** with a unique value). </br> Select **(US) East US 2** in **Location**. </br> Select **Use SQL authentication**. </br> Enter a server admin sign-in and password. </br> Select **OK**. |
134
134
| Want to use SQL elastic pool? | Select **No**. |
135
135
| Workload environment | Leave the default of **Production**. |
136
136
|**Backup storage redundancy**||
@@ -322,7 +322,7 @@ The route sends traffic from **vnet-1** to the address space of virtual network
322
322
323
323
## Configure an application rule in Azure Firewall
324
324
325
-
Create an application rule to allow communication from **vnet-1** to the private endpoint of the Azure SQL server **sql-server-1.database.windows.net**. Replace **sql-server-1** with the name of your Azure SQL server.
325
+
Create an application rule to allow communication from **vnet-1** to the private endpoint of the Azure SQL server **server-name.database.windows.net**. Replace **server-name** with the name of your Azure SQL server.
326
326
327
327
1. In the search box at the top of the portal, enter **Firewall**. Select **Firewall Policies** in the search results.
328
328
@@ -348,7 +348,7 @@ Create an application rule to allow communication from **vnet-1** to the private
348
348
| Source | Enter **10.0.0.0/16**|
349
349
| Protocol | Enter **mssql:1433**|
350
350
| Destination type | Select **FQDN**. |
351
-
| Destination | Enter **sql-server-1.database.windows.net**. |
351
+
| Destination | Enter **server-name.database.windows.net**. |
352
352
353
353
1. Select **Add**.
354
354
@@ -367,7 +367,7 @@ Create an application rule to allow communication from **vnet-1** to the private
367
367
1. To verify name resolution of the private endpoint, enter the following command in the terminal window:
368
368
369
369
```bash
370
-
nslookup sql-server-1.database.windows.net
370
+
nslookup server-name.database.windows.net
371
371
```
372
372
373
373
You receive a message similar to the following example. The IP address returned is the private IP address of the private endpoint.
@@ -390,10 +390,10 @@ Create an application rule to allow communication from **vnet-1** to the private
390
390
391
391
* Replace **\<admin-password>** with the admin password you entered during SQL server creation.
392
392
393
-
* Replace **sql-server-1** with the name of your SQL server.
393
+
* Replace **server-name** with the name of your SQL server.
1. A SQL command prompt is displayed on successful sign in. Enter **exit** to exit the **sqlcmd** tool.
@@ -408,7 +408,7 @@ Create an application rule to allow communication from **vnet-1** to the private
408
408
409
409
1. In the example **Queries**in the search box, enter **Application rule**. In the returned results in**Network**, selectthe**Run** button for**Application rule log data**.
410
410
411
-
1. In the log query output, verify **sql-server-1.database.windows.net** is listed under **FQDN** and **SQLPrivateEndpoint** is listed under **Rule**.
411
+
1. In the log query output, verify **server-name.database.windows.net** is listed under **FQDN** and **SQLPrivateEndpoint** is listed under **Rule**.
0 commit comments