@@ -10,11 +10,12 @@ ms.date: 1/8/2019
10
10
11
11
# Create users in Azure Database for PostgreSQL - Hyperscale (Citus)
12
12
13
- This article describes how you can create users within a Hyperscale (Citus)
14
- server group. To learn instead about Azure subscription users and their
15
- privileges, visit the [ Azure role based access control (RBAC)
16
- article] ( ../role-based-access-control/built-in-roles.md ) or review [ how to
17
- customize roles] ( ../role-based-access-control/custom-roles.md ) .
13
+ > [ !NOTE]
14
+ > The term "users" refers to users within a Hyperscale (Citus)
15
+ > server group. To learn instead about Azure subscription users and their
16
+ > privileges, visit the [ Azure role based access control (RBAC)
17
+ > article] ( ../role-based-access-control/built-in-roles.md ) or review [ how to
18
+ > customize roles] ( ../role-based-access-control/custom-roles.md ) .
18
19
19
20
## The server admin account
20
21
@@ -34,19 +35,19 @@ provides the *citus* role.
34
35
35
36
Permissions for the citus role:
36
37
37
- * Read all configuration variables, even those normally visible only to
38
+ * Read all configuration variables, even variables normally visible only to
38
39
superusers.
39
- * Read all pg\_ stat\_\* views and use various statistics related extensions,
40
- even those normally visible only to superusers.
40
+ * Read all pg\_ stat\_\* views and use various statistics- related extensions --
41
+ even views or extensions normally visible only to superusers.
41
42
* Execute monitoring functions that may take ACCESS SHARE locks on tables,
42
43
potentially for a long time.
43
- * (member of azure \_ pg \_ admin)
44
- * Can [ create PostgreSQL extensions ] ( concepts-hyperscale-extensions.md )
44
+ * [ Create PostgreSQL extensions ] ( concepts-hyperscale-extensions.md ) (because
45
+ the role is a member of azure \_ pg \_ admin).
45
46
46
- Noteably , the citus role has some restrictions:
47
+ Notably , the citus role has some restrictions:
47
48
48
- * Cannot create roles
49
- * Cannot create databases
49
+ * Can't create roles
50
+ * Can't create databases
50
51
51
52
## How to create additional users
52
53
@@ -80,7 +81,7 @@ GRANT SELECT ON mytable TO db_user;
80
81
81
82
Hyperscale (Citus) propagates single-table GRANT statements through the entire
82
83
cluster, applying them on all worker nodes. However GRANTs that are system-wide
83
- (e.g. for all tables in a schema) need to be run on every date node. Use the
84
+ (for example, for all tables in a schema) need to be run on every date node. Use the
84
85
* run_command_on_workers()* helper function:
85
86
86
87
``` sql
@@ -95,9 +96,9 @@ SELECT run_command_on_workers(
95
96
96
97
## How to delete a user or change their password
97
98
98
- Go to the ** Roles** page for your Hyperscale server group, and click the
99
- ellipses ** ...** next to a user. The ellipses will open a menu to delete
100
- the user or reset their password.
99
+ To update a user, visit the ** Roles** page for your Hyperscale server group,
100
+ and click the ellipses ** ...** next to the user. The ellipses will open a menu
101
+ to delete the user or reset their password.
101
102
102
103
![ Edit a role] ( media/howto-hyperscale-create-users/edit-role.png )
103
104
0 commit comments