Skip to content

Commit 71eb3d0

Browse files
committed
Acrolinx, plus clarity about azure_pg_admin
1 parent 12f9f47 commit 71eb3d0

File tree

1 file changed

+18
-17
lines changed

1 file changed

+18
-17
lines changed

articles/postgresql/howto-hyperscale-create-users.md

Lines changed: 18 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -10,11 +10,12 @@ ms.date: 1/8/2019
1010

1111
# Create users in Azure Database for PostgreSQL - Hyperscale (Citus)
1212

13-
This article describes how you can create users within a Hyperscale (Citus)
14-
server group. To learn instead about Azure subscription users and their
15-
privileges, visit the [Azure role based access control (RBAC)
16-
article](../role-based-access-control/built-in-roles.md) or review [how to
17-
customize roles](../role-based-access-control/custom-roles.md).
13+
> [!NOTE]
14+
> The term "users" refers to users within a Hyperscale (Citus)
15+
> server group. To learn instead about Azure subscription users and their
16+
> privileges, visit the [Azure role based access control (RBAC)
17+
> article](../role-based-access-control/built-in-roles.md) or review [how to
18+
> customize roles](../role-based-access-control/custom-roles.md).
1819
1920
## The server admin account
2021

@@ -34,19 +35,19 @@ provides the *citus* role.
3435

3536
Permissions for the citus role:
3637

37-
* Read all configuration variables, even those normally visible only to
38+
* Read all configuration variables, even variables normally visible only to
3839
superusers.
39-
* Read all pg\_stat\_\* views and use various statistics related extensions,
40-
even those normally visible only to superusers.
40+
* Read all pg\_stat\_\* views and use various statistics-related extensions --
41+
even views or extensions normally visible only to superusers.
4142
* Execute monitoring functions that may take ACCESS SHARE locks on tables,
4243
potentially for a long time.
43-
* (member of azure\_pg\_admin)
44-
* Can [create PostgreSQL extensions](concepts-hyperscale-extensions.md)
44+
* [Create PostgreSQL extensions](concepts-hyperscale-extensions.md) (because
45+
the role is a member of azure\_pg\_admin).
4546

46-
Noteably, the citus role has some restrictions:
47+
Notably, the citus role has some restrictions:
4748

48-
* Cannot create roles
49-
* Cannot create databases
49+
* Can't create roles
50+
* Can't create databases
5051

5152
## How to create additional users
5253

@@ -80,7 +81,7 @@ GRANT SELECT ON mytable TO db_user;
8081

8182
Hyperscale (Citus) propagates single-table GRANT statements through the entire
8283
cluster, applying them on all worker nodes. However GRANTs that are system-wide
83-
(e.g. for all tables in a schema) need to be run on every date node. Use the
84+
(for example, for all tables in a schema) need to be run on every date node. Use the
8485
*run_command_on_workers()* helper function:
8586

8687
```sql
@@ -95,9 +96,9 @@ SELECT run_command_on_workers(
9596

9697
## How to delete a user or change their password
9798

98-
Go to the **Roles** page for your Hyperscale server group, and click the
99-
ellipses **...** next to a user. The ellipses will open a menu to delete
100-
the user or reset their password.
99+
To update a user, visit the **Roles** page for your Hyperscale server group,
100+
and click the ellipses **...** next to the user. The ellipses will open a menu
101+
to delete the user or reset their password.
101102

102103
![Edit a role](media/howto-hyperscale-create-users/edit-role.png)
103104

0 commit comments

Comments
 (0)