Skip to content

Commit 82d5f36

Browse files
committed
update SQL connection string placeholders
1 parent 1f88224 commit 82d5f36

File tree

5 files changed

+17
-17
lines changed

5 files changed

+17
-17
lines changed

articles/aks/howto-deploy-java-wls-app.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -554,7 +554,7 @@ In the previous steps, you created the auxiliary image including models and WDT.
554554
555555
| Variable | Description | Example |
556556
|------------------------|--------------------------------------------|-----------------------------------------------------------------------------------------------|
557-
| `DB_CONNECTION_STRING` | The connection string of SQL server. | `jdbc:sqlserver://sqlserverforwlsaks.database.windows.net:1433;database=wlsaksquickstart0125` |
557+
| `DB_CONNECTION_STRING` | The connection string of SQL server. | `jdbc:sqlserver://server-name.database.windows.net:1433;database=wlsaksquickstart0125` |
558558
| `DB_USER` | The username to sign in to the SQL server. | `welogic@sqlserverforwlsaks` |
559559
| `DB_PASSWORD` | The password to sign in to the sQL server. | `Secret123456` |
560560
@@ -577,7 +577,7 @@ In the previous steps, you created the auxiliary image including models and WDT.
577577
In the following commands, be sure to set the variables `DB_CONNECTION_STRING`, `DB_USER`, and `DB_PASSWORD` correctly by replacing the placeholder examples with the values described in the previous steps. Be sure to enclose the value of the `DB_` variables in single quotes to prevent the shell from interfering with the values.
578578
579579
```bash
580-
export DB_CONNECTION_STRING='<example-jdbc:sqlserver://sqlserverforwlsaks.database.windows.net:1433;database=wlsaksquickstart0125>'
580+
export DB_CONNECTION_STRING='<example-jdbc:sqlserver://server-name.database.windows.net:1433;database=wlsaksquickstart0125>'
581581
export DB_USER='<example-welogic@sqlserverforwlsaks>'
582582
export DB_PASSWORD='<example-Secret123456>'
583583
export WLS_DOMAIN_NS=sample-domain1-ns

articles/hdinsight-aks/trino/trino-add-catalogs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ This article demonstrates how you can add a new catalog to your cluster using AR
7979
},
8080
{
8181
"fileName": "trinotestdb1.properties",
82-
"content":"connector.name=sqlserver\nconnection-url=jdbc:sqlserver://mysqlserver1.database.windows.net:1433;database=db1;encrypt=true;trustServerCertificate=false;hostNameInCertificate=*.database.windows.net;loginTimeout=30;\nconnection-user=${SECRET_REF:trinotest-admin-user}\nconnection-password=${SECRET_REF:trinotest-admin-pwd}\n"
82+
"content":"connector.name=sqlserver\nconnection-url=jdbc:sqlserver://server-name.database.windows.net:1433;database=db1;encrypt=true;trustServerCertificate=false;hostNameInCertificate=*.database.windows.net;loginTimeout=30;\nconnection-user=${SECRET_REF:trinotest-admin-user}\nconnection-password=${SECRET_REF:trinotest-admin-pwd}\n"
8383
},
8484
]
8585
}

articles/hdinsight-aks/trino/trino-connect-to-metastore.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Configure external Hive metastore database in `config.properties` file:
4141
{
4242
"fileName": "config.properties",
4343
"values": {
44-
"hive.metastore.hdi.metastoreDbConnectionURL": "jdbc:sqlserver://mysqlserver1.database.windows.net;database=myhmsdb1;encrypt=true;trustServerCertificate=true;create=false;loginTimeout=30",
44+
"hive.metastore.hdi.metastoreDbConnectionURL": "jdbc:sqlserver://server-name.database.windows.net;database=myhmsdb1;encrypt=true;trustServerCertificate=true;create=false;loginTimeout=30",
4545
"hive.metastore.hdi.metastoreDbConnectionUserName": "trinoadmin",
4646
"hive.metastore.hdi.metastoreDbConnectionPasswordSecret": "hms-db-pwd",
4747
"hive.metastore.hdi.metastoreWarehouseDir": "abfs://[email protected]/hive/warehouse"
@@ -50,7 +50,7 @@ Configure external Hive metastore database in `config.properties` file:
5050
```
5151
| Property| Description| Example|
5252
|---|---|---|
53-
|hive.metastore.hdi.metastoreDbConnectionURL|JDBC connection string to database.|jdbc:sqlserver://mysqlserver1.database.windows.net;database=myhmsdb1;encrypt=true;trustServerCertificate=true;create=false;loginTimeout=30|
53+
|hive.metastore.hdi.metastoreDbConnectionURL|JDBC connection string to database.|jdbc:sqlserver://server-name.database.windows.net;database=myhmsdb1;encrypt=true;trustServerCertificate=true;create=false;loginTimeout=30|
5454
|hive.metastore.hdi.metastoreDbConnectionUserName|SQL user name to connect to database.|trinoadmin|
5555
|hive.metastore.hdi.metastoreDbConnectionPasswordSecret|Secret referenceName configured in secretsProfile with password.|hms-db-pwd|
5656
|hive.metastore.hdi.metastoreWarehouseDir|ABFS URI to location in storage where data is stored.|`abfs://[email protected]/hive/warehouse`|
@@ -127,7 +127,7 @@ To configure external Hive metastore to an existing Trino cluster, add the requi
127127
{
128128
"fileName": "config.properties",
129129
"values": {
130-
"hive.metastore.hdi.metastoreDbConnectionURL": "jdbc:sqlserver://mysqlserver1.database.windows.net;database=myhmsdb1;encrypt=true;trustServerCertificate=true;create=false;loginTimeout=30",
130+
"hive.metastore.hdi.metastoreDbConnectionURL": "jdbc:sqlserver://server-name.database.windows.net;database=myhmsdb1;encrypt=true;trustServerCertificate=true;create=false;loginTimeout=30",
131131
"hive.metastore.hdi.metastoreDbConnectionUserName": "trinoadmin",
132132
"hive.metastore.hdi.metastoreDbConnectionPasswordSecret": "hms-db-pwd",
133133
"hive.metastore.hdi.metastoreWarehouseDir": "abfs://[email protected]/hive/warehouse"
@@ -181,7 +181,7 @@ Alternatively external Hive metastore database parameters can be specified in `t
181181
|---|---|---|
182182
|trinoProfile.catalogOptions.hive|List of Hive or iceberg or delta catalogs with parameters of external Hive metastore database, require parameters for each. To use external metastore database, catalog must be present in this list.
183183
|trinoProfile.catalogOptions.hive[*].catalogName|Name of Trino catalog configured in `serviceConfigsProfiles`, which configured to use external Hive metastore database.|hive1|
184-
|trinoProfile.catalogOptions.hive[*].metastoreDbConnectionURL|JDBC connection string to database.|jdbc:sqlserver://mysqlserver1.database.windows.net;database=myhmsdb1;encrypt=true;trustServerCertificate=true;create=false;loginTimeout=30|
184+
|trinoProfile.catalogOptions.hive[*].metastoreDbConnectionURL|JDBC connection string to database.|jdbc:sqlserver://server-name.database.windows.net;database=myhmsdb1;encrypt=true;trustServerCertificate=true;create=false;loginTimeout=30|
185185
|trinoProfile.catalogOptions.hive[*].metastoreDbConnectionUserName|SQL user name to connect to database.|trinoadmin|
186186
|trinoProfile.catalogOptions.hive[*].metastoreDbConnectionPasswordSecret|Secret referenceName configured in secretsProfile with password.|hms-db-pwd|
187187
|trinoProfile.catalogOptions.hive[*].metastoreWarehouseDir|ABFS URI to location in storage where data is stored.|`abfs://[email protected]/hive/warehouse`|
@@ -236,7 +236,7 @@ Alternatively external Hive metastore database parameters can be specified in `t
236236
"hive": [
237237
{
238238
"catalogName": "hive1",
239-
"metastoreDbConnectionURL": "jdbc:sqlserver://mysqlserver1.database.windows.net;database=myhmsdb1;encrypt=true;trustServerCertificate=true;create=false;loginTimeout=30",
239+
"metastoreDbConnectionURL": "jdbc:sqlserver://server-name.database.windows.net;database=myhmsdb1;encrypt=true;trustServerCertificate=true;create=false;loginTimeout=30",
240240
"metastoreDbConnectionUserName": "trinoadmin",
241241
"metastoreDbConnectionPasswordSecret": "hms-db-pwd",
242242
"metastoreWarehouseDir": "abfs://[email protected]/hive/warehouse"

articles/private-link/tutorial-inspect-traffic-azure-firewall.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ In this section, you enable the firewall logs and send them to the log analytics
130130
| Resource group | Select **test-rg**. |
131131
| **Database details** | |
132132
| Database name | Enter **sql-db**. |
133-
| Server | Select **Create new**. </br> Enter **sql-server-1** in **Server name** (Server names must be unique, replace **sql-server-1** with a unique value). </br> Select **(US) East US 2** in **Location**. </br> Select **Use SQL authentication**. </br> Enter a server admin sign-in and password. </br> Select **OK**. |
133+
| Server | Select **Create new**. </br> Enter **server-name** in **Server name** (Server names must be unique, replace **server-name** with a unique value). </br> Select **(US) East US 2** in **Location**. </br> Select **Use SQL authentication**. </br> Enter a server admin sign-in and password. </br> Select **OK**. |
134134
| Want to use SQL elastic pool? | Select **No**. |
135135
| Workload environment | Leave the default of **Production**. |
136136
| **Backup storage redundancy** | |
@@ -322,7 +322,7 @@ The route sends traffic from **vnet-1** to the address space of virtual network
322322

323323
## Configure an application rule in Azure Firewall
324324

325-
Create an application rule to allow communication from **vnet-1** to the private endpoint of the Azure SQL server **sql-server-1.database.windows.net**. Replace **sql-server-1** with the name of your Azure SQL server.
325+
Create an application rule to allow communication from **vnet-1** to the private endpoint of the Azure SQL server **server-name.database.windows.net**. Replace **server-name** with the name of your Azure SQL server.
326326

327327
1. In the search box at the top of the portal, enter **Firewall**. Select **Firewall Policies** in the search results.
328328

@@ -348,7 +348,7 @@ Create an application rule to allow communication from **vnet-1** to the private
348348
| Source | Enter **10.0.0.0/16** |
349349
| Protocol | Enter **mssql:1433** |
350350
| Destination type | Select **FQDN**. |
351-
| Destination | Enter **sql-server-1.database.windows.net**. |
351+
| Destination | Enter **server-name.database.windows.net**. |
352352

353353
1. Select **Add**.
354354

@@ -367,7 +367,7 @@ Create an application rule to allow communication from **vnet-1** to the private
367367
1. To verify name resolution of the private endpoint, enter the following command in the terminal window:
368368

369369
```bash
370-
nslookup sql-server-1.database.windows.net
370+
nslookup server-name.database.windows.net
371371
```
372372

373373
You receive a message similar to the following example. The IP address returned is the private IP address of the private endpoint.
@@ -390,10 +390,10 @@ Create an application rule to allow communication from **vnet-1** to the private
390390

391391
* Replace **\<admin-password>** with the admin password you entered during SQL server creation.
392392

393-
* Replace **sql-server-1** with the name of your SQL server.
393+
* Replace **server-name** with the name of your SQL server.
394394

395395
```bash
396-
sqlcmd -S sql-server-1.database.windows.net -U '<server-admin>' -P '<admin-password>'
396+
sqlcmd -S server-name.database.windows.net -U '<server-admin>' -P '<admin-password>'
397397
```
398398

399399
1. A SQL command prompt is displayed on successful sign in. Enter **exit** to exit the **sqlcmd** tool.
@@ -408,7 +408,7 @@ Create an application rule to allow communication from **vnet-1** to the private
408408

409409
1. In the example **Queries** in the search box, enter **Application rule**. In the returned results in **Network**, select the **Run** button for **Application rule log data**.
410410

411-
1. In the log query output, verify **sql-server-1.database.windows.net** is listed under **FQDN** and **SQLPrivateEndpoint** is listed under **Rule**.
411+
1. In the log query output, verify **server-name.database.windows.net** is listed under **FQDN** and **SQLPrivateEndpoint** is listed under **Rule**.
412412

413413
[!INCLUDE [portal-clean-up.md](../../includes/portal-clean-up.md)]
414414

articles/private-link/tutorial-private-endpoint-sql-portal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,7 @@ In this section, you use the virtual machine you created in the previous steps t
123123
1. To verify name resolution of the private endpoint, enter the following command in the terminal window:
124124

125125
```bash
126-
nslookup sql-server-1.database.windows.net
126+
nslookup server-name.database.windows.net
127127
```
128128

129129
You receive a message similar to the following example. The IP address returned is the private IP address of the private endpoint.
@@ -149,7 +149,7 @@ In this section, you use the virtual machine you created in the previous steps t
149149
* Replace **sql-server-1** with the name of your SQL server.
150150

151151
```bash
152-
sqlcmd -S sql-server-1.database.windows.net -U '<server-admin>' -P '<admin-password>'
152+
sqlcmd -S server-name.database.windows.net -U '<server-admin>' -P '<admin-password>'
153153
```
154154

155155
1. A SQL command prompt is displayed on successful sign in. Enter **exit** to exit the **sqlcmd** tool.

0 commit comments

Comments
 (0)