Skip to content

Commit c803d59

Browse files
committed
fixing merge conflict
1 parent 1338664 commit c803d59

File tree

2 files changed

+7
-10
lines changed

2 files changed

+7
-10
lines changed

articles/postgresql/migrate/migration-service/best-practices-migration-service-postgresql.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ The following phases are considered for calculating the total downtime to perfor
5353
- Matching counts for all the database objects (tables, sequences, extensions, procedures, and indexes).
5454
- Comparing maximum or minimum IDs of key application-related columns.
5555

56-
> [!NOTE]
56+
> [!NOTE]
5757
> The size of databases needs to be the right metric for validation. The source instance might have bloats or dead tuples, which can bump up the size of the source instance. It's normal to have size differences between source instances and target servers. An issue in the first three steps of validation indicates a problem with the migration.
5858
5959
- **Migration of server settings**: Any custom server parameters, firewall rules (if applicable), tags, and alerts must be manually copied from the source instance to the target.
@@ -90,7 +90,7 @@ If the data distribution on the source is highly skewed, with most of the data p
9090

9191
1. The table must have a column with a simple (not composite) primary key or unique index of type int or significant int.
9292

93-
> [!NOTE]
93+
> [!NOTE]
9494
> In the case of approaches #2 or #3, you must carefully evaluate the implications of adding a unique index column to the source schema. Only after confirmation that adding a unique index column won't affect the application should you go ahead with the changes.
9595
9696
1. If the table doesn't have a simple primary key or unique index of type int or significant int but has a column that meets the data type criteria, the column can be converted into a unique index by using the following command. This command doesn't require a lock on the table.

articles/postgresql/migrate/migration-service/concepts-user-roles-migration-service.md

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ This section explores the differences in permissions granted to the **azure_pg_a
2828

2929
### PG catalog permissions
3030

31-
Unlike user-created schemas, which organize database objects into logical groups, pg_catalog is a system schema. It houses crucial system-level information, such as details about tables, columns, and other internal bookkeeping data. Essentially, it's where PostgreSQL stores important metadata.
31+
Unlike user-created schemas, which organize database objects into logical groups, pg_catalog is a system schema. It houses crucial system-level information, such as details about tables, columns, and other internal bookkeeping data. It's where PostgreSQL stores important metadata.
3232

3333
- In a single server environment, a user belonging to the azure_pg_admin role is granted select privileges for all pg_catalog tables and views.
3434
- In a flexible server environment, privileges are restricted for certain tables and views so that only superusers are allowed to query them.
@@ -57,7 +57,7 @@ We removed all privileges for non-superusers on the following pg_catalog views:
5757

5858
- pg_shadow
5959

60-
Allowing unrestricted access to these system tables and views could lead to unauthorized modifications, accidental deletions, or even security breaches. Festricted access reduces the risk of unintended changes or data exposure.
60+
Allowing unrestricted access to these system tables and views could lead to unauthorized modifications, accidental deletions, or even security breaches. Restricted access reduces the risk of unintended changes or data exposure.
6161

6262
### pg_pltemplate deprecation
6363

@@ -66,7 +66,7 @@ Another important consideration is the deprecation of the **pg_pltemplate** syst
6666
#### What is the impact?
6767

6868
- If your application is designed to directly query the affected tables and views, it encounters issues upon migrating to the flexible server. We strongly advise you to refactor your application to avoid direct queries to these system tables.
69-
- If you have granted or revoked privileges to any users or roles for the affected pg_catalog tables and views, you encounter an error during the migration process. You can identify this error by the following pattern:
69+
- If you've granted or revoked privileges to any users or roles for the affected pg_catalog tables and views, you encounter an error during the migration process. You can identify this error by the following pattern:
7070

7171
```sql
7272
pg_restore error: could not execute query <GRANT/REVOKE> <PRIVILEGES> on <affected TABLE/VIEWS> to <user>.
@@ -120,16 +120,13 @@ REVOKE SELECT ON pg_authid FROM adminuser1;
120120
REVOKE SELECT ON pg_shadow FROM adminuser2;
121121
REVOKE UPDATE ON pg_shadow FROM adminuser2;
122122
```
123-
<<<<<<< HEAD
124-
=======
125123

126124
**Step 4: Final Verification**
127125

128-
Run the query from Step 1 again to ensure that the resulting output set is empty.
126+
Run the query from step 1 again to ensure that the resulting output set is empty.
129127

130128
> [!NOTE]
131-
> Make sure you perform the above steps for all the databases included in the migration to avoid any permission-related issues during the migration.
132-
>>>>>>> 650471f5f972debc44f06e7f505345c09d6603d1
129+
> Make sure you perform the preceding steps for all the databases included in the migration to avoid any permission-related issues during the migration.
133130
134131
> [!NOTE]
135132
> Make sure you perform the preceding steps for all the databases included in the migration to avoid any permission-related issues during the migration.

0 commit comments

Comments
 (0)