Skip to content

Commit 470cd03

Browse files
authored
Merge branch 'MicrosoftDocs:main' into 250731-managed-identity-versioning
2 parents ed4985b + 7c001e1 commit 470cd03

File tree

4 files changed

+189
-198
lines changed

4 files changed

+189
-198
lines changed

azure-sql/database/intelligent-insights-troubleshoot-performance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ Because a pagelatch is an internal control mechanism, it automatically determine
166166

167167
One method for handling latch contention is to replace a sequential index key with a nonsequential key to evenly distribute inserts across an index range. Typically, a leading column in the index distributes the workload proportionally. Another method to consider is table partitioning. Creating a hash partitioning scheme with a computed column on a partitioned table is a common approach for mitigating excessive latch contention. In the case of pagelatch IO contention, introducing indexes helps to mitigate this performance issue.
168168

169-
For more information, see [Diagnose and resolve latch contention on SQL Server](http://databaser.net/moniwiki/pds/PerformanceTuning/SQLServerLatchContention.pdf) (PDF download).
169+
For more information, see [Diagnose and resolve latch contention on SQL Server](https://learn.microsoft.com/en-us/sql/relational-databases/performance/diagnose-resolve-latch-contention-sql-server).
170170

171171
## Missing index
172172

docs/relational-databases/security/authentication-access/database-level-roles.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: SQL Server provides several roles that are security principals that
44
author: VanMSFT
55
ms.author: vanto
66
ms.reviewer: randolphwest
7-
ms.date: 02/28/2025
7+
ms.date: 07/31/2025
88
ms.service: sql
99
ms.subservice: security
1010
ms.topic: conceptual
@@ -74,7 +74,7 @@ The following table shows the fixed database roles and their capabilities. These
7474
| **db_datawriter** | Members of the **db_datawriter** fixed database role can add, delete, or change data in all user tables. In most use cases, this role is combined with **db_datareader** membership to allow reading the data that is to be modified. |
7575
| **db_datareader** | Members of the **db_datareader** fixed database role can read all data from all user tables and views. User objects can exist in any schema except `sys` and `INFORMATION_SCHEMA`. |
7676
| **db_denydatawriter** | Members of the **db_denydatawriter** fixed database role can't add, modify, or delete any data in the user tables within a database. |
77-
| **db_denydatareader** | Members of the **db_denydatareader** fixed database role can't read any data from the user tables and views within a database. |
77+
| **db_denydatareader** | Members of the **db_denydatareader** fixed database role can't read any data from the user tables and views within a database. Members of this role also can't read metadata about the database and its objects, such as viewing system views. |
7878

7979
The permissions assigned to the fixed database roles can't be changed. All roles (including the `public` role) have the CONNECT permissions. The following figure shows the permissions assigned to the fixed database roles:
8080

0 commit comments

Comments
 (0)