Skip to content
This repository was archived by the owner on Sep 2, 2025. It is now read-only.

Commit 12c8a0f

Browse files
authored
Merge pull request #1216 from splunk/repo-sync
Pulling refs/heads/main into main
2 parents b02a1d0 + 7ab6b5d commit 12c8a0f

File tree

2 files changed

+15
-5
lines changed

2 files changed

+15
-5
lines changed

gdi/monitors-databases/microsoft-sql-server.rst

Lines changed: 12 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,16 @@ Installation
2222

2323
.. include:: /_includes/collector-installation.rst
2424

25+
Authentication
26+
~~~~~~~~~~~~~~~~~~~~~~~~~~
27+
28+
This integration supports Windows and SQL authentication.
29+
30+
- Windows authentication doesn't require a username and password, as it uses the account where the Collector is running.
31+
- SQL authentication uses the account you configure for the integration. See :ref:`sql-installation-user`.
32+
33+
.. _sql-installation-user:
34+
2535
Microsoft SQL installation
2636
~~~~~~~~~~~~~~~~~~~~~~~~~~
2737

@@ -190,10 +200,7 @@ Troubleshooting
190200
TCP/IP is deactivated
191201
~~~~~~~~~~~~~~~~~~~~~
192202

193-
In some Windows-based SQL Server instances, TCP/IP has been deactivated
194-
by default. You might encounter this in a Microsoft Azure service
195-
instance. If you see error messages similar to ``Cannot read handshake packet: read tcp: wsarecv: An existing connection was forcibly closed by the remote host.``,
196-
you need to explicitly activate TCP/IP for the instance.
203+
In some Windows-based SQL Server instances, TCP/IP has been deactivated by default. You might encounter this in a Microsoft Azure service instance. If you see error messages similar to ``Cannot read handshake packet: read tcp: wsarecv: An existing connection was forcibly closed by the remote host.``, you need to explicitly activate TCP/IP for the instance.
197204

198205
1. Verify agent configurations are correct.
199206

@@ -205,7 +212,7 @@ you need to explicitly activate TCP/IP for the instance.
205212
Applications`, then :menuselection:`SQL Server Configuration Manager`, then :menuselection:`SQL
206213
Server Network Configuration`.
207214

208-
4. Select :menuselection:`Protocols for <YOUR SQL SERVER NAME>`.
215+
4. Select :menuselection:`Protocols for <your_sql_server_name>`.
209216

210217
5. In the protocol list, right-click the :strong:`TCP/IP` protocol and select
211218
:strong:`Enable`.

splunkplatform/unified-id/unified-identity.rst

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,7 @@ Splunk Cloud Platform customers who want to purchase Splunk Observability Cloud
5656

5757
Existing Splunk Observability Cloud customers
5858
------------------------------------------------------------------------------------------
59+
5960
If you already have a Splunk Cloud Platform account and a Splunk Observability Cloud account, take the following actions to set up Unified Identity:
6061

6162
1. Turn on token authentication to allow Splunk Observability Cloud to view your Splunk Cloud Platform logs. See :new-page:`Enable or disable token authentication <https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/EnableTokenAuth>` to learn how.
@@ -70,6 +71,8 @@ If you already have a Splunk Cloud Platform account and a Splunk Observability C
7071
7172
Replace the access token, ``GrkvoDav1M-FNyxdONtK2Q`` in the example above, with the user API access token you retrieved from Splunk Observability Cloud in previous step.
7273

74+
.. note:: If you haven't installed the ACS command-line tool, see :new-page:`Administer Splunk Cloud Platform using the ACS CLI <https://docs.splunk.com/Documentation/SplunkCloud/latest/Config/ACSCLI>`.
75+
7376
The pairing command returns a pairing id:
7477

7578
.. image:: /_images/splunkplatform/pairingID.png

0 commit comments

Comments
 (0)