You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-sql/database/firewall-configure.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,10 +31,13 @@ Connection attempts from the internet and Azure must pass through the firewall b
31
31
32
32
### Server-level IP firewall rules
33
33
34
-
These rules enable clients to access your entire server, that is, all the databases managed by the server. The rules are stored in the *master* database. You can have a maximum of 128 server-level IP firewall rules for a server. If you have the **Allow Azure Services and resources to access this server** setting enabled, this counts as a single firewall rule for the server.
34
+
These rules enable clients to access your entire server, that is, all the databases managed by the server. The rules are stored in the *master* database. The default value is up to 256 server-level IP firewall rules for a server. If you have the **Allow Azure Services and resources to access this server** setting enabled, this counts as a single firewall rule for the server.
35
35
36
36
You can configure server-level IP firewall rules by using the Azure portal, PowerShell, or Transact-SQL statements.
37
37
38
+
> [!NOTE]
39
+
> The maximum number of server-level IP firewall rules is limited to 128 when configuring using the Azure portal.
40
+
38
41
- To use the portal or PowerShell, you must be the subscription owner or a subscription contributor.
39
42
- To use Transact-SQL, you must connect to the *master* database as the server-level principal login or as the Azure Active Directory administrator. (A server-level IP firewall rule must first be created by a user who has Azure-level permissions.)
40
43
@@ -47,7 +50,7 @@ Database-level IP firewall rules enable clients to access certain (secure) datab
47
50
48
51
- You can only create and manage database-level IP firewall rules for master and user databases by using Transact-SQL statements and only after you configure the first server-level firewall.
49
52
- If you specify an IP address range in the database-level IP firewall rule that's outside the range in the server-level IP firewall rule, only those clients that have IP addresses in the database-level range can access the database.
50
-
-You can have a maximum of 128 database-level IP firewall rules for a database. For more information about configuring database-level IP firewall rules, see the example later in this article and see [sp_set_database_firewall_rule (Azure SQL Database)](/sql/relational-databases/system-stored-procedures/sp-set-database-firewall-rule-azure-sql-database).
53
+
-The default value is up to 256 database-level IP firewall rules for a database. For more information about configuring database-level IP firewall rules, see the example later in this article and see [sp_set_database_firewall_rule (Azure SQL Database)](/sql/relational-databases/system-stored-procedures/sp-set-database-firewall-rule-azure-sql-database).
Copy file name to clipboardExpand all lines: docs/t-sql/statements/copy-into-transact-sql.md
+6-1Lines changed: 6 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -274,14 +274,19 @@ IDENTITY_INSERT specifies whether the identity value or values in the imported d
274
274
- IDENTITY_INSERT can only be set for one table at a time.
275
275
276
276
#### *AUTO_CREATE_TABLE = { 'ON' | 'OFF' }*
277
-
*AUTO_CREATE_TABLE* specifies if the table could be automatically created by working alongside with automatic schema discovery.
277
+
278
+
*AUTO_CREATE_TABLE* specifies if the table could be automatically created by working alongside with automatic schema discovery. It is available only for parquet files.
278
279
279
280
- ON: Enables automatic table creation. The COPY INTO process will create a new table automatically by discovering the structure of the file to be loaded.
280
281
- OFF: Automatic table creation is not enabled. Default.
281
282
282
283
>[!NOTE]
283
284
> The automatic table creation works alongside with automatic schema discovery. The automatic table creation is NOT enabled by default.
284
285
286
+
Do not load into hash distributed tables from parquet files using COPY INTO with AUTO_CREATE_TABLE = 'ON'.
287
+
288
+
If parquet files are to be loaded into hash distributed tables using COPY INTO, load it into a round robin staging table followed by INSERT ... SELECT from that table to the target hash distributed table.
289
+
285
290
### Permissions
286
291
287
292
The user executing the COPY command must have the following permissions:
0 commit comments