You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert

19
19
20
20
## See Also
21
21
[Launch the Configuration Manager (Analytics Platform System)](launch-the-configuration-manager.md)

38
38
39
39
2. The **Create Run As Account Wizard** dialog will open. On the **Introduction** page, click **Next**.
40
40
41
41
3. On the **General Properties** page, select **Windows** from **Run As Account type** and specify "APS Watcher" as the **Display name**.


47
47
48
48
5. On the **Distribution Security** page, select **Less secure** and click the **Create** button to finish.

51
51
52
52
1. If you decide to use the **More secure** option, you have to manually specify computers to which credentials will be distributed. To do this, after creating the Run As account, right-click on it and select **Properties**.
53
53
54
54
2. Navigate to the **Distribution** tab and **Add** desired computers.

57
57
58
58
2. Set the **Microsoft APS Watcher Account** profile to use **APS Watcher** Run As account.
59
59
60
60
1. Navigate to **Administration** -> **Run As Configuration** -> **Profiles**.

63
63
64
64
2. Right click on **Microsoft APS Watcher Account** from the list and select **Properties**.

67
67
68
68
3. The **Run As Profile Wizard** dialog will open. Skip the **Introduction** page by clicking **Next**.
69
69
70
70
4. On the **General Properties** page, click **Next**.
71
71
72
72
5. On the **Run As Accounts** page, click the **Add...** button and select the previously created **APS Watcher** Run As account.

75
75
76
76
6. Click **Save** to finish profile assignment.
77
77
78
78
3. Wait until APS appliances discovery completes.
79
79
80
80
1. Navigate to the **Monitoring** pane and open the **SQL Server Appliance** -> **Microsoft Analytics Platform System** -> **Appliances** state view.

83
83
84
84
2. Wait until the appliance appears in the list. The name of the appliance should be equal to one specified in the registry. After discovery completes you should see all appliances listed but not monitored. To enable monitoring, follow the next steps.
85
85
@@ -92,11 +92,11 @@ Here are detailed instructions on how to do the tasks:
92
92
93
93
2. On the **General Properties** page, select **Basic Authentication** account type.

96
96
97
97
3. On the **Credentials** page, supply valid credentials to access APS health state DMVs.

100
100
101
101
5. Configure the **Microsoft APS Action Account** profile to use the newly created Run As account for the APS instance.
102
102
@@ -105,7 +105,7 @@ Here are detailed instructions on how to do the tasks:
105
105
2. On the **Run As Accounts** page, click **Add...** and

109
109
110
110
## Next Step
111
111
Now that you have configured the Management Packs, you are ready to start monitoring the appliance. For more information, see [Monitor the Appliance by Using System Center Operations Manager (Analytics Platform System)](monitor-the-appliance-by-using-system-center-operations-manager.md).

44
44
45
45
## See Also
46
46
[Monitor the Appliance by Using the Admin Console (Analytics Platform System)](monitor-the-appliance-by-using-the-admin-console.md)
Copy file name to clipboardExpand all lines: docs/database-engine/availability-groups/windows/monitor-performance-for-always-on-availability-groups.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,7 +84,7 @@ To view the RTO and RPO within the dashboard, do the following:
84
84
1. In SQL Server Management Studio, expand the **Always On High Availability** node, right-click the name of your availability group, and select **Show Dashboard**.
85
85
1. Select **Add/Remove Columns** under the **Group by** tab. Check both **Estimated Recovery Time(seconds)**[RTO] and **Estimated Data Loss (time)**[RPO].

88
88
89
89
### Calculation of secondary database RTO
90
90
The recovery time calculation determines how much time is needed to recover the *secondary database* after a failover happens. The failover time is usually short and constant. The detection time depends on cluster-level settings and not on the individual availability replicas.
Copy file name to clipboardExpand all lines: docs/linux/sql-server-linux-shared-disk-cluster-configure-iscsi.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ For more information on iSCSI initiator for the supported distributions, consult
41
41
```bash
42
42
sudo iscsiadm -m iface -I iSCSINIC -o new
43
43
```
44
-
![7-setiscsinetwork][6]
44
+
![Screenshot of the iface command and the response to the command.][6]
45
45
46
46
2. Edit `/var/lib/iscsi/ifaces/iSCSIIfaceName`. Make sure it has the following values completely filled out:
47
47
@@ -52,7 +52,7 @@ For more information on iSCSI initiator for the supported distributions, consult
52
52
53
53
See the following example:
54
54
55
-
![iSCSITargetSettings][2]
55
+
![Screenshot of the file with the files completely filled out.][2]
56
56
57
57
3. Find the iSCSI target.
58
58
@@ -62,7 +62,7 @@ For more information on iSCSI initiator for the supported distributions, consult
62
62
63
63
\<iSCSINetName> is the unique/friendly name for the network, \<TargetIPAddress> is the IP address of the iSCSI target, and \<TargetPort> is the port of the iSCSI target.
64
64
65
-
![iSCSITargetResults][3]
65
+
![Screenshot of the discovery command and the response to the command.][3]
66
66
67
67
68
68
4. Log into the target
@@ -89,7 +89,7 @@ For more information on iSCSI initiator for the supported distributions, consult
89
89
```bash
90
90
sudo grep "Attached SCSI" /var/log/messages
91
91
```
92
-
![30-iSCSIattachedDisks][7]
92
+
![Screenshot of the grep command and the response to the command showing the attached SCSI disks.][7]
93
93
94
94
7. Create a physical volume on the iSCSI disk.
95
95
@@ -191,7 +191,7 @@ For more information on iSCSI initiator for the supported distributions, consult
191
191
ls /var/opt/mssql/data
192
192
```
193
193
194
-
![45-CopyMove][8]
194
+
![Screenshot of the ls command and the response to the command.][8]
195
195
196
196
* Type `exit` to switch back to the root user.
197
197
@@ -315,7 +315,7 @@ For more information on iSCSI initiator for the supported distributions, consult
315
315
316
316
* To test, create a database in that folder. The example shown below uses sqlcmd to create a database, switch context to it, verify the files exist at the OS level, and then deletes the temporary location. You can use SSMS.
317
317
318
-
![50-ExampleCreateSSMS][9]
318
+
![Screenshot of the sqlcmd command and the response to the command.][9]
319
319
320
320
* Unmount the share
321
321
@@ -349,7 +349,7 @@ For more information on iSCSI initiator for the supported distributions, consult
349
349
350
350
\<ListOfVGsNotUsedByPacemaker> is the list of volume groups from the output of Step 20 that will not be used by the FCI. Put each one in quotes and separate by a comma. An example is shown below.
351
351
352
-
![55-ListOfVGs][11]
352
+
![Screenshot showing an example of a volume_list value.][11]
353
353
354
354
17. When Linux starts, it will mount the file system. To ensure that only Pacemaker can mount the iSCSI disk, rebuild the root filesystem image.
Copy file name to clipboardExpand all lines: docs/linux/sql-server-linux-shared-disk-cluster-configure-nfs.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ When configuring the folder(s) to be shared on the NFS server, make sure they fo
30
30
31
31
Ensure that your security standards are enforced for accessing. When configuring the folder, make sure that only the servers participating in the FCI should see the NFS folder. An example of a modified /etc/exports on a Linux-based NFS solution is shown below where the folder is restricted to FCIN1 and FCIN2.
32
32
33
-
![05-nfsacl][1]
33
+
![Screenshot of an example of a modified /etc/exports on a Linux-based NFS solution is shown below where the folder is restricted to FCIN1 and FCIN2.][1]
34
34
35
35
## Instructions
36
36
@@ -126,7 +126,7 @@ Ensure that your security standards are enforced for accessing. When configuring
126
126
mount
127
127
```
128
128
129
-
![10-mountnoswitches][2]
129
+
![Screenshot of the mount command and the response to the command showing no switches.][2]
130
130
131
131
* Switch to the mssql user. You will not receive any acknowledgement if successful.
132
132
@@ -222,7 +222,7 @@ Ensure that your security standards are enforced for accessing. When configuring
222
222
223
223
* To test, create a database in that folder. The following example uses sqlcmd to create a database, switch context to it, verify the files exist at the OS level, and then deletes the temporary location. You can use SSMS.
224
224
225
-
![15-createtestdatabase][4]
225
+
![Screenshot of the sqlcmd command and the response to the command.][4]
Copy file name to clipboardExpand all lines: docs/relational-databases/graphs/sql-graph-architecture.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ Learn how SQL Graph is architected. Knowing the basics will make it easier to un
25
25
Users can create one graph per database. A graph is a collection of node and edge tables. Node or edge tables can be created under any schema in the database, but they all belong to one logical graph. A node table is collection of similar type of nodes. For example, a Person node table holds all the Person nodes belonging to a graph. Similarly, an edge table is a collection of similar type of edges. For example, a Friends edge table holds all the edges that connect a Person to another Person. Since nodes and edges are stored in tables, most of the operations supported on regular tables are supported on node or edge tables.

29
29
30
30
Figure 1: SQL Graph database architecture
31
31
@@ -50,7 +50,7 @@ Similar to the `$node_id` column, it is recommended that users create a unique i
50
50
51
51
Figure 2 shows how node and edge tables are stored in the database.
52
52
53
-

53
+

Copy file name to clipboardExpand all lines: docs/relational-databases/graphs/sql-graph-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,7 @@ CREATE TABLE Person (ID INTEGER PRIMARY KEY, Name VARCHAR(100), Age INT) AS NODE
49
49
CREATE TABLE friends (StartDate date) AS EDGE;
50
50
```
51
51
52
-

52
+

Copy file name to clipboardExpand all lines: docs/relational-databases/graphs/sql-graph-sample.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ This sample provides a [!INCLUDE[tsql-md](../../includes/tsql-md.md)] script to
27
27
28
28
This sample creates a graph schema, as showed in Figure 1, for a hypothetical social network that has People, Restaurant and City nodes. These nodes are connected to each other using Friends, Likes, LivesIn and LocatedIn edges.

31
31
Figure 1: Sample schema with restaurant, city, person nodes and LivesIn, LocatedIn, Likes edges.
0 commit comments