You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-sql/database/firewall-configure.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,10 +31,13 @@ Connection attempts from the internet and Azure must pass through the firewall b
31
31
32
32
### Server-level IP firewall rules
33
33
34
-
These rules enable clients to access your entire server, that is, all the databases managed by the server. The rules are stored in the *master* database. You can have a maximum of 128 server-level IP firewall rules for a server. If you have the **Allow Azure Services and resources to access this server** setting enabled, this counts as a single firewall rule for the server.
34
+
These rules enable clients to access your entire server, that is, all the databases managed by the server. The rules are stored in the *master* database. The default value is up to 256 server-level IP firewall rules for a server. If you have the **Allow Azure Services and resources to access this server** setting enabled, this counts as a single firewall rule for the server.
35
35
36
36
You can configure server-level IP firewall rules by using the Azure portal, PowerShell, or Transact-SQL statements.
37
37
38
+
> [!NOTE]
39
+
> The maximum number of server-level IP firewall rules is limited to 128 when configuring using the Azure portal.
40
+
38
41
- To use the portal or PowerShell, you must be the subscription owner or a subscription contributor.
39
42
- To use Transact-SQL, you must connect to the *master* database as the server-level principal login or as the Azure Active Directory administrator. (A server-level IP firewall rule must first be created by a user who has Azure-level permissions.)
40
43
@@ -47,7 +50,7 @@ Database-level IP firewall rules enable clients to access certain (secure) datab
47
50
48
51
- You can only create and manage database-level IP firewall rules for master and user databases by using Transact-SQL statements and only after you configure the first server-level firewall.
49
52
- If you specify an IP address range in the database-level IP firewall rule that's outside the range in the server-level IP firewall rule, only those clients that have IP addresses in the database-level range can access the database.
50
-
-You can have a maximum of 128 database-level IP firewall rules for a database. For more information about configuring database-level IP firewall rules, see the example later in this article and see [sp_set_database_firewall_rule (Azure SQL Database)](/sql/relational-databases/system-stored-procedures/sp-set-database-firewall-rule-azure-sql-database).
53
+
-The default value is up to 256 database-level IP firewall rules for a database. For more information about configuring database-level IP firewall rules, see the example later in this article and see [sp_set_database_firewall_rule (Azure SQL Database)](/sql/relational-databases/system-stored-procedures/sp-set-database-firewall-rule-azure-sql-database).
Copy file name to clipboardExpand all lines: docs/t-sql/statements/copy-into-transact-sql.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -274,14 +274,18 @@ IDENTITY_INSERT specifies whether the identity value or values in the imported d
274
274
- IDENTITY_INSERT can only be set for one table at a time.
275
275
276
276
#### *AUTO_CREATE_TABLE = { 'ON' | 'OFF' }*
277
-
*AUTO_CREATE_TABLE* specifies if the table could be automatically created by working alongside with automatic schema discovery.
277
+
*AUTO_CREATE_TABLE* specifies if the table could be automatically created by working alongside with automatic schema discovery. It is available oly for parquet files
278
278
279
279
- ON: Enables automatic table creation. The COPY INTO process will create a new table automatically by discovering the structure of the file to be loaded.
280
280
- OFF: Automatic table creation is not enabled. Default.
281
281
282
282
>[!NOTE]
283
283
> The automatic table creation works alongside with automatic schema discovery. The automatic table creation is NOT enabled by default.
284
284
285
+
> [!GUIDELINES]
286
+
> Do not load into hash distributed tables from parquet files using COPY INTO with AUTO_CREATE_TABLE = 'ON'
287
+
> If parquet files are to be loaded into Hash Distributed tables using COPY INTO, load it into a Round Robin staging table followed by insert select from that table to the target hash distribued table.
288
+
285
289
### Permissions
286
290
287
291
The user executing the COPY command must have the following permissions:
0 commit comments