config.html 2.0 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243
  1. <h3 class="page-heading">MSSQL Connection</h3>
  2. <div class="gf-form-group">
  3. <div class="gf-form max-width-30">
  4. <span class="gf-form-label width-7">Host</span>
  5. <input type="text" class="gf-form-input" ng-model='ctrl.current.url' placeholder="localhost:1433" bs-typeahead="{{['localhost', 'localhost:1433']}}" required></input>
  6. </div>
  7. <div class="gf-form max-width-30">
  8. <span class="gf-form-label width-7">Database</span>
  9. <input type="text" class="gf-form-input" ng-model='ctrl.current.database' placeholder="database name" required></input>
  10. </div>
  11. <div class="gf-form-inline">
  12. <div class="gf-form max-width-15">
  13. <span class="gf-form-label width-7">User</span>
  14. <input type="text" class="gf-form-input" ng-model='ctrl.current.user' placeholder="user"></input>
  15. </div>
  16. <div class="gf-form max-width-15" ng-if="!ctrl.current.secureJsonFields.password">
  17. <span class="gf-form-label width-7">Password</span>
  18. <input type="password" class="gf-form-input" ng-model='ctrl.current.secureJsonData.password' placeholder="password"></input>
  19. </div>
  20. <div class="gf-form max-width-19" ng-if="ctrl.current.secureJsonFields.password">
  21. <span class="gf-form-label width-7">Password</span>
  22. <input type="text" class="gf-form-input" disabled="disabled" value="configured">
  23. <a class="btn btn-secondary gf-form-btn" href="#" ng-click="ctrl.current.secureJsonFields.password = false">reset</a>
  24. </div>
  25. </div>
  26. </div>
  27. <div class="gf-form-group">
  28. <div class="grafana-info-box">
  29. <h5>User Permission</h5>
  30. <p>
  31. The database user should only be granted SELECT permissions on the specified database &amp; tables you want to query.
  32. Grafana does not validate that queries are safe so queries can contain any SQL statement. For example, statements
  33. like <code>USE otherdb;</code> and <code>DROP TABLE user;</code> would be executed. To protect against this we
  34. <strong>Highly</strong> recommmend you create a specific MSSQL user with restricted permissions.
  35. </p>
  36. </div>
  37. </div>