| 12345678910111213141516171819202122232425262728293031323334353637383940 |
- <h3 class="page-heading">MSSQL Connection</h3>
- <div class="gf-form-group">
- <div class="gf-form max-width-30">
- <span class="gf-form-label width-7">Host</span>
- <input type="text" class="gf-form-input" ng-model='ctrl.current.url' placeholder="localhost:1433" bs-typeahead="{{['localhost:1433', '192.168.0.101:1433']}}" required></input>
- </div>
- <div class="gf-form max-width-30">
- <span class="gf-form-label width-7">Database</span>
- <input type="text" class="gf-form-input" ng-model='ctrl.current.database' placeholder="database name" required></input>
- </div>
- <div class="gf-form-inline">
- <div class="gf-form max-width-15">
- <span class="gf-form-label width-7">User</span>
- <input type="text" class="gf-form-input" ng-model='ctrl.current.user' placeholder="user"></input>
- </div>
- <div class="gf-form max-width-15">
- <span class="gf-form-label width-7">Password</span>
- <input type="password" class="gf-form-input" ng-model='ctrl.current.password' placeholder="password"></input>
- </div>
- </div>
- </div>
- <div class="gf-form-group">
- <div class="grafana-info-box">
- <h5>User Permission</h5>
- <p>
- The database user should only be granted SELECT permissions on the specified database & tables you want to query.
- Grafana does not validate that queries are safe so queries can contain any SQL statement. For example, statements
- like <code>USE otherdb;</code> and <code>DROP TABLE user;</code> would be executed. To protect against this we
- <strong>Highly</strong> recommmend you create a specific MSSQL user with restricted permissions.
- Checkout the <a class="external-link" target="_blank" href="http://docs.grafana.org/features/datasources/mssql/">MSSQL Data Source Docs</a> for more information.
- </p>
- </div>
- </div>
|