2017-12-02 05:40:12 -06:00
|
|
|
|
|
|
|
<h3 class="page-heading">MSSQL Connection</h3>
|
|
|
|
|
|
|
|
<div class="gf-form-group">
|
|
|
|
<div class="gf-form max-width-30">
|
|
|
|
<span class="gf-form-label width-7">Host</span>
|
2018-03-19 07:06:46 -05:00
|
|
|
<input type="text" class="gf-form-input" ng-model='ctrl.current.url' placeholder="localhost:1433" bs-typeahead="{{['localhost:1433']}}" required></input>
|
2017-12-02 05:40:12 -06:00
|
|
|
</div>
|
|
|
|
|
|
|
|
<div class="gf-form max-width-30">
|
|
|
|
<span class="gf-form-label width-7">Database</span>
|
|
|
|
<input type="text" class="gf-form-input" ng-model='ctrl.current.database' placeholder="database name" required></input>
|
|
|
|
</div>
|
|
|
|
|
|
|
|
<div class="gf-form-inline">
|
|
|
|
<div class="gf-form max-width-15">
|
|
|
|
<span class="gf-form-label width-7">User</span>
|
|
|
|
<input type="text" class="gf-form-input" ng-model='ctrl.current.user' placeholder="user"></input>
|
|
|
|
</div>
|
|
|
|
<div class="gf-form max-width-15">
|
|
|
|
<span class="gf-form-label width-7">Password</span>
|
|
|
|
<input type="password" class="gf-form-input" ng-model='ctrl.current.password' placeholder="password"></input>
|
|
|
|
</div>
|
|
|
|
</div>
|
|
|
|
</div>
|
|
|
|
|
|
|
|
<div class="gf-form-group">
|
|
|
|
<div class="grafana-info-box">
|
|
|
|
<h5>User Permission</h5>
|
|
|
|
<p>
|
|
|
|
The database user should only be granted SELECT permissions on the specified database & tables you want to query.
|
|
|
|
Grafana does not validate that queries are safe so queries can contain any SQL statement. For example, statements
|
|
|
|
like <code>USE otherdb;</code> and <code>DROP TABLE user;</code> would be executed. To protect against this we
|
|
|
|
<strong>Highly</strong> recommmend you create a specific MSSQL user with restricted permissions.
|
|
|
|
</p>
|
|
|
|
</div>
|
|
|
|
</div>
|
|
|
|
|