2017-12-02 05:40:12 -06:00
|
|
|
|
|
|
|
<h3 class="page-heading">MSSQL Connection</h3>
|
|
|
|
|
|
|
|
<div class="gf-form-group">
|
|
|
|
<div class="gf-form max-width-30">
|
|
|
|
<span class="gf-form-label width-7">Host</span>
|
2018-03-19 07:24:31 -05:00
|
|
|
<input type="text" class="gf-form-input" ng-model='ctrl.current.url' placeholder="localhost:1433" bs-typeahead="{{['localhost', 'localhost:1433']}}" required></input>
|
2017-12-02 05:40:12 -06:00
|
|
|
</div>
|
|
|
|
|
|
|
|
<div class="gf-form max-width-30">
|
|
|
|
<span class="gf-form-label width-7">Database</span>
|
|
|
|
<input type="text" class="gf-form-input" ng-model='ctrl.current.database' placeholder="database name" required></input>
|
|
|
|
</div>
|
|
|
|
|
|
|
|
<div class="gf-form-inline">
|
|
|
|
<div class="gf-form max-width-15">
|
|
|
|
<span class="gf-form-label width-7">User</span>
|
|
|
|
<input type="text" class="gf-form-input" ng-model='ctrl.current.user' placeholder="user"></input>
|
|
|
|
</div>
|
2018-03-19 11:32:51 -05:00
|
|
|
<div class="gf-form max-width-15" ng-if="!ctrl.current.secureJsonFields.password">
|
|
|
|
<span class="gf-form-label width-7">Password</span>
|
|
|
|
<input type="password" class="gf-form-input" ng-model='ctrl.current.secureJsonData.password' placeholder="password"></input>
|
|
|
|
</div>
|
|
|
|
<div class="gf-form max-width-19" ng-if="ctrl.current.secureJsonFields.password">
|
2017-12-02 05:40:12 -06:00
|
|
|
<span class="gf-form-label width-7">Password</span>
|
2018-03-19 11:32:51 -05:00
|
|
|
<input type="text" class="gf-form-input" disabled="disabled" value="configured">
|
|
|
|
<a class="btn btn-secondary gf-form-btn" href="#" ng-click="ctrl.current.secureJsonFields.password = false">reset</a>
|
2017-12-02 05:40:12 -06:00
|
|
|
</div>
|
|
|
|
</div>
|
|
|
|
</div>
|
|
|
|
|
|
|
|
<div class="gf-form-group">
|
|
|
|
<div class="grafana-info-box">
|
|
|
|
<h5>User Permission</h5>
|
|
|
|
<p>
|
|
|
|
The database user should only be granted SELECT permissions on the specified database & tables you want to query.
|
|
|
|
Grafana does not validate that queries are safe so queries can contain any SQL statement. For example, statements
|
|
|
|
like <code>USE otherdb;</code> and <code>DROP TABLE user;</code> would be executed. To protect against this we
|
|
|
|
<strong>Highly</strong> recommmend you create a specific MSSQL user with restricted permissions.
|
|
|
|
</p>
|
|
|
|
</div>
|
|
|
|
</div>
|
|
|
|
|