You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Single Sign-On (SSO) is the default way to log in to Tobiko Cloud. However, SSO could be down or not working when you need to report an incident.
28
+
29
+
Tobiko Cloud provides a standalone page that doesn't require SSO so you can report an incident when SSO is not working. The page is unique to your organization.
30
+
31
+
The standalone URL is available in the incident reporting page when you log in with SSO. Because accessing the standalone URL does not require SSO, you should only share it with staff authorized to report incidents.
32
+
33
+
To store your standalone incident reporting URL:
34
+
35
+
1. Visit the [Tobiko Cloud Incident Reporting Page](https://incidents.tobikodata.com/)
36
+
2. Click the `Copy Standalone URL` button below the incident reporting section
37
+
3. Save this URL in an easily accessible location in case you need to report an incident when SSO is not working
38
+
39
+
!!! note "Don't wait!"
40
+
We recommend copying this URL *right now* so your organization is protected from difficulty reporting an incident.
41
+
42
+
### SSO not enabled for your organization
43
+
44
+
SSO login is required for accessing the standalone incident reporting URL.
45
+
46
+
SSO is enabled by default in Tobiko Cloud. If it is not enabled for your organization, contact your solution architect and ask them to provide you with a standalone incident reporting URL.
Copy file name to clipboardExpand all lines: docs/guides/configuration.md
+111Lines changed: 111 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -381,6 +381,117 @@ Example showing default values:
381
381
)
382
382
```
383
383
384
+
385
+
### Always comparing against production
386
+
387
+
By default, SQLMesh compares the current state of project files to the target `<env>` environment when `sqlmesh plan <env>` is run. However, a common expectation is that local changes should always be compared to the production environment.
388
+
389
+
The `always_recreate_environment` boolean plan option can alter this behavior. When enabled, SQLMesh will always attempt to compare against the production environment by recreating the target environment; If `prod` does not exist, SQLMesh will fall back to comparing against the target environment.
390
+
391
+
**NOTE:**: Upon succesfull plan application, changes are still promoted to the target `<env>` environment.
Even though the second change should have been a metadata change (thus not requiring a backfill), it will still be classified as a breaking change because the comparison is against production instead of the previous development state. This is intentional and may cause additional backfills as more changes are accumulated.
493
+
494
+
384
495
### Gateways
385
496
386
497
The `gateways` configuration defines how SQLMesh should connect to the data warehouse, state backend, and scheduler. These options are in the [gateway](../reference/configuration.md#gateway) section of the configuration reference page.
This syntax tells SQLMesh to use the cross-database diffing algorithm instead of the normal within-database diffing algorithm.
260
260
261
-
After adding gateways to the table names, use `table_diff` as described above - the same options apply for specifying the join keys, decimal precision, etc. See `sqlmesh table_diff --help` for a [full list of options](../reference/cli.md#table_diff).
261
+
After adding gateways to the table names, use `table_diff` as described above - the same options apply for specifying the join keys, decimal precision, etc. See `tcloud sqlmesh table_diff --help` for a [full list of options](../reference/cli.md#table_diff).
262
262
263
263
!!! warning
264
264
@@ -273,7 +273,7 @@ A cross-database diff is broken up into two stages.
273
273
The first stage is a schema diff. This example shows that differences in column name case across the two tables are identified as schema differences:
Copy file name to clipboardExpand all lines: docs/guides/vscode.md
+10Lines changed: 10 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -139,6 +139,16 @@ The SQLMesh VSCode extension provides the following commands in the VSCode comma
139
139
140
140
## Troubleshooting
141
141
142
+
### DuckDB concurrent access
143
+
144
+
If your SQLMesh project uses DuckDB to store its state, you will likely encounter problems.
145
+
146
+
SQLMesh can create multiple connections to the state database, but DuckDB's local database file does not support concurrent access.
147
+
148
+
Because the VSCode extension establishes a long-running process connected to the database, access conflicts are more likely than with standard SQLMesh usage from the CLI.
149
+
150
+
Therefore, we do not recommend using DuckDB as a state store with the VSCode extension.
151
+
142
152
### Python environment woes
143
153
144
154
The most common problem is the extension not using the correct Python interpreter.
Copy file name to clipboardExpand all lines: docs/integrations/engines/azuresql.md
+11-5Lines changed: 11 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,29 +2,35 @@
2
2
3
3
[Azure SQL](https://azure.microsoft.com/en-us/products/azure-sql) is "a family of managed, secure, and intelligent products that use the SQL Server database engine in the Azure cloud."
4
4
5
-
The Azure SQL adapter only supports authentication with a username and password. It does not support authentication with Microsoft Entra or Azure Active Directory.
6
-
7
5
## Local/Built-in Scheduler
8
6
**Engine Adapter Type**: `azuresql`
9
7
10
8
### Installation
9
+
#### User / Password Authentication:
11
10
```
12
11
pip install "sqlmesh[azuresql]"
13
12
```
13
+
#### Microsoft Entra ID / Azure Active Directory Authentication:
|`type`| Engine type name - must be `azuresql`| string | Y |
20
23
|`host`| The hostname of the Azure SQL server | string | Y |
21
-
|`user`| The username to use for authentication with the Azure SQL server | string | N |
22
-
|`password`| The password to use for authentication with the Azure SQL server | string | N |
24
+
|`user`| The username / client ID to use for authentication with the Azure SQL server | string | N |
25
+
|`password`| The password / client secret to use for authentication with the Azure SQL server | string | N |
23
26
|`port`| The port number of the Azure SQL server | int | N |
24
27
|`database`| The target database | string | N |
25
28
|`charset`| The character set used for the connection | string | N |
26
29
|`timeout`| The query timeout in seconds. Default: no timeout | int | N |
27
30
|`login_timeout`| The timeout for connection and login in seconds. Default: 60 | int | N |
28
31
|`appname`| The application name to use for the connection | string | N |
29
32
|`conn_properties`| The list of connection properties | list[string]| N |
30
-
|`autocommit`| Is autocommit mode enabled. Default: false | bool | N |
33
+
|`autocommit`| Is autocommit mode enabled. Default: false | bool | N |
34
+
|`driver`| The driver to use for the connection. Default: pymssql | string | N |
35
+
|`driver_name`| The driver name to use for the connection. E.g., *ODBC Driver 18 for SQL Server*| string | N |
36
+
|`odbc_properties`| The dict of ODBC connection properties. E.g., authentication: ActiveDirectoryServicePrincipal. See more [here](https://learn.microsoft.com/en-us/sql/connect/odbc/dsn-connection-string-attribute?view=sql-server-ver16). | dict | N |
0 commit comments