Skip to content

Commit 9ff0d28

Browse files
niphlodactions-user
authored andcommitted
updating build ref file
1 parent bb18dc3 commit 9ff0d28

1 file changed

Lines changed: 20 additions & 11 deletions

File tree

assets/dbatools-index.json

Lines changed: 20 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -20837,12 +20837,12 @@
2083720837
],
2083820838
[
2083920839
"Type",
20840-
"Returns firewall rules for the given type(s).\r\nValid values are:\r\n Engine - for the SQL Server instance\r\n Browser - for the SQL Server Browser\r\n AllInstance - for all firewall rules on the target computer related to SQL Server\r\nIf this parameter is not used, the firewall rule for the SQL Server instance will be returned\r\nand in case the instance is listening on a port other than 1433,\r\nalso the firewall rule for the SQL Server Browser will be returned.",
20840+
"Returns firewall rules for the given type(s).\r\nValid values are:\r\n Engine - for the SQL Server instance\r\n Browser - for the SQL Server Browser\r\n DAC - for the dedicated admin connection (DAC)\r\n AllInstance - for all firewall rules on the target computer related to SQL Server\r\nIf this parameter is not used, the firewall rule for the SQL Server instance will be returned\r\nand in case the instance is listening on a port other than 1433,\r\nalso the firewall rule for the SQL Server Browser will be returned.",
2084120841
"",
2084220842
false,
2084320843
"false",
2084420844
"",
20845-
"Engine,Browser,AllInstance"
20845+
"Engine,Browser,DAC,AllInstance"
2084620846
],
2084720847
[
2084820848
"EnableException",
@@ -29138,7 +29138,7 @@
2913829138
},
2913929139
{
2914029140
"Name": "Install-DbaInstance",
29141-
"Description": "This function will help you to quickly install a SQL Server instance on one or many computers.\nSome of the things this function will do for you:\n* Add your login as an admin to the new instance\n* Search for SQL Server installations in the specified file repository\n* Generate SA password if needed\n* Install specific features using \u0027Default\u0027 and \u0027All\u0027 templates or cherry-pick the ones you need\n* Set number of tempdb files based on number of cores (SQL2016+)\n* Activate .Net 3.5 feature for SQL2012/2014\n* Restart the machine if needed after the installation is done\n\nFully customizable installation parameters allow you to:\n* Use existing Configuration.ini files for the installation\n* Define service account credentials using native Powershell syntax\n* Override any configurations by using -Configuration switch\n* Change the TCP port after the installation is done\n* Enable \u0027Perform volume maintenance tasks\u0027 for the SQL Server account\n\nNote that the dowloaded installation media must be extracted and available to the server where the installation runs.\nNOTE: If no ProductID (PID) is found in the configuration files/parameters, Evaluation version is going to be installed.\n\nWhen using CredSSP authentication, this function will try to configure CredSSP authentication for PowerShell Remoting sessions.\nIf this is not desired (e.g.: CredSSP authentication is managed externally, or is already configured appropriately,)\nit can be disabled by setting the dbatools configuration option \u0027commands.initialize-credssp.bypass\u0027 value to $true.\nTo be able to configure CredSSP, the command needs to be run in an elevated PowerShell session.",
29141+
"Description": "This function will help you to quickly install a SQL Server instance on one or many computers.\nSome of the things this function will do for you:\n* Add your login as an admin to the new instance\n* Search for SQL Server installations in the specified file repository\n* Generate SA password if needed\n* Install specific features using \u0027Default\u0027 and \u0027All\u0027 templates or cherry-pick the ones you need\n* Set number of tempdb files based on number of cores (SQL2016+)\n* Activate .Net 3.5 feature for SQL2012/2014\n* Restart the machine if needed after the installation is done\n\nFully customizable installation parameters allow you to:\n* Use existing Configuration.ini files for the installation\n* Define service account credentials using native Powershell syntax\n* Override any configurations by using -Configuration switch\n* Change the TCP port after the installation is done\n* Enable \u0027Perform volume maintenance tasks\u0027 for the SQL Server account\n\nNote that the downloaded installation media must be extracted and available to the server where the installation runs.\nNOTE: If no ProductID (PID) is found in the configuration files/parameters, Evaluation version is going to be installed.\n\nWhen using CredSSP authentication, this function will try to configure CredSSP authentication for PowerShell Remoting sessions.\nIf this is not desired (e.g.: CredSSP authentication is managed externally, or is already configured appropriately,)\nit can be disabled by setting the dbatools configuration option \u0027commands.initialize-credssp.bypass\u0027 value to $true.\nTo be able to configure CredSSP, the command needs to be run in an elevated PowerShell session.",
2914229142
"Tags": [
2914329143
"Deployment",
2914429144
"Install"
@@ -41408,7 +41408,7 @@
4140841408
},
4140941409
{
4141041410
"Name": "New-DbaFirewallRule",
41411-
"Description": "Creates a new inbound firewall rule for a SQL Server instance and adds the rule to the target computer.\n\nThis is basically a wrapper around New-NetFirewallRule executed at the target computer.\nSo this only works if New-NetFirewallRule works on the target computer.\n\nBoth DisplayName and Name are set to the same value, since DisplayName is required\nbut only Name uniquely defines the rule, thus avoiding duplicate rules with different settings.\nThe names and the group for all rules are fixed to be able to get them back with Get-DbaFirewallRule.\n\nThe functionality is currently limited. Help to extend the functionality is welcome.\n\nAs long as you can read this note here, there may be breaking changes in future versions.\nSo please review your scripts using this command after updating dbatools.\n\nThe firewall rule for the instance itself will have the following configuration (parameters for New-NetFirewallRule):\n DisplayName = \u0027SQL Server default instance\u0027 or \u0027SQL Server instance \u003cInstanceName\u003e\u0027\n Name = \u0027SQL Server default instance\u0027 or \u0027SQL Server instance \u003cInstanceName\u003e\u0027\n Group = \u0027SQL Server\u0027\n Enabled = \u0027True\u0027\n Direction = \u0027Inbound\u0027\n Protocol = \u0027TCP\u0027\n LocalPort = \u0027\u003cPort\u003e\u0027 (for instances with static port)\n Program = \u0027\u003cPath ending with MSSQL\\Binn\\sqlservr.exe\u003e\u0027 (for instances with dynamic port)\n\nThe firewall rule for the SQL Server Browser will have the following configuration (parameters for New-NetFirewallRule):\n DisplayName = \u0027SQL Server Browser\u0027\n Name = \u0027SQL Server Browser\u0027\n Group = \u0027SQL Server\u0027\n Enabled = \u0027True\u0027\n Direction = \u0027Inbound\u0027\n Protocol = \u0027UDP\u0027\n LocalPort = \u00271434\u0027",
41411+
"Description": "Creates a new inbound firewall rule for a SQL Server instance and adds the rule to the target computer.\n\nThis is basically a wrapper around New-NetFirewallRule executed at the target computer.\nSo this only works if New-NetFirewallRule works on the target computer.\n\nBoth DisplayName and Name are set to the same value, since DisplayName is required\nbut only Name uniquely defines the rule, thus avoiding duplicate rules with different settings.\nThe names and the group for all rules are fixed to be able to get them back with Get-DbaFirewallRule.\n\nThe functionality is currently limited. Help to extend the functionality is welcome.\n\nAs long as you can read this note here, there may be breaking changes in future versions.\nSo please review your scripts using this command after updating dbatools.\n\nThe firewall rule for the instance itself will have the following configuration (parameters for New-NetFirewallRule):\n DisplayName = \u0027SQL Server default instance\u0027 or \u0027SQL Server instance \u003cInstanceName\u003e\u0027\n Name = \u0027SQL Server default instance\u0027 or \u0027SQL Server instance \u003cInstanceName\u003e\u0027\n Group = \u0027SQL Server\u0027\n Enabled = \u0027True\u0027\n Direction = \u0027Inbound\u0027\n Protocol = \u0027TCP\u0027\n LocalPort = \u0027\u003cPort\u003e\u0027 (for instances with static port)\n Program = \u0027\u003cPath ending with MSSQL\\Binn\\sqlservr.exe\u003e\u0027 (for instances with dynamic port)\n\nThe firewall rule for the SQL Server Browser will have the following configuration (parameters for New-NetFirewallRule):\n DisplayName = \u0027SQL Server Browser\u0027\n Name = \u0027SQL Server Browser\u0027\n Group = \u0027SQL Server\u0027\n Enabled = \u0027True\u0027\n Direction = \u0027Inbound\u0027\n Protocol = \u0027UDP\u0027\n LocalPort = \u00271434\u0027\n\nThe firewall rule for the dedicated admin connection (DAC) will have the following configuration (parameters for New-NetFirewallRule):\n DisplayName = \u0027SQL Server default instance (DAC)\u0027 or \u0027SQL Server instance \u003cInstanceName\u003e (DAC)\u0027\n Name = \u0027SQL Server default instance (DAC)\u0027 or \u0027SQL Server instance \u003cInstanceName\u003e (DAC)\u0027\n Group = \u0027SQL Server\u0027\n Enabled = \u0027True\u0027\n Direction = \u0027Inbound\u0027\n Protocol = \u0027TCP\u0027\n LocalPort = \u0027\u003cPort\u003e\u0027 (typically 1434 for a default instance, but will be fetched from ERRORLOG)\nThe firewall rule for the DAC will only be created if the DAC is configured for listening remotely.\nUse `Set-DbaSpConfigure -SqlInstance SRV1 -Name RemoteDacConnectionsEnabled -Value 1` to enable remote DAC before running this command.",
4141241412
"Tags": [
4141341413
"Network",
4141441414
"Connection",
@@ -41442,12 +41442,12 @@
4144241442
],
4144341443
[
4144441444
"Type",
41445-
"Creates firewall rules for the given type(s).\r\nValid values are:\r\n Engine - for the SQL Server instance\r\n Browser - for the SQL Server Browser\r\nIf this parameter is not used, the firewall rule for the SQL Server instance will be created\r\nand in case the instance is listening on a port other than 1433,\r\nalso the firewall rule for the SQL Server Browser will be created if not already in place.",
41445+
"Creates firewall rules for the given type(s).\r\nValid values are:\r\n Engine - for the SQL Server instance\r\n Browser - for the SQL Server Browser\r\n DAC - for the dedicated admin connection (DAC)\r\nIf this parameter is not used:\r\n The firewall rule for the SQL Server instance will be created.\r\n In case the instance is listening on a port other than 1433, also the firewall rule for the SQL Server Browser will be created if not already in place.\r\n In case the DAC is configured for listening remotely, also the firewall rule for the DAC will be created.",
4144641446
"",
4144741447
false,
4144841448
"false",
4144941449
"",
41450-
"Engine,Browser"
41450+
"Engine,Browser,DAC"
4145141451
],
4145241452
[
4145341453
"Configuration",
@@ -48324,12 +48324,12 @@
4832448324
],
4832548325
[
4832648326
"Type",
48327-
"Removes firewall rules for the given type(s).\r\nValid values are:\r\n Engine - for the SQL Server instance\r\n Browser - for the SQL Server Browser\r\n AllInstance - for all firewall rules on the target computer related to SQL Server\r\nThe default is \u0027Engine\u0027.\r\nAs the Browser might be needed by other instances, the firewall rule for the SQL Server Browser is\r\nnever removed with the firewall rule of the instance but only removed if \u0027Browser\u0027 is used.",
48327+
"Removes firewall rules for the given type(s).\r\nValid values are:\r\n Engine - for the SQL Server instance\r\n Browser - for the SQL Server Browser\r\n DAC - for the dedicated admin connection (DAC)\r\n AllInstance - for all firewall rules on the target computer related to SQL Server\r\nThe default is @(\u0027Engine\u0027, \u0027DAC\u0027).\r\nAs the Browser might be needed by other instances, the firewall rule for the SQL Server Browser is\r\nnever removed with the firewall rule of the instance but only removed if \u0027Browser\u0027 is used.",
4832848328
"",
4832948329
false,
4833048330
"false",
48331-
"Engine",
48332-
"Engine,Browser,AllInstance"
48331+
"@(\u0027Engine\u0027, \u0027DAC\u0027)",
48332+
"Engine,Browser,DAC,AllInstance"
4833348333
],
4833448334
[
4833548335
"InputObject",
@@ -51227,13 +51227,22 @@
5122751227
"master",
5122851228
""
5122951229
],
51230+
[
51231+
"Name",
51232+
"The optional name for the certificate, otherwise, it will be guessed from the certificate file name.",
51233+
"",
51234+
false,
51235+
"false",
51236+
"",
51237+
""
51238+
],
5123051239
[
5123151240
"DecryptionPassword",
5123251241
"Secure string used to decrypt the private key.",
5123351242
"Password,SecurePassword",
5123451243
false,
5123551244
"false",
51236-
"(Read-Host \"Password\" -AsSecureString)",
51245+
"(Read-Host \"Decryption password\" -AsSecureString)",
5123751246
""
5123851247
],
5123951248
[
@@ -51264,7 +51273,7 @@
5126451273
""
5126551274
]
5126651275
],
51267-
"Syntax": "Restore-DbaDbCertificate [-SqlInstance] \u003cDbaInstanceParameter\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-Path] \u003cObject[]\u003e [[-KeyFilePath] \u003cString[]\u003e] [[-EncryptionPassword] \u003cSecureString\u003e] [[-Database] \u003cString\u003e] [[-DecryptionPassword] \u003cSecureString\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
51276+
"Syntax": "Restore-DbaDbCertificate [-SqlInstance] \u003cDbaInstanceParameter\u003e [[-SqlCredential] \u003cPSCredential\u003e] [-Path] \u003cObject[]\u003e [[-KeyFilePath] \u003cString[]\u003e] [[-EncryptionPassword] \u003cSecureString\u003e] [[-Database] \u003cString\u003e] [[-Name] \u003cString\u003e] [[-DecryptionPassword] \u003cSecureString\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
5126851277
},
5126951278
{
5127051279
"Name": "Restore-DbaDbSnapshot",

0 commit comments

Comments
 (0)