Skip to content

Commit da63064

Browse files
niphlodactions-user
authored andcommitted
updating build ref file
1 parent 9ff0d28 commit da63064

1 file changed

Lines changed: 16 additions & 7 deletions

File tree

assets/dbatools-index.json

Lines changed: 16 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -20837,7 +20837,7 @@
2083720837
],
2083820838
[
2083920839
"Type",
20840-
"Returns firewall rules for the given type(s).\r\nValid values are:\r\n Engine - for the SQL Server instance\r\n Browser - for the SQL Server Browser\r\n DAC - for the dedicated admin connection (DAC)\r\n AllInstance - for all firewall rules on the target computer related to SQL Server\r\nIf this parameter is not used, the firewall rule for the SQL Server instance will be returned\r\nand in case the instance is listening on a port other than 1433,\r\nalso the firewall rule for the SQL Server Browser will be returned.",
20840+
"Returns firewall rules for the given type(s).\nValid values are:\r\n* Engine - for the SQL Server instance\r\n* Browser - for the SQL Server Browser\r\n* DAC - for the dedicated admin connection (DAC)\r\n* AllInstance - for all firewall rules on the target computer related to SQL Server\nIf this parameter is not used, the firewall rule for the SQL Server instance will be returned\r\nand in case the instance is listening on a port other than 1433,\r\nalso the firewall rule for the SQL Server Browser will be returned.",
2084120841
"",
2084220842
false,
2084320843
"false",
@@ -41408,7 +41408,7 @@
4140841408
},
4140941409
{
4141041410
"Name": "New-DbaFirewallRule",
41411-
"Description": "Creates a new inbound firewall rule for a SQL Server instance and adds the rule to the target computer.\n\nThis is basically a wrapper around New-NetFirewallRule executed at the target computer.\nSo this only works if New-NetFirewallRule works on the target computer.\n\nBoth DisplayName and Name are set to the same value, since DisplayName is required\nbut only Name uniquely defines the rule, thus avoiding duplicate rules with different settings.\nThe names and the group for all rules are fixed to be able to get them back with Get-DbaFirewallRule.\n\nThe functionality is currently limited. Help to extend the functionality is welcome.\n\nAs long as you can read this note here, there may be breaking changes in future versions.\nSo please review your scripts using this command after updating dbatools.\n\nThe firewall rule for the instance itself will have the following configuration (parameters for New-NetFirewallRule):\n DisplayName = \u0027SQL Server default instance\u0027 or \u0027SQL Server instance \u003cInstanceName\u003e\u0027\n Name = \u0027SQL Server default instance\u0027 or \u0027SQL Server instance \u003cInstanceName\u003e\u0027\n Group = \u0027SQL Server\u0027\n Enabled = \u0027True\u0027\n Direction = \u0027Inbound\u0027\n Protocol = \u0027TCP\u0027\n LocalPort = \u0027\u003cPort\u003e\u0027 (for instances with static port)\n Program = \u0027\u003cPath ending with MSSQL\\Binn\\sqlservr.exe\u003e\u0027 (for instances with dynamic port)\n\nThe firewall rule for the SQL Server Browser will have the following configuration (parameters for New-NetFirewallRule):\n DisplayName = \u0027SQL Server Browser\u0027\n Name = \u0027SQL Server Browser\u0027\n Group = \u0027SQL Server\u0027\n Enabled = \u0027True\u0027\n Direction = \u0027Inbound\u0027\n Protocol = \u0027UDP\u0027\n LocalPort = \u00271434\u0027\n\nThe firewall rule for the dedicated admin connection (DAC) will have the following configuration (parameters for New-NetFirewallRule):\n DisplayName = \u0027SQL Server default instance (DAC)\u0027 or \u0027SQL Server instance \u003cInstanceName\u003e (DAC)\u0027\n Name = \u0027SQL Server default instance (DAC)\u0027 or \u0027SQL Server instance \u003cInstanceName\u003e (DAC)\u0027\n Group = \u0027SQL Server\u0027\n Enabled = \u0027True\u0027\n Direction = \u0027Inbound\u0027\n Protocol = \u0027TCP\u0027\n LocalPort = \u0027\u003cPort\u003e\u0027 (typically 1434 for a default instance, but will be fetched from ERRORLOG)\nThe firewall rule for the DAC will only be created if the DAC is configured for listening remotely.\nUse `Set-DbaSpConfigure -SqlInstance SRV1 -Name RemoteDacConnectionsEnabled -Value 1` to enable remote DAC before running this command.",
41411+
"Description": "Creates a new inbound firewall rule for a SQL Server instance and adds the rule to the target computer.\n\nThis is basically a wrapper around New-NetFirewallRule executed at the target computer.\nSo this only works if New-NetFirewallRule works on the target computer.\n\nBoth DisplayName and Name are set to the same value, since DisplayName is required\nbut only Name uniquely defines the rule, thus avoiding duplicate rules with different settings.\nThe names and the group for all rules are fixed to be able to get them back with Get-DbaFirewallRule.\n\nThe functionality is currently limited. Help to extend the functionality is welcome.\n\nAs long as you can read this note here, there may be breaking changes in future versions.\nSo please review your scripts using this command after updating dbatools.\n\nThe firewall rule for the instance itself will have the following configuration (parameters for New-NetFirewallRule):\n\n DisplayName = \u0027SQL Server default instance\u0027 or \u0027SQL Server instance \u003cInstanceName\u003e\u0027\n Name = \u0027SQL Server default instance\u0027 or \u0027SQL Server instance \u003cInstanceName\u003e\u0027\n Group = \u0027SQL Server\u0027\n Enabled = \u0027True\u0027\n Direction = \u0027Inbound\u0027\n Protocol = \u0027TCP\u0027\n LocalPort = \u0027\u003cPort\u003e\u0027 (for instances with static port)\n Program = \u0027\u003cPath ending with MSSQL\\Binn\\sqlservr.exe\u003e\u0027 (for instances with dynamic port)\n\nThe firewall rule for the SQL Server Browser will have the following configuration (parameters for New-NetFirewallRule):\n\n DisplayName = \u0027SQL Server Browser\u0027\n Name = \u0027SQL Server Browser\u0027\n Group = \u0027SQL Server\u0027\n Enabled = \u0027True\u0027\n Direction = \u0027Inbound\u0027\n Protocol = \u0027UDP\u0027\n LocalPort = \u00271434\u0027\n\nThe firewall rule for the dedicated admin connection (DAC) will have the following configuration (parameters for New-NetFirewallRule):\n\n DisplayName = \u0027SQL Server default instance (DAC)\u0027 or \u0027SQL Server instance \u003cInstanceName\u003e (DAC)\u0027\n Name = \u0027SQL Server default instance (DAC)\u0027 or \u0027SQL Server instance \u003cInstanceName\u003e (DAC)\u0027\n Group = \u0027SQL Server\u0027\n Enabled = \u0027True\u0027\n Direction = \u0027Inbound\u0027\n Protocol = \u0027TCP\u0027\n LocalPort = \u0027\u003cPort\u003e\u0027 (typically 1434 for a default instance, but will be fetched from ERRORLOG)\n\nThe firewall rule for the DAC will only be created if the DAC is configured for listening remotely.\nUse `Set-DbaSpConfigure -SqlInstance SRV1 -Name RemoteDacConnectionsEnabled -Value 1` to enable remote DAC before running this command.",
4141241412
"Tags": [
4141341413
"Network",
4141441414
"Connection",
@@ -41442,7 +41442,7 @@
4144241442
],
4144341443
[
4144441444
"Type",
41445-
"Creates firewall rules for the given type(s).\r\nValid values are:\r\n Engine - for the SQL Server instance\r\n Browser - for the SQL Server Browser\r\n DAC - for the dedicated admin connection (DAC)\r\nIf this parameter is not used:\r\n The firewall rule for the SQL Server instance will be created.\r\n In case the instance is listening on a port other than 1433, also the firewall rule for the SQL Server Browser will be created if not already in place.\r\n In case the DAC is configured for listening remotely, also the firewall rule for the DAC will be created.",
41445+
"Creates firewall rules for the given type(s).\nValid values are:\r\n* Engine - for the SQL Server instance\r\n* Browser - for the SQL Server Browser\r\n* DAC - for the dedicated admin connection (DAC)\nIf this parameter is not used:\r\n* The firewall rule for the SQL Server instance will be created.\r\n* In case the instance is listening on a port other than 1433, also the firewall rule for the SQL Server Browser will be created if not already in place.\r\n* In case the DAC is configured for listening remotely, also the firewall rule for the DAC will be created.",
4144641446
"",
4144741447
false,
4144841448
"false",
@@ -48324,7 +48324,7 @@
4832448324
],
4832548325
[
4832648326
"Type",
48327-
"Removes firewall rules for the given type(s).\r\nValid values are:\r\n Engine - for the SQL Server instance\r\n Browser - for the SQL Server Browser\r\n DAC - for the dedicated admin connection (DAC)\r\n AllInstance - for all firewall rules on the target computer related to SQL Server\r\nThe default is @(\u0027Engine\u0027, \u0027DAC\u0027).\r\nAs the Browser might be needed by other instances, the firewall rule for the SQL Server Browser is\r\nnever removed with the firewall rule of the instance but only removed if \u0027Browser\u0027 is used.",
48327+
"Removes firewall rules for the given type(s).\nValid values are:\r\n* Engine - for the SQL Server instance\r\n* Browser - for the SQL Server Browser\r\n* DAC - for the dedicated admin connection (DAC)\r\n* AllInstance - for all firewall rules on the target computer related to SQL Server\nThe default is @(\u0027Engine\u0027, \u0027DAC\u0027).\r\nAs the Browser might be needed by other instances, the firewall rule for the SQL Server Browser is\r\nnever removed with the firewall rule of the instance but only removed if \u0027Browser\u0027 is used.",
4832848328
"",
4832948329
false,
4833048330
"false",
@@ -50949,7 +50949,7 @@
5094950949
],
5095050950
[
5095150951
"Continue",
50952-
"If specified we will to attempt to recover more transaction log backups onto database(s) in Recovering or Standby states\r\nWhen specified, WithReplace will be set to true",
50952+
"If specified we will to attempt to recover more transaction log backups onto database(s) in Recovering or Standby states",
5095350953
"",
5095450954
false,
5095550955
"false",
@@ -54731,7 +54731,7 @@
5473154731
"CommandName": "Set-DbaDbFileGrowth",
5473254732
"Availability": "Windows, Linux, macOS",
5473354733
"Links": "https://dbatools.io/Set-DbaDbFileGrowth",
54734-
"Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eSet-DbaDbFileGrowth -SqlInstance sql2016 -Database test -GrowthType GB -Growth 1\nSets the test database on sql2016 to a growth of 1GB\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbaDatabase -SqlInstance sql2016 -Database test | Set-DbaDbFileGrowth -GrowthType GB -Growth 1\nSets the test database on sql2016 to a growth of 1GB\n-------------------------- EXAMPLE 3 --------------------------\nPS C:\\\u003eGet-DbaDatabase | Set-DbaDbFileGrowth -SqlInstance sql2017, sql2016, sql2012\nSets all database files on sql2017, sql2016, sql2012 to 64MB.\n-------------------------- EXAMPLE 4 --------------------------\nPS C:\\\u003eSet-DbaDbFileGrowth -SqlInstance sql2017, sql2016, sql2012 -Database test -WhatIf\nShows what would happen if the command were executed",
54734+
"Examples": "-------------------------- EXAMPLE 1 --------------------------\nPS C:\\\u003eSet-DbaDbFileGrowth -SqlInstance sql2016 -Database test -GrowthType GB -Growth 1\nSets the test database on sql2016 to a growth of 1GB\n-------------------------- EXAMPLE 2 --------------------------\nPS C:\\\u003eGet-DbaDatabase -SqlInstance sql2016 -Database test | Set-DbaDbFileGrowth -GrowthType GB -Growth 1\nSets the test database on sql2016 to a growth of 1GB\n-------------------------- EXAMPLE 3 --------------------------\nPS C:\\\u003eGet-DbaDatabase | Set-DbaDbFileGrowth -SqlInstance sql2017, sql2016, sql2012\nSets all database files on sql2017, sql2016, sql2012 to 64MB.\n-------------------------- EXAMPLE 4 --------------------------\nPS C:\\\u003eSet-DbaDbFileGrowth -SqlInstance sql2017, sql2016, sql2012 -Database test -WhatIf\nShows what would happen if the command were executed\n-------------------------- EXAMPLE 5 --------------------------\nPS C:\\\u003eSet-DbaDbFileGrowth -SqlInstance sql2017 -Database test -GrowthType GB -Growth 1 -FileType Data\nSets growth to 1GB for only data files for database test",
5473554735
"Params": [
5473654736
[
5473754737
"SqlInstance",
@@ -54778,6 +54778,15 @@
5477854778
"64",
5477954779
""
5478054780
],
54781+
[
54782+
"FileType",
54783+
"Apply changes to only DATA, LOG or ALL files",
54784+
"",
54785+
false,
54786+
"false",
54787+
"All",
54788+
"All,Data,Log"
54789+
],
5478154790
[
5478254791
"InputObject",
5478354792
"Allows piping from Get-DbaDatabase",
@@ -54815,7 +54824,7 @@
5481554824
""
5481654825
]
5481754826
],
54818-
"Syntax": "Set-DbaDbFileGrowth [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-Database] \u003cString[]\u003e] [[-GrowthType] \u003cString\u003e] [[-Growth] \u003cInt32\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
54827+
"Syntax": "Set-DbaDbFileGrowth [[-SqlInstance] \u003cDbaInstanceParameter[]\u003e] [[-SqlCredential] \u003cPSCredential\u003e] [[-Database] \u003cString[]\u003e] [[-GrowthType] \u003cString\u003e] [[-Growth] \u003cInt32\u003e] [[-FileType] \u003cString\u003e] [[-InputObject] \u003cDatabase[]\u003e] [-EnableException] [-WhatIf] [-Confirm] [\u003cCommonParameters\u003e]"
5481954828
},
5482054829
{
5482154830
"Name": "Set-DbaDbIdentity",

0 commit comments

Comments
 (0)