Skip to content

Commit 6990c5f

Browse files
authored
Merge pull request #3045 from Blargian/3039_fix_broken_hash_docs_repo
update broken hashes for cloud
2 parents c56c4b9 + 2c0b384 commit 6990c5f

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

docs/en/cloud/bestpractices/partitioningkey.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ sidebar_label: Choose a Low Cardinality Partitioning Key
44
title: Choose a Low Cardinality Partitioning Key
55
---
66

7-
When you send an insert statement (that should contain many rows - see [section above](#ingest-data-in-bulk)) to a table in ClickHouse Cloud, and that
7+
When you send an insert statement (that should contain many rows - see [section above](/docs/en/optimize/bulk-inserts)) to a table in ClickHouse Cloud, and that
88
table is not using a [partitioning key](/docs/en/engines/table-engines/mergetree-family/custom-partitioning-key.md) then all row data from that insert is written into a new part on storage:
99

1010
![compression block diagram](images/partitioning-01.png)

docs/en/cloud/security/cloud-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ ClickHouse Cloud also supports security assertion markup language (SAML) single
116116
Use the SHA256_hash method when [creating user accounts](/docs/en/sql-reference/statements/create/user.md) to secure passwords.
117117

118118
**TIP:** Since users with less than administrative privileges cannot set their own password, ask the user to hash their password using a generator
119-
such as [this one](https://tools.keycdn.com/sha256-online-generator) before providing it to the admin to setup the account. Passwords should follow the [requirements](#establish-strong-passwords) listed above.
119+
such as [this one](https://tools.keycdn.com/sha256-online-generator) before providing it to the admin to setup the account. Passwords should follow the [requirements](#password-settings) listed above.
120120

121121
```
122122
CREATE USER userName IDENTIFIED WITH sha256_hash BY 'hash';

docs/en/cloud/security/gcp-private-service-connect.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ In the Google Cloud console, navigate to **Network services -> Private Service C
108108
Open the Private Service Connect creation dialog by clicking on the **Connect Endpoint** button.
109109

110110
- **Target**: use **Published service**
111-
- **Target service**: use **endpointServiceId** from [Obtain GCP service attachment for Private Service Connect](#obtain-gcp-service-attachment-for-private-service-connect) step.
111+
- **Target service**: use **endpointServiceId** from [Obtain GCP service attachment for Private Service Connect](#obtain-gcp-service-attachment-and-dns-name-for-private-service-connect) step.
112112
- **Endpoint name**: set a name for the PSC **Endpoint name**.
113113
- **Network/Subnetwork/IP address**: Choose the network you want to use for the connection. You will need to create an IP address or use an existing one for the Private Service Connect endpoint. In our example, we precreated an address with the name **your-ip-address** and assigned IP address `10.128.0.2`
114114
- To make the endpoint available from any region, you can enable the **Enable global access** checkbox.

0 commit comments

Comments
 (0)