Skip to content

Commit 45ab099

Browse files
authored
Updates per feedback
1 parent 1c5e96d commit 45ab099

File tree

1 file changed

+10
-17
lines changed

1 file changed

+10
-17
lines changed

articles/business-process-tracking/set-up-continuous-integration-deployment.md

Lines changed: 10 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ For this task, see the general steps in [Create your first pipeline](/azure/devo
139139

140140
This example selects **Azure DevOps**.
141141

142-
1. On the **Inventory** tab, select **Non-production** > **Configure pipeline**.
142+
1. On the **Inventory** tab, select **Production** or **Non-production**, and then select **Configure pipeline**.
143143

144144
1. On the **Configure** tab, select **Existing Azure Pipeline YAML file**.
145145

@@ -284,7 +284,7 @@ Now, update your **business-process-pipelines-variables.yml** file to use the pr
284284

285285
1. In Visual Studio Code, go to your logic app project, find the **pipelines** folder, and open the file named **business-process-pipelines-variables.yml** at the end of this path:
286286

287-
**deployment\businessprocesses\<*business-process-name*>\\pipelines\\**
287+
**deployment\businessprocesses\\<*business-process-name*>\\pipelines\\**
288288

289289
The **business-process-pipelines-variables.yml** file contains a node named **`businessProcessMapping`**. This node includes references to your business process stage mappings and specific logic apps. These references contain paths with Azure subscription IDs and names for resource groups and logic apps.
290290

@@ -312,25 +312,18 @@ After you finish these steps, your business process pipelines now appear in the
312312

313313
## Set up permissions and access to Azure Data Explorer
314314

315-
Azure Business Process Tracking uses Azure Data Explorer as the backend data store. So, you need to make sure that your service connection can connect, access, and update Data Explorer cluster, database, and tables.
315+
Azure Business Process Tracking uses Azure Data Explorer as the backend data store. So, you need to make sure that your service connection can connect, access, and update Data Explorer cluster, database, and tables by completing the following steps:
316316

317-
1. Go to the Data Explorer cluster, and check whether your service connection has the **Contributor** role or permissions. If not, assign your service connection the appropriate role on your cluster.
317+
On the Data Explorer database where your service connection needs to create a table, make sure that your service connection has **Database Admin** role.
318318

319-
For more information, see the following documentation:
319+
1. In your Azure Database Explorer cluster, go to your Data Explorer database.
320+
1. On the database menu, under **Overview**, select **Permissions**.
321+
1. Add your service connection, and assign the **Database Admin** role.
320322

321-
- [Azure roles, Microsoft Entra roles, and classic subscription administrator roles](/azure/role-based-access-control/rbac-and-directory-admin-roles)
322-
- [Role-based access control (Azure Data Explorer)](/kusto/access-control/role-based-access-control?view=azure-data-explorer#roles-and-permissions&preserve-view=true)
323+
For more information, see the following documentation:
323324

324-
1. On the Data Explorer database where your service connection needs to create a table, make sure that your service connection has **Database Admin** role.
325-
326-
1. Go to your Data Explorer database.
327-
1. On the database menu, under **Overview**, select **Permissions**.
328-
1. Add the service connection, and assign the **Database Admin** role.
329-
330-
For more information, see the following documentation:
331-
332-
- [Azure roles, Microsoft Entra roles, and classic subscription administrator roles](/azure/role-based-access-control/rbac-and-directory-admin-roles)
333-
- [Role-based access control (Azure Data Explorer)](/kusto/access-control/role-based-access-control?view=azure-data-explorer#roles-and-permissions&preserve-view=true)
325+
- [Azure roles, Microsoft Entra roles, and classic subscription administrator roles](/azure/role-based-access-control/rbac-and-directory-admin-roles)
326+
- [Role-based access control (Azure Data Explorer)](/kusto/access-control/role-based-access-control?view=azure-data-explorer#roles-and-permissions&preserve-view=true)
334327

335328
## Create infrastructure pipeline for your business process
336329

0 commit comments

Comments
 (0)