Skip to content

Commit 47d34c3

Browse files
committed
Update Integration runtimes and sharing section
1 parent 4b4fb43 commit 47d34c3

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

articles/data-factory/continuous-integration-delivery.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: nabhishek
77
ms.author: abnarain
88
ms.reviewer: jburchel
99
ms.topic: conceptual
10-
ms.date: 08/15/2022
10+
ms.date: 08/23/2022
1111
ms.custom: devx-track-azurepowershell
1212
---
1313

@@ -69,6 +69,9 @@ If you're using Git integration with your data factory and have a CI/CD pipeline
6969
7070
- **Integration runtimes and sharing**. Integration runtimes don't change often and are similar across all stages in your CI/CD. So Data Factory expects you to have the same name and type of integration runtime across all stages of CI/CD. If you want to share integration runtimes across all stages, consider using a ternary factory just to contain the shared integration runtimes. You can use this shared factory in all of your environments as a linked integration runtime type.
7171

72+
>[!Note]
73+
>The integration runtime sharing only works with self-hosted integration runtimes. Azure-SSIS integration runtimes don't support sharing.
74+
7275
- **Managed private endpoint deployment**. If a private endpoint already exists in a factory and you try to deploy an ARM template that contains a private endpoint with the same name but with modified properties, the deployment will fail. In other words, you can successfully deploy a private endpoint as long as it has the same properties as the one that already exists in the factory. If any property is different between environments, you can override it by parameterizing that property and providing the respective value during deployment.
7376

7477
- **Key Vault**. When you use linked services whose connection information is stored in Azure Key Vault, it is recommended to keep separate key vaults for different environments. You can also configure separate permission levels for each key vault. For example, you might not want your team members to have permissions to production secrets. If you follow this approach, we recommend that you to keep the same secret names across all stages. If you keep the same secret names, you don't need to parameterize each connection string across CI/CD environments because the only thing that changes is the key vault name, which is a separate parameter.

0 commit comments

Comments
 (0)