Skip to content

Commit 649e480

Browse files
committed
Last push
1 parent eb60e1b commit 649e480

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/storage-discovery/deployment-planning.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ The Discovery service covers only storage accounts located in the following regi
9090
[!INCLUDE [data-plane-regions](includes/data-plane-regions.md)]
9191

9292
> [!WARNING]
93-
> The Discovery service currently can't consider storage accounts located in regions other than those previously listed. Including storage accounts from unsupported regions in a scope can lead to an incomplete set of insights. A short-term limitation of the preview period.
93+
> The Discovery service currently can't consider storage accounts located in regions not included in the previously listed locations. Including storage accounts from unsupported regions in a scope can lead to an incomplete set of insights. A short-term limitation of the preview period.
9494
9595
## Permissions
9696

@@ -110,7 +110,7 @@ In the workspace root, you list at least one and at most 100 Azure resources of
110110
The person deploying the workspace must have at least the RBAC role assignment *Reader* for every resource in the workspace root.
111111
*Reader* is the minimum permission level required. *Contributor* and *Owner* are also supported.
112112

113-
It is possible that you see a subscription listed in the Azure portal, for which you don't have this direct *Reader* role assignment. When you can see a resource you don't have a role assignment to, then most likely you have permissions to a sub resource in this subscription. In this case, the existence of this "parent" was revealed to you, but you have no rights on the subscription resource itself. This example can be extended to resource groups as well. Missing a *Reader* or higher direct role assignment disqualifies an Azure resource from being the basis (root) of a workspace.
113+
It's possible that you see a subscription listed in the Azure portal, for which you don't have this direct *Reader* role assignment. When you can see a resource you don't have a role assignment to, then most likely you have permissions to a sub resource in this subscription. In this case, the existence of this "parent" was revealed to you, but you have no rights on the subscription resource itself. This example can be extended to resource groups as well. Missing a *Reader* or higher direct role assignment disqualifies an Azure resource from being the basis (root) of a workspace.
114114

115115
Permissions are only validated when a workspace is created. Any change to permissions of the Azure account that created the workspace, including its deletion, has no effect on the workspace or the Discovery service functionality.
116116

0 commit comments

Comments
 (0)