You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/business-process-tracking/set-up-continuous-integration-deployment.md
+10-13Lines changed: 10 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -139,7 +139,7 @@ For this task, see the general steps in [Create your first pipeline](/azure/devo
139
139
140
140
This example selects **Azure DevOps**.
141
141
142
-
1. On the **Inventory** tab, select **Non-production** >**Configure pipeline**.
142
+
1. On the **Inventory** tab, select **Production** or **Non-production**, and then select**Configure pipeline**.
143
143
144
144
1. On the **Configure** tab, select **Existing Azure Pipeline YAML file**.
145
145
@@ -284,7 +284,7 @@ Now, update your **business-process-pipelines-variables.yml** file to use the pr
284
284
285
285
1. In Visual Studio Code, go to your logic app project, find the **pipelines** folder, and open the file named **business-process-pipelines-variables.yml** at the end of this path:
The **business-process-pipelines-variables.yml** file contains a node named **`businessProcessMapping`**. This node includes references to your business process stage mappings and specific logic apps. These references contain paths with Azure subscription IDs and names for resource groups and logic apps.
290
290
@@ -312,21 +312,18 @@ After you finish these steps, your business process pipelines now appear in the
312
312
313
313
## Set up permissions and access to Azure Data Explorer
314
314
315
-
Azure Business Process Tracking uses Azure Data Explorer as the backend data store. So, you need to make sure that your service connection can connect, access, and update Data Explorer cluster, database, and tables.
315
+
Azure Business Process Tracking uses Azure Data Explorer as the backend data store. So, you need to make sure that your service connection can connect, access, and update Data Explorer cluster, database, and tables by completing the following steps:
316
316
317
-
1.On the cluster, check whether your service connection has the **Contributor** role or access. If not, assign your service connection the appropriate role on your cluster.
317
+
On the Data Explorer database where your service connection needs to create a table, make sure that your service connection has **Database Admin** role.
318
318
319
-
For more information, see the following documentation:
319
+
1. In your Azure Database Explorer cluster, go to your Data Explorer database.
320
+
1. On the database menu, under **Overview**, select **Permissions**.
321
+
1. Add your service connection, and assign the **Database Admin** role.
320
322
321
-
-[Azure roles, Microsoft Entra roles, and classic subscription administrator roles](/azure/role-based-access-control/rbac-and-directory-admin-roles)
322
-
-[Role-based access control (Azure Data Explorer)](/kusto/access-control/role-based-access-control?view=azure-data-explorer#roles-and-permissions&preserve-view=true)
323
+
For more information, see the following documentation:
323
324
324
-
1. On the cluster database where your service connection needs to create a table, make sure that your service connection has administrator privileges.
325
-
326
-
For more information, see the following documentation:
327
-
328
-
-[Azure roles, Microsoft Entra roles, and classic subscription administrator roles](/azure/role-based-access-control/rbac-and-directory-admin-roles)
329
-
-[Role-based access control (Azure Data Explorer)](/kusto/access-control/role-based-access-control?view=azure-data-explorer#roles-and-permissions&preserve-view=true)
325
+
-[Azure roles, Microsoft Entra roles, and classic subscription administrator roles](/azure/role-based-access-control/rbac-and-directory-admin-roles)
326
+
-[Role-based access control (Azure Data Explorer)](/kusto/access-control/role-based-access-control?view=azure-data-explorer#roles-and-permissions&preserve-view=true)
330
327
331
328
## Create infrastructure pipeline for your business process
0 commit comments