Skip to content

Commit d478fc7

Browse files
committed
Second round of Acrolinx improvements.
1 parent 55ba1e8 commit d478fc7

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/storage-discovery/deployment-planning.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ To generate insights about Azure Storage resources, such as storage accounts, yo
3535
3636
## Getting your subscription ready
3737

38-
You need to choose a subscription that is governed by the same Azure tenant as the Azure Storage resources (such as storage accounts) you want to receive insights for. When you decided on an Azure subscription and resource group for your Storage Discovery workspace, review the following sections to ensure your subscription is prepared.
38+
You need to choose a subscription governed by the same Azure tenant as the Azure Storage resources (such as storage accounts) you want to receive insights for. When you decided on an Azure subscription and resource group for your Storage Discovery workspace, review the following sections to ensure your subscription is prepared.
3939

4040
### Resource provider namespace
4141

@@ -77,7 +77,7 @@ It's important that you familiarize yourself with the available resource tags on
7777

7878
When you deploy a Storage Discovery workspace, you need to choose a region. The region you select determines where the computed insights about your Azure Storage resources are stored. You can still capture insights for Azure Storage resources that are located in other regions. A general best practice is to choose the region for your workspace according to metadata residency requirements that apply to you and in closer proximity to your location. Visualizing your insights from a workspace closer to you can have a slight performance advantage.
7979

80-
Storage Discovery workspaces can be created in the following regions. This list will expand throughout the preview period.
80+
Storage Discovery workspaces can be created in the following regions. More regions are added throughout the preview period.
8181

8282
[!INCLUDE [control-plane-regions](includes/control-plane-regions.md)]
8383

@@ -90,7 +90,7 @@ The Discovery service covers only storage accounts located in the following regi
9090
[!INCLUDE [data-plane-regions](includes/data-plane-regions.md)]
9191

9292
> [!WARNING]
93-
> Storage accounts in regions other than previously listed, can't be considered by the Discovery service. Including storage accounts from unsupported regions in a scope can lead to an incomplete set of insights. A short-term limitation of the preview period.
93+
> The Discovery service currently can't consider storage accounts located in regions other than those previously listed. Including storage accounts from unsupported regions in a scope can lead to an incomplete set of insights. A short-term limitation of the preview period.
9494
9595
## Permissions
9696

@@ -122,13 +122,13 @@ The Azure Storage Discovery workspace stores the computed insights for your stor
122122
|Scenario |Minimal RBAC role assignments needed |
123123
|:--------|--------------------------------------------------------------------------------:|
124124
|Register a resource provider namespace with a subscription| Subscription: `Contributor` |
125-
|Deploy a Storage Discovery workspace <br>*([RP namespace already registered](#resource-provider-namespace))*| Resource group: `Contributor` |
125+
|Deploy a Storage Discovery workspace <br>*([Resource provider namespace already registered](#resource-provider-namespace))*| Resource group: `Contributor` |
126126
|Share the Storage Discovery insights with another person | Storage Discovery workspace: `Reader`|
127127
|Enable a person to make changes to the workspace configuration| Storage Discovery workspace: `Contributor`|
128128
|Enable a person to share these insights with others | Storage Discovery workspace: `Owner`|
129129

130130
> [!CAUTION]
131-
> When you provide other users access to a workspace they might not be privileged to know about the existence of the Azure resources they'll see in the workspace. You are disclosing all insights of the workspace - there are no further permission checks. Providing access to a workspace does not provide access to an individual storage account, resource group, or subscription. Individual resources remain governed by RBAC.
131+
> When you provide other users access to a workspace, they might not be privileged to know about the existence of the Azure resources covered by the workspace. You are disclosing all insights of the workspace - there are no further permission checks. Providing access to a workspace does not provide access to an individual storage account, resource group, or subscription. Individual resources remain governed by RBAC.
132132
133133
## Next steps
134134

0 commit comments

Comments
 (0)