![]() ![]() ![]() If you know you’re never going to need a notebook again, you can delete it from your computer. This will create a new AAD token for your Azure Service Principal and save its value in the DATABRICKS_TOKENĮnvironment variable for use in subsequent steps.Delete a OneNote notebook from your computer The Application (client) Id should be stored as AZURE_SP_APPLICATION_ID, Directory (tenant) Id as AZURE_SP_TENANT_ID, and client secret as AZURE_SP_CLIENT_SECRET.Īdd the following step at the start of your GitHub workflow. Store your service principal credentials into your GitHub repository secrets. Use the Service Principal in your GitHub Workflow Use the client or application Id of your service principal as the applicationId of the service principal in the add-service-principal payload. tenantId: this is the tenant or directory Id of your service principal.Īfter you create an Azure Service Principal, you should add it to your Azure Databricks workspace using the SCIM API.clientSecret: this is the client service of your service princiapl.clientId: this is the client or application Id of your service principal.Specifying the subscription and resource group of your Azure Databricks workspace, to create a service principal and client secret.įrom the resulting JSON output, record the following values: Run az ad sp create-for-rbac -n -sdk-auth -scopes /subscriptions//resourceGroups/ -sdk-auth -role contributor,.Run az login to authenticate with Azure.Record the Application (client) Id, Directory (tenant) Id, and client secret values generated by the steps. ![]() The first way is via the Azure Portal UI. Here are two ways that you can create an Azure Service Principal. Azureįor security reasons, we recommend using a Databricks service principal AAD token. You canĪnd generate an API token on its behalf. AWSįor security reasons, we recommend creating and using a Databricks service principal API token. GitHub-hosted action runners have a wide range of IP addresses, making it difficult to whitelist. Note: we recommend that you do not run this Action against workspaces with IP restrictions. The following section lists recommended approaches for token creation by cloud. We recommend that you store the Databricks REST API token in GitHub Actions secrets If supplying the workspace-notebook-path parameter, "Can read" permissions on the specified notebook.Workspace-temp-dir parameter (the /tmp/databricks-github-actions directory if workspace-temp-dir is unspecified). If supplying the local-notebook-path parameter, "Can manage" permissions on the directory specified by the. ![]() You can associate git credentials with your principal by creating a git credential entry using your principal's API token. However, your principal must have Git integration configured ( AWS | Azure | GCP).
0 Comments
Leave a Reply. |