You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
// create a single database that is used to maintain state information for graphrag indexing
75
+
// NOTE: The current CosmosDB role assignments are not sufficient to allow the aks workload identity to create databases so we must do it in bicep at deployment time.
76
+
// TODO: Identify and assign appropriate RBAC roles that allow the workload identity to create new databases instead of relying on this bicep implementation.
varcustomRoleName = 'Custom cosmosDB role for graphrag - adds read/write permissions at the database and container level'
56
+
// NOTE: The code snippet below is commented out because there is a known race condition issue at deployment time when assigning Cosmos DB built-in roles to an identity.
57
+
// For more information: https://github.com/pulumi/pulumi-azure-native/issues/2816
58
+
// For a temporary workaround, that seems to work in practice, we can create a custom role defintion with the same permissions as the built-in role and use it instead
59
+
// var cosmosDbContainerReadWriteRoleId = '00000000-0000-0000-0000-000000000002'
0 commit comments