- Sign up the following two services:
- Microsoft Azure activated with a Microsoft Entra tenant and an Azure subscription.
- GitHub
- Copy a Microsoft Entra tenant ID and a Azure subscription ID by official reference.
- Access Azure Portal and search Microsoft Entra ID:
- Access App Registrations > New registration.
- Register a service principal by setting the any name and click "Register" button:
- Copy "Application (client) ID" of a registered service principal in the overview.
- Access Certificates & secrets > New client secret.
- Register a client secret of a registered service principal by setting the any description and expires and click "Add" button
- Copy a client secret value:
- Access Overview > Managed application in local directory:
- Access Properties and Turn "Visible to users?" on:
Warning
A client secret value is only displayed immediately after the registration, so keep a copied one at hand.
- Access Azure Portal and access "Subscription" of "Navigate":
- Access the Azure subscription > Access control (IAM) > Add role assignment.
- Select "Privileged administrator roles" tab and "Contributor" role, then click "Next" button:
- Select "User, group, or service principal" in "Assign access to", click "Select Members", set and select the name of a service principal, click "Select" button and click "Review + assign" button:
- Click "Review + assign" button.
- Fork this Repository.
- Access Setting > Secrets And variables > Actions.
- Click the "New repository secret" button from the "Secrets" tab and set all secrets as follows:
Name Value AZURE_AD_SP_CONTRIBUTOR_CLIENT_SECRET
Copied client secret value of service principal - Click the "New repository variable" button from the "Variables" tab and set all variables as follows:
Name Value AZURE_AD_SP_CONTRIBUTOR_CLIENT_ID
Copied client ID of service principal AZURE_API_CONNECTION_AZUREBLOB
Name of Azure API Connection with BLOB Storage AZURE_API_CONNECTION_OUTLOOK
Name of Azure API Connection with Outlook.com AZURE_APPLICATION_INSIGHTS
Name of Azure Application Insights AZURE_FUNCTIONS
Name of Azure Function Apps AZURE_FUNCTIONS_PLAN
Name of Azure Function Apps' Plan AZURE_LOCATION
Region of all Azure resources AZURE_LOGIC_APP
Name of Azure Logic Apps AZURE_RESOURCE_GROUP
Name of Azure Resource Group AZURE_STORAGE
Globally unique Name of Azure Storage Account AZURE_SUBSCRIPTION_ID
Copied Azure subscription ID AZURE_TENANT_ID
Copied Microsoft Entra tenant ID AZURE_WORKSPACES
Name of Azure Log Analytics Workspaces - Access Actions and run "Create Azure Resources" workflow.
Warning
After running "Create Azure Resources" workflow, charges will be incurred on Microsoft Azure due to the deployment of Azure resources.
- Access Azure Portal and search Logic Apps:
- Access
AZURE_LOGIC_APP
> Logic app designer. - Expand boxes named "Set mail" and "Set makers".
- Set values as follows:
Name Description Example Set mail Notification mail destination when new UCS was changed foo@bar.com
Set makers An array of the UCS maker names as double-quated strings which you trace and notificate ["foo", "bar"]
- Expand box named "Check Notification UCS List" > "True" > "Connections" and check the following error message:
- Click the "Invalid" column icon and authentificate by Microsoft Azure account in the new dialog.
- Check vanishing the error message and the "Invalid" column icon:
- Click "Save" button.
- Access Overview > Run and click "Run":
- After a while, click "Refresh" and check if the latest "Runs History" status is "Succeeded":