Skip to content

Commit 0dc2d4b

Browse files
authored
docs: rewrite parts of Azure VPC Peering page (#6486)
1 parent b2da950 commit 0dc2d4b

File tree

1 file changed

+38
-36
lines changed

1 file changed

+38
-36
lines changed

docs/content/Configuration/VPC/Connecting-with-a-VPC-Azure.mdx

Lines changed: 38 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -10,75 +10,77 @@ information is required:
1010

1111
- **Virtual Network Name:** This can be found in the Virtual Networks section of
1212
the [Azure Portal][azure-console].
13-
- **Tenant ID:** This can be found under Azure Active Directory > Properties >
14-
Tenant ID in the [Azure Portal][azure-console].
13+
- **Tenant ID:** This can be found under `Azure Active Directory` > `Properties` >
14+
`Tenant ID` in the [Azure Portal][azure-console].
1515

1616
## Setup
1717

18-
Unfortunately Azure cross-tenant peering suppose that you grant peering role to
19-
the user id/service principal to the peering party Below the list of steps that
20-
would register Cube Cloud tenant at your organization and grant peering access
21-
to Cube Cloud service principal
18+
For cross-tenant peering in Azure, you are supposed to assign the peering role to
19+
the service principal of the peering party.
20+
21+
Using the steps outlined below, you would register Cube Cloud tenant at your organization
22+
and grant peering access to Cube Cloud service principal.
2223

2324
### Add Cube tenant to your organization
2425

25-
First the Cube Cloud tenant must be added to your organization. To do this, open
26-
the [Azure Portal][azure-console] and go to Azure Active Directory > External
27-
Identities > Cross-tenant access settings > Organizational Settings > Add
28-
Organization.
26+
First you should add the Cube Cloud tenant to your organization. To do this, open
27+
the [Azure Portal][azure-console] and go to `Azure Active Directory` > `External
28+
Identities` > `Cross-tenant access settings` > `Organizational Settings` > `Add
29+
Organization`.
30+
31+
For Tenant ID, enter `197e5263-87f4-4ce1-96c4-351b0c0c714a`.
2932

30-
For Tenant ID, enter `197e5263-87f4-4ce1-96c4-351b0c0c714a`. Make sure that B2B
31-
Collaboration > Inbound Access > Applications is set (or inherited) so that it
32-
`Allows access`
33+
Make sure that `B2B Collaboration` > `Inbound Access` > `Applications` is set to `Allows access`.
3334

3435
### Register Cube Cloud service principal at your organization
3536

36-
`Cube Cloud service principal`
37+
To register the Cube Cloud service principal for your organization, follow these steps:
3738

38-
info: Client ID: `0c5d0d4b-6cee-402e-9a08-e5b79f199481` Name:
39-
`cube-dedicated-infra-sp`
39+
1. Log in with an account that has permissions to register Enterprise applications.
40+
2. Open a browser tab and go to the following URL, replacing "TenantID" with your tenant ID:
41+
https://login.microsoftonline.com/TenantID/oauth2/authorize?client_id=0c5d0d4b-6cee-402e-9a08-e5b79f199481&response_type=code&redirect_uri=https%3A%2F%2Fwww.microsoft.com%2F
42+
3. The Cube Cloud service principal has specific credentials. Check that the following details match exactly what you see on the dialog box that pops up:
43+
- Client ID: `0c5d0d4b-6cee-402e-9a08-e5b79f199481`
44+
- Name: `cube-dedicated-infra-sp`
4045

41-
Using browser tab where account that has rights to register
42-
`Enterprise applications` is logged in open the following url:
43-
https://login.microsoftonline.com/**Tenant
44-
ID\*\*/oauth2/authorize?client_id=0c5d0d4b-6cee-402e-9a08-e5b79f199481&response_type=code&redirect_uri=https%3A%2F%2Fwww.microsoft.com%2F
45-
Select `Consent on behalf of your organization` And click `Accept`
46+
Once you have confirmed that all the information is correct, select "Consent on behalf of your organization" and click "Accept".
4647

4748
### Grant peering permissions to Cube Cloud service principal on your `Virtual Network`
4849

49-
As `peering role` you can use built-in `Network contributor` or custom role that
50-
has the following permissions:
50+
As `peering role` you can use built-in `Network Contributor` or create custom role (e.g. `cube-peering-role`) with the following permissions:
5151

52-
- Microsoft.Network/virtualNetworks/virtualNetworkPeerings/write
53-
- Microsoft.Network/virtualNetworks/peer/action
54-
- Microsoft.ClassicNetwork/virtualNetworks/peer/action
55-
- Microsoft.Network/virtualNetworks/virtualNetworkPeerings/read
56-
- Microsoft.Network/virtualNetworks/virtualNetworkPeerings/delete
52+
- `Microsoft.Network/virtualNetworks/virtualNetworkPeerings/write`
53+
- `Microsoft.Network/virtualNetworks/peer/action`
54+
- `Microsoft.ClassicNetwork/virtualNetworks/peer/action`
55+
- `Microsoft.Network/virtualNetworks/virtualNetworkPeerings/read`
56+
- `Microsoft.Network/virtualNetworks/virtualNetworkPeerings/delete`
5757

58-
On the [Azure Portal][azure-console], go to `Virtual networks` > **Virtual
59-
Network Name** > `Access Control (IAM)` > `Add` > `Add role assignment` Role =
60-
`peering role` Members: `cube-dedicated-infra-sp`
58+
On the [Azure Portal][azure-console], go to `Virtual networks` > *Virtual
59+
Network Name* > `Access Control (IAM)` > `Add` > `Add role assignment` and fill in the following details:
60+
- Role = `Network Contributor` or `cube-peering-role`
61+
- Members: `cube-dedicated-infra-sp`
6162

6263
### Firewall
6364

64-
Make sure that your firewall rules allow inbound and outbound traffic
65+
Make sure that your firewall rules allow inbound and outbound traffic to IP/port your database is listening at.
6566

6667
## Information required by Cube Cloud support
6768

6869
When you are reaching out Cube Cloud support please provide following
6970
information:
7071

71-
- **Virtual Network ID:** You can find it at `Virtual Networks` > **Virtual
72-
Network Name** > `Overview` > `JSON view` > `Resource ID` on [Azure
72+
- **Virtual Network ID:** You can find it at `Virtual Networks` > *Virtual
73+
Network Name* > `Overview` > `JSON view` > `Resource ID` on [Azure
7374
Portal][azure-console].
7475
- **Virtual Network Address Spaces:** You can find it at `Virtual Networks` >
75-
**Virtual Network Name** > `Overview` > `JSON view` > `properties` >
76+
*Virtual Network Name* > `Overview` > `JSON view` > `properties` >
7677
`addressSpace` on [Azure Portal][azure-console].
7778
- **Tenant ID:** You can find it in `Azure Active Directory` > `Properties` >
7879
`Tenant ID` section of [Azure Portal][azure-console].
7980

8081
## Supported Regions
8182

82-
We support all general purpose regions
83+
We support all general-purpose regions. Cube Store is currently located only in `US Central`
84+
so pre-aggregations performance might depend on geographical proximity to it.
8385

8486
[azure-console]: https://portal.azure.com

0 commit comments

Comments
 (0)