@@ -10,75 +10,77 @@ information is required:
1010
1111- ** Virtual Network Name:** This can be found in the Virtual Networks section of
1212 the [ Azure Portal] [ azure-console ] .
13- - ** Tenant ID:** This can be found under Azure Active Directory > Properties >
14- Tenant ID in the [ Azure Portal] [ azure-console ] .
13+ - ** Tenant ID:** This can be found under ` Azure Active Directory ` > ` Properties ` >
14+ ` Tenant ID ` in the [ Azure Portal] [ azure-console ] .
1515
1616## Setup
1717
18- Unfortunately Azure cross-tenant peering suppose that you grant peering role to
19- the user id/service principal to the peering party Below the list of steps that
20- would register Cube Cloud tenant at your organization and grant peering access
21- to Cube Cloud service principal
18+ For cross-tenant peering in Azure, you are supposed to assign the peering role to
19+ the service principal of the peering party.
20+
21+ Using the steps outlined below, you would register Cube Cloud tenant at your organization
22+ and grant peering access to Cube Cloud service principal.
2223
2324### Add Cube tenant to your organization
2425
25- First the Cube Cloud tenant must be added to your organization. To do this, open
26- the [ Azure Portal] [ azure-console ] and go to Azure Active Directory > External
27- Identities > Cross-tenant access settings > Organizational Settings > Add
28- Organization.
26+ First you should add the Cube Cloud tenant to your organization. To do this, open
27+ the [ Azure Portal] [ azure-console ] and go to ` Azure Active Directory ` > `External
28+ Identities` > ` Cross-tenant access settings` > ` Organizational Settings` > ` Add
29+ Organization`.
30+
31+ For Tenant ID, enter ` 197e5263-87f4-4ce1-96c4-351b0c0c714a ` .
2932
30- For Tenant ID, enter ` 197e5263-87f4-4ce1-96c4-351b0c0c714a ` . Make sure that B2B
31- Collaboration > Inbound Access > Applications is set (or inherited) so that it
32- ` Allows access `
33+ Make sure that ` B2B Collaboration ` > ` Inbound Access ` > ` Applications ` is set to ` Allows access ` .
3334
3435### Register Cube Cloud service principal at your organization
3536
36- ` Cube Cloud service principal `
37+ To register the Cube Cloud service principal for your organization, follow these steps:
3738
38- info: Client ID: ` 0c5d0d4b-6cee-402e-9a08-e5b79f199481 ` Name:
39- ` cube-dedicated-infra-sp `
39+ 1 . Log in with an account that has permissions to register Enterprise applications.
40+ 2 . Open a browser tab and go to the following URL, replacing "TenantID" with your tenant ID:
41+ https://login.microsoftonline.com/TenantID/oauth2/authorize?client_id=0c5d0d4b-6cee-402e-9a08-e5b79f199481&response_type=code&redirect_uri=https%3A%2F%2Fwww.microsoft.com%2F
42+ 3 . The Cube Cloud service principal has specific credentials. Check that the following details match exactly what you see on the dialog box that pops up:
43+ - Client ID: ` 0c5d0d4b-6cee-402e-9a08-e5b79f199481 `
44+ - Name: ` cube-dedicated-infra-sp `
4045
41- Using browser tab where account that has rights to register
42- ` Enterprise applications ` is logged in open the following url:
43- https://login.microsoftonline.com/**Tenant
44- ID\*\* /oauth2/authorize?client_id=0c5d0d4b-6cee-402e-9a08-e5b79f199481&response_type=code&redirect_uri=https%3A%2F%2Fwww.microsoft.com%2F
45- Select ` Consent on behalf of your organization ` And click ` Accept `
46+ Once you have confirmed that all the information is correct, select "Consent on behalf of your organization" and click "Accept".
4647
4748### Grant peering permissions to Cube Cloud service principal on your ` Virtual Network `
4849
49- As ` peering role ` you can use built-in ` Network contributor ` or custom role that
50- has the following permissions:
50+ As ` peering role ` you can use built-in ` Network Contributor ` or create custom role (e.g. ` cube-peering-role ` ) with the following permissions:
5151
52- - Microsoft.Network/virtualNetworks/virtualNetworkPeerings/write
53- - Microsoft.Network/virtualNetworks/peer/action
54- - Microsoft.ClassicNetwork/virtualNetworks/peer/action
55- - Microsoft.Network/virtualNetworks/virtualNetworkPeerings/read
56- - Microsoft.Network/virtualNetworks/virtualNetworkPeerings/delete
52+ - ` Microsoft.Network/virtualNetworks/virtualNetworkPeerings/write `
53+ - ` Microsoft.Network/virtualNetworks/peer/action `
54+ - ` Microsoft.ClassicNetwork/virtualNetworks/peer/action `
55+ - ` Microsoft.Network/virtualNetworks/virtualNetworkPeerings/read `
56+ - ` Microsoft.Network/virtualNetworks/virtualNetworkPeerings/delete `
5757
58- On the [ Azure Portal] [ azure-console ] , go to ` Virtual networks ` > ** Virtual
59- Network Name** > ` Access Control (IAM) ` > ` Add ` > ` Add role assignment ` Role =
60- ` peering role ` Members: ` cube-dedicated-infra-sp `
58+ On the [ Azure Portal] [ azure-console ] , go to ` Virtual networks ` > * Virtual
59+ Network Name* > ` Access Control (IAM) ` > ` Add ` > ` Add role assignment ` and fill in the following details:
60+ - Role = ` Network Contributor ` or ` cube-peering-role `
61+ - Members: ` cube-dedicated-infra-sp `
6162
6263### Firewall
6364
64- Make sure that your firewall rules allow inbound and outbound traffic
65+ Make sure that your firewall rules allow inbound and outbound traffic to IP/port your database is listening at.
6566
6667## Information required by Cube Cloud support
6768
6869When you are reaching out Cube Cloud support please provide following
6970information:
7071
71- - ** Virtual Network ID:** You can find it at ` Virtual Networks ` > ** Virtual
72- Network Name** > ` Overview ` > ` JSON view ` > ` Resource ID ` on [ Azure
72+ - ** Virtual Network ID:** You can find it at ` Virtual Networks ` > * Virtual
73+ Network Name* > ` Overview ` > ` JSON view ` > ` Resource ID ` on [ Azure
7374 Portal] [ azure-console ] .
7475- ** Virtual Network Address Spaces:** You can find it at ` Virtual Networks ` >
75- ** Virtual Network Name* * > ` Overview ` > ` JSON view ` > ` properties ` >
76+ * Virtual Network Name* > ` Overview ` > ` JSON view ` > ` properties ` >
7677 ` addressSpace ` on [ Azure Portal] [ azure-console ] .
7778- ** Tenant ID:** You can find it in ` Azure Active Directory ` > ` Properties ` >
7879 ` Tenant ID ` section of [ Azure Portal] [ azure-console ] .
7980
8081## Supported Regions
8182
82- We support all general purpose regions
83+ We support all general-purpose regions. Cube Store is currently located only in ` US Central `
84+ so pre-aggregations performance might depend on geographical proximity to it.
8385
8486[ azure-console ] : https://portal.azure.com
0 commit comments