You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -49,36 +49,157 @@ Once this Azure subscription has been created and configured to host CockroachDB
49
49
50
50
{{ site.data.alerts.end }}
51
51
52
-
## Step 2. Grant IAM permissions to Cockroach Labs
53
-
54
-
When BYOC is enabled for your account, Cockroach Labs provisions a multi-tenant App Registration associated with your CockroachDB {{ site.data.products.cloud }} organization and provides you with a URL to grant tenant-wide admin consent to the application. Visit this URL with a user account that is [authorized to consent on behalf of your organization](https://learn.microsoft.com/entra/identity/enterprise-apps/grant-admin-consent?pivots=portal#prerequisites).
55
-
56
-
Once the Cockroach Labs App Registration has been granted admin consent in the tenant, grant the following set of roles to the app:
57
-
58
-
-`Role Based Access Control Administrator`
59
-
-`Azure Kubernetes Service Cluster User Role`
60
-
-`Azure Kubernetes Service Contributor Role`
61
-
-`Azure Kubernetes Service RBAC Cluster Admin`
62
-
-`Managed Identity Contributor`
63
-
-`Network Contributor`
64
-
-`Storage Account Contributor`
65
-
-`Storage Blob Data Contributor`
66
-
-`Virtual Machine Contributor`
67
-
- A custom role, `Resource Group Manager`, with the following permissions:
The custom `Resource Group Manager` role is required to create and manage resource groups in the subscription. This role is used instead of requesting the more broad `Contributor` role.
80
-
81
-
## Step 3. Register resource providers
52
+
## Step 2. Grant admin consent to Cockroach Labs support
53
+
54
+
The CockroachDB {{ site.data.products.cloud }} BYOC Reader is an enterprise application in Azure that is used
55
+
by Cockroach Labs support. Granting admin consent to this application gives **read-only** permissions to allow
56
+
Cockroach Labs support engineers to securely view your Azure resources if needed.
57
+
58
+
Follow these steps to grant admin consent to the reader application and assign the necessary permissions:
59
+
60
+
1. Log in to the Azure portal as a user with Global Administrator or Privileged Role Administrator permissions.
The custom `Resource Group Manager` role is required to create and manage resource groups in the subscription. This role is used instead of requesting the more broad `Contributor` role.
98
+
99
+
## Step 3. Configure Azure Lighthouse
100
+
101
+
[Azure Lighthouse](https://learn.microsoft.com/azure/lighthouse/overview) enables cross-tenant management to Cockroach Labs with least-privilege access and full customer visibility. You can review or remove this access at any time from the Azure portal.
102
+
103
+
This Azure Lighthouse deployment grants the following permissions to Cockroach Labs:
104
+
105
+
- Access to the CockroachDB {{ site.data.products.cloud }} BYOC reader application for observability.
106
+
- Kubernetes read access for cluster inspection.
107
+
- Administrative access for managed operations.
108
+
109
+
These permissions are granted to Cockroach Labs's managed tenant, which has a tenant ID of `a4611215-941c-4f86-b53b-348514e57b45`
110
+
111
+
Follow these steps to enable secure, scoped access for Cockroach Labs to your subscription using Azure Lighthouse:
112
+
113
+
1. Save the following ARM template to a file named `byoc-lighthouse.json`:
2. Deploy the template at the subscription scope using Azure CLI, Azure PowerShell, or Azure Portal. The following example command uses the Azure CLI:
194
+
{% include_cached copy-clipboard.html %}
195
+
~~~ shell
196
+
az deployment sub create \
197
+
--name cockroach-byoc-lighthouse \
198
+
--location <region> \
199
+
--template-file byoc-lighthouse.json
200
+
~~~
201
+
202
+
## Step 4. Register resource providers
82
203
83
204
Register the following [resource providers](https://learn.microsoft.com/azure/azure-resource-manager/management/resource-providers-and-types) in the Azure subscription:
84
205
@@ -88,7 +209,7 @@ Register the following [resource providers](https://learn.microsoft.com/azure/az
88
209
- `Microsoft.Quota`
89
210
- `Microsoft.Storage`
90
211
91
-
## Step 4. Create the CockroachDB {{ site.data.products.cloud }} cluster
212
+
## Step 5. Create the CockroachDB {{ site.data.products.cloud }} cluster
92
213
93
214
In BYOC deployments, CockroachDB clusters are deployed with the {{ site.data.products.cloud }} API and must use the {{ site.data.products.advanced }} plan. Follow the API documentation to [create a CockroachDB {{ site.data.products.cloud }} {{ site.data.products.advanced }} cluster]({% link cockroachcloud/cloud-api.md %}#create-an-advanced-cluster).
0 commit comments