Before setting up the environment, gather the following details to ensure proper configuration:

Before proceeding, you must add our account to your Entra tenant. Azure RBAC roles can only be assigned to users who exist in your Entra ID. Quick Link: Invite new Entra tenant member as Guest Steps:

  1. Go Azure Portal: https://portal.azure.com/
  2. Search for Microsoft Entra Id
  3. Click + Add (top bar, left), User > Invite External User
  4. Set email to [email protected]
  5. Finalise the rest of the optional details and invite

Setup

  1. Create a new subscription through your internal procurement process, choosing a billing model that fits your company’s preferences. Steps:
    1. Go to the Azure Portal: https://portal.azure.com/
    2. Search for Subscriptions
    3. Click + Add (top bar, left)
    4. Specify subscription details
    5. Create
  2. Assign RBAC permissions to our tenant user Steps:
    1. Go Azure Portal: https://portal.azure.com/
    2. Search for Subscriptions
    3. Select the newly created subscription
    4. Access Control (IAM) (left menu)
    5. Click + Add (top bar, left), Add role assignment
    6. Select Privileged administrator roles
    7. Select Owner
    8. Next
    9. + select Members
    10. find [email protected], Select
    11. Next
    12. Tick Allow user to assign all roles except privileged administrator roles Owner, UAA, RBAC (Recommended) option
    13. Next, Review & Assign

<aside> 🚨

Once permissions are assigned, please confirm with us so we can begin the setup process. Also send us the gathered details asked at the beginning of this guide.

  1. Account Id
  2. Region / AZ
  3. CIDR range </aside>

Use our Terraform modules to install the required infrastructure

Terraform modules:

Learn how to use them:

Frequently Asked Questions

Access & Permissions

Q: Can I assign the Contributor role instead of Owner? A: No, Contributor does not grant permission to assign roles for Azure Managed Identities, which is required for our setup.