Skip to content

Commit

Permalink
tidb-cloud: add Azure Blob Storage access configuration for Dedicated
Browse files Browse the repository at this point in the history
Implement instructions for configuring Azure Blob Storage access
in TiDB Cloud Dedicated. This change supports the new Import
feature for TiDB Cloud Dedicated on Azure, allowing users to
import data from Azure Blob Storage containers.
Those instructions are consistent with
tidb-cloud/serverless-external-storage.md (branch release-7.5)

The instructions cover:
- Accessing the Azure Storage account
- Creating a service SAS token with appropriate permissions
  • Loading branch information
alastori committed Oct 11, 2024
1 parent ceaa402 commit e191132
Show file tree
Hide file tree
Showing 3 changed files with 30 additions and 0 deletions.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
30 changes: 30 additions & 0 deletions tidb-cloud/config-s3-and-gcs-access.md
Original file line number Diff line number Diff line change
Expand Up @@ -221,3 +221,33 @@ To allow TiDB Cloud to access the source data in your GCS bucket, you need to co
![Get bucket URI](/media/tidb-cloud/gcp-bucket-uri02.png)

7. In the TiDB Cloud console, go to the **Data Import** page where you get the Google Cloud Service Account ID, and then paste the GCS bucket gsutil URI to the **Bucket gsutil URI** field. For example, paste `gs://tidb-cloud-source-data/`.

## Configure Azure Blob Storage access

To allow TiDB Cloud Dedicated to access your Azure Blob container, you need to configure the Azure Blob access for the container. You can use a service SAS token to configure the container access:

1. On the [Azure Storage account](https://portal.azure.com/#browse/Microsoft.Storage%2FStorageAccounts) page, click your storage account to which the container belongs.

2. On your **Storage account** page, click **Security+network** in the left navigation pane, and then click **Shared access signature**.

![sas-position](/media/tidb-cloud/dedicated-external-storage/azure-sas-position.png)

3. On the **Shared access signature** page, create a service SAS token with the necessary permissions as follows. For more information, see [Create a service SAS token](https://docs.microsoft.com/en-us/azure/storage/common/storage-sas-overview).

1. In the **Allowed services** section, choose the **Blob** service.
2. In the **Allowed Resource types** section, choose **Container** and **Object**.
3. In the **Allowed permissions** section, choose the permissions as needed. For example, importing data to a TiDB Cloud Dedicated cluster needs the **Read** and **List** permissions.
4. Adjust **Start and expiry date/time** as needed. For security reasons, it's recommended to set an expiration date that aligns with your data import timeline.
5. You can keep the default values for other settings.

![sas-create](/media/tidb-cloud/dedicated-external-storage/azure-sas-create.png)

4. Click **Generate SAS and connection string** to generate the SAS token.

5. Copy the generated **SAS Token**. You will need this token string when configuring the data import in TiDB Cloud.

> **Note:**
>
> TiDB Cloud does not store your SAS token. It is recommended that you revoke or delete the SAS token after the import is complete to ensure the security of your Azure Blob Storage.

Remember to test the connection and permissions before starting your data import to ensure TiDB Cloud Dedicated can access the specified Azure Blob container and files.

0 comments on commit e191132

Please sign in to comment.