Skip to content
English
  • There are no suggestions because the search field is empty.

Quickstart: Provisioning your CAEVES instance in Microsoft Azure

This guide walks you through the end-to-end process of deploying a CAEVES instance using the Microsoft Marketplace Quickstart, including all prerequisites required to ensure a successful deployment.

The CAEVES instance is a hardened server appliance that delivers intelligent deep storage capabilities directly into your Azure environment—with no manual setup required.

Prerequisites for Quickstart Deployment

Before launching the CAEVES Quickstart deployment, ensure the following prerequisites are met. Completing these steps in advance prevents deployment failures and permission-related errors.

1. Active Azure Subscription 
  • You must have an active Microsoft Azure subscription with billing enabled.
  • Ensure the account used has Owner or Contributor permissions on the target subscription.
  • MicrosoftMarketplace purchases must be enabled for your subscription.
2. Mandatory CAEVES Minimum Requirement Role 
2.1 Create the Custom CAEVES Role in Azure

As part of the deployment process, customers must create a custom Azure Role that includes all permissions listed in the CAEVES Minimum Requirement Role specification.

Steps to Create the Custom Role:
  1. Go to Azure Portal
  2. On the left menu, select Microsoft Entra ID.
  3. In the left navigation panel, choose Roles and administrators.
  4. Click + New custom role (top area).
  5. choose: Start from JSON
  6. Click Upload.
  7. Select the file Json file.
  8. Click Next through the tabs (Permissions, Assignable scopes, JSON) to review.
  9. Click Create.

Your CAEVES Minimum Requirement Role is now created.

2.2 Assign the Custom Role to the Deployment Identity
  1. In Azure Portal, open Subscriptions.
  2. Select the subscription.
  3. In the left menu, click Access control (IAM).
  4. Click + Add → Add role assignment.
  5. Under Role, search for and select: CAEVES Minimum Requirement Role
  6. Click Next.
  7. Click Select members.
  8. Search for the user or service principal (App Registration).
  9. Click Review + assign to confirm.

The identity now has the required permissions to deploy.

2.3 Required RBAC Permissions 

To successfully deploy, ensure the user or service principal has the following Azure Role-Based Access Control (RBAC) permissions:

                    "Microsoft.Resources/deployments/validate/action",

                    "Microsoft.Resources/deployments/write",

                    "Microsoft.Authorization/roleAssignments/write",

                    "Microsoft.Resources/subscriptions/resourceGroups/read",

                    "Microsoft.Resources/subscriptions/resourceGroups/write",

                    "Microsoft.SaaS/resources/read",

                    "Microsoft.Storage/storageAccounts/listkeys/action",

                    "Microsoft.Storage/storageAccounts/read",

                    "Microsoft.Compute/virtualMachines/extensions/write",

                    "Microsoft.Compute/virtualMachines/write",

                    "Microsoft.Storage/storageAccounts/write",

                    "Microsoft.Network/publicIPAddresses/write",

                    "Microsoft.Network/networkInterfaces/write",

                    "Microsoft.Network/networkSecurityGroups/write",

                    "Microsoft.Network/virtualNetworks/write",

                    "Microsoft.Storage/storageAccounts/blobServices/write",

                    "Microsoft.Storage/storageAccounts/blobServices/containers/write",

                    "Microsoft.Storage/storageAccounts/tableServices/write",

                    "Microsoft.Storage/storageAccounts/tableServices/tables/write",

                    "Microsoft.Resources/deployments/read",

                    "Microsoft.Resources/deployments/operations/read",

                    "Microsoft.Resources/deployments/operationstatuses/read",

                    "Microsoft.Network/networkSecurityGroups/read",

                    "Microsoft.Network/publicIPAddresses/read",

                    "Microsoft.Network/virtualNetworks/read",

                    "Microsoft.Network/networkSecurityGroups/join/action",

                    "Microsoft.Network/networkInterfaces/read",

                    "Microsoft.Network/networkInterfaces/delete",

                    "Microsoft.Network/virtualNetworks/subnets/join/action",

                    "Microsoft.Network/applicationSecurityGroups/read",

                    "Microsoft.Network/publicIPAddresses/join/action",

                    "Microsoft.Network/networkInterfaces/join/action",

                    "Microsoft.Compute/disks/read",

                    "Microsoft.Compute/disks/beginGetAccess/action",

                    "Microsoft.Compute/virtualMachines/start/action",

                    "Microsoft.Compute/virtualMachines/runCommand/action",

                    "Microsoft.Compute/virtualMachines/extensions/read",

                    "Microsoft.Compute/virtualMachines/read",

                    "Microsoft.Compute/virtualMachines/deallocate/action",

                    "Microsoft.Compute/virtualMachines/restart/action",

                    "Microsoft.Compute/virtualMachines/delete",

                    "Microsoft.Network/virtualNetworks/subnets/read",

                    "Microsoft.Compute/disks/write",

                    "Microsoft.Compute/disks/delete",

                    "Microsoft.Compute/disks/endGetAccess/action"

3. Azure CLI, PowerShell, or Portal Access

Depending on your chosen deployment method:

  • Azure Portal: Access to Azure Portal with sign-in credentials.
  • Azure CLI: Installed and configured locally.
  • Download the installer:

                  https://aka.ms/installazurecliwindows

  • Run the installer:

                  Double-click the downloaded .msi file.

                  Follow the installation wizard.

  •   Verify installation:

                  Open Command Prompt and run:  az --version

               

  • Azure PowerShell: Installed and connected via Connect-AzAccount
4. Registered Azure Resource Providers

Ensure the following resource providers are registered:

  • Microsoft.Compute
  • Microsoft.Network
  • Microsoft.Storage
  • Microsoft.KeyVault

Register using Azure CLI:

  • az provider register --namespace Microsoft.Compute
  • az provider register --namespace Microsoft.Network
  • az provider register --namespace Microsoft.Storage
  • az provider register --namespace Microsoft.KeyVault

To verify registration:

az provider list --output table

             

You may also register providers via Azure Portal → Subscriptions → Resource providers.

Register Using the Azure Portal:

You can also register resource providers through the Azure Portal:

  1. Sign in to the Azure Portal: Azure Portal
  2. Navigate to Subscriptions.
  3. Select the subscription you will use for the deployment.
  4. In the left-hand menu, select Resource providers.
  5. Use the search bar to find the required providers, such as:
    Microsoft.Compute
    Microsoft.Network
    Microsoft.Storage
    Microsoft.KeyVault
  6. Select each provider and click Register.
  7. Wait for the status to display Registered.

5. Azure Active Directory (Entra ID) Configuration 
  • Ensure your Azure AD tenant is properly configured.
  • The user subscribing must belong to the same Azure AD tenant as the Azure subscription.
  • If your SaaS solution uses service principals or managed identities, verify they have the necessary role assignments.
6.  Network and Resource Availability
  • Confirm any required network resources (VNet, subnets, public IPs) exist or will be created.

  • Ensure quotas (e.g., VM cores, storage accounts) are available in the target region.

7. Template Parameters and Resource Naming

Review the Quickstart template to identify required parameters such as:

  • Admin username/password or SSH key

  • Region and resource group name

  • App-specific settings (e.g., VM size)

    Validate all parameters such as region, VM size, and naming conventions before deployment.

Once all prerequisites are met, you are ready to deploy the CAEVES Quickstart.

Provisioning Your CAEVES Instance in Microsoft Azure

What is the CAEVES Instance?

  • A virtual machine with CAEVES software preinstalled

  • Acts as both a deep storage interface and a data migration engine

  • Supports multi-protocol file sharing (SMB & NFS)

  • Preserves NTFS permissions & ACLs via Active Directory or Entra ID

  • Enables real-time caching, intelligent data tiering, and snapshotting

  • Perfect for hybrid and public Microsoft Azure datacenters

Step-by-Step: Provisioning via Microsoft Marketplace

Step 1: Launch the Quickstart Deployment
Step 2: Basic Setup
  • Select your Azure Subscription, Resource Group, and Region

  • Deploy near your data & AI workloads to minimize latency

  • Associate your previously created CAEVES subscription

Step 3: Configure the Virtual Machine
  • Name your CAEVES VM instance

  • Choose a VM size (we pre-select the recommended size)

  • Set the Data Disk Size (default: 1TB)
    • Used for metadata, cache, and snapshots
    • Minimum: 128GB (~10 million files)
    • Recommended: 1TB (~50+ million files)
  • Create a local admin account (for troubleshooting only)
Step 4: Network Configuration
  • Choose an existing or new Virtual Network and Subnet
  • Assign a Public IP Address (optional)
    • We recommend disabling public IP and using a Bastion Host for RDP access
  • See the CAEVES KB for IP allocation best practices
 Step 5: Active Directory & Security
  • Choose Workgroup or Domain-joined mode
  • Join via:
    • Traditional Active Directory
    • Microsoft Entra ID Domain Services
  • A system-managed identity will be created by default for Entra ID integration
Step 6: Configure CAEVES Cloud Object Storage
  • Provision a CAEVES Storage Account
    • Hosts all object data and associated snapshots
    • Includes a Metadata Table used by:
      • CAEVES Copilot Connector (for RAG search & M365 integration)
      • Microsoft 365 Search indexing
Step 7: Configure Snapshots & Retention Policies
  • Enable VSS (Volume Shadow Copy) by default
    • Supports Previous Versions file restore
  • Activate Metadata Snapshot Scheduling
    • Snapshots ~10% of your data disk size to object storage
    • Used for disaster recovery and instance rebuilds
  • Review snapshot sizing, retention tiers, and cost estimates in the CAEVES KB
 Step 8: Final Review & Deployment
  • Supply your phone number

  • Review your full deployment configuration

  • Click Create to start the provisioning process

Deployment takes ~5–10 minutes and includes:

  • CAEVES Virtual Machine

  • Cloud Object Storage & Metadata Services

  • All dependencies auto-provisioned

After Deployment

Once complete, you can:

  • Validate the instance status

  • Begin migrating legacy file data to CAEVES