Documentation Index
Fetch the complete documentation index at: https://docs.cube.dev/llms.txt
Use this file to discover all available pages before exploring further.
This page covers backend connectivity — Cube reaching into your network to
query data sources, auth providers, BI APIs targeted by Semantic Layer Sync,
and other upstream services. See
Backend and frontend connectivity for the full picture.
For frontend connectivity (exposing Cube’s APIs to your applications,
browsers, BI tools, and embedded analytics clients), see
Private API Connectivity on AWS; the
equivalent pattern is available on Azure on request.
Granting peering access to Cube
Add the Cube tenant to your organization
First, add the Cube tenant to your organization. Open the Azure Portal and go to Azure Active Directory → External Identities → Cross-tenant access settings → Organizational Settings → Add Organization. For Tenant ID, enter197e5263-87f4-4ce1-96c4-351b0c0c714a.
Make sure that B2B Collaboration → Inbound Access →
Applications is set to Allows access.
Register the Cube service principal at your organization
To register the Cube service principal for your organization, follow these steps:- Log in with an account that has permissions to register Enterprise applications.
-
Open a browser tab and go to the following URL, replacing
<TENANT_ID>with your tenant ID:https://login.microsoftonline.com/<TENANT_ID>/oauth2/authorize?client_id=7f3afcf3-e061-4e1b-8261-f396646d7fc7&response_type=code&redirect_uri=https%3A%2F%2Fwww.microsoft.com%2F -
The Cube service principal has specific credentials. Check that the
following details match exactly what you see on the dialog box that
pops up:
- Client ID:
7f3afcf3-e061-4e1b-8261-f396646d7fc7 - Name:
cube-dedicated-infra-peering-sp
- Client ID:
Grant peering permissions on your virtual network
As the peering role you can use the built-inNetwork Contributor role or
create a custom role (e.g. cube-peering-role) with the following
permissions:
Microsoft.Network/virtualNetworks/virtualNetworkPeerings/writeMicrosoft.Network/virtualNetworks/peer/actionMicrosoft.ClassicNetwork/virtualNetworks/peer/actionMicrosoft.Network/virtualNetworks/virtualNetworkPeerings/readMicrosoft.Network/virtualNetworks/virtualNetworkPeerings/delete
- Role:
Network Contributororcube-peering-role - Members:
cube-dedicated-infra-peering-sp
Information required by Cube
When reaching out to Cube support, please provide the following information:- Virtual Network ID: Find this at Virtual Networks → Virtual Network Name → Overview → JSON view → Resource ID on the Azure Portal.
- Virtual Network Address Spaces: Find this at Virtual Networks → Virtual Network Name → Overview → JSON view → properties → addressSpace on the Azure Portal.
- Tenant ID: Find this in Azure Active Directory → Properties → Tenant ID section of the Azure Portal.
- Cube Region: VNet Peering requires Cube to be hosted on Dedicated Infrastructure. Specify which Cube Region should host your Dedicated Infrastructure.
Firewall and routing
Once the peering is established, allow traffic from Cube’s VNet CIDR block to reach your data source:-
Network Security Groups (NSGs) attached to the data-source subnet (or
the resource itself) must include an inbound rule that permits TCP traffic
from Cube’s VNet CIDR on the database port. For example, for PostgreSQL:
Cube’s VNet CIDR is shared with you alongside the peering request and is also visible in the Azure Portal on the Virtual networks → <your VNet> → Peerings → <Cube peering> → Address space field.
Priority Source Source Port Destination Service / Port Action 1000 Cube VNet CIDR (e.g. 10.x/16) *VirtualNetworkTCP / 5432 Allow - Azure Firewall / third-party NVAs: if traffic between your subnets transits a firewall, add a rule permitting TCP from the Cube VNet CIDR to the data source’s IP and port.
-
User-defined routes (UDRs): confirm that the route tables on your
subnets do not blackhole Cube’s CIDR via
0.0.0.0/0next-hop appliances. Ensure traffic destined for Cube’s VNet CIDR is routed to the Virtual network peering next-hop. - Data source firewall: if the resource has its own firewall (e.g. an Azure SQL Server firewall or a PaaS-level allow-list), add Cube’s VNet CIDR there as well.