---
title: Integrate Microsoft Azure with Tiger Cloud | Tiger Data Docs
description: Connect your Azure infrastructure to Tiger Cloud on Azure using Azure Private Link
---

[Microsoft Azure](https://azure.microsoft.com/en-gb/) is a cloud computing platform and services suite, offering infrastructure, AI, analytics, security, and developer tools to help businesses build, deploy, and manage applications.

This page explains how to integrate your Microsoft Azure infrastructure with Tiger Cloud on Azure using [Azure Private Link](https://learn.microsoft.com/en-us/azure/private-link/private-link-overview).

Note

This feature is currently not supported for Tiger Cloud on AWS.

## Prerequisites

To follow the steps on this page:

- Create a target [Tiger Cloud service](/docs/get-started/quickstart/create-service/index.md) with the Real-time analytics capability.

* Create an [Azure account](https://azure.microsoft.com/en-gb/pricing/purchase-options/azure-account) with an active subscription.
* Configure [permissions](https://learn.microsoft.com/en-us/azure/private-link/rbac-permissions) to create private endpoints and manage network resources.
* Create an [Azure Virtual Network](https://learn.microsoft.com/en-us/azure/virtual-network/quickstart-create-virtual-network?tabs=portal) with a subnet for the resources you will connect to Tiger Cloud.

## Set up Azure Private Link connection

Note

Azure Private Link is currently in private preview. To request access in Tiger Console, go to `Security` > `Private Endpoints` and click `Request access`. Then refresh the page and follow the steps below.

Take the following steps to connect Tiger Cloud to Azure with Private Link:

1. **Create a Private Link subscription authorization**

   1. In [Tiger Console](https://console.cloud.tigerdata.com/dashboard/azure-privatelink), select `Security` > `Private Endpoints` > `Configure Private Endpoint Connection`.
   2. Enter your [Azure subscription ID](https://learn.microsoft.com/en-us/azure/azure-portal/get-subscription-tenant-id#find-your-azure-subscription) and specify a name for the Private Link authorization, then click a checkmark next to it. ![Azure Private Link authorization](/docs/_astro/configure-private-link-authorization.Fx6efBGm_ZpzMMJ.webp)
   3. Under `Alias`, copy the alias for the region in which you need to create the connection. Choose the region closest to your Azure resources for optimal performance.
   4. Click `Done`. Tiger Cloud confirms your authorization. Once it is confirmed, you can create multiple private endpoints from the same authorized subscription. ![Azure Private Link authorization complete](/docs/_astro/private-link-authorization-complete.BBS73pc-_3HHHG.webp)

2. **Create a private endpoint**

   1. In [Azure Portal](https://azure.microsoft.com/en-us/get-started/azure-portal), go to `Private endpoints` and click `Create`. ![Create Azure Private Endpoint](/docs/_astro/create-private-endpoint-azure.BEjIkaB7_Z13XlPp.webp)
   2. In `Subscription`, select the subscription you have previously authorized in Tiger Cloud.
   3. In `Resource group`, select an existing resource group or create a new one for your private endpoint.
   4. Provide a name for your endpoint.
   5. Select the region where your Virtual Network is deployed, then click `Next: Resource`.
   6. In `Connection method`, select `Connect to an Azure resource by resource ID or alias`.
   7. In `Resource ID or alias`, paste the alias you have copied from Tiger Console.
   8. In `Request message`, enter your [Tiger Cloud project ID](/docs/integrate/find-connection-details/index.md), then click `Next: Virtual Network`.
   9. Select the Virtual Network and subnet for your endpoint, optionally select an application security group, then click `Next: DNS`.
   10. Optionally configure private DNS integration and tags for your endpoint, then click `Next: Review + create`.
   11. Review your config and click `Create`. Azure creates your private endpoint. Wait for the deployment to succeed.
   12. Go to `Private endpoints` and copy the private endpoint IP from the `Private IP` column.

3. **Sync the connection**

   1. In [Tiger Console](https://console.cloud.tigerdata.com/dashboard/azure-privatelink) > `Security` > `Private Link`, click `Refresh`. Tiger Cloud automatically approves connections from authorized subscriptions. Your connection appears in the list. ![Azure Private Endpoint IP](/docs/_astro/private-link-add-ip.CXR8Gl7x_Z2lS5se.webp)
   2. Click `Add IP` and paste the IP address you have copied from Azure Portal.
   3. Click the three dots next to your connection and select `+ Attach service`. Select your service from the dropdown and click `Attach`. You can attach a service to one Private Endpoint connection.
   4. From a VM inside your Azure VNet, connect to your service using a connection string with your [connection details](/docs/integrate/find-connection-details/index.md). You should be able to connect successfully.

   Warning

   After attaching a service to a Private Endpoint, it is no longer accessible from the public internet. Make sure all your applications are configured to connect through the Private Endpoint before attaching your service.

## Manage connections

- To detach a service from a Private Endpoint connection, go to `Security` > `Private Endpoints` and expand the details of the corresponding connection. Click the trash bin icon and confirm detaching your service.
- To edit or remove a connection, click the three dots next to the connection in the list and select `Edit` or `Disconnect`, respectively. Detach services from the connection before deleting it.
- To remove an authorization, click `Manage Authorizations` > trash bin icon. Disconnect all relevant connections before removing an authorization.
