Connecting with a VPC on AWS
To allow Cube Cloud to connect to a VPC on AWS, the following information is required:
- AWS Account ID: The AWS account ID of the VPC owner. This can be found in the top-right corner of the AWS Console.
- AWS Region: The AWS region that the VPC resides in. Ensure that the region is available in Supported Regions to see if Cube Cloud VPC connectivity is available in your region.
- AWS VPC ID: The ID of the VPC that Cube Cloud will connect to, for example
- AWS VPC CIDR: The CIDR block of the VPC that Cube Cloud will connect to,
VPC Peering Request
To accept the VPC peering request through the AWS Web Console, follow the instructions here with the following amendments:
- On Step 4, verify the peering request is from Cube Cloud by checking that the AWS account ID, region and VPC IDs match those provided by Support.
- On Step 5, ensure Modify my route tables now is selected so that the necessary routes are created.
- After Step 5, the security group for any databases within the VPC may require updating to allow traffic from Cube Cloud.
Updating security groups
Often the initial VPC setup will not allow traffic from Cube Cloud; this is usually because the security group for the database will need to allow access from the Cube Cloud CIDR block.
This can be achieved by adding a new security group rule:
- Protocol: TCP
- Port Range: The database port, usually
3306for MySQL or
- Source/Destination: The Cube Cloud CIDR block for the AWS region.
Did you find this page useful?