PowerBI
Add a PowerBI connection to your decube so that you can discover the lineage of your assets from source to dashboards.
PowerBI
Supported Capabilities
Metadata Extraction
✅
Metadata Types Collected
Schema, Virtual Table, Virtual Column, Chart, Dashboard
Data Profiling
❌
Data Preview
❌
Data Quality
❌
Configurable Collection
✅
External Table
❌
View Table
❌
Stored Procedure
❌
Supported Lineage Mapping
PowerBI supports lineage mapping from the following sources:
- Upstream Connectors: bigquery, postgresql, sql_server, synapse, snowflake, databricks 
Credentials
Connecting to PowerBI requires credentials that can be configured and found through this guide. These credentials include:
- Tenant ID
- Client ID
- Client Secret

To note, for complete Lineage to report sources, with additional configurations we only support sources from:
- BigQuery 
- PostgreSQL 
- Microsoft SQL 
- Snowflake 
- Synapse 
The connector might be rate-limited when it is scanning more than 1000 workspaces.
Prerequisite
- Access to Azure Active Directory for service principals. 
- A PowerBI Pro or Premium (Premium per-user or Premium capacity ) workspace. 
- Admin access to PowerBI to change Tenant Settings. 
Creating Service Principals and Security Group
- Go to Azure Active Directory, under the Manage tab to the left of the screen, look for - App Registrationsand click it.
- Click on - New Registrationson the top of the tab and you'll be presented with the screen below.

- We recommend entering - decubeas the Name. Click Register when you are done.

- Click Overview on the left tab and take note of the - Client IDand- Tenant IDwe would require when setting up decube.
- Click on - Certificates and Secrets on the left tab again and click on- New Client Secretas below. We recommend the description to be- 'decube client secret' and the expiry date to be until the end of your contract with us.
Make sure to copy the Value of the Client Secret and store it somewhere safe like Azure Key Vault. We will need this value for registration.

- Go back to the Azure Active Directory main page and on the left tab again click on Groups. Click - Create New Group.

- Ensure Group Type is - Security.
- Click on members and search for the previously configured Service Principal. Here it would be - decube.

- Click on - Selectto add the service principal into the group.
- Click on - Createand we are done retrieving the- Tenant ID,- Client IDand- Client Secretfor this integration.
Setting up and providing permissions to Service Principal
- On the main PowerBI workspace page, on the top right corner, click on the gear icon to Setting and below - Governance and Insightyou will find- Admin Portal.
- Here in the Admin Portal, find Tenant Settings and search for - Allow service principals to use Power BI APIs under Developer Settings.
- Enable it and either - Apply to Entire Organisationor- Specific Security Group.Here you can search for the one we created earlier. Example of how it should look like below.

- Please enable and do this for the following settings as well under - Admin APIsettings.
- Allow service principals to use read-only admin APIs
- Enhance admin APIs responses with detailed metadata
- Enhance admin APIs responses with DAX and mashup expressions
Additional Configuration for lineage
To build out the lineage, we will need to know the data sources that you've referenced within your PowerBI definitions. You can do a one-time mapping for the sources by going to the Data Sources page > Modify Data Source > Additional Config.

Last updated