This article walks you through the process of allowing Xplenty direct access to your databases on RDS. If you'd like to use an SSH tunnel, click here to read more.
You can watch this short video that demonstrates setting up a connection to MySQL RDS in VPC or read below for textual instructions.
The security rules are setup with either a VPC or an EC2 instance to provide Xplenty access to the database IP address and port. The default ports for supported databases are:
- mysql - 3306
- SQL Server - 1433
- PostgreSQL - 5432
To verify or modify the security rules of an instance on VPC:
Note: You must provision the instance with Publicly Accessible set to the default value Yes.
- View the instance in the RDS Dashboard and click on the Security Group listed in the Security and Network section of the DB Instance pane.
- In the Security Group screen, select the Inbound tab.
- Add rules for the relevant IP addresses listed here. In each rule select the type of database and enter the port used by the database.
- If not, click Edit to change an existing rule or click Add Rule to add the rules.
To configure your database to only accept SSL encrypted connections see https://aws.amazon.com/rds/faqs/#53 for more information.
To verify or modify the security rules of an instance on EC2-classic (RDS not on a VPC):
- Open the instance and click on the Security group listed in the Security and Network section of the DB Instance pane.
- In the Security Groups screen select the Inbound tab and click Edit.
- Modify a rule or Click Add Rule to add each rule.
Add new rules for each IP address listed in Xplenty's IP addresses list:
- In the "Type" dropbox, choose Custom TCP rule.
- In the port range, add the port that your database listens to.
- In the source dropbox select Custom IP and enter one of the IP addresses.