Page tree
Skip to end of metadata
Go to start of metadata

In CloudConnect Designer, a common use case involves extracting data from a local database and uploading it to your GoodData project. This development process can be impacted by any firewalls in place to protect your internal database.

To facilitate connectivity to resources behind enterprise firewall systems, CloudConnect Designer includes a secured proxy so that all external traffic is passed through a single address. Since CloudConnect Designer is consistently reaching out to your local database from a consistent address, you can easily implement a CloudConnect reference in the whitelists of your local systems.

Implementation

Whitelisted IP addresses

To enable CloudConnect whitelisting, please add the following IP addresses to your firewall:

The IP address 107.22.195.240 is no longer valid as of March 15, 2014. Add 108.171.171.238 to your firewall settings immediately to prevent service interruption.

IP addressDescription
108.171.171.238
23.253.9.202
For secure.gooddata.com, NA Datacenter
78.136.2.250
134.213.186.151
For secure.eu.gooddata.com, EU Datacenter
209.151.86.53
209.151.86.60
For secure.ca.gooddata.com, CA Datacenter

Common Database Ports

Below, you can see the specific ports used by common database engines. Depending on the installed database, these ports need to be enabled for communication between CloudConnect Designer and the database:

PortDescription
22SFTP
1433, 1434Microsoft SQL Server
1521Oracle
3050Firebird, Interbase
3306MySQL
5349Amazon Redshift JDBC driver
5432, 5433PostgreSQL

 

  • For more information on supported integrations, see GoodData Data Sources (PDF).
  • For more information, please contact GoodData Customer Support.

GoodData Connection Ports

For more information on GoodData ports see Ports Used to Connect to GoodData.

  • No labels