Overview
To allow TextQL to connect to your database, you need to whitelist the following IP addresses in your database’s firewall or security group settings:44.229.62.6954.69.138.147
Configuration by Database Provider
AWS (RDS, Aurora, Redshift)
- Go to your database in the RDS Console
- Click the Connectivity & Security tab
- Click on the VPC security group link
- Click Inbound rules and then Edit inbound rules
- Add rule: Type=
MYSQL/Aurora, Port=3306, Source=44.229.62.69/32 - Add rule: Type=
MYSQL/Aurora, Port=3306, Source=54.69.138.147/32
- Add rule: Type=
PostgreSQL, Port=5432, Source=44.229.62.69/32 - Add rule: Type=
PostgreSQL, Port=5432, Source=54.69.138.147/32
- Add rule: Type=
Redshift, Port=5439, Source=44.229.62.69/32 - Add rule: Type=
Redshift, Port=5439, Source=54.69.138.147/32
- Click Save rules
Azure (Synapse, SQL Database, PostgreSQL)
- Go to your database or workspace in the Azure portal
- Navigate to Networking in the left menu
- Under Firewalls, click Add firewall rule
- Add rule: Name=
TextQL-IP-1, Start IP=44.229.62.69, End IP=44.229.62.69 - Add rule: Name=
TextQL-IP-2, Start IP=54.69.138.147, End IP=54.69.138.147 - Click Save to apply the changes
Google Cloud (BigQuery, Cloud SQL)
For Cloud SQL:- Go to your Cloud SQL instance in the Google Cloud Console
- Click Connections in the left menu
- Under Authorized networks, click Add network
- Add network: Name=
TextQL-IP-1, Network=44.229.62.69/32 - Add network: Name=
TextQL-IP-2, Network=54.69.138.147/32 - Click Done and then Save
Databricks
- Go to your Databricks workspace settings
- Navigate to IP Access Lists
- Click Add to create a new IP access list
- Add IP:
44.229.62.69/32 - Add IP:
54.69.138.147/32 - Enable the IP access list
Other Database Providers
For databases hosted on other platforms, add the TextQL IP addresses to your firewall or network security settings according to your provider’s documentation. The general principle is the same: allow inbound connections from the two IP addresses listed above.Troubleshooting
TextQL Cannot Connect After Adding IPs
Verify the following:- IP addresses entered correctly:
44.229.62.69and54.69.138.147 - Correct port is open for your database type:
- MySQL/Aurora MySQL: 3306
- PostgreSQL/Aurora PostgreSQL: 5432
- Redshift: 5439
- SQL Server/Azure Synapse: 1433
- Snowflake: 443
- Database credentials are correct
- Database is publicly accessible (or appropriately configured for external connections)
- VPC or subnet configurations allow external traffic
- Multiple layers of firewalls (network ACLs, security groups, etc.) all need updating
Connection Timeout
Possible causes:- Firewall rules not applied yet (may take a few minutes)
- Incorrect host URL or port
- Database server not running
- Network connectivity issues
Authentication Errors
These are not network issues:- Verify username and password
- Check user permissions
- Ensure user can connect from external IPs
Security Best Practices
Principle of Least Privilege
- Create a dedicated read-only user for TextQL
- Grant access only to necessary schemas/tables
- Use strong passwords
- Rotate credentials regularly
Monitoring and Auditing
- Enable query logging
- Monitor connection attempts
- Set up alerts for unusual activity
- Review access logs regularly
Data Protection
- Use SSL/TLS for connections (enabled by default)
- Encrypt sensitive data at rest
- Implement row-level security where appropriate
- Mask sensitive columns
VPC and Private Network Deployments
Enterprise Deployment Options: The IP whitelisting instructions above are for standard cloud deployments. If you require VPC peering, on-premises connectivity, or single-tenant deployment, different network configuration applies.
- VPC Peering: Available for dedicated deployments
- AWS PrivateLink: Supported for AWS customers
- Azure Private Endpoints: Available for Azure customers
- On-Premises Connectivity: Custom network configuration required
- Single-Tenant Deployments: Dedicated infrastructure with custom networking
- Email: [email protected]
- Subject: Enterprise Network Configuration
- Include: Your deployment type and network requirements