DataRow can connect to your Amazon Redshift database even it’s behind a firewall or publicly not available. Just create an Amazon EC2 in your private network, use our installer to install proxy service ( HAProxy ) and assign a security group that allows inbound requests from DataRow Public IPs.

1- Allocate an Elastic IP. See “Allocating an Elastic IP Address” for more information.

2- Create a security group and add following inbound rules:

TypeProtocolPort RangeSourceDescription
RedshiftTCP54393.86.119.54/32DataRow Public IP
RedshiftTCP543950.19.197.58/32DataRow Public IP
Security group inbound rules for DataRow access

See “Creating a Security Group” for more information.

Don’t forget to update security group of your Amazon Redshift cluster to give inbound/outbound access to the EC2 that you just created.

Important: If your VPC’s Network ACL rules allows inbound/outbound connections from only specific IP addresses, you should add DataRow public IP addresses to the network ACL too, otherwise you won’t able to connect to your Amazon Redshift cluster from DataRow.

3- Launch an Instance into your VPC that your Amazon Redshift Instance is located. Assign the security group that you created, and the Elastic IP you allocated to the Instance.

4- Connect to your Linux Instance using SSH you launched. See Connecting to Your Linux Instance Using SSH for more information.

5- Install DataRow Proxy (HAProxy)

chmod +x
sudo ./ your-redshift-instance-host

6- Add your connection; enter the Elastic IP (the public IP of your Instance) to the host input.