![]() ![]() In this we assume the Postgres RDS/MySQL RDS DB already exists and we are only configuring the SSM port forwarding for this DB. Save the Access keys and secret access key for the user created to connect to the system programmatically for using SSM port forwarding. Create a new user and add the required permission. Log in to the AWS Management Console and go to IAM section. We will be covering only the SSM port forwarding and NLB Connectivity steps in this blog., once this is created there is no difference between connecting to on-premise or on the Cloud DB ![]() View key operational metrics in the AWS Management Console, including compute/memory/storage. Once this setup is done, the connection to the DB is similar to what is being done for connecting to on-premise DB. Amazon RDS for PostgreSQL provides Amazon CloudWatch metrics for your database instances at no additional charge and Amazon RDS Enhanced Monitoring provides access to over 50 CPU, memory, file system, and disk I/O metrics. Step by step approach using AWS Open VPN is not covered, the links for creating Open VPN and connecting to the AWS VPC from the Users computer is given in the reference section. Connect AWS RDS postgresql base to power bi. Use PGADMIN from the computer and use the NLB host name for the DB host name and connect to the DB.Configure the NLB as shown below for this IP address.Use the EC2 box and get the IP address of the RDS instance using the command nslookup >.Use PGADMIN tool to connect to the Postgres RDS DB. ![]()
0 Comments
Leave a Reply. |