


Select the correct SSH tunneled source connection (for example, MySQL).In Rivery console, Go to Connections in the main menu and click New Connection.There is a requirement to generate a new public key that will allow Rivery to connect to the server. Set permissions to file: chmod 600 ~/.ssh/authorized_keys.Create authorized_keys file: touch ~/.ssh/authorized_keys.Set permissions to the directory: chmod 700 ~/.ssh.Switch control to rivery user: sudo su - rivery.Create a user rivery: sudo useradd -m -g rivery rivery.Connect to your ssh tunnel server using ssh (we're using the same example of the aws server created above): ssh -i /path/to/key_pair.pem Create a group rivery: sudo groupadd rivery.Run the following commands on your SSH tunnel host:
#Ssh tunnel through bastion host aws install
On Windows, you'll need to install an SSH client like OpenSSH to use SSH. This part assumes you're using a Linux or Ubuntu SSH server. Create SSH Tunnel Using Auto-Generated Public Key Create a security group on your Redshift cluster/database instances that allow inbound rules of ports 5439 from the SSH tunneling instance private IP.Create a security group for the instance that allows SSH port 22 inbound rules to Rivery IPs.If any additional user for our service in the instance is required, follow the instructions for this procedure and get the KeyPair in order to connect the instance. While creating the instance, an internal user (ec2-user in most instances) is created and attached to a KeyPair file (.pem/.pub files). Create a small instance in your database.Set up an SSH tunnel on AWS EC2 by following these steps: Configuring an SSH TunnelĬonnect to an AWS EC2 Linux instance via SSH, and then use the same connection to connect to the database instance/Redshift/Azure SQL DWH cluster.
#Ssh tunnel through bastion host aws how to
This tutorial will show you how to configure the server so that Rivery can access it, but it will not show you how to build the server.
